searching for reviewer(Alex_Gaynor)
8b2aa73ab267c98e038bc2aff456c8afde244ab3: Bug 1543809 - Can't run with XPCOM_MEM_BLOAT_LOG=1 on OS X r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Thu, 18 Apr 2019 15:17:08 +0000 - rev 531974
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1543809 - Can't run with XPCOM_MEM_BLOAT_LOG=1 on OS X r=Alex_Gaynor Don't assume XPCOM_MEM_BLOAT_LOG is a filename. XPCOM_MEM_BLOAT_LOG and XPCOM_MEM_LEAK_LOG can be set to a filename or "1" or "2" for logging to stdout and stderr respectively. Set the debug write directory for XPCOM_MEM_LEAK_LOG in the same way we already to for XPCOM_MEM_BLOAT_LOG. Differential Revision: https://phabricator.services.mozilla.com/D27968
f1085371d713eb0127a3c0ead6d97ae2116b92d1: Bug 1542015 - Enable the Mac RDD Sandbox early init mode by default r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Tue, 09 Apr 2019 12:51:26 +0000 - rev 530583
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1542015 - Enable the Mac RDD Sandbox early init mode by default r=Alex_Gaynor Re-enable early init of the RDD process sandbox (bug 1525086) by default. Differential Revision: https://phabricator.services.mozilla.com/D26627
f558bd686d04a94c66f74593abed7d0eeaa2b8c1: Bug 1541230 - Part 2 - Add /System/Library read access to the utility sandbox r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Tue, 09 Apr 2019 12:51:18 +0000 - rev 530474
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1541230 - Part 2 - Add /System/Library read access to the utility sandbox r=Alex_Gaynor Allow read access to /System/Library for accessing system libraries. Depends on D26397 Differential Revision: https://phabricator.services.mozilla.com/D26626
156aba60571fb7910d1b46412b0f26c93419bfee: Bug 1541272 - Mac Utility sandbox profile missing crash reporter port allow rule r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Thu, 04 Apr 2019 19:59:25 +0000 - rev 529929
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1541272 - Mac Utility sandbox profile missing crash reporter port allow rule r=Alex_Gaynor Add the crash reporter port to the utility process sandbox so that crash reports can be saved for processes using the utility sandbox with early sandbox init. At this time, the RDD process is the only process using the utility sandbox. Differential Revision: https://phabricator.services.mozilla.com/D26228
277768e37335cef6490ca9d35122af8b231398cd: Bug 1510569 - Use Maybe<T> directly in TabChild::PrepareProgressListenerData r=nika,Alex_Gaynor
Barret Rennie <barret@brennie.ca> - Wed, 03 Apr 2019 17:29:28 +0000 - rev 529753
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1510569 - Use Maybe<T> directly in TabChild::PrepareProgressListenerData r=nika,Alex_Gaynor Differential Revision: https://phabricator.services.mozilla.com/D24806
2bca51da9a9aa9fb07d479b5506717b90e415d2f: Bug 1540892 - [Mac] Don't #include policy definition headers in mac/Sandbox.h r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Tue, 02 Apr 2019 12:59:46 +0000 - rev 529487
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1540892 - [Mac] Don't #include policy definition headers in mac/Sandbox.h r=Alex_Gaynor Move sandbox policy includes to Sandbox.mm. Differential Revision: https://phabricator.services.mozilla.com/D25691
f2b1f6a1c760bceb3a278501e11473aa947d8843: Bug 1540288 - YouTube Tab Crash on macOS 10.11 in mozilla::PRemoteDecoderManagerChild::SendPRemoteDecoderConstructor r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Tue, 02 Apr 2019 12:57:28 +0000 - rev 529486
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1540288 - YouTube Tab Crash on macOS 10.11 in mozilla::PRemoteDecoderManagerChild::SendPRemoteDecoderConstructor r=Alex_Gaynor Disable early sandbox init for the RDD Mac process until the 10.11 crash is resolved. Differential Revision: https://phabricator.services.mozilla.com/D25690
7d8d318ea0627102c14b211ab487042563b122b8: Bug 1537940 - [Mac] With content sandbox disabled, processes "Not Responding" in Activity Monitor r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Fri, 29 Mar 2019 13:47:44 +0000 - rev 528679
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1537940 - [Mac] With content sandbox disabled, processes "Not Responding" in Activity Monitor r=Alex_Gaynor Make sure CGSShutdownServerConnections() is called regardless of whether or not the sandbox is enabled. Differential Revision: https://phabricator.services.mozilla.com/D24794
d33c1566c2d9a0958fcbd48f5a275241519b10e4: Bug 1539796 - Ccov build: fatal error: 'mozilla/Sandbox.h' file not found r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Thu, 28 Mar 2019 19:40:57 +0000 - rev 528524
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1539796 - Ccov build: fatal error: 'mozilla/Sandbox.h' file not found r=Alex_Gaynor Add missing MOZ_SANDBOX preprocessor check before including Sandbox.h to fix the code coverage build. Remove unused nsMacUtilsImpl.h #include. Differential Revision: https://phabricator.services.mozilla.com/D25287
c83b5d6e0777dc6df8ce917a388a3f46729d5dc7: Bug 1525086 - Part 6 - Use AssertMacSandboxEnabled() for the RDD process, change the assert to use sandbox_check() r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Wed, 27 Mar 2019 20:29:08 +0000 - rev 528389
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1525086 - Part 6 - Use AssertMacSandboxEnabled() for the RDD process, change the assert to use sandbox_check() r=Alex_Gaynor When the RDD process sandbox is started at launch, assert the sandbox has been enabled in the Init message. Change AssertMacSandboxEnabled() to use the undocumented sandbox_check() function instead of sandbox_init(). Differential Revision: https://phabricator.services.mozilla.com/D22414
beca0789c9df05a90ae7075dda2ae67feca74be4: Bug 1525086 - Part 5 - Update ContentParent to use new MacSandboxInfo param methods r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Wed, 27 Mar 2019 20:28:49 +0000 - rev 528388
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1525086 - Part 5 - Update ContentParent to use new MacSandboxInfo param methods r=Alex_Gaynor Use the new MacSandboxInfo CLI param methods to setup the content process command line arguments. Differential Revision: https://phabricator.services.mozilla.com/D22411
0e5f0e49adac53e95dcc14ad7efdd8817ba6a231: Bug 1525086 - Part 4 - Cache the result of nsMacUtilsImpl::GetAppPath r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Thu, 28 Mar 2019 02:25:54 +0000 - rev 528387
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1525086 - Part 4 - Cache the result of nsMacUtilsImpl::GetAppPath r=Alex_Gaynor Cache the result of nsMacUtilsImpl::GetAppPath() to avoid doing I/O on repeated calls. Differential Revision: https://phabricator.services.mozilla.com/D22410
08e70a4f1768919cd1272145e08b6094f8ba6325: Bug 1525086 - Part 3b - Start the RDD sandbox earlier r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Thu, 28 Mar 2019 02:25:50 +0000 - rev 528386
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1525086 - Part 3b - Start the RDD sandbox earlier r=Alex_Gaynor Start the RDD process earlier by changing RDDProcessHost to pass the necessary command line arguments for enabling the sandbox. Per lsmp output on 10.14.3, starting the RDD process sandbox removes access to WindowServer, coreservicesd, lsd and distnoted. Add a pref (defaulting to on) to control enabling starting the RDD process earlier. Differential Revision: https://phabricator.services.mozilla.com/D23460
49a9f3abb9a981c0595ca3d6e1439e504e840934: Bug 1525086 - Part 3a - Move sandbox param logic to GeckoChildProcessHost and MacSandboxInfo to be more reusable r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Thu, 28 Mar 2019 02:25:52 +0000 - rev 528385
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1525086 - Part 3a - Move sandbox param logic to GeckoChildProcessHost and MacSandboxInfo to be more reusable r=Alex_Gaynor Move sandbox early start logic to GeckoChildProcessHost. Move sandbox CLI param logic into MacSandboxInfo. Differential Revision: https://phabricator.services.mozilla.com/D22409
4fc01165236cdf0c3929fd1a5c5fb3731c863d29: Bug 1525086 - Part 2 - Remove unneeded params and permissions from the utility sandbox r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Wed, 27 Mar 2019 20:27:32 +0000 - rev 528384
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1525086 - Part 2 - Remove unneeded params and permissions from the utility sandbox r=Alex_Gaynor Remove the unused plugin binary path and app binary path parameters and cleanup file path permissions. Explicitly allow access to launchservicesd to allow SetProcessName() to work when the sandbox is started during startup. Differential Revision: https://phabricator.services.mozilla.com/D22408
4c6dfbf1662d955009ff939e842f6157a1bb3fec: Bug 1525086 - Part 1 - Split up sandbox policies, create utility policy for the RDD process r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Wed, 27 Mar 2019 20:27:09 +0000 - rev 528383
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1525086 - Part 1 - Split up sandbox policies, create utility policy for the RDD process r=Alex_Gaynor Move sandbox policies for different process types into their own files. Create a new "utility" policy cloned from the GMP policy to be used for basic utility-type processes. Use the utility policy for the RDD process. Differential Revision: https://phabricator.services.mozilla.com/D22405
9a628e1147208212479e318fa093474f1e4f10a7: Bug 1533842 - When creating the ContentParent object explicitly flag it as not shutting down r=Alex_Gaynor
Gabriele Svelto <gsvelto@mozilla.com> - Mon, 18 Mar 2019 12:54:11 +0000 - rev 526668
Push 2082 by ffxbld-merge at Mon, 01 Jul 2019 08:34:18 +0000
Bug 1533842 - When creating the ContentParent object explicitly flag it as not shutting down r=Alex_Gaynor Differential Revision: https://phabricator.services.mozilla.com/D23740
ca6825d7be210e4a1282a92a3ba9b24ffef976a3: Bug 1533842 - When creating the ContentParent object explicitly flag it as not shutting down r=Alex_Gaynor a=pascalc
Gabriele Svelto <gsvelto@mozilla.com> - Mon, 18 Mar 2019 12:54:11 +0000 - rev 525646
Push 2032 by ffxbld-merge at Mon, 13 May 2019 09:36:57 +0000
Bug 1533842 - When creating the ContentParent object explicitly flag it as not shutting down r=Alex_Gaynor a=pascalc Differential Revision: https://phabricator.services.mozilla.com/D23740
608ca009efdfd35fc49127b47bb13a57df6f7273: Bug 1523996 - part 5 - bulk-read/write adjacent POD fields in IPDL-defined structs; r=Alex_Gaynor
Nathan Froyd <froydnj@gmail.com> - Wed, 06 Mar 2019 13:59:57 +0000 - rev 523541
Push 2032 by ffxbld-merge at Mon, 13 May 2019 09:36:57 +0000
Bug 1523996 - part 5 - bulk-read/write adjacent POD fields in IPDL-defined structs; r=Alex_Gaynor Now that fields are packed nicely, we can take advantage of the contiguous layout of POD fields and read/write all the POD fields of a given size in a single read/write call. For many structs, this should have little or no effect, but for large structs such as LoadInfoArgs, this reduces the number of function calls by ~50%. Differential Revision: https://phabricator.services.mozilla.com/D22001
90d17458ca5425d50a0d58ad59ec227a3458890e: Bug 1523996 - part 4 - add static assertions for member layout; r=Alex_Gaynor
Nathan Froyd <froydnj@gmail.com> - Wed, 06 Mar 2019 13:59:48 +0000 - rev 523540
Push 2032 by ffxbld-merge at Mon, 13 May 2019 09:36:57 +0000
Bug 1523996 - part 4 - add static assertions for member layout; r=Alex_Gaynor We're about to start depending on how the fields are packed in a future patch, so we should add some compile-time checking that our assertions are correct. Differential Revision: https://phabricator.services.mozilla.com/D22000
1746c87bdd261f2254909bb25d0c15091ec1e545: Bug 1523996 - part 3 - factor out reading/writing sentinels; r=Alex_Gaynor
Nathan Froyd <froydnj@gmail.com> - Wed, 06 Mar 2019 13:59:43 +0000 - rev 523539
Push 2032 by ffxbld-merge at Mon, 13 May 2019 09:36:57 +0000
Bug 1523996 - part 3 - factor out reading/writing sentinels; r=Alex_Gaynor We're going to read and write sentinels slightly differently for bulk-writing adjacent fields, so let's factor out some reusable code for doing so. Differential Revision: https://phabricator.services.mozilla.com/D21999
5a1bb4076f8fd77e616fa54dbd85812285ef303f: Bug 1523996 - part 2 - pack IPDL-defined struct members better; r=Alex_Gaynor
Nathan Froyd <froydnj@gmail.com> - Wed, 06 Mar 2019 13:59:39 +0000 - rev 523538
Push 2032 by ffxbld-merge at Mon, 13 May 2019 09:36:57 +0000
Bug 1523996 - part 2 - pack IPDL-defined struct members better; r=Alex_Gaynor This patch changes the layout of IPDL-defined structs to order the POD members by decreasing size, which ensures everything is packed well. This optimization is only applied to the internal representation; the external interface (e.g. constructors) is entirely unchaged. Differential Revision: https://phabricator.services.mozilla.com/D21998
318d0fe526a048c5340bf6095b1d567d1d60bdc4: Bug 1523996 - part 1 - compute a packed ordering for structure fields; r=Alex_Gaynor
Nathan Froyd <froydnj@gmail.com> - Wed, 06 Mar 2019 13:59:35 +0000 - rev 523537
Push 2032 by ffxbld-merge at Mon, 13 May 2019 09:36:57 +0000
Bug 1523996 - part 1 - compute a packed ordering for structure fields; r=Alex_Gaynor This patch computes an ordering for the fields of an IPDL structure decl such that they are packed well in memory. We'll take advantage of this ordering in future patches. Differential Revision: https://phabricator.services.mozilla.com/D21997
825dfac611b25553f36ee0da6d7e5b043087b7e3: bug 1435858 - add a canary test that will fail before all of the test certificates expire r=Alex_Gaynor,jcj
Dana Keeler <dkeeler@mozilla.com> - Mon, 25 Feb 2019 22:51:47 +0000 - rev 521902
Push 2032 by ffxbld-merge at Mon, 13 May 2019 09:36:57 +0000
bug 1435858 - add a canary test that will fail before all of the test certificates expire r=Alex_Gaynor,jcj This test should remind us to regenerate the test certificates next year before they actually expire. Differential Revision: https://phabricator.services.mozilla.com/D21065
d8c0471be57847453ffbf0629fdabefe1a1e9619: Bug 1527472 - devirtualize IPC methods in PVideoDecoder and PRemoteVideoDecoder. r=Alex_Gaynor
Michael Froman <mfroman@mozilla.com> - Wed, 13 Feb 2019 14:11:45 +0000 - rev 519775
Push 2032 by ffxbld-merge at Mon, 13 May 2019 09:36:57 +0000
Bug 1527472 - devirtualize IPC methods in PVideoDecoder and PRemoteVideoDecoder. r=Alex_Gaynor Differential Revision: https://phabricator.services.mozilla.com/D19578
43475e4517a993eba5eda641bce72d31ed8cc7f9: bug 1525343 - increase add-on manifest size limit r=Alex_Gaynor
Dana Keeler <dkeeler@mozilla.com> - Tue, 12 Feb 2019 22:01:16 +0000 - rev 519706
Push 2032 by ffxbld-merge at Mon, 13 May 2019 09:36:57 +0000
bug 1525343 - increase add-on manifest size limit r=Alex_Gaynor Differential Revision: https://phabricator.services.mozilla.com/D19452
71adb32bf578972f458accbb88a7e0cec0dce86e: Bug 1525625 - [Mac] Flash plugin can not save settings r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Fri, 08 Feb 2019 20:42:10 +0000 - rev 519230
Push 2032 by ffxbld-merge at Mon, 13 May 2019 09:36:57 +0000
Bug 1525625 - [Mac] Flash plugin can not save settings r=Alex_Gaynor Allow file-write-unlink in ~/Library/Preferences/Macromedia/Flash Player to allow changes made in the Flash Global Settings panel to persist. Differential Revision: https://phabricator.services.mozilla.com/D19217
5722c0971a524299866da74dd4b33e5944866726: Bug 1520873: Support IPC fuzzer Faulty to run on Windows r=Alex_Gaynor
Christoph Diehl <cdiehl@mozilla.com> - Wed, 30 Jan 2019 19:08:48 +0000 - rev 518225
Push 2032 by ffxbld-merge at Mon, 13 May 2019 09:36:57 +0000
Bug 1520873: Support IPC fuzzer Faulty to run on Windows r=Alex_Gaynor This is a supplement to further increase coverage of IPC fuzzing and to fulfill support for Faulty on all platforms. Differential Revision: https://phabricator.services.mozilla.com/D16888
5531999b13066b74b4f24154568d79126abdcdad: Bug 1506495 - Whitelist /Library and ~/Library ColorSync Profile directories r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Fri, 01 Feb 2019 22:09:24 +0000 - rev 517372
Push 2032 by ffxbld-merge at Mon, 13 May 2019 09:36:57 +0000
Bug 1506495 - Whitelist /Library and ~/Library ColorSync Profile directories r=Alex_Gaynor Whitelist the /Library and ~/Library ColorSync profile directories allowing gfx.color_management.display_profile to be used to load color profiles from those locations. Differential Revision: https://phabricator.services.mozilla.com/D18390
11471a80d264aa5b174b3ffb1dd93fcaf798e62a: Bug 1520764 - Disable logging for iokit-get-properties and other extra deny types in sandbox profiles r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Wed, 23 Jan 2019 14:06:51 +0000 - rev 516787
Push 2032 by ffxbld-merge at Mon, 13 May 2019 09:36:57 +0000
Bug 1520764 - Disable logging for iokit-get-properties and other extra deny types in sandbox profiles r=Alex_Gaynor Add "(with no-log)" to the iokit-get-properties and other extra deny types in the content and GMP sandbox profiles. Differential Revision: https://phabricator.services.mozilla.com/D17285
2705a920610a3b56aaf84b45166fd9e06e118fae: bug 1525343 - increase add-on manifest size limit r=Alex_Gaynor, a=lizzard
Dana Keeler <dkeeler@mozilla.com> - Tue, 12 Feb 2019 22:01:16 +0000 - rev 516008
Push 1953 by ffxbld-merge at Mon, 11 Mar 2019 12:10:20 +0000
bug 1525343 - increase add-on manifest size limit r=Alex_Gaynor, a=lizzard Differential Revision: https://phabricator.services.mozilla.com/D19452
cea43c1728b90b48d131016636df357f7883522d: Bug 1525625 - [Mac] Flash plugin can not save settings r=Alex_Gaynor a=lizzard
Haik Aftandilian <haftandilian@mozilla.com> - Fri, 08 Feb 2019 20:42:10 +0000 - rev 515931
Push 1953 by ffxbld-merge at Mon, 11 Mar 2019 12:10:20 +0000
Bug 1525625 - [Mac] Flash plugin can not save settings r=Alex_Gaynor a=lizzard Allow file-write-unlink in ~/Library/Preferences/Macromedia/Flash Player to allow changes made in the Flash Global Settings panel to persist. Differential Revision: https://phabricator.services.mozilla.com/D19217
63b220f22addd222434d43e0ba0d46e263b58916: Bug 1506495 - Whitelist /Library and ~/Library ColorSync Profile directories r=Alex_Gaynor a=lizzard
Haik Aftandilian <haftandilian@mozilla.com> - Fri, 01 Feb 2019 22:09:24 +0000 - rev 515723
Push 1953 by ffxbld-merge at Mon, 11 Mar 2019 12:10:20 +0000
Bug 1506495 - Whitelist /Library and ~/Library ColorSync Profile directories r=Alex_Gaynor a=lizzard Whitelist the /Library and ~/Library ColorSync profile directories allowing gfx.color_management.display_profile to be used to load color profiles from those locations. Differential Revision: https://phabricator.services.mozilla.com/D18390
a3b8503e6109c7e6e81cee27af25b9ec1b01d74d: Bug 1522599 - make the logic for cxxTypeNeedsMove more straightforward; r=Alex_Gaynor
Nathan Froyd <froydnj@mozilla.com> - Thu, 24 Jan 2019 16:31:59 -0500 - rev 515376
Push 1953 by ffxbld-merge at Mon, 11 Mar 2019 12:10:20 +0000
Bug 1522599 - make the logic for cxxTypeNeedsMove more straightforward; r=Alex_Gaynor Nested conditionals are hard to read; separating things out should make the flow somewhat more obvious.
f71ebb7632fb7e9e8f8514f377c12e9a52430da1: Bug 1521167 [Mac] Sandbox violation logging is always enabled with early startup r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Tue, 22 Jan 2019 14:00:27 +0000 - rev 514832
Push 1953 by ffxbld-merge at Mon, 11 Mar 2019 12:10:20 +0000
Bug 1521167 [Mac] Sandbox violation logging is always enabled with early startup r=Alex_Gaynor For sandbox early startup, ensure violation logging is only enabled when the parent passes the -sbLogging flag. Differential Revision: https://phabricator.services.mozilla.com/D17013
4ef4c81995f62e908208a3c99f2e34664ae5adab: Bug 1518922 - part 1 - remove dead code for extra crashreporting directory; r=Alex_Gaynor
Nathan Froyd <froydnj@mozilla.com> - Thu, 10 Jan 2019 16:13:37 -0500 - rev 513355
Push 1953 by ffxbld-merge at Mon, 11 Mar 2019 12:10:20 +0000
Bug 1518922 - part 1 - remove dead code for extra crashreporting directory; r=Alex_Gaynor The command-line parameter used by nsEmbedFunctions.cpp is turned into an nsIFile, and then said nsIFile is never used. Its last use was deleted in bug 1407693, where we reworked how extra annotations were done.
51fa00bbe97e6553e67d8d85ae12e5cf98b4ba8b: Bug 1508277 - Crash in mozilla::gl::SurfaceFactory_IOSurface::CreateShared r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Mon, 31 Dec 2018 17:23:35 +0000 - rev 512185
Push 1953 by ffxbld-merge at Mon, 11 Mar 2019 12:10:20 +0000
Bug 1508277 - Crash in mozilla::gl::SurfaceFactory_IOSurface::CreateShared r=Alex_Gaynor Allow access to device-id and vendor-id IOKit properties needed for AppleIntelHD3000GraphicsGLDriver. Fixes a crash in the AppleIntelHD3000GraphicsGLDriver userland driver which is used in some 2011-era Macs. Differential Revision: https://phabricator.services.mozilla.com/D15528
14dfa47c99a1deb2267d707f53b8b5821ad0be7b: Bug 1506495 - Whitelist /Library and ~/Library ColorSync Profile directories. r=Alex_Gaynor, a=RyanVM
Haik Aftandilian <haftandilian@mozilla.com> - Fri, 01 Feb 2019 22:09:24 +0000 - rev 509623
Push 1931 by ryanvm@gmail.com at Fri, 08 Feb 2019 21:14:52 +0000
Bug 1506495 - Whitelist /Library and ~/Library ColorSync Profile directories. r=Alex_Gaynor, a=RyanVM Whitelist the /Library and ~/Library ColorSync profile directories allowing gfx.color_management.display_profile to be used to load color profiles from those locations. Differential Revision: https://phabricator.services.mozilla.com/D18390
1577f27b12ba23efba7921a38ba64888d5f90d8d: Bug 1521167 - [Mac] Sandbox violation logging is always enabled with early startup. r=Alex_Gaynor, a=RyanVM
Haik Aftandilian <haftandilian@mozilla.com> - Tue, 22 Jan 2019 14:00:27 +0000 - rev 509577
Push 1913 by ryanvm@gmail.com at Thu, 24 Jan 2019 16:37:43 +0000
Bug 1521167 - [Mac] Sandbox violation logging is always enabled with early startup. r=Alex_Gaynor, a=RyanVM For sandbox early startup, ensure violation logging is only enabled when the parent passes the -sbLogging flag. Differential Revision: https://phabricator.services.mozilla.com/D17013
2f7653477756a0d4ecac6296d98b09c846d594a5: Bug 1508277 - Crash in mozilla::gl::SurfaceFactory_IOSurface::CreateShared. r=Alex_Gaynor, a=RyanVM
Haik Aftandilian <haftandilian@mozilla.com> - Mon, 31 Dec 2018 17:23:35 +0000 - rev 509270
Push 1905 by ffxbld-merge at Mon, 21 Jan 2019 12:33:13 +0000
Bug 1508277 - Crash in mozilla::gl::SurfaceFactory_IOSurface::CreateShared. r=Alex_Gaynor, a=RyanVM Allow access to device-id and vendor-id IOKit properties needed for AppleIntelHD3000GraphicsGLDriver. Fixes a crash in the AppleIntelHD3000GraphicsGLDriver userland driver which is used in some 2011-era Macs. Differential Revision: https://phabricator.services.mozilla.com/D15528
4021b54225626c9b2e52db192b30d94d833be924: Bug 1511376 - Firefox crashes during startup when executed from tempdir r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Tue, 04 Dec 2018 19:02:06 +0000 - rev 508511
Push 1905 by ffxbld-merge at Mon, 21 Jan 2019 12:33:13 +0000
Bug 1511376 - Firefox crashes during startup when executed from tempdir r=Alex_Gaynor Change nsMacUtilsImpl::GetAppPath() to not depend on the app bundle ending in ".app". Differential Revision: https://phabricator.services.mozilla.com/D13682
ab21bad9895d263a0cd717fd38960459413efc26: Bug 1505573 - [Mac] Enable sandbox early startup by default on all releases (ride the trains) r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Fri, 30 Nov 2018 13:55:13 +0000 - rev 508208
Push 1905 by ffxbld-merge at Mon, 21 Jan 2019 12:33:13 +0000
Bug 1505573 - [Mac] Enable sandbox early startup by default on all releases (ride the trains) r=Alex_Gaynor Let sandbox early startup ride the trains by setting security.sandbox.content.mac.earlyinit=true on all releases, not just Nightly. Differential Revision: https://phabricator.services.mozilla.com/D13470
823acff9cd2fe0b5e15e456226dbadc81b3c4961: Bug 1506776 - 17.78% Base Content Resident Unique Memory regression r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Tue, 20 Nov 2018 22:06:06 +0000 - rev 506595
Push 1905 by ffxbld-merge at Mon, 21 Jan 2019 12:33:13 +0000
Bug 1506776 - 17.78% Base Content Resident Unique Memory regression r=Alex_Gaynor Until more analysis is done, add back access to com.apple.CoreServices.coreservicesd to avoid extra allocations that are triggered when the service is blocked. Differential Revision: https://phabricator.services.mozilla.com/D12479
22d335fc020fb0509c67c4a945db21a27b8332d4: Bug 1501126 - [Mac] Enable sandbox early startup by default on Nightly r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Fri, 09 Nov 2018 19:55:07 +0000 - rev 504684
Push 1905 by ffxbld-merge at Mon, 21 Jan 2019 12:33:13 +0000
Bug 1501126 - [Mac] Enable sandbox early startup by default on Nightly r=Alex_Gaynor Set security.sandbox.content.mac.earlyinit=true to enable sandbox early startup by default on Nightly only. Differential Revision: https://phabricator.services.mozilla.com/D11218
9e1e0da28cb4486461eb5061ec04b13610bedd9b: Bug 1498750 - [Mac] Cache content process sandbox params setup in ContentParent::AppendSandboxParams() r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Fri, 09 Nov 2018 17:21:36 +0000 - rev 504681
Push 1905 by ffxbld-merge at Mon, 21 Jan 2019 12:33:13 +0000
Bug 1498750 - [Mac] Cache content process sandbox params setup in ContentParent::AppendSandboxParams() r=Alex_Gaynor Cache the sandboxing command line parameters used when starting a new content process, avoiding calls to realpath(3) on the main thread in the parent process for each content process that is started. Differential Revision: https://phabricator.services.mozilla.com/D10529
b246415f6864c04591ea05ca9e06e1cd7e6f9ca2: Bug 1505445 - [Mac] With sandbox early startup, start the sandbox after the port exchange r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Thu, 08 Nov 2018 21:04:19 +0000 - rev 504424
Push 1905 by ffxbld-merge at Mon, 21 Jan 2019 12:33:13 +0000
Bug 1505445 - [Mac] With sandbox early startup, start the sandbox after the port exchange r=Alex_Gaynor Don't start the sandbox until after the port exchange so the parent process does not have to wait longer in ContentParent::LaunchSubprocess() for the (expensive) sandbox_init_with_parameters call to complete in the child. Remove the policy rule allowing access to the parent port now that it is already open when the sandbox is initialized and therefore not needed. Differential Revision: https://phabricator.services.mozilla.com/D11186
fdeb43b7bc65cb624dc1dcc18f2ba070ef254fdc: Bug 1502228 - [Mac] With sandbox early startup enabled, some form elements are not rendered r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Fri, 26 Oct 2018 18:51:37 +0000 - rev 502432
Push 1905 by ffxbld-merge at Mon, 21 Jan 2019 12:33:13 +0000
Bug 1502228 - [Mac] With sandbox early startup enabled, some form elements are not rendered r=Alex_Gaynor Add the /private/var directory to the list of file-read-metadata paths to avoid rendering issues on macOS 10.14 when sandbox early startup is enabled. Differential Revision: https://phabricator.services.mozilla.com/D9933
141e7c1fa4338aa1a7e3ee275f983f8ed3845d5c: Bug 1501121 - [Mac] With sandbox early startup enabled, content processes become "Not Responding" in Activity Monitor r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Fri, 26 Oct 2018 13:03:55 +0000 - rev 502356
Push 1905 by ffxbld-merge at Mon, 21 Jan 2019 12:33:13 +0000
Bug 1501121 - [Mac] With sandbox early startup enabled, content processes become "Not Responding" in Activity Monitor r=Alex_Gaynor When early sandbox setartup is enabled, revert to sending SetProcessSandbox() to the child process as before. In the child process RecvSetProcessSandbox() handler, call CGSShutdownServerConnections() and then return early if the sandbox is already enabled. Differential Revision: https://phabricator.services.mozilla.com/D9827
c70d57adec824c605e77196e651191c784c84bc3: Bug 1431441 - Part 6 - Start middleman WebReplay process sandbox later r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Thu, 18 Oct 2018 20:51:54 +0000 - rev 501643
Push 1905 by ffxbld-merge at Mon, 21 Jan 2019 12:33:13 +0000
Bug 1431441 - Part 6 - Start middleman WebReplay process sandbox later r=Alex_Gaynor Depends on D7357 Differential Revision: https://phabricator.services.mozilla.com/D8474
cd9c1a610dd7edf256945bccea8671cb2bd18f70: Bug 1431441 - Part 5 - Parameterize access to the windowserver in the Mac content sandbox policy r=Alex_Gaynor
Haik Aftandilian <haftandilian@mozilla.com> - Thu, 18 Oct 2018 20:49:51 +0000 - rev 501642
Push 1905 by ffxbld-merge at Mon, 21 Jan 2019 12:33:13 +0000
Bug 1431441 - Part 5 - Parameterize access to the windowserver in the Mac content sandbox policy r=Alex_Gaynor Only allow access to "com.apple.windowserver.active" when the pref "security.sandbox.content.mac.disconnect-windowserver" is set to true. Depends on D6721 Differential Revision: https://phabricator.services.mozilla.com/D7357