- 07 Jan, 2021 1 commit
-
-
Andreas Pehrson authored
Differential Revision: https://phabricator.services.mozilla.com/D98354
-
- 11 Jan, 2021 1 commit
-
-
ffxbld authored
Differential Revision: https://phabricator.services.mozilla.com/D101353
-
- 10 Dec, 2020 1 commit
-
-
Kirk Steuber authored
Differential Revision: https://phabricator.services.mozilla.com/D99373
-
- 02 Jun, 2020 1 commit
-
-
Zhao Jiazhong authored
Bug 1642265 - [MIPS64] Add branchTestSymbol and fallibleUnboxPtr to MacroAssembler. r=tcampbell, a=RyanVM Differential Revision: https://phabricator.services.mozilla.com/D77629
-
- 05 Jan, 2021 1 commit
-
-
Steve Fink authored
Differential Revision: https://phabricator.services.mozilla.com/D100261
-
- 08 Dec, 2020 2 commits
-
-
Steve Fink authored
Differential Revision: https://phabricator.services.mozilla.com/D98700
-
Steve Fink authored
Differential Revision: https://phabricator.services.mozilla.com/D97386
-
- 07 Jan, 2021 1 commit
-
-
ffxbld authored
Differential Revision: https://phabricator.services.mozilla.com/D101027
-
- 06 Jan, 2021 2 commits
-
-
Mozilla Releng Treescript authored
No bug - Tagging df0581e37d875577ff1f2be1d5943e0d03c9e796 with FIREFOX_78_6_1esr_RELEASE a=release CLOSED TREE DONTBUILD
-
Ryan VanderMeulen authored
-
- 05 Jan, 2021 1 commit
-
-
Mozilla Releng Treescript authored
No bug - Tagging df0581e37d875577ff1f2be1d5943e0d03c9e796 with FIREFOX_78_6_1esr_BUILD1 a=release CLOSED TREE DONTBUILD
-
- 22 Dec, 2020 1 commit
-
-
Mihai Alexandru Michis authored
Bug 1683792 - Remove sandbox-navigation-timing.tentative.html manifest for causing unexpected passes. r=aryx, a=test-only Differential Revision: https://phabricator.services.mozilla.com/D100326
-
- 07 Dec, 2020 1 commit
-
-
Michael Kaply authored
Differential Revision: https://phabricator.services.mozilla.com/D98527
-
- 03 Dec, 2020 1 commit
-
-
Masatoshi Kimura authored
Bug 1652412 - Do not set as default .pdf, .svg, ftp:, and mailto: handlers on Windows 7. r=mhowell, a=RyanVM Differential Revision: https://phabricator.services.mozilla.com/D98580
-
- 30 Nov, 2020 1 commit
-
-
Mark Banner authored
Differential Revision: https://phabricator.services.mozilla.com/D97779
-
- 12 Nov, 2020 1 commit
-
-
Michael Kaply authored
Differential Revision: https://phabricator.services.mozilla.com/D96621
-
- 12 Jun, 2020 1 commit
-
-
Nicolas Chevobbe authored
Differential Revision: https://phabricator.services.mozilla.com/D79474
-
- 16 Dec, 2020 1 commit
-
-
Yaron Tausky authored
Differential Revision: https://phabricator.services.mozilla.com/D100802
-
- 04 Jan, 2021 3 commits
-
-
Nils Ohlmeier [:drno] authored
Depends on D100490 Differential Revision: https://phabricator.services.mozilla.com/D100491
-
Nils Ohlmeier [:drno] authored
Bug 1683964: clean up more resources of existing SCTP association in case of a restart. r=ng, a=RyanVM Depends on D100379 Differential Revision: https://phabricator.services.mozilla.com/D100490
-
Nils Ohlmeier [:drno] authored
Differential Revision: https://phabricator.services.mozilla.com/D100379
-
- 15 Dec, 2020 2 commits
-
-
Jon Coppeard authored
This takes account of the fact that zones may be added to the waiting set during an incremental GC, after the set has been cleared in CycleCollectedJSRuntime::PrepareWaitingZonesForGC. I considered disallowing zones to be added to the set during a GC but decided it would be better not to lose track of poked zones in the usual case where they don't end up getting destoryed by the current GC. Depends on D100799 Differential Revision: https://phabricator.services.mozilla.com/D100800
-
Jon Coppeard authored
Bug 1681268 - Check zone pointers passed into the API and add a callback for zone destruction. r=sfink, a=tjr This adds assertions that zone pointers passed in refer to zones we know about and adds and API that's called when zones are destroyed. It also adds some standard assertions for other related APIs. Differential Revision: https://phabricator.services.mozilla.com/D100799
-
- 21 Dec, 2020 2 commits
-
-
Sebastian Hengst authored
-
Alexis Beingessner authored
Differential Revision: https://phabricator.services.mozilla.com/D100024
-
- 14 Aug, 2020 1 commit
-
-
Mike Hommey authored
This fixes the following error when running on Apple Silicon DTK: AGX: agxs_util.cpp:355:size_t getSystemMemorySize(): !!! Verification failed: status == 0 Differential Revision: https://phabricator.services.mozilla.com/D87048
-
- 22 Oct, 2020 1 commit
-
-
Mike Hommey authored
The warning is broken in older versions of clang. It also turns out we were disabling it locally for some directories because of this very problem. A few local disable rules stay under accessible/ because they do hide actual warnings from code generated by MIDL. Differential Revision: https://phabricator.services.mozilla.com/D94262
-
- 28 Dec, 2020 1 commit
-
-
Emilio Cobos Álvarez authored
This works both with the old and new cbindgen-generated bindings. This is effectively dead code on ESR though, because we haven't enabled WebGPU there, but... Differential Revision: https://phabricator.services.mozilla.com/D100497
-
- 01 Dec, 2020 1 commit
-
-
Gabriele Svelto authored
Bug 1624467 - Fix a race in child process crash generation which could lead to a full browser crash. r=KrisWright, a=RyanVM In bug 1614933 we discovered a potential deadlock in Windows-specific code could cause the main process to get stuck waiting for a child process to send out its annotations after it crashed. As it turns out this flaw was also present in the Linux and macOS versions but was not visible because on those platforms we used non-blocking writes when writing out annotations and we didn't check if they were actually written out (see bug 1666383). Since the child process would not stop it couldn't possible deadlock. However, the relevant code is still racy: if the child process' pipe would start rejecting writes early, the child process could race past the main process leading to the crash. The sequence of events in the racy case would be the following: - We hit an exception in the child process, we enter the exception handler and signal the main process to write a minidump - The crash generation thread in the main process is woken up, writes the minidump then signals the child process it can continue - The child process writes out the crash annotations then exits - At this stage the crash generation thread in the main process should have picked up the annotations and stored the crash report in the pid-to-minidump table. But let's assume the scheduler doesn't wake up this thread for now. - The main thread in the main process wakes up in response to the child process shutdown, it will try to grab the minidump - The minidump is not available yet because the crash generation client thread hasn't run yet and there's nothing preventing the main thread to race past it: the main process crashes trying to access a NULL pointer To this issue the act of transfering the exception-time annotations is decoupled from the act of writing the minidump in both the main process and the child process. This way when the child process is forced to wait for the main process to act on the minidump before the crash annotations are written out, and by the time the child process quits the main process has reliably acquired the lock to the pid-to-minidump table so that the race can't happen anymore. Note: to implement the second change the child process exception handler should execute the minidump callback after it has request the creation of a minidump. For some reason this was implemented in breakpad only for the in-process crash case, not the out-of-process one. I modified the relevant code in the exception handler to invoke the callback in both cases. Differential Revision: https://phabricator.services.mozilla.com/D97964
-
- 04 Jan, 2021 1 commit
-
-
ffxbld authored
Differential Revision: https://phabricator.services.mozilla.com/D100693
-
- 16 Dec, 2020 1 commit
-
-
Toshihito Kikuchi authored
Bug 1644240 - Suppress playing a sound if Diebold Warsaw's modules are partially unloaded. r=cmartin, a=RyanVM This patch is to mitigate the crash which was probably caused by Diebold Warsaw. We couldn't reproduce the problem, but our crash reports indicate the crash happened when `winmm!mciwindow` called `USER32!GetMessageA` but it was redirected to a freed buffer. This happens Firefox calls to `PlaySound` e.g. showing the menu bar by pressing Alt key, or showing a dialogbox. Most of (not 100%) the crash instances have wslbdhm64 loaded but wslbscrwh64.dll was unloaded. The proposed mitigation is to suppress playing a sound under such a condition. Differential Revision: https://phabricator.services.mozilla.com/D99705
-
- 17 Aug, 2020 1 commit
-
-
Jonathan Kew authored
Bug 1659453 - Accelerate gfxFontFamily::SearchAllFontsForChar by setting up the family charmap. r=lsalzman, a=RyanVM Differential Revision: https://phabricator.services.mozilla.com/D87285
-
- 21 Dec, 2020 1 commit
-
-
ffxbld authored
Differential Revision: https://phabricator.services.mozilla.com/D100240
-
- 18 Dec, 2020 2 commits
-
-
Ryan VanderMeulen authored
Backed out changeset 7a7b002ee8f9 (bug 1675755c) Backed out changeset f325221d3fb2 (bug 1675755c)
-
Ryan VanderMeulen authored
Backed out changeset 851810d2f3a5 (bug 1681268) Backed out changeset 8e949a39a0f2 (bug 1681268)
-
- 15 Dec, 2020 1 commit
-
-
Olli Pettay authored
Differential Revision: https://phabricator.services.mozilla.com/D97783
-
- 11 Dec, 2020 1 commit
-
-
Karl Tomlinson authored
Bug 1680410 - Extend forced shutdown track notification to include the usual destroy process. r=padenot, a=RyanVM Cherrypicked from https://phabricator.services.mozilla.com/D99183
-
- 10 Dec, 2020 1 commit
-
-
Dana Keeler authored
Bug 1680372 - replace Let's Encrypt intermediate certificates with ISRG Root X1 in the mozilla_services pinset. r=kjacobs, a=RyanVM Now that we're actually using Let's Encrypt for Mozilla services, we should pin to the root. Differential Revision: https://phabricator.services.mozilla.com/D99293
-
- 08 Dec, 2020 2 commits
-
-
Steve Fink authored
Differential Revision: https://phabricator.services.mozilla.com/D98700
-
Steve Fink authored
Differential Revision: https://phabricator.services.mozilla.com/D97386
-