883e0e945f7a5f43a465d3e4a0763b6f5ee5fbcd: Backed out changeset 0740284125d3 (bug 1284897)
Sebastian Hengst <archaeopteryx@coole-files.de> - Tue, 21 Feb 2017 23:13:24 +0100 - rev 344033
Push 87270 by archaeopteryx@coole-files.de at Tue, 21 Feb 2017 22:16:01 +0000
Backed out changeset 0740284125d3 (bug 1284897)
19f1d4210d56f8c164cc02baeec2e42ca2ef792d: Backed out changeset c35afe490583 (bug 1284897)
Sebastian Hengst <archaeopteryx@coole-files.de> - Tue, 21 Feb 2017 23:13:20 +0100 - rev 344032
Push 87270 by archaeopteryx@coole-files.de at Tue, 21 Feb 2017 22:16:01 +0000
Backed out changeset c35afe490583 (bug 1284897)
001bc0207dbcf4b008d9a23030e9b3adc5bdd7ab: Bug 1322373 - TLS 1.3 early-data for HTTP/2. r=dragana,mcmanus
Patrick McManus <mcmanus@ducksong.com> - Tue, 21 Feb 2017 15:19:46 -0500 - rev 344031
Push 87269 by mcmanus@ducksong.com at Tue, 21 Feb 2017 22:00:16 +0000
Bug 1322373 - TLS 1.3 early-data for HTTP/2. r=dragana,mcmanus
c35afe490583c88e2c6a7041aad3d1451b3e82bc: Bug 1284897 - Hook GetSaveFileNameW/GetOpenFileNameW to record and grant a sandboxed process permission to access user-chosen files. r=jimm
David Parks <dparks@mozilla.com> - Wed, 08 Feb 2017 11:38:40 -0800 - rev 344030
Push 87268 by ryanvm@gmail.com at Tue, 21 Feb 2017 21:54:40 +0000
Bug 1284897 - Hook GetSaveFileNameW/GetOpenFileNameW to record and grant a sandboxed process permission to access user-chosen files. r=jimm
0740284125d33ce825023ae66fdf07484f62f0c4: Bug 1284897 - Add mechanism to libsandbox_s to track names of files that have been given special sandbox access permissions (PermissionsService). r=bobowen
David Parks <dparks@mozilla.com> - Fri, 20 Jan 2017 08:27:57 -0800 - rev 344029
Push 87268 by ryanvm@gmail.com at Tue, 21 Feb 2017 21:54:40 +0000
Bug 1284897 - Add mechanism to libsandbox_s to track names of files that have been given special sandbox access permissions (PermissionsService). r=bobowen Hook this into the browser via the XREAppData. This patch contains only the changes to Chromium source code.
71b9ac06a60a570b6a7ce4560a685f642122a9d4: Bug 1284897 - Add mechanism to libsandbox_s to track names of files that have been given special sandbox access permissions (PermissionsService). r=bobowen, r=glandium
David Parks <dparks@mozilla.com> - Tue, 14 Feb 2017 15:08:40 -0800 - rev 344028
Push 87268 by ryanvm@gmail.com at Tue, 21 Feb 2017 21:54:40 +0000
Bug 1284897 - Add mechanism to libsandbox_s to track names of files that have been given special sandbox access permissions (PermissionsService). r=bobowen, r=glandium Hook this into the browser via the XREAppData. This patch does not include the changes to Chromium source code.
4e81ec8850dcaf402ce8b23f146859cfea377f41: Bug 1284897 - Add missing hooked methods to TestDllInterceptor. r=aklotz
David Parks <dparks@mozilla.com> - Tue, 07 Feb 2017 12:00:45 -0800 - rev 344027
Push 87268 by ryanvm@gmail.com at Tue, 21 Feb 2017 21:54:40 +0000
Bug 1284897 - Add missing hooked methods to TestDllInterceptor. r=aklotz Added ASSERTions to nsWindowsDllInterceptor in case of a failed detour hook, with an exception for the RET opcode that appears in ImmReleaseContext. Added documentation about TestDllInterceptor.
a176abd99d2b2a12288694f0a8378266372d1f84: Bug 1284897 - Add opcodes to nsWindowsDllInterceptor for GetSaveFileNameW, GetOpenFileNameW and ImmReleaseContext. r=aklotz
David Parks <dparks@mozilla.com> - Fri, 20 Jan 2017 16:03:44 -0800 - rev 344026
Push 87268 by ryanvm@gmail.com at Tue, 21 Feb 2017 21:54:40 +0000
Bug 1284897 - Add opcodes to nsWindowsDllInterceptor for GetSaveFileNameW, GetOpenFileNameW and ImmReleaseContext. r=aklotz This includes a near-jump CALL instruction in x64, which expands to a far-jump CALL with a 64-bit address as inline data. This requires us to abandon the method where we memcpy the code block into the trampoline and, instead, build the trampoline function as we go.
125a0e765379cebd702ecbcda6b60b56076e95c4: Bug 1339275: Define JSPropertySpec values in a way that's easier for Visual Studio to initialize. r=Waldo
David Major <dmajor@mozilla.com> - Wed, 22 Feb 2017 10:11:54 +1300 - rev 344025
Push 87267 by dmajor@mozilla.com at Tue, 21 Feb 2017 21:13:51 +0000
Bug 1339275: Define JSPropertySpec values in a way that's easier for Visual Studio to initialize. r=Waldo MozReview-Commit-ID: BMCunTjUapN
972714aa03b210476c57991c58e30ea9f98745e2: Bug 419470: Re-enable PGO for Linux mozjemalloc. r=glandium
David Major <dmajor@mozilla.com> - Wed, 22 Feb 2017 09:46:06 +1300 - rev 344024
Push 87266 by dmajor@mozilla.com at Tue, 21 Feb 2017 20:46:41 +0000
Bug 419470: Re-enable PGO for Linux mozjemalloc. r=glandium It only took nine years. MozReview-Commit-ID: 2zsCBMTJ6O1
bc401cae3a9074ad98566042c7e4188881dcefaf: Backed out changeset a93c0f43ccf8 (bug 1322355) for android build bustage a=backout
Wes Kocher <wkocher@mozilla.com> - Tue, 21 Feb 2017 12:37:27 -0800 - rev 344023
Push 87265 by kwierso@gmail.com at Tue, 21 Feb 2017 20:37:33 +0000
Backed out changeset a93c0f43ccf8 (bug 1322355) for android build bustage a=backout MozReview-Commit-ID: 5ecKiKuodUm
54175c795fbee1d3ca7c7a210f670cf3f0c6acfc: Bug 1341082 - Add ACCESSIBILITY guards to functions in Utils.cpp that depend on it being enabled. r=aklotz
Ryan VanderMeulen <ryanvm@gmail.com> - Tue, 21 Feb 2017 15:27:18 -0500 - rev 344022
Push 87264 by ryanvm@gmail.com at Tue, 21 Feb 2017 20:27:38 +0000
Bug 1341082 - Add ACCESSIBILITY guards to functions in Utils.cpp that depend on it being enabled. r=aklotz
50e44effc231ca9a609f14b37f8ec82a26515a63: Bug 1338574 - Part 8: Use MOZ_ASSERT and MOZ_CRASH_UNSAFE_OOL in mozjemalloc. r=glandium
Emanuel Hoogeveen <emanuel.hoogeveen@gmail.com> - Tue, 21 Feb 2017 18:02:07 +0100 - rev 344021
Push 87263 by ryanvm@gmail.com at Tue, 21 Feb 2017 20:25:26 +0000
Bug 1338574 - Part 8: Use MOZ_ASSERT and MOZ_CRASH_UNSAFE_OOL in mozjemalloc. r=glandium
5b533dd2bb8bdff818bbe5e9e71b39376e591355: Bug 1338574 - Part 7: Use MOZ_CRASH_UNSAFE_PRINTF in XPCOM. r=froydnj
Emanuel Hoogeveen <emanuel.hoogeveen@gmail.com> - Tue, 21 Feb 2017 18:02:03 +0100 - rev 344020
Push 87263 by ryanvm@gmail.com at Tue, 21 Feb 2017 20:25:26 +0000
Bug 1338574 - Part 7: Use MOZ_CRASH_UNSAFE_PRINTF in XPCOM. r=froydnj
c9cafd66b9e96916d0273be338e820bd11ea6a4e: Bug 1338574 - Part 6: Use MOZ_CRASH_UNSAFE_PRINTF in NSS. r=keeler
Emanuel Hoogeveen <emanuel.hoogeveen@gmail.com> - Tue, 21 Feb 2017 18:02:00 +0100 - rev 344019
Push 87263 by ryanvm@gmail.com at Tue, 21 Feb 2017 20:25:26 +0000
Bug 1338574 - Part 6: Use MOZ_CRASH_UNSAFE_PRINTF in NSS. r=keeler
32194844a42a211631255bc39b16fe5f6153b1ff: Bug 1338574 - Part 5: Use MOZ_CRASH_UNSAFE_OOL in Necko. r=valentin
Emanuel Hoogeveen <emanuel.hoogeveen@gmail.com> - Tue, 21 Feb 2017 18:01:56 +0100 - rev 344018
Push 87263 by ryanvm@gmail.com at Tue, 21 Feb 2017 20:25:26 +0000
Bug 1338574 - Part 5: Use MOZ_CRASH_UNSAFE_OOL in Necko. r=valentin
2a7baab53d6920e2ed024aa80e3c04344885d971: Bug 1338574 - Part 4: Use MOZ_CRASH_UNSAFE_OOL and MOZ_CRASH_UNSAFE_PRINTF in SpiderMonkey. r=jandem
Emanuel Hoogeveen <emanuel.hoogeveen@gmail.com> - Tue, 21 Feb 2017 18:01:52 +0100 - rev 344017
Push 87263 by ryanvm@gmail.com at Tue, 21 Feb 2017 20:25:26 +0000
Bug 1338574 - Part 4: Use MOZ_CRASH_UNSAFE_OOL and MOZ_CRASH_UNSAFE_PRINTF in SpiderMonkey. r=jandem
02ca86a397be7609ecf96bda5b162f6598906884: Bug 1338574 - Part 3: Use MOZ_CRASH_UNSAFE_PRINTF in IPC glue. r=mrbkap
Emanuel Hoogeveen <emanuel.hoogeveen@gmail.com> - Tue, 21 Feb 2017 18:01:48 +0100 - rev 344016
Push 87263 by ryanvm@gmail.com at Tue, 21 Feb 2017 20:25:26 +0000
Bug 1338574 - Part 3: Use MOZ_CRASH_UNSAFE_PRINTF in IPC glue. r=mrbkap
253f65ad681fdc0ebc8894b4ba6512598adeabbb: Bug 1338574 - Part 2: Use MOZ_CRASH_UNSAFE_PRINTF in Media. r=jwwang
Emanuel Hoogeveen <emanuel.hoogeveen@gmail.com> - Tue, 21 Feb 2017 18:01:45 +0100 - rev 344015
Push 87263 by ryanvm@gmail.com at Tue, 21 Feb 2017 20:25:26 +0000
Bug 1338574 - Part 2: Use MOZ_CRASH_UNSAFE_PRINTF in Media. r=jwwang
7fdb44e79e51279ac2076040f6bd7bc341b97c23: Bug 1338574 - Part 1: Add MOZ_CRASH_UNSAFE_OOL and MOZ_CRASH_UNSAFE_PRINTF to crash with a runtime generated explanation string. r=froydnj
Emanuel Hoogeveen <emanuel.hoogeveen@gmail.com> - Tue, 21 Feb 2017 18:01:41 +0100 - rev 344014
Push 87263 by ryanvm@gmail.com at Tue, 21 Feb 2017 20:25:26 +0000
Bug 1338574 - Part 1: Add MOZ_CRASH_UNSAFE_OOL and MOZ_CRASH_UNSAFE_PRINTF to crash with a runtime generated explanation string. r=froydnj
(0) -300000 -100000 -30000 -10000 -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 +3000 +10000 +30000 +100000 tip