Граф коммитов

72 Коммитов

Автор SHA1 Сообщение Дата
Jesse Schwartzentruber 0026d74b59 Bug 1695285 - Pass ASan/UBSan flags to cargo for native builds. r=firefox-build-system-reviewers,glandium
Differential Revision: https://phabricator.services.mozilla.com/D106652
2021-03-18 20:46:55 +00:00
Doug Thayer cd96536b38 Bug 1656526 - Add resolver_64.cc to asan_blacklist_win.txt r=dmajor
resolver_64.cc should have been on the list all along, because the InternalThunk
constructor runs before ASan init. It was probably just accident (maybe inlining?)
that we got away with not including it in the past.

Differential Revision: https://phabricator.services.mozilla.com/D89669
2020-09-15 14:50:26 +00:00
Dorel Luca 634b687351 Backed out 4 changesets (bug 1656526) for Browser-chrome failures in toolkit/xre/test/browser_checkdllblockliststate.js. CLOSED TREE
Backed out changeset 24648c48a49c (bug 1656526)
Backed out changeset 472b724994eb (bug 1656526)
Backed out changeset 6fbb7e7ac121 (bug 1656526)
Backed out changeset 88ff36a4bcfb (bug 1656526)
2020-09-11 23:17:23 +03:00
Doug Thayer ebf7f05657 Bug 1656526 - Add resolver_64.cc to asan_blacklist_win.txt r=dmajor
resolver_64.cc should have been on the list all along, because the InternalThunk
constructor runs before ASan init. It was probably just accident (maybe inlining?)
that we got away with not including it in the past.

Differential Revision: https://phabricator.services.mozilla.com/D89669
2020-09-11 14:12:25 +00:00
David Major bd18433165 Bug 1614375: bustage fix, add a couple more suppressions for straggler failures 2020-05-12 14:50:34 -04:00
David Major 5fff0f03db Bug 1614375 - UBSan pointer-overflow suppressions for clang-10 r=tsmith
Differential Revision: https://phabricator.services.mozilla.com/D63690
2020-05-08 21:46:08 +00:00
Tyson Smith d97983b83c Bug 1404547 - Enable 'enum' UBSan check. r=froydnj,mccr8
Differential Revision: https://phabricator.services.mozilla.com/D65393

--HG--
extra : moz-landing-system : lando
2020-03-04 20:22:30 +00:00
Mihai Alexandru Michis 3bdc97b4c6 Backed out changeset 4af4d32ee984 (bug 1404547) for causing wpt leaks. 2020-03-04 12:23:34 +02:00
Tyson Smith 7f6936156c Bug 1404547 - Enable 'enum' UBSan check. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D65213

--HG--
extra : moz-landing-system : lando
2020-03-03 22:30:39 +00:00
Tyson Smith 30f2b5474f Bug 1602536 - Enable 'object-size' UBSan check r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D56472

--HG--
extra : moz-landing-system : lando
2019-12-09 22:07:12 +00:00
Christian Holler a157a20300 Bug 1587463 - Remove LSan/UBSan suppressions option from automation. r=ahal
Depends on D48786

Differential Revision: https://phabricator.services.mozilla.com/D48787

--HG--
extra : moz-landing-system : lando
2019-10-16 16:11:23 +00:00
Doug Thayer 534ac9e360 Bug 1550108 - Pull in secondary lz4 libraries r=glandium
I opted to go with what I perceived as the more expedient route
of leaving lz4 roughly where it is and just adding to that. The
biggest complication was xxhash, which is included elsewhere.
I'm not generally proficient with build-related things though so
my solution may be wrong and not just ugly.

Differential Revision: https://phabricator.services.mozilla.com/D30640

--HG--
rename : mfbt/lz4.c => mfbt/lz4/lz4.c
rename : mfbt/lz4.h => mfbt/lz4/lz4.h
extra : moz-landing-system : lando
2019-10-04 20:44:08 +00:00
Cosmin Sabou 14938bad3b Backed out 10 changesets (bug 1550108) for causing build bustages on StartupCache.cpp.
Backed out changeset cbadfa2bbd7e (bug 1550108)
Backed out changeset 2560f0ab6ebf (bug 1550108)
Backed out changeset 0a1fa8d8bb3c (bug 1550108)
Backed out changeset 62416909cf67 (bug 1550108)
Backed out changeset 60991713b1e2 (bug 1550108)
Backed out changeset f950e30afd90 (bug 1550108)
Backed out changeset e63d0a1fec38 (bug 1550108)
Backed out changeset 7a009d42e7e7 (bug 1550108)
Backed out changeset 395affa4c205 (bug 1550108)
Backed out changeset 0fd41e9dbd2a (bug 1550108)

--HG--
rename : mfbt/lz4/lz4.c => mfbt/lz4.c
rename : mfbt/lz4/lz4.h => mfbt/lz4.h
2019-09-29 01:14:31 +03:00
Doug Thayer fdbddfa996 Bug 1550108 - Pull in secondary lz4 libraries r=glandium
I opted to go with what I perceived as the more expedient route
of leaving lz4 roughly where it is and just adding to that. The
biggest complication was xxhash, which is included elsewhere.
I'm not generally proficient with build-related things though so
my solution may be wrong and not just ugly.

Differential Revision: https://phabricator.services.mozilla.com/D30640

--HG--
rename : mfbt/lz4.c => mfbt/lz4/lz4.c
rename : mfbt/lz4.h => mfbt/lz4/lz4.h
extra : moz-landing-system : lando
2019-09-27 22:15:01 +00:00
Brendan Dahl b474db77c6 Bug 1551344 - Part 1: Remove XULDocument code. r=smaug,Jamie
All .xul files have been loading as HTMLDocuments for a few weeks now, so
it should be safe to remove the XULDocument implementation.

Differential Revision: https://phabricator.services.mozilla.com/D41238

--HG--
extra : moz-landing-system : lando
2019-08-09 19:57:50 +00:00
Ehsan Akhgari 4cb428d268 Bug 1555205 - Move db/sqlite3 to third_party/; r=mak
Differential Revision: https://phabricator.services.mozilla.com/D32939

--HG--
rename : db/sqlite3/README => third_party/sqlite3/README
rename : db/sqlite3/README.MOZILLA => third_party/sqlite3/README.MOZILLA
rename : db/sqlite3/src/moz.build => third_party/sqlite3/src/moz.build
rename : db/sqlite3/src/sqlite.symbols => third_party/sqlite3/src/sqlite.symbols
rename : db/sqlite3/src/sqlite3.c => third_party/sqlite3/src/sqlite3.c
rename : db/sqlite3/src/sqlite3.h => third_party/sqlite3/src/sqlite3.h
extra : moz-landing-system : lando
2019-05-29 10:16:29 +00:00
Emilio Cobos Álvarez 1834c20f36 Bug 1518045 - Make Servo use a single thread-pool for layout-related tasks per-process. r=jdm
Instead of per-document. This also allows to reuse this thread-pool if needed
for other stuff, like parallel CSS parsing (#22478), and to share more code with
Gecko, which is always nice.

This cherry-picks https://github.com/servo/servo/pull/22487, with a few minor
fixes to the build that are landing as part of the sync associated to this bug,
and an lsan exception tweak to point to the right module since it's moving.
2019-01-07 00:53:04 +01:00
svoisen d9fce4a9d0 Bug 1466722 - Remove remaining references to nsCSSRuleProcessor since it has been removed. r=heycam
Differential Revision: https://phabricator.services.mozilla.com/D3928

--HG--
extra : moz-landing-system : lando
2018-08-22 01:29:39 +00:00
Jeff Walden 49725cf601 Change the sanitizer blacklist files to use *nix line endings. No bug, r=lumpy 2018-03-06 15:17:55 -08:00
Jeff Walden 953c3dadc3 Fix the attribute names in the comments in the sanitizer blacklists to the final adopted names. No bug, r=sparky 2018-03-06 15:16:54 -08:00
Jeff Walden 76b527d6d8 Bug 1443342 - Don't blacklist nsCSSProps.cpp:SortPropertyAndCount from integer-overflow sanitizing. r=froydnj
--HG--
extra : rebase_source : b5d9da242923e0ae43abf6a508e0298b64741466
2018-03-06 09:34:04 -08:00
Jeff Walden 212527bdf1 Bug 1443342 - Remove XorShift128PlusRNG.h from integer-overflow sanitizer blacklisting. r=froydnj
--HG--
extra : rebase_source : 6ecedb849aa51cffc493017661025365ecdb1eb2
2018-03-06 09:33:52 -08:00
Jeff Walden ed3e951980 Bug 1443342 - Blacklist nsZipArchive.cpp's entry-name hashing function from being checked for unsigned integer overflows, because it knowingly relies on them. r=froydnj
--HG--
extra : rebase_source : f71e49bcb679b1c3d3a1a8e48f2d6bffd320e876
2018-03-01 17:11:39 -08:00
Jeff Walden ba5975180b Bug 1443342 - Opt one HashFunctions.h function out of integer-overflow sanitizing and don't blacklist HashFunctions.h. r=froydnj
--HG--
extra : rebase_source : a33b53362c1f9ce96df22a321990a45a224af9d6
2018-03-01 17:11:33 -08:00
Jeff Walden 25a7df6306 Bug 1441657 - Implement mozilla::WrappingMultiply. r=froydnj
--HG--
extra : rebase_source : 57d1796976a25597ee4dda90561d40debc6a9fc9
2018-02-15 17:36:55 -08:00
Jeff Walden 792f264ae3 Bug 1437739 - Don't blacklist the entirety of the JS engine for the signed integer overflow sanitizer. jstests and jit-tests only report two runtime signed overflows, so the problem appears easily well corralled enough to not exclude the entire engine. r=decoder
--HG--
extra : rebase_source : d501e76485383cdb88dafed009615b79dfc13fc5
2018-02-02 21:35:30 -08:00
Jeff Walden 0e77ce073b Bug 1435484 - Split the integer-overflow blacklist into two blacklists, one for signed integer overflow and one for unsigned integer overflow, and rename both configure flags to be clearer. r=decoder, r=froydnj
--HG--
rename : build/sanitizers/ubsan_blacklist_int.txt => build/sanitizers/ubsan_signed_overflow_blacklist.txt
rename : build/sanitizers/ubsan_blacklist_int.txt => build/sanitizers/ubsan_unsigned_overflow_blacklist.txt
2018-02-02 21:25:31 -08:00
David Major de1574c9ea Bug 1418453 - Change asan_blacklist_win.txt syntax to get it working again. r=glandium
--HG--
extra : rebase_source : ca7d9b74176d78c87d708eefee2ee244b39cd3c0
2017-11-22 12:07:00 -05:00
Alfredo.Yang 7bdbfe6743 Bug 1417011 - remove stagefright folder. r=kinetik
MozReview-Commit-ID: F20u08Dr1yn

--HG--
extra : rebase_source : cd23f462c072f194e5bd8a16c72d0ca02cf9be35
2017-11-15 14:34:07 +08:00
J. Ryan Stinnett 7bc9824a4f Bug 1363976 - Suppress global_style_data for LSAN. r=bholley
Suppress leaks for allocations where any stack frame matches the string
style::gecko::global_style_data.  This could be dangerous if someone were to
allocate non-global things with this on the stack, but hopefully that can be
avoided, given the name of the module.

MozReview-Commit-ID: 65HpUGsgPPM

--HG--
extra : rebase_source : 19ba5a5001de65628acdb0433341d14429e4af67
2017-08-07 19:55:51 -05:00
Christian Holler b8ee76ebd8 Bug 1373256 - Changes to support -fsanitize=integer in the codebase. r=froydnj
The -fsanitize=integer analysis from UBSan can be helpful to detect signed and unsigned integer overflows in the codebase. Unfortunately, those occur very frequently, making it impossible to test anything with it without the use of a huge blacklist. This patch includes a blacklist that is broad enough to silence everything that would drain performance too much. But even with this blacklist, neither tests nor fuzzing is "clean". We can however in the future combine this with static analysis to limit ourselves to interesting places to look at, or improve the dynamic analysis to omit typical benign overflows.

It also adds another attribute that can be used on functions. It is not used right now because it was initially easier to add things to the compile-time blacklist to get started.

Finally, it includes a runtime suppression list and patches various parts in the test harnesses to support that. It is currently empty and it should not be used on frequent overflows because it is expensive. However, it has the advantage that it can be used to differentiate between signed and unsigned overflows while the compile-time blacklist cannot do that. So it can be used to e.g. silence unsigned integer overflows on a file or function while still reporting signed issues. We can also use this suppression list for any other UBSan related suppressions, should we ever want to use other features from that sanitizer.

MozReview-Commit-ID: C5ofhfJdpCS

--HG--
extra : rebase_source : 952043a441b41b2f58ec4abc51ac15fa71fc142f
2017-04-09 12:59:26 +02:00
Carsten "Tomcat" Book d8e080c10c Backed out changeset 07e0c4e4ae85 (bug 1373256) for breaking android tests 2017-06-28 14:47:55 +02:00
Christian Holler 9924ab3046 Bug 1373256 - Changes to support -fsanitize=integer in the codebase. r=froydnj
The -fsanitize=integer analysis from UBSan can be helpful to detect signed and unsigned integer overflows in the codebase. Unfortunately, those occur very frequently, making it impossible to test anything with it without the use of a huge blacklist. This patch includes a blacklist that is broad enough to silence everything that would drain performance too much. But even with this blacklist, neither tests nor fuzzing is "clean". We can however in the future combine this with static analysis to limit ourselves to interesting places to look at, or improve the dynamic analysis to omit typical benign overflows.

It also adds another attribute that can be used on functions. It is not used right now because it was initially easier to add things to the compile-time blacklist to get started.

Finally, it includes a runtime suppression list and patches various parts in the test harnesses to support that. It is currently empty and it should not be used on frequent overflows because it is expensive. However, it has the advantage that it can be used to differentiate between signed and unsigned overflows while the compile-time blacklist cannot do that. So it can be used to e.g. silence unsigned integer overflows on a file or function while still reporting signed issues. We can also use this suppression list for any other UBSan related suppressions, should we ever want to use other features from that sanitizer.

MozReview-Commit-ID: C5ofhfJdpCS

--HG--
extra : rebase_source : 64aa804965d24bb90b103c00c692a2ac6859e408
2017-04-09 12:59:26 +02:00
Joel Maher ff97d2f03e Bug 1334461 - run mochitest-a11y on ubuntu 16.04 instead of 12.04. r=kats
MozReview-Commit-ID: 9nF6NgKrPDP
2017-01-27 12:28:28 -05:00
David Major a70b85d44a Bug 1317471: Add the sandbox's interceptors_64.cc to Windows ASan blacklist. r=froydnj DONTBUILD
For the same reason as bug 1200740#c0: this code runs before ASan initializes shadow memory.

MozReview-Commit-ID: 9fIB6tyfSEl
2016-11-14 16:43:51 -06:00
Ting-Yu Chou f069d5cee1 Bug 1200740 - Import blacklist for ASan on Windows to avoid instrumenting selected sandbox functions and files. r=glandium
MozReview-Commit-ID: DJJuD0dyyKz

--HG--
extra : rebase_source : 803a3136f1ff163fe3237a0ac157bffa1eef0873
2016-11-10 09:18:55 +08:00
Ryan VanderMeulen b32395334d Bug 1311584 - Remove some LSAN suppressions that are no longer needed. r=mccr8 2016-10-19 22:47:01 -04:00
Valentin Gosu fe9b24270d Bug 1301069 - Backed out bug 1185120 (changeset 38cad72a77a6) a=backout a=merge
--HG--
extra : source : 9330dc01ec0245f05311c56025a50705138351bc
2016-09-08 00:04:07 +02:00
Yen Chi Hsuan 5a098d36c7 Bug 1185120 - Convert raw pointers in DNS.cpp and nsHostResolver.cpp to smart pointers. r=valentin 2016-09-05 03:47:58 +08:00
Kearwood (Kip) Gilbert 9b588f7bc7 Bug 1111689 - Suppress ASAN leak reports for libglsl.so. - r=jgilbert 2016-06-08 17:28:49 -07:00
Andrew McCreight d32f8a4e5c Bug 1227347, part 1 - Remove IPC-related LSan suppressions. r=erahm
It seems like these were fixed by making graphics IPC shut down
properly.
2016-04-26 11:46:28 -07:00
Andrew McCreight bd211c811c Bug 1250995 - Consolidate some NSPR fd-related leak suppressions. r=erahm 2016-02-24 14:19:00 +01:00
Jeff Muizelaar 5093f222e3 Bug 1248290. Add an lsan supression for libdricore9.2.1.so.
Mesa 9.2.1 looks to be leaking debug messages and I can't figure out how
to make it stop. The upstream code has been entirely rewritten so it's
probably not worth investigating further.
2016-02-14 17:39:22 -05:00
Valentin Gosu 0779b66d18 Bug 1228640 - Backout bug 1183781 (changeset b9b6a1567ef6) for causing crash a=me 2015-11-28 00:20:01 +01:00
Valentin Gosu 8a5616fdc5 Bug 1183781 - Small leak in DNS.cpp and nsHostResolver.cpp r=sworkman
* makes AddrInfo extend nsISupports
* uses RefPtr for managing AddrInfo and nsHostResolver in nsHostResolver.cpp
2015-11-23 13:02:41 +01:00
Mike Hommey f8b450ee34 Bug 1186748 - Make ASAN builds happy with Gtk+3. r=mccr8,r=bholley
- Add a suppression for a leak LSAN detects in system libpixman.
- Skip an intermittently failing test.
2015-11-04 11:21:49 +09:00
Andrew McCreight 8a9c5fbb0a Bug 1212987 - Remove IPC::Channel LSan suppressions. r=billm
Note that we are still leaking some of these, likely due to
CompositorChild and ImageBridgeChild leaking, but they are not
detected by LSan because they are reachable from the stack.
2015-10-14 11:03:47 -07:00
Andrew McCreight ed4e680f0d Bug 1201096 - Remove various obsolete LSan suppressions. r=erahm 2015-09-02 13:18:00 +02:00
Andrew McCreight e0b02240a7 Bug 1074317 - Report indirect LSan leaks in mochitests. r=erahm
LeanSanitizer reports two kinds of leaks: direct and indirect. A
leaked block that is pointed to by another leaked block is an
"indirect leak", while one that isn't is a "direct leak". Often,
indirect leaks are just things entrained by the "real" leak, but if
two leaked blocks are in a cycle, then they both end up being
indirect, so we need to report them, too.

This patch makes it so that indirect LSan leaks are treated the same
as direct leaks by Mochitests, which means they will turn the tree
orange. There are a few existing indirect leaks of various severity,
so I had add some suppressions. See those bugs for more details.

--HG--
extra : rebase_source : 0269666f546b6e349bebf216771fc6dfa4d9487a
2015-08-03 06:45:00 -04:00
Andrew McCreight ef6d1e9493 Bug 1089816 - Let ASan content processes run to completion. r=billm
There are a variety of ways that the parent and child process ensure that
the child process exits quickly in opt builds, but for AddressSanitizer
builds we want to let the child process to run to completion, so that we
can get a LeakSanitizer report.

This requires adding some addition LSan suppressions, because running
LSan in child processes detects some new leaks.
2015-07-27 12:49:48 -07:00