Граф коммитов

455893 Коммитов

Автор SHA1 Сообщение Дата
Nathan Froyd 9bdab2140d Bug 1232732 - modify NS_WARNING in MOZ_WIN_MEM_TRY_CATCH; r=aklotz
The particular syntax for this warning is an MSVC extension, which
causes clang-cl to fallback to MSVC when compiling files that use this
macro.  Trying to use nsPrintfCString or equivalent here runs into
issues of unused variables in non-debug builds.  I think it's reasonable
to raise an warning without a specific location; folks can grovel about
in a debugger if they want to figure out what's going on.
2016-01-04 12:28:25 -05:00
Chris Manchester 58d5a05e65 Bug 1216681 - Add a fileid utility to extract the breakpad GUID from object files for identification in fix_stack_using_bpsyms. r=ted
fix_stack_using_bpsyms.py locates a .sym file based on file name only, not uuid or full path,
which causes a failure if a duplicate leaf file name is introduced. This patch introduces a
small utility program on mac and linux to extract a breakpad guid from a shared library or
executable to identify the correct symbol file when this ambiguity occurs. A subsequent commit
implements this for windows.

--HG--
extra : commitid : 2O7REfHuDus
2015-10-21 16:37:42 -07:00
Nathan Froyd 570a28bb10 Bug 1236570 - use UniquePtr<T[]> instead of nsAutoArrayPtr<T> in b2g/app/; r=khuey 2015-12-14 16:50:21 -05:00
Nathan Froyd 1965bce699 Bug 1236632 - remove unused variable in FactoryOp::WaitForTransactions; r=janv
This variable got left behind during the refactoring in bug 1125102.
2016-01-04 14:29:33 -05:00
Ehsan Akhgari 1f26ea8aca Bug 1214305 - Part 10: Clean up global DataStorage references in the child process; r=keeler 2016-01-04 16:30:02 -05:00
Ehsan Akhgari 094f658b3e Bug 1214305 - Part 9: Avoid using CPOWs in browser_bug1045902_console_csp_ignore_reflected_xss_message.js; r=billm 2016-01-04 16:30:02 -05:00
Ehsan Akhgari d7bfbd4a1d Bug 1214305 - Part 8: Enable secure upgrade service worker tests on e10s; r=jdm 2016-01-04 16:30:02 -05:00
Ehsan Akhgari 9f447f6c4f Bug 1214305 - Part 7: Decide in the child process whether an intercepted channel should go through a secure upgrade; r=mcmanus
This is OK from a security perspective, since this decision only affects
whether the channel will be intercepted with the secure URI in the child
process.  If the intercepting service worker decides to fall back to an
actual network request, we send the request to the parent process with
the original pre-upgrade URI, and the parent process will still be in
charge of whether a network visible HTTP request should be upgraded.
2016-01-04 16:30:02 -05:00
Ehsan Akhgari 69ce1d24d9 Bug 1214305 - Part 6: Use a non-IPC redirect for synthesized upgraded responses to ensure the response URL is correctly propagated; r=mcmanus 2016-01-04 16:30:02 -05:00
Ehsan Akhgari 603bdd57fd Bug 1214305 - Part 5: Use the secure upgraded channel URI in FetchEventRunnable::Init; r=jdm
This ensures that FetchEvent.request.url will have the correct value
for secure upgraded channels.
2016-01-04 16:30:02 -05:00
Ehsan Akhgari ba3d9b7d66 Bug 1214305 - Part 4: Use the secure upgraded channel URI in ServiceWorkerManager::PrepareFetchEvent; r=jdm
This is needed to ensure that the ServiceWorkerManager uses the
correct URI for non-subresource requests.  Note that we're relying
on the property that non-secure non-subresource requests can never
be intercepted, so we don't need to check the request type explicitly.
2016-01-04 16:30:02 -05:00
Ehsan Akhgari a48f3795ae Bug 1214305 - Part 3: Add a nsIInterceptedChannel.secureUpgradedChannelURI helper; r=jdm 2016-01-04 16:30:02 -05:00
Ehsan Akhgari 9d105a6fd7 Bug 1214305 - Part 2: Refactor the logic for obtaining the secure upgraded URI into HttpBaseChannel; r=mcmanus 2016-01-04 16:30:02 -05:00
Ehsan Akhgari 377b919b76 Bug 1214305 - Part 1: Refactor the logic for querying whether a connection should go through a secure upgrade into NS_ShouldSecureUpgrade; r=mcmanus 2016-01-04 16:30:02 -05:00
Josh Matthews 21aeea2c72 Bug 1214305 - Part 0: Ensure site security service is initialized before trying to use DataStorage via IPC. 2016-01-04 16:30:02 -05:00
Jordan Lund e89c66f355 Bug 1225905 - create a mozharness script that manages each beet mover task logic, NPOTB DONTBUILD r=rail
--HG--
extra : commitid : L1hpWyOgKxa
extra : rebase_source : ef585199e5819894d251ecb11ca7150eb3b1efcc
2015-12-30 10:20:31 -08:00
Nathan Froyd cedf0dc1a3 No bug - remove tab from xpcom/test/gtest/moz.build file; r=me
DONTBUILD because whitespace only changes are always green.
2016-01-04 16:17:53 -05:00
Henrik Skupin 7bf2719b66 Bug 1212609 - Add common test package rules for firefox-ui-tests. r=gps 2016-01-04 22:13:43 +01:00
Daniel Holbert f288610d40 Bug 1235737: Soften some MOZ_CRASH statements in flexbox layout code to MOZ_ASSERT_UNREACHABLE, which they were originally intended as anyway. r=mats 2016-01-04 13:11:58 -08:00
Nathan Froyd ee15c8c814 Bug 1236574 - use UniquePtr<T[]> instead of nsAutoArrayPtr<T> in SocketBase subclasses; r=tzimmerman 2015-12-06 10:53:37 -05:00
Ben Kelly fdc6dd443a Bug 1234458 P2 Lock the CacheChild actor while Cache DOM methods are running. r=ehsan a=ritu 2016-01-04 12:03:11 -08:00
Ben Kelly 7d02efa8cf Bug 1234458 P1 Allow the CacheChild to be "locked" into memory so it will delay destruction. r=ehsan a=ritu 2016-01-04 12:03:11 -08:00
Benoit Girard 54ae94438d Bug 1223540 - Add a pref for CGL's multithreaded mode (CEMPEngine). r=jrmuizel
--HG--
extra : commitid : 6osvwNBJqWR
2015-11-10 16:14:24 -05:00
Ehsan Akhgari 5b3ebf89d1 Bug 1226384 - Reject the promise returned from ServiceWorkerRegistration.update() if the registration is being uninstalled; r=bkelly 2016-01-04 14:50:57 -05:00
Ehsan Akhgari 46b8636a0e Bug 1235896 - Make it possible to run browser_download.js with --run-until-failure; r=bkelly 2016-01-04 14:50:57 -05:00
Gregory Szorc 1a7415dd67 Bug 1236259 - Normalize LOCALE_MERGEDIR paths; r=ted.mielczarek
glandium suggests doing this to fix l10n builds. This is a shot in the
dark. It should either work or completely break things.

--HG--
extra : rebase_source : cd4923a7532ae74b21548792ff0c7ef885952aeb
2016-01-04 11:13:31 -08:00
Tooru Fujisawa afeff41c94 Bug 1234025 - Part 3: Remove unused constant from Statistics.cpp 2016-01-05 04:33:35 +09:00
Tooru Fujisawa bc25c6f0df Bug 1234025 - Part 2: Remove unused functions from ScriptedDirectProxyHandler.cpp. 2016-01-05 04:33:34 +09:00
Tooru Fujisawa c89eedaf00 Bug 1234025 - Part 1: Move ObjectBox::isModuleBox definition to ParseNode.cpp. 2016-01-05 04:33:34 +09:00
Armen Zambrano Gasparnian a6fa0e3a8b Bug 1232407 - Enable VNC and skip running Mozharness if requested. r=dustin
--HG--
extra : commitid : 36KewIdeqju
extra : rebase_source : cd02357f96f09d2ab2907bdb45d8f29b98742e63
2015-12-18 10:32:44 -05:00
Kearwood (Kip) Gilbert b06c3df1b8 Bug 1218482 - Enable WebVR By Default,r=bz
- dom.vr.enabled is now "true" by default for non-release builds.
- dom.vr.add-test-devices is now "0" by default, so that content may detect
  VR devices accurately.
2015-10-26 19:56:49 -07:00
Andrea Marchesini e7fe22c87e Bug 1236505 - isPinned param in SessionHistory.jsm serializeEntry is not used, r=smaug 2016-01-04 19:04:48 +00:00
Andrea Marchesini 47f282fda3 Bug 1233750 - about:profiles - Setting a profile as default, selects it too, r=ehsan 2016-01-04 19:02:39 +00:00
Mike Hommey 837f1ced88 Bug 1236259 - Quote MOZ_APP_ID; r=gps
This is glandium's suggested patch. Committing under his name reviewed
by me.

--HG--
extra : commitid : 5abfwXR51iA
extra : rebase_source : d7d3658687e5b825e2095682786653cc42bf201e
extra : amend_source : fde873074c7e5d29f0fd9b5452ed5d1bed2f279d
2016-01-04 10:58:42 -08:00
Wes Kocher dbbade6e75 Backed out 10 changesets (bug 1214305) for leaks on linux debug m-e10s(bc7)
Backed out changeset 1f482566235a (bug 1214305)
Backed out changeset 001b31489756 (bug 1214305)
Backed out changeset 4e94d2088219 (bug 1214305)
Backed out changeset fba4a5bcea41 (bug 1214305)
Backed out changeset 100f8e249007 (bug 1214305)
Backed out changeset a59c453192dc (bug 1214305)
Backed out changeset 2daa86fc1fb9 (bug 1214305)
Backed out changeset c04efb57b0ed (bug 1214305)
Backed out changeset 52046e843c60 (bug 1214305)
Backed out changeset ac4fd6615828 (bug 1214305)

--HG--
extra : commitid : ILmaVumvmvH
2016-01-04 10:34:24 -08:00
Mike Conley 009f18f61a Bug 1221846 - Properly close the tasktracer property in the GeckoSampler JSON blob. r=BenWa
--HG--
extra : rebase_source : c4ef8f49ab072da6287be8cab0393cc16be9edfe
2015-12-15 19:12:17 -05:00
Mike Conley e62894147e Bug 1221846 - Get Task Tracer building on desktop r=cyu.
--HG--
extra : rebase_source : 0666526a249c106274a4c764e325cd9810e9a2e7
2015-12-02 20:55:38 -05:00
Gabor Krizsanits f77ea57991 Bug 1235376 - Handling %s in contextMenus. r=kmaglione 2016-01-04 16:54:59 +01:00
Gabor Krizsanits 99d250bd13 Bug 1211366 - parentId validation in contextMenus. r=kmaglione 2016-01-04 16:54:59 +01:00
Gabor Krizsanits c3b77c61e9 Bug 1211366 - contextMEnus refactoring. r=kmaglione 2016-01-04 16:54:59 +01:00
Nathan Froyd 0fe98fa9ef Bug 1234860 - move win32 NS_InvokeByIndex implementation to a separate assembly file; r=aklotz,ted.m
On win32, NS_InvokeByIndex is implemented with inline assembly.  This
inline assembly assumes that it is wrapped by the compiler with the
standard x86 prologue and epilogue:

    push ebp
    mov ebp, esp
    [inline assembly that manipulates the stack pointer]
    pop ebp
    ret

In particular, the last instruction of the inline assembly is:

    mov esp, ebp

which cancels out the effects of the stack manipulation performed by all
the inline assembly that proceeds the instruction.

When compiling with clang-cl, however, the above assumption does not
hold, as clang-cl inserts a more complex prologue and epilogue,
something like:

    push ebp
    mov ebp, esp
    sub esp, frame_size
    [save registers into stack frame]
    [inline assembly that manipulates the stack pointer]
    [restore registers from stack frame]
    add esp, frame_size
    mov esp, ebp
    pop ebp
    ret

Combining this more extensive prologue and epilogue with the assumptions
of the inline assembly leads to interesting crashes when
NS_InvokeByIndex is called: the inline assembly effectively deallocates
the stack allocated by the inline assembly *and* the stack frame
allocated by the compiler itself.  The compiler-generated code then
attemptes to deallocate the stack frame, leading to the crash, as the
code now returns to an unspecified address.

To avoid these sorts of problems in clang-cl and make the code more
robust generally, let's move the NS_InvokeByIndex implementation to a
separate assembly file.  We can then write exactly what we need to have
happen, safe from any manipulations of the compiler.

Since we don't compile much (any?) code in Gecko with MASM, we need to
add the /SAFESEH flag to the assembler invocation so that the object
file with be appropriately marked as not containing exception handlers;
the linker (which is invoked with the /SAFESEH flag itself) will then
consent to link it into libxul.
2015-12-23 11:45:38 -05:00
Ehsan Akhgari 810e22d3f4 Bug 1214305 - Part 9: Avoid using CPOWs in browser_bug1045902_console_csp_ignore_reflected_xss_message.js; r=billm 2016-01-04 09:52:50 -05:00
Ehsan Akhgari 5740e920d4 Bug 1214305 - Part 8: Enable secure upgrade service worker tests on e10s; r=jdm 2016-01-04 09:52:49 -05:00
Ehsan Akhgari 96c8327a92 Bug 1214305 - Part 7: Decide in the child process whether an intercepted channel should go through a secure upgrade; r=mcmanus
This is OK from a security perspective, since this decision only affects
whether the channel will be intercepted with the secure URI in the child
process.  If the intercepting service worker decides to fall back to an
actual network request, we send the request to the parent process with
the original pre-upgrade URI, and the parent process will still be in
charge of whether a network visible HTTP request should be upgraded.
2016-01-04 09:52:47 -05:00
Ehsan Akhgari 1927591d62 Bug 1214305 - Part 6: Use a non-IPC redirect for synthesized upgraded responses to ensure the response URL is correctly propagated; r=mcmanus 2016-01-04 09:52:45 -05:00
Ehsan Akhgari 0c4cdf6c16 Bug 1214305 - Part 5: Use the secure upgraded channel URI in FetchEventRunnable::Init; r=jdm
This ensures that FetchEvent.request.url will have the correct value
for secure upgraded channels.
2016-01-04 09:52:44 -05:00
Ehsan Akhgari a4a75435f0 Bug 1214305 - Part 4: Use the secure upgraded channel URI in ServiceWorkerManager::PrepareFetchEvent; r=jdm
This is needed to ensure that the ServiceWorkerManager uses the
correct URI for non-subresource requests.  Note that we're relying
on the property that non-secure non-subresource requests can never
be intercepted, so we don't need to check the request type explicitly.
2016-01-04 09:52:42 -05:00
Ehsan Akhgari 17e63f2856 Bug 1214305 - Part 3: Add a nsIInterceptedChannel.secureUpgradedChannelURI helper; r=jdm 2016-01-04 09:52:40 -05:00
Ehsan Akhgari 478b7b9bc3 Bug 1214305 - Part 2: Refactor the logic for obtaining the secure upgraded URI into HttpBaseChannel; r=mcmanus 2016-01-04 09:52:39 -05:00
Ehsan Akhgari 3e8d2fe85d Bug 1214305 - Part 1: Refactor the logic for querying whether a connection should go through a secure upgrade into NS_ShouldSecureUpgrade; r=mcmanus 2016-01-04 09:52:37 -05:00