Kyle Huey
3bd84c39ed
Bug 1272415: Don't include task.h everywhere. r=froydnj
2016-05-12 15:15:43 -07:00
Kyle Huey
b972c94d0f
Bug 1268313: Part 7 - Move NS_NewRunnableMethod and friends to mozilla::NewRunnableMethod. r=froydnj
2016-05-05 01:45:00 -07:00
Kyle Huey
b91ceaea75
Bug 1268313: Part 2 - Replace some NewRunnableMethods with NS_NewNonOwningRunnableMethod. r=froydnj
2016-05-05 01:44:59 -07:00
Carsten "Tomcat" Book
d10653e369
Backed out changeset fd833da413ad (bug 1268313)
2016-04-29 14:21:25 +02:00
Carsten "Tomcat" Book
aadd508ffe
Backed out changeset 85ce8cb0639a (bug 1268313)
2016-04-29 14:21:16 +02:00
Kyle Huey
e62a0823c9
Bug 1268313: Part 7 - Move NS_NewRunnableMethod and friends to mozilla::NewRunnableMethod. r=froydnj
2016-04-28 14:08:25 -07:00
Kyle Huey
b334682d78
Bug 1268313: Part 2 - Replace some NewRunnableMethods with NS_NewNonOwningRunnableMethod. r=froydnj
2016-04-28 14:08:24 -07:00
Kyle Huey
f3e34e67b3
Bug 1266595: Replace Chromium Task with Runnable. r=froydnj
2016-04-27 17:06:05 -07:00
Bas Schouten
2d102ed23e
Bug 1262898: Keep the GeckoChildProcessHost alive for the lifetime of the CompositorBridge and ImageBridge parent actors. r=jimm r=nical
...
MozReview-Commit-ID: 1rsWqRpbhgN
2016-04-25 03:54:07 +00:00
Chris Pearce
c47ff27825
Bug 1245789 - Load Widevine CDM with sandbox level USER_RESTRICTED instead of USER_LOCKDOWN. r=bobowen
...
Otherwise Widevine CDM won't load on Windows. Other GMPs are still loaded at USER_LOCKDOWN.
MozReview-Commit-ID: aCTG1tQuwt
2016-04-12 16:12:20 +12:00
George Wright
4b6255d510
Revert "Bug 1114647 - Rename "plugin-container" to "firefox-webcontent" and create a new executable target for Win32 called "firefox-plugin-container" r=ted,jhamer" because of widespread breakage due to whitelisted executable names in third parties
...
This reverts commit a94b5f861bd0d25043a3bb7a0c3128acf8c0b93a.
2016-04-08 13:34:40 -04:00
George Wright
89316736c1
Revert "Bug 1261416 - Rename firefox-plugin-container back to plugin-container to satisfy Flash's protected mode checks, and ensure that we launch the correct binary r=ted" because of widespread breakage due to whitelisted executable names in third parties
...
This reverts commit 2d44e8ffaf63a32292f8e5b8fdd1485d0a462afc.
2016-04-08 13:33:27 -04:00
Bill McCloskey
5dbc026b0c
Bug 1235633 - IPC OOM mitigation by eliminating buffer copying (r=jld)
2016-04-07 17:15:26 -07:00
George Wright
2b21d6e072
Bug 1261416 - Rename firefox-plugin-container back to plugin-container to satisfy Flash's protected mode checks, and ensure that we launch the correct binary r=ted
2016-04-04 18:03:33 -04:00
George Wright
47045c3266
Bug 1114647 - Rename "plugin-container" to "firefox-webcontent" and create a new executable target for Win32 called "firefox-plugin-container" r=ted,jhamer
2016-04-01 02:12:59 -04:00
Kyle Huey
20d0dc7286
Bug 1259294: Part 2 - Use MOZ_ALWAYS_SUCCEEDS. r=froydnj
2016-03-28 10:28:15 -07:00
Honza Bambas
a358f0e3ef
Bug 1248565 - Let child processes have its own MOZ_LOG_FILE. r=erahm
2016-03-11 08:24:00 -05:00
Cervantes Yu
f9580897e4
Bug 1253575 - Annotate the crash report on failure in opening the process handle for plugin or content process. r=billm
2016-03-10 16:07:57 +08:00
Ehsan Akhgari
5942467b69
Bug 1251226 - Avoid passing a std::wstring through the variadic method; r=bobowen
2016-02-25 11:12:18 -05:00
Bob Owen
d96a034609
Bug 1193861: Log to the process log when launching a sandboxed process on Windows. r=billm
2016-02-09 08:31:18 +00:00
Bob Owen
a51fe3df77
Bug 1244774: Correct wchar_t/char16_t VS2015 compilation problem caused by patches for bug 1173371. r=jimm
2016-02-01 19:48:15 +00:00
Bob Owen
8d351de33c
Bug 1173371 Part 3: Add sandbox policy rule to allow read access to the Firefox program directory when it is on a network drive. r=aklotz
2016-02-01 08:59:01 +00:00
David Rajchenbach-Teller
323ccee44c
Bug 1224374 - Profiler labels for the top 26-100 chrome hangs;r=BenWa
2016-01-15 11:38:03 +01:00
Sebastian Hengst
2e241e7e5e
Backed out 2 changesets (bug 1224374) for Windows bustage. r=bustage on a CLOSED TREE
...
Backed out changeset 5f458e6e4997 (bug 1224374 )
Backed out changeset 0dc02cb0b604 (bug 1224374 )
2016-01-19 21:30:41 +01:00
David Rajchenbach-Teller
f7045cd073
Bug 1224374 - Profiler labels for the top 26-100 chrome hangs;r=BenWa
2016-01-15 11:38:03 +01:00
chaithanya
e50ecee339
Bug 1197306 - remove PR_snprintf calls in ipc/; r=froydnj
2015-12-14 13:32:56 -05:00
Jacek Caban
69e19ab8ae
Bug 1198450 - GCC (mingw) fixup.
2015-12-01 14:20:41 +01:00
Brad Lassey
dc8f439097
bug 1198450 - Firefox fails to load about:home if Firefox was installed to a folder with non-Latin name r=jimm
2015-11-23 18:27:23 -05:00
Bob Owen
9c23c5d99e
Bug 1225023: Allow Flash Player to create Adobe\Flash Player and Macromedia\Flash Player directories. r=bbondy
2015-11-17 07:24:34 +00:00
Nathan Froyd
c0c1384b2d
Bug 1222167 - fix initialization order in GeckoChildProcessHost; r=jld
...
Member fields are supposed to be initialized in the order they are
declared, but the constructor of GeckoChildProcessHost initialized
mDelegate prior to mSandboxLevel. This is probably harmless, but it
does cause a warning on clang-cl, so let's fix it.
2015-11-05 15:15:19 -05:00
Jacek Caban
bd67a7a508
Bug 1201438 - Fixup for builds with disabled sandbox.
2015-09-09 14:17:12 +02:00
Bob Owen
aa4bbfbed6
Bug 1201438: Add non-sandboxed Windows content processes as target peers for handle duplication. r=bbondy
2015-09-08 11:18:12 +01:00
Mike Hommey
9de7ac58a9
Bug 1189967 - Be slightly more explicit about some conversions to std::wstring. r=nfroyd
2015-08-23 22:20:19 +09:00
Bob Owen
75807e86d1
Bug 1189352: Fix NSPR_LOG_FILE with absolute paths for sandboxed child on Windows. r=bbondy
2015-08-03 07:58:43 +01:00
Jesse Ruderman
6785bc0e32
Bug 1024259: Use NS_FREE_PERMANENT_DATA more consistently. r=mccr8
2015-07-31 12:11:48 -07:00
Bob Owen
f76e5c325c
Bug 1171796: Add sandbox rule for child process NSPR log file on Windows. r=bbondy
...
This also moves the initialization of the sandbox TargetServices to earlier in
plugin-container.cpp content_process_main, because it needs to happen before
xul.dll loads.
2015-07-30 10:04:42 +01:00
Mike Hommey
dce35f78a7
Bug 1187533 - Change how Gtk+2 plugin-container is started on Gtk+3 builds. r=billm
...
The current situation looks like this: Firefox launches the plugin-container
with two environment variables set:
LD_LIBRARY_PATH=$FIREFOX_DIR:$LD_LIBRARY_PATH
LD_PRELOAD=$FIREFOX_DIR/libmozgtk2.so:$LD_PRELOAD
libxul.so has a dependency on libmozgtk.so (without "2"), but libmozgtk2.so
has a SONAME of libmozgtk.so, so ld.so recognizes libmozgtk2.so as a
dependency of libxul.so, and uses it instead of the actual libmozgtk.so,
making the plugin-container use Gtk+2 instead of Gtk+3 to load Gtk+2 plugins.
Now, ASan sets things up in shared libraries such that they needs a symbol
from the executable binary. So in the case of plugin-container, the
plugin-container executable itself contains some ASan symbols such as
__asan_init_v3. libmozgtk2.so, OTOH, contains an undefined weak reference to
that symbol, like all other Firefox shared libraries.
Since libmozgtk2.so is LD_PRELOADed, it is loaded _before_ the
plugin-container executable, and __asan_init_v3 can't be resolved.
Disabling ASan for libmozgtk2.so would be a possibility, but the build system
doesn't really know how to do that, and filtering out -fsanitize=address
can be fragile.
The alternative possibility, implemented here, is to change the library
loading strategy, renaming libmozgtk2.so to gtk2/libmozgtk.so, and setting
the following environment variable when Firefox launches the plugin-container:
LD_LIBRARY_PATH=$FIREFOX_DIR/gtk2:$FIREFOX_DIR:$LD_LIBRARY_PATH
2015-07-28 08:19:13 +09:00
Andrew McCreight
7e0540b9ce
Bug 1089816 - Let ASan content processes run to completion. r=billm
...
There are a variety of ways that the parent and child process ensure that
the child process exits quickly in opt builds, but for AddressSanitizer
builds we want to let the child process to run to completion, so that we
can get a LeakSanitizer report.
This requires adding some addition LSan suppressions, because running
LSan in child processes detects some new leaks.
2015-07-27 12:49:48 -07:00
Brad Lassey
99e21866e1
bug 1161166 - Use mach shared memory for shared memory on OSX r=billm
2015-06-17 00:38:38 -04:00
Markus Stange
eb92e8ae6a
Bug 971811 - Don't prepend an empty existing DYLD_INSERT_LIBRARIES path when launching the plugin. r=smichaud
2015-06-10 12:54:52 -04:00
Wes Kocher
2a932fffd8
Backed out changeset 1be05715932f (bug 1161166)
2015-06-09 15:12:21 -07:00
Brad Lassey
3aef53f002
Bug 1161166 - Use mach shared memory for shared memory on OSX. r=billm
2015-06-09 09:56:50 -04:00
James Willcox
51501fcfc5
Bug 1141693 - Build and use a PIE plugin-container on Android 5.0+. Based on a patch by Mike Hommey. r=me,glandium
2015-06-03 10:26:16 -05:00
James Willcox
94edfc6be5
Backout fb6329699801 for x86 breakage on a CLOSED TREE
2015-05-14 15:40:00 -05:00
James Willcox
0faf957f85
Bug 1141693 - Build and use a PIE plugin-container on Android 5.0+. Based on a patch by Mike Hommey. r=me,glandium
2015-05-14 14:52:10 -05:00
Mike Conley
16367a6360
Bug 1146955 - Unify pluginID for GMP and runID for NPAPI plugins to use the same internal incrementor. r=jesup, mrbkap.
2015-04-27 15:09:45 -04:00
Bob Owen
7517f0b07d
Bug 1119878 Part 2: Change IPC code to hold ProcessID instead of ProcessHandle. r=billm, r=dvander, r=aklotz, r=cpearce
2015-04-01 09:40:35 +01:00
Bob Owen
3ec652be22
Bug 1137166: Change the Content moreStrict sandbox pref to an integer to indicate the level of sandboxing. r=tabraldes
2015-03-10 08:03:12 +00:00
Bob Owen
919ea04738
Bug 1132021 - Add a new sandbox level for Windows NPAPI to use USER_LIMITED access token level. r=bsmedberg, r=bbondy
2015-02-11 16:25:43 +00:00
Bob Owen
4811c84eb6
Bug 1127230: Change the NPAPI sandbox prefs to integers to indicate the level of sandboxing. r=bsmedberg
2015-01-30 17:48:15 +00:00