Commit Graph

2821 Commits

Author SHA1 Message Date
Robert Strong
f9ecc88a7e Bug 1530103 - Check for osint argument when checking for greomni and appomni arguments. r=aklotz
Differential Revision: https://phabricator.services.mozilla.com/D21326

--HG--
extra : moz-landing-system : lando
2019-02-27 19:18:38 +00:00
Jed Davis
5cc3212784 Bug 1506291 - Move the AV1 decoders to a sandbox-friendly CPU counting wrapper. r=gcp,mjf
Counting CPUs accesses the filesystem (sysfs or procfs), which we'd like
to disallow when sandboxed if possible, and fails silently if access
is denied.  Because the CPU count rarely changes, this patch handles
that problem for the RDD process by caching a copy before starting
sandboxing.

Tested with a local patch to have the sandbox file broker client crash
if accessing the sysfs node for the CPU count, to verify that it's not
accessed.

Depends on D14524

Differential Revision: https://phabricator.services.mozilla.com/D20895

--HG--
extra : moz-landing-system : lando
2019-02-25 16:20:50 +00:00
Aaron Klotz
9deb5d11f5 Bug 1530788: Ensure that the launcher process pref remains functional on Nightly; r=mhowell
Differential Revision: https://phabricator.services.mozilla.com/D21254

--HG--
extra : moz-landing-system : lando
2019-02-26 21:38:08 +00:00
Noemi Erli
7e23372938 Merge mozilla-central to autoland. a=merge CLOSED TREE
--HG--
extra : rebase_source : de8796d5d7d7079af1b895a2f537371885f8cc6c
2019-02-26 00:09:40 +02:00
Stephen A Pohl
4287947c1a Bug 1523613: Fix memory leaks during updates. r=rstrong 2019-02-25 10:16:15 -05:00
Aaron Klotz
8919792ffe Bug 1460433: Part 2 - Log launcher process failures to a telemetry ping; r=mhowell
This patch does a few things:

* Fleshes out the launcher process failure ping;
* Sends that ping via pingsender;
* If there is any failure in doing so, we fall back to the Windows event log;
* Any launcher process failures will result in us falling back to the normal
  startup code path, ensuring that users will still see a browser.

A sample ping will be attached to the bug.

Differential Revision: https://phabricator.services.mozilla.com/D19697

--HG--
extra : moz-landing-system : lando
2019-02-25 21:14:07 +00:00
Cosmin Sabou
65609ed7bd Backed out changeset 7733f36c6e38 (bug 1460433) for windows MinGW butages on ErrorHandler. CLOSED TREE
--HG--
extra : histedit_source : 8defc62b37bbaed971c6899d529e05db299a9d20
2019-02-25 20:32:35 +02:00
Aaron Klotz
61c0cff76e Bug 1460433: Part 2 - Log launcher process failures to a telemetry ping; r=mhowell
This patch does a few things:

* Fleshes out the launcher process failure ping;
* Sends that ping via pingsender;
* If there is any failure in doing so, we fall back to the Windows event log;
* Any launcher process failures will result in us falling back to the normal
  startup code path, ensuring that users will still see a browser.

A sample ping will be attached to the bug.

***
Format cleanup

Differential Revision: https://phabricator.services.mozilla.com/D19697

--HG--
extra : moz-landing-system : lando
2019-02-22 18:43:18 +00:00
Aaron Klotz
28466cb97e Bug 1460433: Part 1 - Change BasicDllServices to not do any dll notification callbacks; r=mhowell
BasicDllServices is used to gain access to the authenticode APIs in non-Gecko
contexts. One feature that WinDllServices provides is the ability to register
a callback interface to be notified when a DLL has been loaded.

This is not particularly useful in the BasicDllServices use case, and in the
"handle a launcher process failure on a background thread" use case, would
actually be harmful.

This patch modifies the DLLServices backend to offer a "basic" option that
omits the callback stuff.

Differential Revision: https://phabricator.services.mozilla.com/D19696

--HG--
extra : moz-landing-system : lando
2019-02-20 06:18:45 +00:00
Aaron Klotz
df205ceebd Bug 1529429: Part 2 - SHIELD opt-out for launcher process in Nightly; r=mhowell
We use the SHIELD pref instead of the usual launcher process pref for Nightly.
This effectively treats the launcher process as a SHIELD study with 100%
deployment.

We add some Nightly-specific code that uses the SHIELD pref to determine
whether or not to use the launcher. During startup, we query that pref and
reflect it into the registry, which then falls through to the usual launcher
process code.

We will be changing this past 67, but for now this is an effective way to
provide Nightly users with an opt-out to the launcher process and its telemetry.

Differential Revision: https://phabricator.services.mozilla.com/D20621

--HG--
extra : moz-landing-system : lando
2019-02-21 19:11:24 +00:00
Robert Strong
b71ad23d06 Bug 1434033 - Use ORIGIN to search for NSS on Linux. r=mhowell,glandium
Set the updater LDFLAGS to -Wl,-rpath=$ORIGIN so NSS can be found in the binary's directory
Stop changing the LD_LIBRARY_PATH in nsUpdaterDriver.cpp
Load the updater support files before the update begins in progressui_gtk.cpp
Launch the updater from the install directory instead of copying it to the update directory
Remove the skip-if = (os == linux && verify) for the staging tests since this also fixes the ETXTBSY error when calling execv on the copied updater

Differential Revision: https://phabricator.services.mozilla.com/D20098

--HG--
extra : moz-landing-system : lando
2019-02-21 00:31:11 +00:00
Masatoshi Kimura
e25fbce870 Bug 1528651 - Re-enable warnings-as-errors on Windows in some directories. r=dmajor
--HG--
extra : source : ba86ea25070b37f4725834e1c2d9ec4c0783e119
2019-02-17 15:03:02 +09:00
Olli Pettay
020b13e585 Bug 1528502 - Add an environment variable to control allow-downgrade, r=Mossop 2019-02-16 22:50:12 +02:00
Sylvestre Ledru
e0c61dafa5 Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
Summary: # ignore-this-changeset

Reviewers: Ehsan

Reviewed By: Ehsan

Subscribers: emilio, jandem, bbouvier, jya

Bug #: 1519636

Differential Revision: https://phabricator.services.mozilla.com/D20062
2019-02-16 20:20:37 +01:00
Cosmin Sabou
a4b19fcd61 Merge mozilla-inbound to mozilla-central. a=merge
--HG--
rename : browser/components/nsBrowserContentHandler.js => browser/components/BrowserContentHandler.jsm
2019-02-15 20:39:45 +02:00
Sylvestre Ledru
41d1d79094 Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D19663

--HG--
extra : moz-landing-system : lando
2019-02-15 08:15:57 +00:00
Daniel Varga
1e9aa9e1fc Merge mozilla-central to mozilla-inbound. a=merge on a CLOSED TREE
--HG--
rename : browser/components/nsBrowserContentHandler.js => browser/components/BrowserContentHandler.jsm
2019-02-15 03:51:05 +02:00
Mike Hommey
2980c6fe0b Bug 1512504 - Remove now unused CFG test. r=tjr
Depends on D19615

Differential Revision: https://phabricator.services.mozilla.com/D19616

--HG--
extra : moz-landing-system : lando
2019-02-14 18:56:29 +00:00
Aaron Klotz
84c01f8930 Bug 1400344: Rename mscom::MainThreadRuntime to mscom::ProcessRuntime and make it aware of Win32k lockdown and of multiple instantiations; r=Jamie
This patch takes care of a bunch of issues and does some cleanup:

* We rename mscom::MainThreadRuntime to mscom::ProcessRuntime, as the latter
  is a more accurate name going forward.
* We make ProcessRuntime aware of the Win32k Lockdown process mitigation
  policy. When Win32k is disabled, we perform process-wide COM initialization
  in the multi-threaded apartment (since we cannot create an STA window).
* We refactor the mscom apartment region stuff to enable the Win32k lockdown
  pieces in ProcessRuntime.
* We move some Gecko-specific stuff into MOZILLA_INTERNAL_API guards so that
  ProcessRuntime is usable outside of xul.dll (I will be needing it for the
  launcher process).
* Another thing that might happen with the launcher process is that, under
  error conditions in the launcher, we create a ProcessRuntime object on a
  background thread for the purposes of telemetry logging, but we also allow
  the main thread to proceed to start as the browser. This could result in a
  scenario where the main thread, as the browser process, is attempting to
  instantiate its ProcessRuntime and ends up racing with the launcher process's
  telemetry thread which has its own ProcessRuntime. To account for this
  situation, we add mutual exclusion to the process-wide initialization code.
  We host this part inside mozglue since that state is shared between both
  firefox.exe and xul.dll.
* We clean up ProcessRuntime::InitializeSecurity by using Vector to set up
  the EXPLICIT_ACCESS entries.
* We remove mscom::MainThreadClientInfo and replace it with a direct call to
  CoGetCallerTID
* We revise all references to this class to use the new name.

Differential Revision: https://phabricator.services.mozilla.com/D19551

--HG--
rename : ipc/mscom/COMApartmentRegion.h => ipc/mscom/ApartmentRegion.h
rename : ipc/mscom/MainThreadRuntime.cpp => ipc/mscom/ProcessRuntime.cpp
rename : ipc/mscom/MainThreadRuntime.h => ipc/mscom/ProcessRuntime.h
extra : moz-landing-system : lando
2019-02-14 18:56:20 +00:00
Dorel Luca
67115dd61b Backed out changeset 2d4b8d90cbd7 (bug 1400344) for Spider monkey failrues. CLOSED TREE
--HG--
rename : ipc/mscom/ApartmentRegion.h => ipc/mscom/COMApartmentRegion.h
rename : ipc/mscom/ProcessRuntime.cpp => ipc/mscom/MainThreadRuntime.cpp
rename : ipc/mscom/ProcessRuntime.h => ipc/mscom/MainThreadRuntime.h
2019-02-14 20:45:26 +02:00
Aaron Klotz
0cb12a123a Bug 1400344: Rename mscom::MainThreadRuntime to mscom::ProcessRuntime and make it aware of Win32k lockdown and of multiple instantiations; r=Jamie
This patch takes care of a bunch of issues and does some cleanup:

* We rename mscom::MainThreadRuntime to mscom::ProcessRuntime, as the latter
  is a more accurate name going forward.
* We make ProcessRuntime aware of the Win32k Lockdown process mitigation
  policy. When Win32k is disabled, we perform process-wide COM initialization
  in the multi-threaded apartment (since we cannot create an STA window).
* We refactor the mscom apartment region stuff to enable the Win32k lockdown
  pieces in ProcessRuntime.
* We move some Gecko-specific stuff into MOZILLA_INTERNAL_API guards so that
  ProcessRuntime is usable outside of xul.dll (I will be needing it for the
  launcher process).
* Another thing that might happen with the launcher process is that, under
  error conditions in the launcher, we create a ProcessRuntime object on a
  background thread for the purposes of telemetry logging, but we also allow
  the main thread to proceed to start as the browser. This could result in a
  scenario where the main thread, as the browser process, is attempting to
  instantiate its ProcessRuntime and ends up racing with the launcher process's
  telemetry thread which has its own ProcessRuntime. To account for this
  situation, we add mutual exclusion to the process-wide initialization code.
  We host this part inside mozglue since that state is shared between both
  firefox.exe and xul.dll.
* We clean up ProcessRuntime::InitializeSecurity by using Vector to set up
  the EXPLICIT_ACCESS entries.
* We remove mscom::MainThreadClientInfo and replace it with a direct call to
  CoGetCallerTID
* We revise all references to this class to use the new name.

Differential Revision: https://phabricator.services.mozilla.com/D19551

--HG--
rename : ipc/mscom/COMApartmentRegion.h => ipc/mscom/ApartmentRegion.h
rename : ipc/mscom/MainThreadRuntime.cpp => ipc/mscom/ProcessRuntime.cpp
rename : ipc/mscom/MainThreadRuntime.h => ipc/mscom/ProcessRuntime.h
extra : moz-landing-system : lando
2019-02-14 16:40:58 +00:00
Dave Townsend
6d2f06a63f Bug 1527374: Always remove --allow-downgrade from the command line. r=bzbarsky
Currently we only check and remove the --allow-downgrade command line argument
if the run is actually a downgrade. When we don't the --allow-downgrade argument
makes it to Firefox's default command line handler which doesn't know how to
handle it and so ignores it and the next argument on the command line.

Flipping the ordering of the check makes sure we always remove the argument.

Differential Revision: https://phabricator.services.mozilla.com/D19569

--HG--
extra : moz-landing-system : lando
2019-02-13 16:36:02 +00:00
Christian Holler
40d009a2a5 Bug 1526328 - Disable Telemetry recording in FUZZING builds. r=janerik
Differential Revision: https://phabricator.services.mozilla.com/D19359

--HG--
extra : moz-landing-system : lando
2019-02-13 16:16:32 +00:00
Sylvestre Ledru
816560fce5 Bug 1488679 - Use MOZ_APP_VERSION_DISPLAY for --version to show the full version r=glandium
Differential Revision: https://phabricator.services.mozilla.com/D19026

--HG--
extra : moz-landing-system : lando
2019-02-13 13:50:01 +00:00
Razvan Maries
dcc3ecb682 Merge mozilla-central to autoland. a=merge on a CLOSED TREE 2019-02-13 07:23:59 +02:00
Razvan Maries
221d6eaca3 Backed out changeset 91bfef9d7343 (bug 1527374) for causing merge conflict. a=backout 2019-02-13 07:21:11 +02:00
Ciure Andrei
54eeeb0a66 Backed out changeset 1f7d1d6bf61d (bug 1488679) for causing build bustages on xre/nsAppRunner.cpp CLOSED TREE 2019-02-13 01:36:43 +02:00
Sylvestre Ledru
bcb8079207 Bug 1488679 - Use MOZ_APP_VERSION_DISPLAY for --version to show the full version r=glandium
--HG--
extra : histedit_source : bc851cb0240c61b275b83a78342d4f00fef37ef8
2019-02-13 00:19:58 +01:00
Sylvestre Ledru
963728a54b Bug 1488679 - nsAppRunner.cpp: Ride along - Move to the correct style r=glandium
--HG--
extra : histedit_source : 14c997f60eaf04ed876c0daf5326c7d53ba586bc
2019-02-13 00:18:45 +01:00
Dave Townsend
68c6578b56 Bug 1527374: Always remove --allow-downgrade from the command line. r=bzbarsky
Currently we only check and remove the --allow-downgrade command line argument
if the run is actually a downgrade. When we don't the --allow-downgrade argument
makes it to Firefox's default command line handler which doesn't know how to
handle it and so ignores it and the next argument on the command line.

Flipping the ordering of the check makes sure we always remove the argument.

Differential Revision: https://phabricator.services.mozilla.com/D19569

--HG--
extra : rebase_source : 9d92c78a500bccdcb05d002bb129e779d2391468
2019-02-12 13:15:42 -08:00
Dave Townsend
c92f258326 Bug 1518639: Move profile locking outside of SelectProfile. r=froydnj
So the remoting clients can know what the selected profile is before an attempt
to lock it is made we move the locking code to after the call to SelectProfile.

Differential Revision: https://phabricator.services.mozilla.com/D19420

--HG--
extra : moz-landing-system : lando
2019-02-12 20:14:54 +00:00
Dave Townsend
85249bde88 Bug 1518639: Always use the same locking code when locking the profile. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D19419

--HG--
extra : moz-landing-system : lando
2019-02-12 20:14:52 +00:00
Dave Townsend
bd1192ad4d Bug 1518639: Split out the profile locking attempt into its own function. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D19418

--HG--
extra : moz-landing-system : lando
2019-02-12 20:14:45 +00:00
Dave Townsend
f381b7e980 Bug 1518639: Move offline command line argument handling alongside the other command line argument handling. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D19417

--HG--
extra : moz-landing-system : lando
2019-02-12 20:14:43 +00:00
Dave Townsend
beb79714a9 Bug 1518639: Remove unused arguments for CheckDowngrade. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D19415

--HG--
extra : moz-landing-system : lando
2019-02-12 20:14:41 +00:00
Dave Townsend
014a32958e Bug 1518639: Hold the profile service as its concrete type. r=froydnj
We cast the nsIToolkitProfileService to nsToolkitProfileService in a bunch of
places, might as well just hold that instead.

Differential Revision: https://phabricator.services.mozilla.com/D19414

--HG--
extra : moz-landing-system : lando
2019-02-12 20:14:33 +00:00
Coroiu Cristina
315837ca18 Backed out 6 changesets (bug 1518639) for build bustages at builds/worker/workspace/build/src/toolkit/xre/nsAppRunner.cpp on a CLOSED TREE
Backed out changeset 9f51da716b8a (bug 1518639)
Backed out changeset e2a0ca34bab9 (bug 1518639)
Backed out changeset 0780bd0ba2e1 (bug 1518639)
Backed out changeset 14c454f88604 (bug 1518639)
Backed out changeset 51becd44a8cb (bug 1518639)
Backed out changeset e8f1e89edf7f (bug 1518639)
2019-02-12 19:51:52 +02:00
Dave Townsend
6acd055f80 Bug 1518639: Always use the same locking code when locking the profile. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D19419

--HG--
extra : moz-landing-system : lando
2019-02-12 17:36:34 +00:00
Dave Townsend
cecc89a1de Bug 1518639: Split out the profile locking attempt into its own function. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D19418

--HG--
extra : moz-landing-system : lando
2019-02-12 17:36:32 +00:00
Dave Townsend
8dd2cb39f4 Bug 1518639: Move offline command line argument handling alongside the other command line argument handling. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D19417

--HG--
extra : moz-landing-system : lando
2019-02-12 17:36:30 +00:00
Dave Townsend
2921fd9063 Bug 1518639: Remote unused mProfileName member. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D19416

--HG--
extra : moz-landing-system : lando
2019-02-12 17:36:22 +00:00
Dave Townsend
cd905ce67b Bug 1518639: Remove unused arguments for CheckDowngrade. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D19415

--HG--
extra : moz-landing-system : lando
2019-02-12 17:36:20 +00:00
Dave Townsend
eb44cb01c4 Bug 1518639: Hold the profile service as its concrete type. r=froydnj
We cast the nsIToolkitProfileService to nsToolkitProfileService in a bunch of
places, might as well just hold that instead.

Differential Revision: https://phabricator.services.mozilla.com/D19414

--HG--
extra : moz-landing-system : lando
2019-02-12 17:36:13 +00:00
Dave Townsend
f01445a07c Bug 1525262: Always show the profile missing dialog if the selected profile does not exist. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D19231

--HG--
extra : moz-landing-system : lando
2019-02-11 15:31:17 +00:00
Narcis Beleuzu
b4342f1667 Backed out changeset 442a1725c992 (bug 1526328) for build bustages on Telemetry.cpp. CLOSED TREE 2019-02-11 16:27:39 +02:00
Christian Holler
67dd5df98e Bug 1526328 - Disable Telemetry recording in FUZZING builds. r=janerik
Differential Revision: https://phabricator.services.mozilla.com/D19359

--HG--
extra : moz-landing-system : lando
2019-02-11 13:54:28 +00:00
Chris Peterson
8e1848413c Bug 1507049 - Rename MOZ_CRASH_UNSAFE_OOL MOZ_CRASH_UNSAFE. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D18515

--HG--
extra : rebase_source : e8ef6eec0f7542bb381e2da81ae6431b2828aabc
extra : source : a8c262b4a2579e6def1b3a5a8220f5197b443e34
2019-02-03 00:09:37 -08:00
Chris Peterson
c032c54b84 Bug 1507049 - Rename GeckoCrashOOL GeckoCrash. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D18514

--HG--
extra : rebase_source : 914b4be6452a4a9a70b41281c0c5b0da7ee03921
extra : source : 7f11397ea19118d872f1f793f3d70985af994876
2019-02-03 00:02:30 -08:00
Chris Peterson
cedea8a566 Bug 1507049 - Rename MOZ_CrashOOL MOZ_Crash. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D18513

--HG--
extra : rebase_source : 00910ccc380f24a12181fef2a72d84c1170cb9fe
extra : source : d39e75533e61b315c9ee0000ea74eca3bf474f58
2019-02-03 00:00:12 -08:00
Kris Maglione
6472462d5e Bug 1524687: Part 2 - Convert most of the embedding module to static registration. r=mossop
Differential Revision: https://phabricator.services.mozilla.com/D18397

--HG--
extra : rebase_source : b0a3f0b9b26371cacf3bc93bec796cd98dd1b564
extra : source : 10c69df4444dd5b5410ea8716404c14721afa925
2019-01-24 15:32:56 -08:00