Commit Graph

24 Commits

Author SHA1 Message Date
Dave Townsend
03c290b393 Bug 1326245: Tell the child processes when we're in safe mode. r=smaug
MozReview-Commit-ID: EiuULIb5L6A
2017-02-08 15:45:01 -08:00
Brad Lassey
c91080f3e8 bug 1303096 - Stop sending sync messages soon after content process start-up r=billm 2017-02-05 00:52:38 -05:00
Sebastian Hengst
fc3db3338c Backed out changeset e9d8a75a0dcc (bug 1303096) for failing various tests on Android 4.3 debug (e.g. test_saveHeapSnapshot_e10s_01.html). r=backout 2017-02-05 10:26:28 +01:00
Brad Lassey
c50cf62b3a bug 1303096 - Stop sending sync messages soon after content process start-up r=billm 2017-02-05 00:52:38 -05:00
Masatoshi Kimura
4995a64785 Bug 1334868 - Remove Windows XP support from dom/ipc/. r=jimm
MozReview-Commit-ID: 59ud0n62opE
2017-01-29 16:27:33 +09:00
Haik Aftandilian
73e4ac839c Bug 1290619 - Content sandbox rules should use actual profile directory, not Profiles/*/ regex's; r=jimm
Passes the profile dir to the content process as a -profile CLI
option so that the correct profile dir can be used in the OS X content
sandbox rules.  Only enabled on OS X for now.

On Nightly, profile directories will now be read/write protected
from the content process (apart from a few profile subdirectories) even
when they don't reside in ~/Library.

xpcshell tests invoke the content process without providing a
profile directory. In that case, we don't need to add filesystem
profile dir. read/write exclusion rules to the sandbox.

This patch adds two new macros to the content sandbox rule set:
|profileDir| holds the path to the profile or the emptry string;
|hasProfileDir| is a boolean (1 or 0) that indicates whether or
not the profile directory rules should be added. If |hasProfileDir|
is 0, profile directory exclusion rules don't need to be added
and |profileDir| is not used.

MozReview-Commit-ID: rrTcQwTNdT
2016-08-30 13:32:21 -07:00
Nicholas Nethercote
b5810a1eb4 Bug 1299384 - Use MOZ_MUST_USE with NS_warn_if_impl(). r=erahm.
This change avoids lots of false positives for Coverity's CHECKED_RETURN
warning, caused by NS_WARN_IF's current use in both statement-style and
expression-style.

In the case where the code within the NS_WARN_IF has side-effects, I made the
following change.

> NS_WARN_IF(NS_FAILED(FunctionWithSideEffects()));
> -->
> Unused << NS_WARN_IF(NS_FAILED(FunctionWithSideEffects()));

In the case where the code within the NS_WARN_IF lacks side-effects, I made the
following change.

> NS_WARN_IF(!condWithoutSideEffects);
> -->
> NS_WARNING_ASSERTION(condWithoutSideEffects, "msg");

This has two improvements.
- The condition is not evaluated in non-debug builds.
- The sense of the condition is inverted to the familiar "this condition should
  be true" sense used in assertions.

A common variation on the side-effect-free case is the following.

> nsresult rv = Fn();
> NS_WARN_IF_(NS_FAILED(rv));
> -->
> DebugOnly<nsresult rv> = Fn();
> NS_WARNING_ASSERTION(NS_SUCCEEDED(rv), "Fn failed");
2016-09-02 17:12:24 +10:00
Aaron Klotz
af72ed4dc8 Bug 1236108: Modify sandbox initialization code to use directory service to obtain content process temp directory; r=bobowen,haik
The previous patch in this series creates a new directory service entry
specifically for obtaining the content process temp directory.

This patch converts everything else to reference that entry. It also sets
appropriate environment variables in the content processes so that system
APIs automatically pick up the directory. This is necessary for the crash
reporter to be able to call those APIs in exception handling contexts.

MozReview-Commit-ID: DF6aNKrWnWp
2016-03-08 11:02:27 -08:00
Haik Aftandilian
816f0a824e Bug 1237847 - [e10s] Null deref crash when running test_pluginstream_newstream.html; r=bobowen
Modify the Mac sandbox to allow temporary files to be created in a
parent-specified subdirectory of NS_OS_TEMP_DIR. This is similar to the
Windows approach. The parent provides a UUID in a preference which is
used by the content process to form the subdirectory name.

MozReview-Commit-ID: 6BONpfZz8ZI
2016-02-25 15:26:13 -08:00
Birunthan Mohanathas
ac37dec517 Bug 1219392 - Capitalize mozilla::unused to avoid conflicts. r=froydnj 2015-11-02 07:53:26 +02:00
Bob Owen
6e8e363d86 Bug 1207972: Move to using USER_INTERACTIVE and JOB_INTERACTIVE by default for the Windows content sandbox. r=tabraldes 2015-10-05 11:10:46 +01:00
David Anderson
8da648d544 Use the same graphics device parameters across processes. (bug 1183910 part 7, r=mattwoodrow) 2015-08-02 13:59:33 -07:00
Bob Owen
2a2df89262 Bug 1166316: Move temporary clean up code for old low integrity temps, so it actually gets called in non-debug builds. r=billm 2015-05-20 09:58:32 +01:00
Bob Owen
09cd8b48b7 Bug 1162327 Part 2: Add temporary code to clean up the old low integrity temps on Windows. r=jimm 2015-05-18 11:53:57 +01:00
Bob Owen
6a573747b4 Bug 1162327 Part 1: Change low integrity temp to a fixed dir per profile and improve clean-up. r=jimm, r=froydnj 2015-05-18 11:51:07 +01:00
Andrew McCreight
92010d3e4c Bug 1152551, part 2 - Fix mode lines in dom/. r=jst 2015-05-03 15:32:37 -04:00
Bob Owen
0ca96f4f15 Bug 1149483: Change content sandbox level 1 to a working low integrity sandbox. r=tabraldes, r=billm 2015-04-05 14:01:38 +01:00
Bob Owen
7517f0b07d Bug 1119878 Part 2: Change IPC code to hold ProcessID instead of ProcessHandle. r=billm, r=dvander, r=aklotz, r=cpearce 2015-04-01 09:40:35 +01:00
Bob Owen
68642b117e Bug 1018988 - Set up a low integrity temp directory when using the Windows content sandbox. r=mrbkap r=tabraldes r=froydnj 2014-09-10 12:36:17 +01:00
Thinker Lee
af486f9a02 Bug 771765 - Support template content process, part 5: PContent protocol changes. r=khuey, r=bent
Change the PContent protocol to support:
* Creating the template process.
* Forking new content processes from the template on the child side and cloning the actor on the parent side.
* Fallback to non-templated content process creation if no template-preallocated process is available.
2013-06-03 18:14:40 +08:00
Jim Mathies
ab65b99a3f Bug 820200 - Pass application directory to XRE_InitEmbedding2 in content process. r=bsmedberg 2012-12-18 10:24:42 -06:00
Gervase Markham
cb6a072c2a Bug 716478 - update licence to MPL 2. 2012-05-21 12:12:37 +01:00
Josh Matthews
e53f9315d5 Bug 548904 - Remote console messages from content to chrome via a listener. r=bzbarsky a=blocking-fennec 2010-09-23 21:39:32 -04:00
Chris Jones
131910888d Bug 578262: Clean up style in and remove build warnings from new-ishly merged e10s code. r=bsmedberg 2010-07-19 13:33:33 -05:00