591f1064b73c05bc20f18801c1c369dc3403d0d2: Bug 1218482 - Enable WebVR By Default,r=bz
Kearwood (Kip) Gilbert <kgilbert@mozilla.com> - Mon, 26 Oct 2015 19:56:49 -0700 - rev 300601
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1218482 - Enable WebVR By Default,r=bz - dom.vr.enabled is now "true" by default for non-release builds. - dom.vr.add-test-devices is now "0" by default, so that content may detect VR devices accurately.
a4d42eb9721db2302b0cb4310e7049c8a9299abf: Bug 1236505 - isPinned param in SessionHistory.jsm serializeEntry is not used, r=smaug
Andrea Marchesini <amarchesini@mozilla.com> - Mon, 04 Jan 2016 19:04:48 +0000 - rev 300600
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1236505 - isPinned param in SessionHistory.jsm serializeEntry is not used, r=smaug
95259a235e6c27fe0c9506a60a0bb7c852974f02: Bug 1233750 - about:profiles - Setting a profile as default, selects it too, r=ehsan
Andrea Marchesini <amarchesini@mozilla.com> - Mon, 04 Jan 2016 19:02:39 +0000 - rev 300599
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1233750 - about:profiles - Setting a profile as default, selects it too, r=ehsan
11acb7e361fe445eb563fa43d552f3d10dac56d9: Bug 1236259 - Quote MOZ_APP_ID; r=gps
Mike Hommey <mh+mozilla@glandium.org> - Mon, 04 Jan 2016 10:58:42 -0800 - rev 300598
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1236259 - Quote MOZ_APP_ID; r=gps This is glandium's suggested patch. Committing under his name reviewed by me.
c315a91b6edb1ab48c71b6975cc4d12a7fe35185: Backed out 10 changesets (bug 1214305) for leaks on linux debug m-e10s(bc7)
Wes Kocher <wkocher@mozilla.com> - Mon, 04 Jan 2016 10:34:24 -0800 - rev 300597
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Backed out 10 changesets (bug 1214305) for leaks on linux debug m-e10s(bc7) Backed out changeset 1f482566235a (bug 1214305) Backed out changeset 001b31489756 (bug 1214305) Backed out changeset 4e94d2088219 (bug 1214305) Backed out changeset fba4a5bcea41 (bug 1214305) Backed out changeset 100f8e249007 (bug 1214305) Backed out changeset a59c453192dc (bug 1214305) Backed out changeset 2daa86fc1fb9 (bug 1214305) Backed out changeset c04efb57b0ed (bug 1214305) Backed out changeset 52046e843c60 (bug 1214305) Backed out changeset ac4fd6615828 (bug 1214305)
0e4bdac31c326ba2c22082469cdf9fb6626fe912: Bug 1221846 - Properly close the tasktracer property in the GeckoSampler JSON blob. r=BenWa
Mike Conley <mconley@mozilla.com> - Tue, 15 Dec 2015 19:12:17 -0500 - rev 300596
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1221846 - Properly close the tasktracer property in the GeckoSampler JSON blob. r=BenWa
61cefe69917e39f70a8fde8e87ddf04755b4c6d4: Bug 1221846 - Get Task Tracer building on desktop r=cyu.
Mike Conley <mconley@mozilla.com> - Wed, 02 Dec 2015 20:55:38 -0500 - rev 300595
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1221846 - Get Task Tracer building on desktop r=cyu.
81e407daa22246e9ab796ae7efad39efba1eb1ff: Bug 1235376 - Handling %s in contextMenus. r=kmaglione
Gabor Krizsanits <gkrizsanits@mozilla.com> - Mon, 04 Jan 2016 16:54:59 +0100 - rev 300594
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1235376 - Handling %s in contextMenus. r=kmaglione
efd432a79df6fb865adf35ed6cedee39fc335424: Bug 1211366 - parentId validation in contextMenus. r=kmaglione
Gabor Krizsanits <gkrizsanits@mozilla.com> - Mon, 04 Jan 2016 16:54:59 +0100 - rev 300593
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1211366 - parentId validation in contextMenus. r=kmaglione
a99460bbb35072ab8726d327304e06fcd64e4a60: Bug 1211366 - contextMEnus refactoring. r=kmaglione
Gabor Krizsanits <gkrizsanits@mozilla.com> - Mon, 04 Jan 2016 16:54:59 +0100 - rev 300592
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1211366 - contextMEnus refactoring. r=kmaglione
efcc954571bdfa86e7aa1ff3ecd1f07793b40d24: Bug 1234860 - move win32 NS_InvokeByIndex implementation to a separate assembly file; r=aklotz,ted.m
Nathan Froyd <froydnj@mozilla.com> - Wed, 23 Dec 2015 11:45:38 -0500 - rev 300591
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1234860 - move win32 NS_InvokeByIndex implementation to a separate assembly file; r=aklotz,ted.m On win32, NS_InvokeByIndex is implemented with inline assembly. This inline assembly assumes that it is wrapped by the compiler with the standard x86 prologue and epilogue: push ebp mov ebp, esp [inline assembly that manipulates the stack pointer] pop ebp ret In particular, the last instruction of the inline assembly is: mov esp, ebp which cancels out the effects of the stack manipulation performed by all the inline assembly that proceeds the instruction. When compiling with clang-cl, however, the above assumption does not hold, as clang-cl inserts a more complex prologue and epilogue, something like: push ebp mov ebp, esp sub esp, frame_size [save registers into stack frame] [inline assembly that manipulates the stack pointer] [restore registers from stack frame] add esp, frame_size mov esp, ebp pop ebp ret Combining this more extensive prologue and epilogue with the assumptions of the inline assembly leads to interesting crashes when NS_InvokeByIndex is called: the inline assembly effectively deallocates the stack allocated by the inline assembly *and* the stack frame allocated by the compiler itself. The compiler-generated code then attemptes to deallocate the stack frame, leading to the crash, as the code now returns to an unspecified address. To avoid these sorts of problems in clang-cl and make the code more robust generally, let's move the NS_InvokeByIndex implementation to a separate assembly file. We can then write exactly what we need to have happen, safe from any manipulations of the compiler. Since we don't compile much (any?) code in Gecko with MASM, we need to add the /SAFESEH flag to the assembler invocation so that the object file with be appropriately marked as not containing exception handlers; the linker (which is invoked with the /SAFESEH flag itself) will then consent to link it into libxul.
1f482566235a007d579bd42682e8afa26d2d087e: Bug 1214305 - Part 9: Avoid using CPOWs in browser_bug1045902_console_csp_ignore_reflected_xss_message.js; r=billm
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 31 Dec 2015 14:39:54 -0500 - rev 300590
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1214305 - Part 9: Avoid using CPOWs in browser_bug1045902_console_csp_ignore_reflected_xss_message.js; r=billm
001b314897561c53b94b75ab1abf800f95805a81: Bug 1214305 - Part 8: Enable secure upgrade service worker tests on e10s; r=jdm
Ehsan Akhgari <ehsan@mozilla.com> - Mon, 02 Nov 2015 11:28:00 -0500 - rev 300589
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1214305 - Part 8: Enable secure upgrade service worker tests on e10s; r=jdm
4e94d20882191a1c448bab61706ff43607387424: Bug 1214305 - Part 7: Decide in the child process whether an intercepted channel should go through a secure upgrade; r=mcmanus
Ehsan Akhgari <ehsan@mozilla.com> - Mon, 02 Nov 2015 11:27:00 -0500 - rev 300588
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1214305 - Part 7: Decide in the child process whether an intercepted channel should go through a secure upgrade; r=mcmanus This is OK from a security perspective, since this decision only affects whether the channel will be intercepted with the secure URI in the child process. If the intercepting service worker decides to fall back to an actual network request, we send the request to the parent process with the original pre-upgrade URI, and the parent process will still be in charge of whether a network visible HTTP request should be upgraded.
fba4a5bcea4172e7652fd4a3ecfa3cdfb9a3dde9: Bug 1214305 - Part 6: Use a non-IPC redirect for synthesized upgraded responses to ensure the response URL is correctly propagated; r=mcmanus
Ehsan Akhgari <ehsan@mozilla.com> - Mon, 02 Nov 2015 11:27:00 -0500 - rev 300587
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1214305 - Part 6: Use a non-IPC redirect for synthesized upgraded responses to ensure the response URL is correctly propagated; r=mcmanus
100f8e24900720858a485cfb9f86d35538401b41: Bug 1214305 - Part 5: Use the secure upgraded channel URI in FetchEventRunnable::Init; r=jdm
Ehsan Akhgari <ehsan@mozilla.com> - Mon, 02 Nov 2015 11:27:00 -0500 - rev 300586
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1214305 - Part 5: Use the secure upgraded channel URI in FetchEventRunnable::Init; r=jdm This ensures that FetchEvent.request.url will have the correct value for secure upgraded channels.
a59c453192dce3e7a6d79b9d8e5be3f96c03ccb1: Bug 1214305 - Part 4: Use the secure upgraded channel URI in ServiceWorkerManager::PrepareFetchEvent; r=jdm
Ehsan Akhgari <ehsan@mozilla.com> - Mon, 02 Nov 2015 11:27:00 -0500 - rev 300585
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1214305 - Part 4: Use the secure upgraded channel URI in ServiceWorkerManager::PrepareFetchEvent; r=jdm This is needed to ensure that the ServiceWorkerManager uses the correct URI for non-subresource requests. Note that we're relying on the property that non-secure non-subresource requests can never be intercepted, so we don't need to check the request type explicitly.
2daa86fc1fb9e3fe00a02a934c82c90e071f69f8: Bug 1214305 - Part 3: Add a nsIInterceptedChannel.secureUpgradedChannelURI helper; r=jdm
Ehsan Akhgari <ehsan@mozilla.com> - Mon, 02 Nov 2015 11:27:00 -0500 - rev 300584
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1214305 - Part 3: Add a nsIInterceptedChannel.secureUpgradedChannelURI helper; r=jdm
c04efb57b0ed18c8b70dffae6c471c24472ad4f3: Bug 1214305 - Part 2: Refactor the logic for obtaining the secure upgraded URI into HttpBaseChannel; r=mcmanus
Ehsan Akhgari <ehsan@mozilla.com> - Mon, 02 Nov 2015 11:27:00 -0500 - rev 300583
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1214305 - Part 2: Refactor the logic for obtaining the secure upgraded URI into HttpBaseChannel; r=mcmanus
52046e843c60ba6fd77acb865a59a3bb5941f9dd: Bug 1214305 - Part 1: Refactor the logic for querying whether a connection should go through a secure upgrade into NS_ShouldSecureUpgrade; r=mcmanus
Ehsan Akhgari <ehsan@mozilla.com> - Mon, 02 Nov 2015 11:27:00 -0500 - rev 300582
Push 8978 by raliiev@mozilla.com at Mon, 25 Jan 2016 14:05:32 +0000
Bug 1214305 - Part 1: Refactor the logic for querying whether a connection should go through a secure upgrade into NS_ShouldSecureUpgrade; r=mcmanus
(0) -300000 -100000 -30000 -10000 -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 +3000 +10000 +30000 tip