652c34465d5b2f7e78902a6018cd45c92ec44363: Bug 1461421 Use OffsetOf to calculate the location of parameters_ rather than making assumptions about the parent class draft
Tom Ritter <tom@mozilla.com> - Thu, 07 Jun 2018 13:08:27 -0500 - rev 2009610
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Bug 1461421 Use OffsetOf to calculate the location of parameters_ rather than making assumptions about the parent class MozReview-Commit-ID: D7REZiAIMpN
e11fad1d0104e0815d371e8988ea7e7e1e51263a: Bug 1431803 Disable a specific __try block on MinGW draft
Tom Ritter <tom@mozilla.com> - Fri, 19 Jan 2018 13:26:22 -0600 - rev 2009609
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Bug 1431803 Disable a specific __try block on MinGW This function is a technique to name a thread for debugging purposes, and it always throws an exception (and then continues). On MinGW we don't want it to throw an exception, so we do nothing. This means on MinGW we won't get nice thread naming during debugging, but we'll limp along. MozReview-Commit-ID: JRKY4wp7sdu
c14849107381f2f03ee10d215424b5254147a7a6: Bug 1431797 Correct the capitalization of headers inside the chromium code so MinGW can compile draft
Tom Ritter <tom@mozilla.com> - Wed, 24 Jan 2018 14:25:59 -0600 - rev 2009608
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Bug 1431797 Correct the capitalization of headers inside the chromium code so MinGW can compile
6413cb580dccd986c61e6dbdc72fc370765b8f10: Bug 1432295 Cast GetProcAddress to (void*) draft
Tom Ritter <tom@mozilla.com> - Tue, 23 Jan 2018 09:15:44 -0600 - rev 2009607
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Bug 1432295 Cast GetProcAddress to (void*) error: invalid conversion from 'FARPROC {aka int (__attribute__((__stdcall__)) *)()}' to 'void*' [-fpermissive] According to http://stackoverflow.com/questions/13958081/, msvc does the fixup
6c7d2da21e54f60e3ef24e3c52ca00e336b55cfc: Bug 1230910 Declare operator new [](size_t, sandbox::AllocationType, void*) draft
Tom Ritter <tom@mozilla.com> - Wed, 08 Mar 2017 19:16:46 +0000 - rev 2009606
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Bug 1230910 Declare operator new [](size_t, sandbox::AllocationType, void*) MozReview-Commit-ID: GCKj5Ao2Y2n
4944c81c5c5718f281e30d5e49bf5e55f424f561: Bug 1431825 Map _Copy_s to copy for basic_string compatibility on MinGW draft
Tom Ritter <tom@mozilla.com> - Fri, 19 Jan 2018 14:48:13 -0600 - rev 2009605
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Bug 1431825 Map _Copy_s to copy for basic_string compatibility on MinGW
47cb9f72b9ffee741abea262e12d43e2444c194c: Bg 1432790 Remove a stray \ to fix the MinGW build. draft
Tom Ritter <tom@mozilla.com> - Wed, 24 Jan 2018 14:08:45 -0600 - rev 2009604
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Bg 1432790 Remove a stray \ to fix the MinGW build. The GCC case includes a stray \ at the end of the line that gcc complains about. For reference purposes, this commit is a combination of Bug 1431621 and Bug 1432790 combined together so that it looks like I hadn't screwed it up.
891d4c089d859aea765455881fcd3f1fc3c722ab: Revert commit f7540af7428f4b146136ec19b781886693f8c03f changes to policy_target.cc for causing issues with CoInitializeSecurity. draft
Bob Owen <bobowencode@gmail.com> - Tue, 07 Nov 2017 12:44:22 +0000 - rev 2009603
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Revert commit f7540af7428f4b146136ec19b781886693f8c03f changes to policy_target.cc for causing issues with CoInitializeSecurity.
6ceca8b3eb98320949f76eb6d5659751fda06458: Allow a special all paths rule in the Windows process sandbox when using semantics FILES_ALLOW_READONLY. draft
Bob Owen <bobowencode@gmail.com> - Tue, 28 Mar 2017 08:36:16 +0100 - rev 2009602
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Allow a special all paths rule in the Windows process sandbox when using semantics FILES_ALLOW_READONLY. This also changes the read only related status checks in filesystem_interception.cc to include STATUS_NETWORK_OPEN_RESTRICTION (0xC0000201), which gets returned in some cases and fails because we never ask the broker.
b0c03c48d7199056df1b3e719f3b3dd55990f9a6: Bug 1366701 - Add option to Windows chromium sandbox policy to not use restricting SIDs. draft
Bob Owen <bobowencode@gmail.com> - Tue, 11 Jul 2017 09:44:20 +0100 - rev 2009601
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Bug 1366701 - Add option to Windows chromium sandbox policy to not use restricting SIDs. This originally landed in changeset: https://hg.mozilla.org/mozilla-central/rev/14374cd9497a
27281334a464a0656380a6e6a777bcf58fd57e1d: Don't compile base::Time::FromStringInternal. draft
Bob Owen <bobowencode@gmail.com> - Thu, 26 Oct 2017 15:10:42 +0100 - rev 2009600
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Don't compile base::Time::FromStringInternal. This has a dependency on nspr, which causes issues. Originally landed in changeset: https://hg.mozilla.org/mozilla-central/rev/477b991bf6fa7b4511768649c9bf37c7275d30d9
3fcda0e1ceef631e0547da6a84a1cc157155d3ed: Don't compile sandbox::ApplyMitigationsToCurrentThread. draft
Bob Owen <bobowencode@gmail.com> - Thu, 26 Oct 2017 15:10:42 +0100 - rev 2009599
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Don't compile sandbox::ApplyMitigationsToCurrentThread. This brings in new dependencies via FilePath and we don't currently use it. As far as I can tell Chromium doesn't use it either.
d354f513c7705f75d7ef602027475c74f55a46e0: Reinstate sandbox::TargetServices::BrokerDuplicateHandle. draft
Bob Owen <bobowencode@gmail.com> - Wed, 01 Feb 2017 21:46:15 +0000 - rev 2009598
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Reinstate sandbox::TargetServices::BrokerDuplicateHandle. This basically reverts chromium commit 569193665184525ca366e65d0735f5c851106e43.
da187c32d5d04a0668d8512e90ea1fc8ceed6816: Reinstate sandbox::BrokerServices::AddTargetPeer draft
Bob Owen <bobowencode@gmail.com> - Wed, 01 Feb 2017 21:49:59 +0000 - rev 2009597
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Reinstate sandbox::BrokerServices::AddTargetPeer This is basically a revert of chromium commit 996b42db5296bd3d11b3d7fde1a4602bbcefed2c.
6970b490b0eb2f34e928911d69bf9ad3a7815c49: This removes sequence checking on RefCountedBase in DEBUG builds. draft
Bob Owen <bobowencode@gmail.com> - Thu, 26 Oct 2017 15:10:43 +0100 - rev 2009596
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
This removes sequence checking on RefCountedBase in DEBUG builds. We don't currently make use of it and it brings in many dependencies.
00ed201e50a258c16977b2bed2b1c7e024021a08: Update chromium's list of linux-x86-32 syscalls. draft
Gian-Carlo Pascutto <gcp@mozilla.com> - Wed, 08 Jun 2016 20:36:04 +0200 - rev 2009595
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Update chromium's list of linux-x86-32 syscalls. Originally landed as changset: https://hg.mozilla.org/mozilla-central/rev/adb1d2a92e0d
6597592b48aa938b52f29680cfdb3093c8e20809: Mozilla patches to chromium code no longer required after update. draft
Bob Owen <bobowencode@gmail.com> - Mon, 20 May 2019 08:33:00 +0100 - rev 2009594
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Mozilla patches to chromium code no longer required after update.
9813619e1c91d7336e530799f7438f9360a5cad8: Add new security/sandbox/chromium/sandbox/linux dependencies from chromium commit a95171383423bed8840d49a9247debb426bf705d r=jld! draft
Bob Owen <bobowencode@gmail.com> - Mon, 20 May 2019 08:33:00 +0100 - rev 2009593
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Add new security/sandbox/chromium/sandbox/linux dependencies from chromium commit a95171383423bed8840d49a9247debb426bf705d r=jld!
2f65436a135b57bdd88cbfb3b51605a1f0756118: Update existing security/sandbox/chromium/sandbox/linux files to chromium commit a95171383423bed8840d49a9247debb426bf705d r=jld! draft
Bob Owen <bobowencode@gmail.com> - Mon, 20 May 2019 08:33:00 +0100 - rev 2009592
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Update existing security/sandbox/chromium/sandbox/linux files to chromium commit a95171383423bed8840d49a9247debb426bf705d r=jld!
fd5753ccd32b5222a15de39f39b54e727dce08a4: Changes to chromium-shim and mozilla code required for chromium commit a95171383423bed8840d49a9247debb426bf705d r=aklotz! draft
Bob Owen <bobowencode@gmail.com> - Mon, 20 May 2019 08:28:40 +0100 - rev 2009591
Push 364154 by bobowencode@gmail.com at Mon, 20 May 2019 08:19:54 +0000
Changes to chromium-shim and mozilla code required for chromium commit a95171383423bed8840d49a9247debb426bf705d r=aklotz!
(0) -1000000 -300000 -100000 -30000 -10000 -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 +3000 +10000 +30000 +100000 tip