Commit Graph

559193 Commits

Author SHA1 Message Date
Kai Engert
3d4de91391 Bug 1393854, land NSPR_4_18_RTM, no code change, only version numbers, r=me
UPGRADE_NSPR_RELEASE
DONTBUILD
2017-09-19 18:43:02 +02:00
Michal Novotny
3a05f43e12 Backed out changeset from bug 1392841 due to speedometer regression. r=backout 2017-09-19 18:37:40 +02:00
Stephen A Pohl
9b750573b6 Bug 1398582: Prevent drawing titles in title bars on macOS 10.13 when we don't want them. r=mstange 2017-09-19 12:17:05 -04:00
Joel Maher
e801d6d6ae Bug 1398766 - Disable toolkit/mozapps/extensions/test/browser/browser_gmpProvider.js on linux debug for frequent failures. r=me, a=test-only 2017-09-19 12:15:46 -04:00
Joel Maher
50a371672c Bug 1370783 - Disable netwerk/test/browser/browser_child_resource.js on debug for frequent failures. r=me, a=test-only 2017-09-19 12:15:11 -04:00
Rail Aliiev
be7d259acc Bug 1395697 - Use BZ2 MAR compression for versions less than 56.0 r=sfraser
MozReview-Commit-ID: LutFJRayTOX

--HG--
extra : rebase_source : 17c71e4384d5f4106660214f04bf0e67df0ed719
2017-09-19 06:09:23 -04:00
Tim Taubert
a7712cd24a Bug 1400940 - Fix WebAuthn deadlock when cancelling a request on tab switch r=jcj
This should be an easy solution. We can't stop the sign() or register()
runloop from calling the callback, so we need the callback to simply return
early when the U2FHIDTokenManager shuts down.

Bug #: 1400940

Differential Revision: https://phabricator.services.mozilla.com/D67
2017-09-19 18:00:39 +02:00
Andrea Marchesini
fd7d739519 Bug 1401204 - Get rid of NS_BackgroundInputStream and NS_BackgroundOutputStream, r=valentin 2017-09-19 17:52:28 +02:00
Joel Maher
f4b8f26ddb Bug 1398910 - make reftest-no-accel run on windows 10 (hardware) instead of windows 8. r=ahal,jet 2017-09-19 11:44:07 -04:00
Joel Maher
2b9c5c615c Bug 1397258 - migrate mochitest-webgl to windows 10. r=ahal 2017-09-19 11:44:05 -04:00
Joel Maher
b08f501872 Bug 1401184 - migrate mochitest-chrome from buildbot hardware to taskcluster VM. r=ahal 2017-09-19 11:44:02 -04:00
Steve Fink
7997149dd2 Bug 1400442 - Trim down whitelists to only what is required, and mark all known issues with bug numbers, r=jonco
I also snuck in some last-minute assertions and minor fixes into this patch:

- don't stop reporting for a callee if we've seen it already (or rather, make the reachable set local to a root rather than global to all roots). This slows down runs with hundreds of hazards, but results in every problematic root being reported, for a more accurate count.

- annotate away some thread assertions

- special-case annotation for bug 1400435 since it's a whole family of hazards

--HG--
extra : rebase_source : ac7335d45e3e0772d34cb42cc6a3f628564fd3d1
2017-09-15 17:18:13 -07:00
Steve Fink
f01d6be6a4 Bug 1400442 - Special-case annotation for a->b->emplace(); a->b->Init(), r=bhackett
--HG--
extra : rebase_source : 0029b7764332896fd882d68e429800662d9178b2
2017-09-15 17:17:49 -07:00
Steve Fink
c044d7cad2 Bug 1400442 - Assert that Gecko_ShouldCreateStyleThreadPool is only called on the main thread, r=emilio
--HG--
extra : rebase_source : 4b6354e0db13489693d7df6d3ea56c4f38c9a193
2017-09-15 17:16:34 -07:00
Steve Fink
cd9758653e Bug 1400442 - stylo heap write analysis: Miscellaneous minor annotations, r=jonco
--HG--
extra : rebase_source : d22cdb4f63009949b538541c82d41db6fc57c7aa
2017-09-15 17:15:34 -07:00
Steve Fink
724031b982 Bug 1400442 - Annotate Servo_ComputedValues_EqualCustomProperties as safe, r=manishearth
--HG--
extra : rebase_source : 9b828ee29363fcff1f5be587958b822a29f3d5be
2017-08-31 08:10:51 -07:00
Steve Fink
a1e4291a8a Bug 1400442 - Annotate nsTArray::InsertElementAt as returning a value that propagates safety of the array, r=jonco
--HG--
extra : rebase_source : f69a5bf2e2d01f55453d6df0d077b3f9a0bfa7d4
2017-09-15 11:00:37 -07:00
Steve Fink
a4eeddfca1 Bug 1400442 - Annotate border colors array as being thread-owned by container, r=bhackett
nsStyleStruct has the field:

  nsBorderColors** mBorderColors;

It starts out nullptr, and when it is needed, it allocates an array of 4 nsBorderColors pointers. But the nsStyleStruct exclusively owns the array; nothing else can get at it. This change teaches the analysis that if 'this' is a safe nsStyleStruct*, then it should treat mBorderColors as if it were an inline length-4 array.

--HG--
extra : rebase_source : e9d4a550a728e403b3bb30e7dd61341c2680962d
2017-09-15 17:18:08 -07:00
Steve Fink
22f464bca9 Bug 1400442 - Backward-compatible js::Class[Ops].trace annotation, r=me
--HG--
extra : rebase_source : eac8e39bab5a3979c1e18a5494c899af777a1958
2017-09-15 09:24:48 -07:00
Steve Fink
6fac83771a Bug 1400442 - analyzeHeapWrites: getter_Copies preserves safety (similar to getter_AddRefs), r=bhackett
--HG--
extra : rebase_source : 4ae6297aa5725532bec513055dd451b8cbcf7bde
2017-09-08 15:03:06 -07:00
Steve Fink
2b08c335d7 Bug 1400442 - analyzeHeapWrites: implement a cache for checking whether local variables are safe pointers, r=jonco
--HG--
extra : rebase_source : fce58842604238e6102f43057301fff27ee58d6f
2017-09-08 15:00:56 -07:00
Steve Fink
1ec4752dd2 Bug 1400442 - Refactor the --function debugging command line option (and alias it to -f) to analyzeHeapWrites.js, r=me
--HG--
extra : rebase_source : b8f81284ffe70712f2a245c495158c3584650ce4
2017-09-08 14:59:43 -07:00
Steve Fink
5e41355433 Bug 1400442 - Fix handling of parameterNames, r=jonco
This is for nicer output only, and does not affect the computation. A WorkListEntry contains a stack of CallSites, and the top of the stack represents the entry itself and so should share parameterNames. This changes fixes cases where some names were being registered in a different table than ended up being used by printouts.

--HG--
extra : rebase_source : e52bbc9ab3e4596d748ca2d729772a61cde1430a
2017-09-08 14:57:02 -07:00
Steve Fink
ed820e5f99 Bug 1400442 - Broaden the annotation for string appending functions to handle more types, r=jonco
--HG--
extra : rebase_source : c55d9900278cf6a31a16567e5ff658306c08e87c
2017-09-08 14:54:22 -07:00
Steve Fink
2c2bec029d Bug 1400442 - Annotate MOZ_CrashPrintf, r=jonco
--HG--
extra : rebase_source : 0ea91eb0373a1b0c848ce7e97f43a2006c190f29
2017-09-08 14:54:00 -07:00
Steve Fink
5a2de7af69 Bug 1400442 - Targeted annotation for static local array of member pointers in LangGroupFontPrefs::Initialize, r=bhackett
The code is

    void
    LangGroupFontPrefs::Initialize(nsIAtom* aLangGroupAtom)
    {
        nsFont* fontTypes[] = {
            &mDefaultVariableFont,
            &mDefaultFixedFont,
            &mDefaultSerifFont,
            &mDefaultSansSerifFont,
            &mDefaultMonospaceFont,
            &mDefaultCursiveFont,
            &mDefaultFantasyFont
        };

        nsFont* font = fontTypes[3];
        font->size = 42;
    }

'this' is known to be a safe pointer (exclusively owned by the current thread), so a pointer to one of its members is also safe. But the analysis can't track safety across all that, so I have a special-case annotation here that says that fontTypes[3] returns a safe pointer if and only if 'this' is safe.

Note that all of those fields (eg mDefaultVariableFont) are nsFont structs, not pointers, so although you'd expect this to be one dereference away from a safe pointer's memory, it is not; assigning to font->size ends up being a write to some offset within the 'this' pointer, which is known to be safe here.

--HG--
extra : rebase_source : 60bf982911b8a66bc612cb5c7eeb04ec766ecf70
2017-09-08 15:03:22 -07:00
Steve Fink
c849aebbd6 Bug 1400442 - Annotate atof as not doing any racy writes, r=me
--HG--
extra : rebase_source : 206bba89c68e8dc37c135fed03490282eff61d76
2017-09-08 14:37:19 -07:00
Steve Fink
3fa9c0cd2a Bug 1400442 - Propagate safety through RefPtr, r=bhackett
--HG--
extra : rebase_source : 187dda47209195746d88a00733d9b806da2c4f14
2017-08-31 09:47:53 -07:00
Steve Fink
9f483c4259 Bug 1400442 - CFG dumping utility, handy for debugging, r=me
--HG--
extra : rebase_source : ca41fae3c6f0507ed0be567ca5cd641e59475c8b
2017-09-15 17:15:46 -07:00
Steve Fink
5b5e84123b Bug 1400468 - Control verbosity, r=jonco
--HG--
extra : rebase_source : 950699da0c0d8c894542c71881cce3359a8c6697
2017-08-31 11:53:14 -07:00
Steve Fink
cf00ad1217 Bug 1400468 - Port hazard analysis test scripts to python3, r=jonco
--HG--
extra : rebase_source : 1cf32c7b383b2f2e8bbe44f8d09cb027b086ebbf
2017-08-31 17:14:45 -07:00
Steve Fink
2434340f83 Bug 1400468 - Trim output, r=jonco
--HG--
extra : rebase_source : de700225cbfcfc4a3fad56327d9007eabff02859
2017-08-09 13:54:41 -07:00
Steve Fink
a4306ab94d Bug 1400466 - Cache the information loaded from src_comp.xdb into a structured clone buffer, r=jonco
Note that this requires some enhancements to the JS engine to support reading and writing structured clone data from/to files.

--HG--
extra : rebase_source : 444a2d407bd231efbba4b6b648eeb151f02177db
2017-09-08 14:58:26 -07:00
Steve Fink
ebf6b994dd Bug 1400466 - Implement minimum necessary to allow saving and loading structured clone data, r=jonco
--HG--
extra : rebase_source : ea13ebcc1b3958c99cf04e7345da1aab5536b0ee
2017-09-08 13:56:04 -07:00
Tim Taubert
14bd1247ca Bug 1401019 - Cancel the current U2F API request before starting a new one r=jcj
I wasn't sure what the right behavior for the U2F API is when `.sign()`
or `.register()` is called but there's an ongoing request that wasn't fulfilled
yet.

I think it makes sense to deny the request (as we currently do) when a request
of the same type is currently active. When however sign() -> register() or
vice-versa is called then we should cancel the previous request and start
the new one. From what I understand from reading the spec we definitely should
call the callback before starting the new request.

Bug #: 1401019

Differential Revision: https://phabricator.services.mozilla.com/D70
2017-09-19 16:55:38 +02:00
Tim Taubert
0ab9d21338 Bug 1400559 - [u2f-hid-rs] rustfmt followup r=me 2017-09-19 16:45:07 +02:00
Boris Zbarsky
203072cfe1 Bug 1401171 - Make nsIMultiplexInputStream not inherit from nsIInputStream. r=bkelly
This is a preexisting issue that makes nsMultiplexInputStream multiple-inherit
from nsIInputStream: once via nsIMultipartInputStream and once via
nsIAsyncInputStream.  This causes problems once we end up with more multiplex
streams that are async streams, because then some assingments to
nsCOMPtr<nsIInputStream> start asserting.  This patch just removes the footgun
by getting rid of the multiple inheritance.
2017-09-19 16:26:21 +02:00
Sebastian Hengst
7973633f84 Backed out changeset 3c9e25405f59 (bug 1401204) an request from baku for landing with wrong bug number. r=backout 2017-09-19 16:25:20 +02:00
Boris Zbarsky
5c70c28414 Bug 1401204 - Make nsIMultiplexInputStream not inherit from nsIInputStream. r=bkelly
This is a preexisting issue that makes nsMultiplexInputStream multiple-inherit
from nsIInputStream: once via nsIMultipartInputStream and once via
nsIAsyncInputStream.  This causes problems once we end up with more multiplex
streams that are async streams, because then some assingments to
nsCOMPtr<nsIInputStream> start asserting.  This patch just removes the footgun
by getting rid of the multiple inheritance.
2017-06-11 00:07:23 -04:00
Boris Zbarsky
d9be58174d Bug 1400898 part 4. Get rid of nsIDOMChromeWindow methods that are unused from C++, and mark the rest [noscript]. r=farre
MozReview-Commit-ID: GtYmfg6XiaQ
2017-09-19 10:13:23 -04:00
Boris Zbarsky
ff472070b5 Bug 1400898 part 3. Make nsIDOMChromeWindow.browserDOMWindow readonly. r=farre
C++ code only reads this attribute.  Code that sets it comes via WebIDL bindings.

MozReview-Commit-ID: 2itFAxUVTBo
2017-09-19 10:13:23 -04:00
Boris Zbarsky
b4ae7df969 Bug 1400898 part 2. Get rid of the interface constants on nsIDOMChromeWindow. r=farre
MozReview-Commit-ID: 4FuJSgha5y3
2017-09-19 10:13:22 -04:00
Boris Zbarsky
624fdefa57 Bug 1400898 part 1. Remove the one script use of nsIDOMChromeWindow. r=farre
MozReview-Commit-ID: I31eceiJP55
2017-09-19 10:13:22 -04:00
Sebastian Hengst
2ae4025edd Backed out changeset 5cd2ba3bc6c4 (bug 1336389) for failing new talos test cpstartup. r=backout 2017-09-19 16:12:41 +02:00
Tim Taubert
076af4a6e0 Bug 1400559 - Move runloop code into its own crate r=jcj
The runloop seems like a good candidate for moving into its own crate.

I wasn't sure whether we want it under the Mozilla org on GitHub, so I pushed
it to ttaubert/rust-runloop for a start. Moving the repository to mozilla/*
is easy, and we'd just need to bump the crate version with the updated
repository, if you think we should.

Bug #: 1400559

Differential Revision: https://phabricator.services.mozilla.com/D62

--HG--
rename : dom/webauthn/u2f-hid-rs/src/runloop.rs => third_party/rust/runloop/src/lib.rs
2017-09-19 15:46:55 +02:00
Ekanan Ketunuti
c124624034 Bug 1401050 - Add vanishingly to the en-US dictionary. r=ehsan 2017-09-19 07:01:39 +07:00
Vedant Chakravadhanula
e8910cf14c Bug 1359289 - Add a "Learn More" link to Safe Browsing checkbox in about:preferences. r=jhofmann 2017-09-19 12:33:28 +05:30
Nick Thomas
64add6a97f Bug 1400141 - Use redo params from nightly with a jitter r=bhearsum
MozReview-Commit-ID: BjU6A9pOpKE

--HG--
extra : amend_source : df945e1a1c60ed7973079b82ddeddadb79696ebd
2017-09-19 15:21:22 +02:00
Nicolas Silva
3434431a1a Bug 1397407 - Apply deferred image key deletions to the next transaction. r=Gankro 2017-09-15 13:24:31 +02:00
Andrew Osmond
7c2def1540 Bug 1380649 - Part 2. Ensure SourceSurfaceVolatileData does not forget its purged state. r=jrmuizel
Currently if SourceSurfaceVolatileData::Map fails due to being purged,
we expect that the surface will be discarded by the caller. This has not
consistently been the case, and as such, we should ensure we do not
forget if a buffer was previously purged when we reacquire it. Since we
do not at this time support repopulating an already allocated buffer
with new data, we cannot reset this state once it has been set.
2017-09-19 08:19:48 -04:00