- 24 Jul, 2012 6 commits
-
-
Kristian Høgsberg authored
-
Kristian Høgsberg authored
-
Daniel Stone authored
Use unsigned rather than signed for IDs, so they match up with what we see in other prints. Signed-off-by:
Daniel Stone <daniel@fooishbar.org>
-
Daniel Stone authored
The connection-handling code already allows this, so make it legal in the protocol definition too. Signed-off-by:
Daniel Stone <daniel@fooishbar.org>
-
Daniel Stone authored
Expose these to other files using wayland-private.h, so wayland-client.c can walk NULLables properly. Signed-off-by:
Daniel Stone <daniel@fooishbar.org>
-
Kristian Høgsberg authored
Since glibc dlsym() calls calloc, we get a call to our calloc wrapper as we try to look up the real calloc implementation. dlsym() will fall back to a static buffer in case calloc returns NULL, so that's what we'll do. This is all highly glibc dependent, of course, but the entire malloc weak symbol wrapper mechanism is, so there's no loss of generality here.
-
- 23 Jul, 2012 2 commits
-
-
Daniel Stone authored
So all our tests don't start failing just because we had the temerity to use realloc() rather than malloc(). Signed-off-by:
Daniel Stone <daniel@fooishbar.org>
-
Daniel Stone authored
Signed-off-by:
Daniel Stone <daniel@fooishbar.org>
-
- 22 Jul, 2012 4 commits
-
-
Kristian Høgsberg authored
-
Mathias Fiedler authored
If a new object id arrives ensure that there is an empty array entry created, otherwise we might get out of sync for new ids if object isn't created by interface implementation.
-
Mathias Fiedler authored
wl_map_reserve_new() ensures that new id is valid and will point to an empty array entry.
-
Mathias Fiedler authored
Creation of new client resources was silently ignored when wl_client_add_resource() was used on server side and new object id was out of range. An error is now send out to the client in such case. Also changed error message in wl_client_add_object, since wl_map_insert_at() returns -1 only at invalid new id.
-
- 20 Jul, 2012 4 commits
-
-
Kristian Høgsberg authored
-
Kristian Høgsberg authored
The wayland README had outdated build instructions for weston. Let's just trim it down to build instructions for wayland and a link to the web site.
-
Kristian Høgsberg authored
-
Robert Ancell authored
-
- 17 Jul, 2012 1 commit
-
-
Dmitry Guryanov authored
I've found a bug during wayland exploration - if you make two drag'n'drops in weston client example, dnd - weston crashes with segfault. I've tried to investigate it and found a problem. In function drag_grab_button we first call data_device_end_drag_grab, which sets seat->drag_data_source to NULL. Then we remove listener from list only if drag_data_source is not NULL. So if client will not free wl_data_source and start another drag'n'drop, after the first one. Then two wl_data_source structures will be free'd on client exit (let's name them s1 and s2). next and prev pointer of wl_data_source.resource.destroy_signal.listener_list in both wl_data_source structures will be seat->drag_data_source_listener, but next and prev in seat->drag_data_source_listener.link point to listener_list in s2. So if you try to iterate over listener_list in s1 then you get drag_data_source_listener as first item and (struct wl_listener *)(&s2.resource.destroy_signal.listener_list) Iteration over that list occurs in wl_resource_destroy->destroy_resource->wl_signal_emit->wl_signal_emit and try to call function at address of wl_resource->client, so weston segfaults there.
-
- 10 Jul, 2012 6 commits
-
-
Pekka Paalanen authored
- don't leak fd in shm_pool_destroy() - return NULL from wl_cursor_theme_load() if pool fails Tha last one fixes a segfault, when shm_pool_create() has failed. Signed-off-by:
Pekka Paalanen <ppaalanen@gmail.com>
-
Pekka Paalanen authored
Copy the implementation of os_create_anonymous_file() here from weston, so we can use it instead of hardcoding a path to /tmp. Signed-off-by:
Pekka Paalanen <ppaalanen@gmail.com>
-
Pekka Paalanen authored
This makes wl_seat_set_keyboard similar to wl_seat_set_pointer in that it's a no-op, if you try to set keyboard to NULL when it already is NULL, instead of refusing to set it to NULL ever. Signed-off-by:
Pekka Paalanen <ppaalanen@gmail.com>
-
Pekka Paalanen authored
Just like wl_keyboard and wl_pointer, add a signal handler for losing touch focus. Signed-off-by:
Pekka Paalanen <ppaalanen@gmail.com>
-
Robert Ancell authored
-
Kristian Høgsberg authored
Regression in c94c0946
-
- 09 Jul, 2012 7 commits
-
-
Martin Olsson authored
-
Martin Olsson authored
-
Ander Conselvan de Oliveira authored
Fixes bug 51889.
-
Martin Olsson authored
-
Martin Olsson authored
-
Martin Olsson authored
-
Martin Olsson authored
-
- 02 Jul, 2012 3 commits
-
-
Kristian Høgsberg authored
wl_data_device.set_selection() allows NULL to withdraw the previously set selection and wl_surface.attach() allows a NULL buffer to hide the surface.
-
Christopher James Halse Rogers authored
Signed-off-by:
Christopher James Halse Rogers <christopher.halse.rogers@canonical.com>
-
Christopher James Halse Rogers authored
Most of the time it does not make sense to pass a NULL object, string, or array to a protocol request. This commit adds an explicit “allow-null” attribute to mark the request arguments where NULL makes sense. Passing a NULL object, string, or array to a protocol request which is not marked as allow-null is now an error. An implementation will never receive a NULL value for these arguments from a client. Signed-off-by:
Christopher James Halse Rogers <christopher.halse.rogers@canonical.com>
-
- 30 Jun, 2012 7 commits
-
-
Dylan Noblesmith authored
These would either overflow the struct sockaddr_un, or be truncated and leave a non-null-terminated string.
-
Dylan Noblesmith authored
It was failing with missing include files. While here, destroy the ugly "../src/..." include paths used in the tests that was just hacking around this problem in the Makefile: sed -i s/..\\/src\\/// tests/*.c
-
Dylan Noblesmith authored
-
Dylan Noblesmith authored
Attempting to write anything longer into the embedded char array would create a non-null-terminated string, and all later reads would run off the end into invalid memory. This is a hard limitation of AF_LOCAL/AF_UNIX sockets.
-
Dylan Noblesmith authored
Attempting to write anything longer into the embedded char array would create a non-null-terminated string, and all later reads would run off the end into invalid memory. This is a hard limitation of AF_LOCAL/AF_UNIX sockets.
-
Dylan Noblesmith authored
-
Dylan Noblesmith authored
Always unlink() the lock file before closing the file descriptor for it. Otherwise, there is a race like this: Process A closes fd, releasing the lock Process B opens the same file, taking the lock Process A unlinks the lock file Process C opens the same file, which now no longer exists, and takes the lock on the newly created lock file Process B and C both 'own' the same display socket. unlink()ing while holding the lock is effectively a better way to release the lock atomically.
-