Commit Graph

639048 Commits

Author SHA1 Message Date
Julian Descottes
235dde6c92 Bug 1528276 - Do not destroy the DebuggerServer in non-e10s when last frame connection is closed r=ochameau
When reviewing https://bugzilla.mozilla.org/show_bug.cgi?id=1521052 I did not think about Firefox for Android which is not using e10s.
This means the main DebuggerServer will be killed when there are no connections left. Happy to discuss more about the preferred solution.
This is a regression in 66 and I hope to uplift a fix for this.

Differential Revision: https://phabricator.services.mozilla.com/D20830

--HG--
extra : moz-landing-system : lando
2019-02-27 19:17:37 +00:00
Jed Davis
af97210807 Bug 1506291 - Add Linux sandboxing for the RDD (media decoder) process. r=gcp,mjf,flod
The seccomp-bpf policy is currently just the "common" policy with no
additions (but with the fixes in bug 1511560 to enable shared memory
creation).  The file broker policy allows shared memory creation and
nothing else.  The namespace setup is the same as for GMP (i.e., as
restrictive as we currently can be).

The sandbox can be turned off for troubleshooting by setting the
environment variable MOZ_DISABLE_RDD_SANDBOX, similarly to the other
process types.

Tested against https://demo.bitmovin.com/public/firefox/av1/ with the
necessary prefs set.

Depends on D20895

Differential Revision: https://phabricator.services.mozilla.com/D14525

--HG--
extra : moz-landing-system : lando
2019-02-27 20:14:54 +00:00
Jed Davis
5cc3212784 Bug 1506291 - Move the AV1 decoders to a sandbox-friendly CPU counting wrapper. r=gcp,mjf
Counting CPUs accesses the filesystem (sysfs or procfs), which we'd like
to disallow when sandboxed if possible, and fails silently if access
is denied.  Because the CPU count rarely changes, this patch handles
that problem for the RDD process by caching a copy before starting
sandboxing.

Tested with a local patch to have the sandbox file broker client crash
if accessing the sysfs node for the CPU count, to verify that it's not
accessed.

Depends on D14524

Differential Revision: https://phabricator.services.mozilla.com/D20895

--HG--
extra : moz-landing-system : lando
2019-02-25 16:20:50 +00:00
Jed Davis
6fc87bff63 Bug 1511560 - Allow dup and ftruncate (when needed) in SandboxPolicyCommon. r=gcp
File descriptors are sometimes dup()ed in the process of communicating
them over IPC; some of this may be unnecessary (due to insufficient
use of move-only types), but dup() is relatively harmless.  It was
previously allowed for both content and GMP, so this doesn't change
anything.

The handling of ftruncate is a little complicated -- it's used for IPC
shared memory, but only when creating segments; so GMP doesn't allow
it and should continue not allowing it, but content needs it and RDD
will as well.  As a result, the subclass indicates if it will be needed.

Note that even when we have memfd_create support (bug 1440203),
ftruncate is still necessary even though brokering may not.

Depends on D14523

Differential Revision: https://phabricator.services.mozilla.com/D14524

--HG--
extra : moz-landing-system : lando
2019-02-27 20:14:52 +00:00
Jed Davis
bb4d6b8630 Bug 1511560 - Move the socketpair handling into SandboxPolicyCommon. r=gcp
The sandbox broker uses socketpair to construct the per-request channels
over which responses are sent; thus, if and only if the policy will be
using brokering, it will allow socketpair as safely as possible (i.e.,
denying datagram sockets if possible).

Depends on D14522

Differential Revision: https://phabricator.services.mozilla.com/D14523

--HG--
extra : moz-landing-system : lando
2019-02-23 00:44:10 +00:00
Jed Davis
2dfa36102d Bug 1511560 - Move syscalls for adjusting memory mapping properties into SandboxPolicyCommon. r=gcp
madvise is used by our malloc (and probably others), and mprotect is
used with shared memory, including when created by another process, so
the common policy should include those rules.

Depends on D14521

Differential Revision: https://phabricator.services.mozilla.com/D14522

--HG--
extra : moz-landing-system : lando
2019-02-23 00:44:08 +00:00
Jed Davis
6acf27b81f Bug 1511560 - Move the Linux sandbox broker hooks into SandboxPolicyCommon. r=gcp
This will allow other policies to use brokering if needed (e.g., RDD and
similar utility processes may need to access /dev/shm to create shared
memory).  The concrete policy class can deny filesystem access completely
(matching the current behavior of the GMP policy) by passing nullptr to
the superclass constructor instead.

Depends on D14520

Differential Revision: https://phabricator.services.mozilla.com/D14521

--HG--
extra : moz-landing-system : lando
2019-02-23 00:44:06 +00:00
Jed Davis
86607a852d Bug 1500297 - Require a broker client in ContentSandboxPolicy at level > 1. r=gcp
ContentSandboxPolicy currently allows direct filesystem access if it
isn't given a broker client; this is a legacy design from the B2G era,
before the current idea of "sandbox level".  With this patch, it allows
filesystem access at level 1, and above that it requires brokering.

This is both to reduce the opportunities for accidentally having a
too-permissive sandbox and to prepare for refactoring the broker glue in
bug 1511560.

Depends on D14519

Differential Revision: https://phabricator.services.mozilla.com/D14520

--HG--
extra : moz-landing-system : lando
2019-02-27 15:23:25 +00:00
Jed Davis
0901298ac2 Bug 1500297 - Fix Linux content sandbox level 1. r=gcp
Level 1 is meant to enable some seccomp-bpf filtering, but still allow
direct access to the filesystem, and level 2 is where brokering starts.
This was accidentally broken in 1365257 (making "level 1" act like level
2); this patch fixes that.

This feature obviously isn't used much given how long nobody noticed it was
broken, but it's useful to have around for troubleshooting, and it's
actually easier to fix it than edit it out of the documentation.

Differential Revision: https://phabricator.services.mozilla.com/D14519

--HG--
extra : moz-landing-system : lando
2019-02-27 15:23:25 +00:00
Dan Minor
7df80039d5 Bug 1530488 - Disable camera for aarch64 windows builds; r=pehrsons
This disables the camera for win64-aarch64 for Windows versions below
19H1. These versions have problems with the DirectShow implementation
which prevent the camera from working properly.

Differential Revision: https://phabricator.services.mozilla.com/D21272

--HG--
extra : moz-landing-system : lando
2019-02-27 19:50:04 +00:00
Botond Ballo
34d9171482 Bug 1519621 - Make sure ScrollToRestoredPosition() restores both the layout and visual scroll positions. r=tnikkel
Differential Revision: https://phabricator.services.mozilla.com/D18367

--HG--
extra : moz-landing-system : lando
2019-02-27 20:19:33 +00:00
Shane Caraveo
3fb3b1e418 Bug 1527127 update addon panel text for private windows r=flod,Gijs,mstriemer,rpl
Differential Revision: https://phabricator.services.mozilla.com/D19845

--HG--
extra : moz-landing-system : lando
2019-02-27 20:05:38 +00:00
Shane Caraveo
e52a8bacf3 Bug 1527127 set permission for enabled extensions on initial upgrade r=aswan
When a user first upgrades to a version where incognito is enabled,
add the permission to all enabled extensions.  This preserves user workflow
and addresses other issues (e.g. proxy).  This will only happen once.

Differential Revision: https://phabricator.services.mozilla.com/D19442

--HG--
extra : moz-landing-system : lando
2019-02-25 16:59:55 +00:00
Andrea Marchesini
6dd0ecd7d0 Bug 1525245 - Stabilize cookiePolicy/cookiePermission for live documents - part 12 - new CookieSettings for SharedWorkers and ServiceWorkers, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D21357

--HG--
extra : moz-landing-system : lando
2019-02-27 19:58:26 +00:00
Andrea Marchesini
477f2b65c3 Bug 1525245 - Stabilize cookiePolicy/cookiePermission for live documents - part 11 - windows/workers/documents must keep the current cookie settings and ignore changes, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D18960

--HG--
extra : moz-landing-system : lando
2019-02-27 19:58:07 +00:00
Andrea Marchesini
eaa983a53f Bug 1525245 - Stabilize cookiePolicy/cookiePermission for live documents - part 10 - Fix existing tests, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D18958

--HG--
extra : moz-landing-system : lando
2019-02-27 19:57:47 +00:00
Andrea Marchesini
1b7b09b29f Bug 1525245 - Stabilize cookiePolicy/cookiePermission for live documents - part 9 - Tests for DOM Cache and cookie settings changing, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D18957

--HG--
extra : moz-landing-system : lando
2019-02-27 19:57:27 +00:00
Andrea Marchesini
13d01cb0bd Bug 1525245 - Stabilize cookiePolicy/cookiePermission for live documents - part 8 - Tests for ServiceWorkers and cookie settings changing, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D18956

--HG--
extra : moz-landing-system : lando
2019-02-27 19:57:09 +00:00
Andrea Marchesini
bbf2814e97 Bug 1525245 - Stabilize cookiePolicy/cookiePermission for live documents - part 7 - Tests for IndexedDB and cookie settings changing, r=Ehsan,asuth
Differential Revision: https://phabricator.services.mozilla.com/D18955

--HG--
extra : moz-landing-system : lando
2019-02-27 19:56:57 +00:00
Andrea Marchesini
19d747280e Bug 1525245 - Stabilize cookiePolicy/cookiePermission for live documents - part 6 - Tests for SharedWorker and cookie settings changing, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D18954

--HG--
extra : moz-landing-system : lando
2019-02-27 19:56:39 +00:00
Andrea Marchesini
2c669f9cbd Bug 1525245 - Stabilize cookiePolicy/cookiePermission for live documents - part 5 - BroadcastChannel must be blocked when cookie jar access is denied to avoid communication between live and new documents, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D18953

--HG--
extra : moz-landing-system : lando
2019-02-27 19:56:20 +00:00
Andrea Marchesini
27309db8bb Bug 1525245 - Stabilize cookiePolicy/cookiePermission for live documents - part 4 - Storage tests, r=asuth
Differential Revision: https://phabricator.services.mozilla.com/D18952

--HG--
extra : moz-landing-system : lando
2019-02-27 19:56:07 +00:00
Andrea Marchesini
a0175b3980 Bug 1525245 - Stabilize cookiePolicy/cookiePermission for live documents - part 3 - LocalStorage and SessionStorage, r=asuth
Differential Revision: https://phabricator.services.mozilla.com/D18951

--HG--
extra : moz-landing-system : lando
2019-02-27 19:55:46 +00:00
Andrea Marchesini
4bef4aafc4 Bug 1525245 - Stabilize cookiePolicy/cookiePermission for live documents - part 2 - AntiTracking, r=Ehsan
Depends on D18949

Differential Revision: https://phabricator.services.mozilla.com/D18950

--HG--
extra : moz-landing-system : lando
2019-02-27 19:55:29 +00:00
Andrea Marchesini
dec5a16bcd Bug 1525245 - Stabilize cookiePolicy/cookiePermission for live documents - part 1 - information stored into loadInfo, r=Ehsan,ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D18949

--HG--
extra : moz-landing-system : lando
2019-02-27 19:55:11 +00:00
Thomas Daede
e4583841d3 Bug 1529305 - Add NASM env var to win64-plain/opt. r=dmajor
This one doesn't inherit the common mozconfig.nasm file.

Differential Revision: https://phabricator.services.mozilla.com/D21301

--HG--
extra : moz-landing-system : lando
2019-02-27 00:31:01 +00:00
Robert Helmer
30e3d84c28 Bug 1523312 - do not export msgpack, as it has no callers out side of libxul r=dmajor
Includes a drive-by fix for two unused `DEFINES`.

Differential Revision: https://phabricator.services.mozilla.com/D17859

--HG--
extra : moz-landing-system : lando
2019-02-27 19:33:54 +00:00
Robert Helmer
228ecafc9c Bug 1523312 - build msgpack separately from libprio r=glandium
Differential Revision: https://phabricator.services.mozilla.com/D21076

--HG--
extra : moz-landing-system : lando
2019-02-27 18:58:37 +00:00
Andrei Oprea
0c3e9a63d8 Bug 1528959 - Add strings for CFR Pin Tab message r=flod
Spec https://mozilla.invisionapp.com/share/R3OVTEX9X76#/screens

Differential Revision: https://phabricator.services.mozilla.com/D21020

--HG--
extra : moz-landing-system : lando
2019-02-27 14:10:02 +00:00
Aaron Klotz
6f4ebce141 Bug 1530539: Set --enable-launcher-process to default on past Nightly; r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D21262

--HG--
extra : moz-landing-system : lando
2019-02-26 21:11:51 +00:00
Aaron Klotz
2dee09001f Bug 1530809: Make LaunchElevated use mscom::ProcessRuntime instead of mscom::STARegion; r=mhowell
Differential Revision: https://phabricator.services.mozilla.com/D21261

--HG--
extra : moz-landing-system : lando
2019-02-26 21:40:59 +00:00
Aaron Klotz
0a41c8af39 Bug 1530700: Add a missing ifdef MOZ_LAUNCHER_PROCESS block; r=mhowell
Differential Revision: https://phabricator.services.mozilla.com/D21258

--HG--
extra : moz-landing-system : lando
2019-02-27 11:00:14 +00:00
Aaron Klotz
9deb5d11f5 Bug 1530788: Ensure that the launcher process pref remains functional on Nightly; r=mhowell
Differential Revision: https://phabricator.services.mozilla.com/D21254

--HG--
extra : moz-landing-system : lando
2019-02-26 21:38:08 +00:00
Dave Townsend
3073e9d542 Bug 1528998: Apply profile snatching behaviour when the first run of a dedicated build is after a restart. r=froydnj
If Firefox was using the default profile before restarting to upgrade to a build
supporting dedicated profiles then we should check if we can make the selected
profile the default for this build and if not create the user a new profile.

Differential Revision: https://phabricator.services.mozilla.com/D20415

--HG--
extra : moz-landing-system : lando
2019-02-27 19:24:04 +00:00
James Willcox
2fe9e30e89 Bug 1525959 - Only run mochitest-e10s on GeckoView opt builds r=gbrown
Differential Revision: https://phabricator.services.mozilla.com/D21405

--HG--
extra : moz-landing-system : lando
2019-02-27 19:17:35 +00:00
Sean Stangl
16371d080e Bug 1530031 - Summary: Allow ARM64 Simulator to return a different error message. r=nbp
Differential Revision: https://phabricator.services.mozilla.com/D21288

--HG--
extra : moz-landing-system : lando
2019-02-27 10:52:42 +00:00
Shane Caraveo
b9e3808121 Bug 1530816 support RTA IDs in AddonRepository r=aswan
AddonRepository validates IDs that are returned from AMO.  We
need to handle the case where we are using rta prefix for ReturnToAMO.

Differential Revision: https://phabricator.services.mozilla.com/D21389

--HG--
extra : moz-landing-system : lando
2019-02-27 17:18:46 +00:00
Ciure Andrei
109f80ff56 Backed out changeset 46def7f1496f (bug 1530546) for perma failing test_progress_events_for_gzip_data.html CLOSED TREE 2019-02-27 21:10:25 +02:00
Nicolas B. Pierron
7612e299fd Bug 1530396 - Move the AutoFlushICache to the Linker. r=mgaudet
Differential Revision: https://phabricator.services.mozilla.com/D21025

--HG--
extra : moz-landing-system : lando
2019-02-27 18:00:02 +00:00
Dorel Luca
e44a331ef0 Backed out changeset 19b29b2e2f5e (bug 1526054) for eslint failures. CLOSED TREE 2019-02-27 19:52:40 +02:00
Logan Smyth
2cfdeb0deb Bug 1530549 - Ensure that _clearSteppingHooks() runs _after_ we pause. r=jlast
Differential Revision: https://phabricator.services.mozilla.com/D21384

--HG--
extra : moz-landing-system : lando
2019-02-27 17:37:31 +00:00
Kartikaya Gupta
778cca9d62 Bug 1524418 - Avoid crashing content process with giant drawtarget. r=mstange
Differential Revision: https://phabricator.services.mozilla.com/D21230

--HG--
extra : moz-landing-system : lando
2019-02-27 17:34:23 +00:00
Kartikaya Gupta
bb22600a64 Bug 1530016 - Drop bogus entries from the generated-sources tarball. r=froydnj
On Android we apparently try to include the cpufeatures.c file from the
NDK as part of the generated-sources tarball. While this works, it makes
tar drop the bogus entry for safety reasons when unpacking the archive.
It also makes tar return an error, which is undesirable for searchfox.
It's better to just skip the entry when building the tarball.

Differential Revision: https://phabricator.services.mozilla.com/D20942

--HG--
extra : moz-landing-system : lando
2019-02-27 17:45:27 +00:00
Razvan Caliman
dbbe2953a3 Bug 1526054 - Set target node in Font Editor according to selected node type. r=gl
Refactors the logic so the target node on which the Font Editor operates can point to a parent node in case of text nodes without explicitly changing the node selection.

The target node is assigned to `this.node`. When that is null, it means the node selection is not supported by the Font Editor. This removes the need for the `isSelectedNodeValid()` method.

Differential Revision: https://phabricator.services.mozilla.com/D21387

--HG--
extra : moz-landing-system : lando
2019-02-27 17:40:49 +00:00
Eric Rahm
557518ac40 Bug 1530869 - Add support for setting per-suite alert thresholds. r=igoldan
This adds support for specifying per-suite perfherder alert thresholds and
updates the base content JS measurement to specify a 0.25% threshold.

Differential Revision: https://phabricator.services.mozilla.com/D21292

--HG--
extra : moz-landing-system : lando
2019-02-27 14:24:48 +00:00
Robin Templeton
effd19ec9c Bug 1530406 - Make HashableValue comparison of BigInts infallible r=wingo,jwalden
Differential Revision: https://phabricator.services.mozilla.com/D21032

--HG--
extra : moz-landing-system : lando
2019-02-27 15:50:04 +00:00
Razvan Caliman
ac817f3c89 Bug 1530976 - Remove functionality to mark rules as selected in the Rules view. r=gl
Differential Revision: https://phabricator.services.mozilla.com/D21344

--HG--
extra : moz-landing-system : lando
2019-02-27 15:31:16 +00:00
Razvan Caliman
294be58640 Bug 1530972 - Remove obsolete modifySelctor2 method from StyleRule actor, front and spec. r=gl
Differential Revision: https://phabricator.services.mozilla.com/D21342

--HG--
extra : moz-landing-system : lando
2019-02-27 15:33:33 +00:00
Dorel Luca
ca0e748103 Backed out changeset 9970e92003a2 (bug 1530396) for spidermonkey failure 2019-02-27 19:13:35 +02:00
Andrew Erickson
08ddc1cd25 Bug 1530546: updating hostutils for linux, round 2 r=gbrown
Differential Revision: https://phabricator.services.mozilla.com/D21318

--HG--
extra : moz-landing-system : lando
2019-02-27 16:10:27 +00:00