dfa71e81e863f9ae8082460daf3b7c45bd76e3b3: Backed out changeset d3bd59939150 (bug 1601781) for build bustages at BrowsingContextGroup.h. CLOSED TREE
Brindusan Cristian <cbrindusan@mozilla.com> - Fri, 06 Dec 2019 00:16:31 +0200 - rev 567899
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Backed out changeset d3bd59939150 (bug 1601781) for build bustages at BrowsingContextGroup.h. CLOSED TREE
a3e44bbc9ce3a53198d2e7bd8d2b04985dd3b8ef: Bug 1522830: Part 13 - Update third-party-modules ping to acquire data from child processes; r=janerik
Aaron Klotz <aklotz@mozilla.com> - Thu, 05 Dec 2019 22:01:30 +0000 - rev 567898
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1522830: Part 13 - Update third-party-modules ping to acquire data from child processes; r=janerik Differential Revision: https://phabricator.services.mozilla.com/D53686
11078767a24642a06a76f5c9a5c29caedaa1019f: Bug 1522830: Part 12 - ASAN fix for DllBlocklistInit in launcher process; r=mhowell
Aaron Klotz <aklotz@mozilla.com> - Thu, 05 Dec 2019 22:00:50 +0000 - rev 567897
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1522830: Part 12 - ASAN fix for DllBlocklistInit in launcher process; r=mhowell Differential Revision: https://phabricator.services.mozilla.com/D53685
c7ee156830cff1912e200c9e29f72e43d02c02e6: Bug 1522830: Part 11 - Adjust shutdown phase in widget/windows/WinUtils for telemetry whitelisting; r=mhowell
Aaron Klotz <aklotz@mozilla.com> - Thu, 05 Dec 2019 22:00:07 +0000 - rev 567896
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1522830: Part 11 - Adjust shutdown phase in widget/windows/WinUtils for telemetry whitelisting; r=mhowell The current shutdown phase is too early and thus may crash when called by `UntrustedModulesProcessor`. We move it to a later phase such that the processor has already shut down. Differential Revision: https://phabricator.services.mozilla.com/D53683
810f0cb2308df98c56d3687cfee2331ddcaf0e1c: Bug 1522830: Part 10 - Add IPC for untrusted modules to RDD; r=mjf
Aaron Klotz <aklotz@mozilla.com> - Thu, 05 Dec 2019 21:59:29 +0000 - rev 567895
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1522830: Part 10 - Add IPC for untrusted modules to RDD; r=mjf * The parent process needs to be able to request the child process to provide its untrusted modules telemetry. This is done via `GetUntrustedModulesData`. * The child process needs to be able to determine which of its module loads are trusted, and which are not. Since the child process is sandboxed, it must delegate that work to the parent process. This is done via `GetModulesTrust`. * The handlers for these functions just pass the requests on to DLL Services to do the actual processing. Differential Revision: https://phabricator.services.mozilla.com/D53682
f8ab752193875406b064faa0fb465f7d5017c721: Bug 1522830: Part 9 - Add IPC for untrusted modules to Content; r=jmathies
Aaron Klotz <aklotz@mozilla.com> - Thu, 05 Dec 2019 21:58:23 +0000 - rev 567894
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1522830: Part 9 - Add IPC for untrusted modules to Content; r=jmathies * The parent needs to be able to request the child to provide its untrusted modules telemetry. This is done via `GetUntrustedModulesData`. * The child needs to be able to determine which of its module loads are trusted, and which are not. Since the child is sandboxed, it must delegate that work to the parent process. This is done via `GetModulesTrust`. Differential Revision: https://phabricator.services.mozilla.com/D53681
ec293f9a5e3299c718a8583582521e1515da2f80: Bug 1522830: Part 8 - Update UntrustedModulesProcessor to support processing child processes; r=mhowell
Aaron Klotz <aklotz@mozilla.com> - Thu, 05 Dec 2019 21:57:29 +0000 - rev 567893
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1522830: Part 8 - Update UntrustedModulesProcessor to support processing child processes; r=mhowell This patch contains the core changes to make this all work across e10s: * We clarify the naming of path variables to be more specific as to whether they are NT paths or DOS paths; * We add IPC `ParamTraits` that are necessary for `UntrustedModulesData` types; * We implement `ProcessModuleLoadQueue` for child processes. Because of sandboxing, we need to split this sequence into multiple async operations: ** Initial queue processing; ** Sending the list of modules to the parent process to determine trustworthiness (via `GetModulesTrust`); ** Receiving the results from the parent process and producing a final result (via `CompleteProcessing`). * We implement the `GetModulesTrust` function for the parent process, which evaluates the trust of child process modules; * We change all hash tables to be keyed using NT paths. Because resolving DOS paths may not be permitted in sandboxed processes, we need to standardize on NT paths as the "universal path" across processes. * We add `WinDllServices::StartUntrustedModulesProcessor` to separate untrusted modules startup from `WinDllServices` construction: ** While we now start `WinDllServices` across all child process types, only specific process types will support untrusted modules. ** Furthermore, untrusted modules must be started at a very specific point that is dependent on the type of child process. ** We add those calls to `StartUntrustedModulesProcessor` in subsequent patches. Differential Revision: https://phabricator.services.mozilla.com/D53680
4bfc013c3d7995b6277985177faad1246e6079f4: Bug 1522830: Part 7 - Initialize launcher process blocklist during launch of sandboxed child process; r=bobowen
Aaron Klotz <aklotz@mozilla.com> - Thu, 05 Dec 2019 21:55:45 +0000 - rev 567892
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1522830: Part 7 - Initialize launcher process blocklist during launch of sandboxed child process; r=bobowen When launching a sandboxed child process that uses `firefox.exe`, we now perform early initialization of the DLL blocklist. Differential Revision: https://phabricator.services.mozilla.com/D53679
f4ae67f2f23130cc1db525793afcb058bafdc1a6: Bug 1522830: Part 6 - Add API to be able to initialize launcher dll blocklist during spawning of child process; r=mhowell
Aaron Klotz <aklotz@mozilla.com> - Thu, 05 Dec 2019 21:55:02 +0000 - rev 567891
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1522830: Part 6 - Add API to be able to initialize launcher dll blocklist during spawning of child process; r=mhowell We need a way for the sandbox broker to be able to initialize the launcher DLL blocklist when starting a new content process. This patch adds the ability to resolve the initialization function through DLL services. Differential Revision: https://phabricator.services.mozilla.com/D53678
2737350b7d40fff9f02e4c959d16a3650de6d7dd: Bug 1522830: Part 5 - Provide a launcher result type that unconditionally includes file and line info; r=mhowell
Aaron Klotz <aklotz@mozilla.com> - Thu, 05 Dec 2019 21:53:41 +0000 - rev 567890
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1522830: Part 5 - Provide a launcher result type that unconditionally includes file and line info; r=mhowell `LauncherResult` only includes file and line info when built into the launcher process. Now that there will be `xul.dll`-based code calling into launcher process startup, this would create an ABI mismatch. This patch creates a new type, `LauncherResultWithLineInfo`, that unconditionally includes the file and line so that APIs called by both `xul` and non-`xul` code can have the same ABI for both. Differential Revision: https://phabricator.services.mozilla.com/D53677
52931597c65280077f16ecd9109e3a7c92dffbf4: Bug 1522830: Part 4 - Add constexpr constructor and assignment operator from uint64_t to ModuleVersion; r=mhowell
Aaron Klotz <aklotz@mozilla.com> - Thu, 05 Dec 2019 21:52:51 +0000 - rev 567889
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1522830: Part 4 - Add constexpr constructor and assignment operator from uint64_t to ModuleVersion; r=mhowell Differential Revision: https://phabricator.services.mozilla.com/D53676
bc8985a345391032a29714e1302ec848dd3c9e66: Bug 1522830: Part 3 - Change launcher blocklist generation to include child processes; r=bytesized
Aaron Klotz <aklotz@mozilla.com> - Thu, 05 Dec 2019 21:52:13 +0000 - rev 567888
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1522830: Part 3 - Change launcher blocklist generation to include child processes; r=bytesized Now that the launcher blocklist will support child processes, we need to add them to the launcher blocklist. The revised criteria the `Launcher` blocklist matches the criteria already in use by the `Legacy` blocklist. Differential Revision: https://phabricator.services.mozilla.com/D53675
09cbbbc5c802e37442048717cb89c8625675d95a: Bug 1522830: Part 2 - Make launcher blocklist work in child processes; r=mhowell
Aaron Klotz <aklotz@mozilla.com> - Thu, 05 Dec 2019 21:51:35 +0000 - rev 567887
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1522830: Part 2 - Make launcher blocklist work in child processes; r=mhowell * We change `InitializeDllBlocklistOOP` to be able to set the correct flags when initializing a sandbox child process. * We change the freestanding DLL blocklist code to be sensitive to the `CHILD_PROCESSES_ONLY` flag; * We move the declaration of `gBlocklistInitFlags` to `WindowsDllBlocklist.h` so that it is visible to more code. Differential Revision: https://phabricator.services.mozilla.com/D53674
d5e366ea4657b4b17a445cd9655880df8e8bb95c: Bug 1522830: Part 1 - Init legacy blocklist using gBlocklistInitFlags; r=mhowell
Aaron Klotz <aklotz@mozilla.com> - Thu, 05 Dec 2019 21:51:33 +0000 - rev 567886
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1522830: Part 1 - Init legacy blocklist using gBlocklistInitFlags; r=mhowell When we initialize the legacy blocklisting code, we should carry forward any flags that were set by the launcher process and/or sandbox launcher. Differential Revision: https://phabricator.services.mozilla.com/D53672
d3bd59939150ff2b3c00de87e6ee6ef1bcf3b71d: Bug 1601781: Forward declare ContentParent in BrowsingContextGroup; r=kmag
Aaron Klotz <aklotz@mozilla.com> - Thu, 05 Dec 2019 21:54:47 +0000 - rev 567885
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1601781: Forward declare ContentParent in BrowsingContextGroup; r=kmag Differential Revision: https://phabricator.services.mozilla.com/D56088
07ee7361f34ab1ccc83361c02eada7943ab84e7b: Bug 1571569: Check for correct document in blockParsing test. r=zombie
Kris Maglione <maglione.k@gmail.com> - Thu, 05 Dec 2019 14:23:33 +0000 - rev 567884
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1571569: Check for correct document in blockParsing test. r=zombie Differential Revision: https://phabricator.services.mozilla.com/D55906
4805e7e3acb487450bc4d11da1c975e3291377a4: Bug 1392945 - Wait for "seeked" instead of "playing". r=alwu
Andreas Pehrson <apehrson@mozilla.com> - Thu, 05 Dec 2019 21:12:14 +0000 - rev 567883
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1392945 - Wait for "seeked" instead of "playing". r=alwu Differential Revision: https://phabricator.services.mozilla.com/D55952
791fb28110c886b6358818dbd3171577fccb2b36: Bug 1601768: Don't register BrowserContentHandler in content processes. r=mconley
Kris Maglione <maglione.k@gmail.com> - Thu, 05 Dec 2019 21:14:45 +0000 - rev 567882
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1601768: Don't register BrowserContentHandler in content processes. r=mconley It only works in the parent process, and if we wind up falling back to it in a content process, it can only cause trouble. Differential Revision: https://phabricator.services.mozilla.com/D56059
3a6a9814936d41c40c0bdec5c2d37b25f4b728d6: Bug 1601694. Remove the redundant Windows range/ifame selection code. r=bobowen
Jonathan Watt <jwatt@jwatt.org> - Thu, 05 Dec 2019 18:24:27 +0000 - rev 567881
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Bug 1601694. Remove the redundant Windows range/ifame selection code. r=bobowen There is no need for this code to set the kEnableSelectionRB bit. nsPrintJob already sets it before it calls nsIPrintingPromptService::ShowPrintDialog. Differential Revision: https://phabricator.services.mozilla.com/D55992
469a80cf68cabebfebe740c77fb6f488587beb03: Backed out changeset b89936db7178 (bug 202251) for bc failures at browser_misused_characters_in_strings.js. CLOSED TREE
Brindusan Cristian <cbrindusan@mozilla.com> - Thu, 05 Dec 2019 23:10:09 +0200 - rev 567880
Push 12493 by ffxbld-merge at Mon, 06 Jan 2020 15:38:57 +0000
Backed out changeset b89936db7178 (bug 202251) for bc failures at browser_misused_characters_in_strings.js. CLOSED TREE
(0) -300000 -100000 -30000 -10000 -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 +3000 +10000 +30000 tip