Meeting 2024-11-12
-
Team calendar
- Next on Necko triage: Kershaw
-
New contributors / Friends of Necko THANK YOU!!
-
Round Table
- – enter topics –
-
Active Projects roadmap Fx132 rel Oct 29, Fx133 rel Nov 26, Fx134 code freeze Nov 21
-
Firefox Essential Internal Services Toughening[FEISTY] (in progress, TBD)
- – enter updates –
-
DoH Enablement - Fenix and Focus (in progress, TBD)
-
[Greg] Pinged Amedyne Moya to request dev support, TBD
-
– enter updates –
-
-
3rd Party Cookie Deprecation (in progress, target Fx134)
-
[Ed] CHIPS re-rollout backed out, likely another attempt this week.
-
Tentative 3PCD/CHIPS rollout:
-
134:
-
3PCD experiment
-
re-enable chips, ride the trains to release (Jan 7)
- Note: CHIPS-related breakage
-
-
>134
-
(pending experiment): 3PCD in all windows in release
- Note: 3pcd-related breakage
-
-
>136
- (pending all-windows): “Migration”/deletion of TCP cookies (non-chips partitioned)
-
-
-
Fetch keepalive: (riding the trains, Target Fx133)
- – enter updates –
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
First cut of download results: https://lookerstudio.google.com/reporting/f5fbaacd-a473-4daf-bf22-faa3d3c8391f/page/DO9EE
-
Update TC scripts
-
Ship this week or next
-
-
[kershaw]
-
Bug 1930638 When running upload/download test, make sure a clean connection is used in each run
- R?
-
Latest result of download test
-
-
-
unthrottled
fast5G
busy5G
slow3G
Firefox
953.96
220.44
41.4
0.92
Chrome
585.92
175.36
29.1
0.92
-
Interop 2024 URL (in progress, target H2 2024)
- [Ed] Wrote patch for https://bugzilla.mozilla.org/show_bug.cgi?id=1922028
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks tracking such blocks using Bug 1901798
- – enter updates –
-
Fast UDP I/O in Firefox (in progress, target H2 2024)
-
milestone 1 - basic end-to-end integration
-
Report of quinn-udp breaking HTTP3/QUIC on Windows on ARM
-
Narrowed down the bug to the UDP segmentation system.
-
In touch with Microsoft (Nick Banks, MSQUIC author).
-
Trying to get my hands on a Windows on ARM machine to speed up debugging cycles. See Slack conversation.
-
-
-
milestone 3 - Benchmark result for download and upload
-
Use simulated time in qlogs (i.e. now), thus allowing us to easily plot congestion control and flow control behavior using various network scenarios. See mozilla/neqo#2211.
-
Add QUIC frame Glean metrics.
-
E.g. answers questions like: how many migrations do we see? Have we improved receive window auto-tuning (flow-control), …
-
-
-
Implement WebTransport based on HTTP/2
-
[kershaw]
- Just started
-
-
Performance work:
-
[acreskey]
-
FYI, proposal on solution to Fenix slow pageload progress bar
-
-
Response protocol version and HTTP/3:
-
query - protocol version from root document request - about 14-18%
-
Other sources report ~30% of requests:
-
Useful to have a query based on migrated probe:
-
-
Meeting 2024-11-05
-
Team calendar
- Next on Necko triage: Valentin
-
New contributors / Friends of Necko THANK YOU!!
-
Round Table
- [Greg] Globs reported networking issue NS_ERROR_CONNECTION_REFUSE hitting server on local LAN, Sunil looking at logs
-
Active Projects roadmap Fx132 rel Oct 29, Fx133 rel Nov 26, Fx134 code freeze Nov 21
-
Firefox Essential Internal Services Toughening[FEISTY] (in progress, TBD)
-
Approved - ready to go
-
Have prototype
-
-
DoH Enablement - Fenix and Focus (in progress, TBD)
- Approved - ready to go
-
3rd Party Cookie Deprecation (in progress, target Fx134)
-
[Ed] Due to CHIPS incident and 3PCD experiment, we are pushing back the rollout plan, probably won’t make 134:
-
134:
-
3PCD experiment
-
re-enable chips, ride the trains to release (Jan 7)
- Note: CHIPS-related breakage
-
-
>134
-
(pending experiment): 3PCD in all windows in release
- Note: 3pcd-related breakage
-
-
>136
- (pending all-windows): “Migration”/deletion of TCP cookies (non-chips partitioned)
-
-
-
Fetch keepalive: (riding the trains, Target Fx133)
- – enter updates –
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
First cut of download results: https://lookerstudio.google.com/reporting/f5fbaacd-a473-4daf-bf22-faa3d3c8391f/page/DO9EE
-
Update TC scripts
-
Ship this week or next
-
-
Needs validation, maybe hand testing
-
Related: Chromium’s loadline framework
-
(greg) Perf Infra Hardware review Performance Hardware Review
- How long test take to run and how many tests are we running
-
[kershaw]
- Landed a change to make the test more reliable.
-
-
-
Interop 2024 URL (in progress, target H2 2024)
- No progress
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks tracking such blocks using Bug 1901798
- – enter updates –
-
Fast UDP I/O in Firefox (in progress, target H2 2024)
- – enter updates –
-
Implement WebTransport based on HTTP/2
- – enter updates –
-
Performance work:
-
Fenix pref-flip experiment live and actually working
-
In-progress experiments:
-
Working on:
-
Pageload Event properties by TRR domain
-
-
Note: only counts non-zero dns lookup times
-
-
-
[sunil]
-
OnDataFinished and OnStopRequest probes indicate we still experience delays in between dispatching and running OnDataFinished in the background thread.
-
Modified code to dispatch directly to the background thread skipping the queue. Testing ongoing.
-
-
Meeting 2024-10-29
-
Team calendar
- Next on Necko triage: Randell
-
New contributors / Friends of Necko THANK YOU!!
- None in the last week.
-
Round Table
- – enter public topics –
-
Active Projects roadmap Fx132 rel Oct 29, Fx133 rel Nov 26, Fx134 code freeze Nov 21
-
Firefox Essential Internal Services Toughening[FEISTY]
- [Greg] Passed internal review, now in strategic review
-
DoH Enablement - Fenix and Focus
- [Greg] Passed internal review, now in strategic review
-
3rd Party Cookie Deprecation (in progress, target Fx134)
-
3PCD timeline
-
131: Enable in nightly all windows(dry run)
- Check back once 131 hits release and see the telemetry
-
132: Enable in PBMode and ETP Strict to release
- Tracking breakage
-
133: Release telemetry on partition limit will start, review it (we are here)
- – enter updates –
-
134: All windows in release (targeting January)
-
136: “Migration”/deletion of TCP cookies (non-chips partitioned)
-
-
[Ed] Ongoing investigations and discussions with privacy team for google-auth followup
-
-
Fetch keepalive: (riding the trains, Target Fx133)
- – enter updates –
-
HTTP Priorities Experiments (riding the trains, target Fx 132)
-
[Greg] Released today closing!
-
[ACreskey] First experiment that selects only pages that don’t make use of fetchpriority (images). Promising results
-
2.6% improvement in mean lcp, up to 7% at P80
-
Following up on Fenix (nightly) and Desktop (beta)
-
[skim working on:]
-
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
First cut of download results: https://lookerstudio.google.com/reporting/f5fbaacd-a473-4daf-bf22-faa3d3c8391f/page/DO9EE
-
Needs validation, maybe hand testing
-
Related: Chromium’s loadline framework
-
(greg) Perf Infra Hardware review Performance Hardware Review
-
– enter updates –
-
-
-
Interop 2024 URL (in progress, target H2 2024)
-
[Ed] Landed Add defaultUri bypass and Enable defaultURI
-
URL interop score moves to 99.3% of our commitments (96.8% if we consider all of URL test scores)
-
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks tracking such blocks using Bug 1901798
- – enter updates –
-
Fast UDP I/O in Firefox (in progress, target H2 2024)
-
milestone 1 - basic end-to-end integration
-
On Android x86 Focus and Fenix CI startup tests have failed due to a seccomp panic after a `recvmmsg` call.
-
Upgrade mozilla-central to quinn-udp v0.5.6 ready for review.
-
Upgrade was previously blocked due to version conflict in transient depedency, namely windows-sys v0.52.
-
After larger discussion, we found a solution not involving upgrading many crates in the Rust ecosystem.
-
-
-
-
milestone 3 - Benchmark result for download and upload
-
Optimize neqo-client send path for more accurate benchmark results.
-
Simulating gbit link up- and download via Neqo network simulator.
-
-
Lars' quinn-udp pull request merged, adding experimental multi-message support on Apple platforms.
-
Adjusted quinn-udp benchmark to measure GSO, GRO and recvmmsg performance.
-
-
milestone 5 - multi-packet state machines
-
Pull request stack, removing major allocations in Neqo UDP receive path is merged.
-
Mozilla-central upgrading to latest release (v0.10.0) containing the optimization happening in phabricator#D226823.
-
Minor follow-up for the Neqo test server is pending.
-
-
Identify where bottlenecks are is it GSO or other
-
-
Implement WebTransport based on HTTP/2
- – enter updates –
-
Performance work:
-
[acreskey]
-
Expecting to start these four experiments tomorrow
-
https://mozilla-hub.atlassian.net/wiki/spaces/FIREFOX/pages/11047744/Experiments+Necko#Schedule
-
https://experimenter.services.mozilla.com/nimbus/fetch-priority-fenix-nightly/summary (Fenix nightly)
-
https://experimenter.services.mozilla.com/nimbus/fetchpriority-beta-pageload-event/summary (Desktop beta)
-
https://experimenter.services.mozilla.com/nimbus/performance-metric-calibration-with-lcp-nightly/summary (A/A/A/A on Desktop nightly)
-
https://experimenter.services.mozilla.com/nimbus/fenix-performance-metric-calibration-beta-followup/summary (A/A/A on Fenix beta)
-
-
-
Based on Randell’s profiling of main thread, ran this test and logged this one:
-
Great help from Sean Kim:
-
Network Marker Profiler upgrades
-
-
[sunil]
-
OnDataFinished and OnStopRequest probes indicate we still experience delays in between dispatching and running OnDataFinished in the background thread.
-
Did local browser tests to confirm this. ChannelEventQueue design seems to be a possible bottleneck. Will investigate further this week.
-
-
https://docs.google.com/document/d/1RI237uPR3Yl-dXmmYfeCFJl75T6FUxJ5GsbF3dkEgX8/edit?tab=t.0
Meeting 2024-10-22
-
Team calendar
- Next on Necko triage: Sunil
-
New contributors / Friends of Necko THANK YOU!!
-
Round Table
- No public topics this week
-
Active Projects roadmap Fx132 rel Oct 29, Fx133 freeze Oct 24
-
3rd Party Cookie Deprecation (in progress, target Fx134)
-
3PCD timeline
-
131: Enable in nightly all windows(dry run)
- Check back once 131 hits release and see the telemetry
-
132: Enable in PBMode and ETP Strict to release
- Tracking breakage
-
133: Release telemetry on partition limit will start, review it (we are here)
- – enter updates –
-
134: All windows in release (targeting January)
-
136: “Migration”/deletion of TCP cookies (non-chips partitioned)
-
-
[Ed] Handling, investigating, and code review for google auth incident (CHIPS issue)
-
-
Fetch keepalive: (riding the trains, Target Fx133)
- [Sunil] Sent intent to ship. No objections so far.
-
-
HTTP Priorities Experiments (riding the trains, target Fx 132)
-
[acreskey] Code to run FetchPriorities experiment on Android in review
- https://phabricator.services.mozilla.com/D226053
-
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
First cut of download results: https://lookerstudio.google.com/reporting/f5fbaacd-a473-4daf-bf22-faa3d3c8391f/page/DO9EE
-
Needs validation, maybe hand testing
-
Related: Chromium’s loadline framework
-
-
Interop 2024 URL (in progress, target H2 2024)
-
[Ed] code clean up and try testing on defaultURI
-
added pref flip patch
-
Trying to land this week
-
Expectation is we’ll get to ~95%
- Detailed update (slack)
-
-
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks tracking such blocks using Bug 1901798
- – enter updates –
-
Fast UDP I/O in Firefox (in progress, target H2 2024)
-
Presented progress at MIR^3
- See slides.
-
milestone 5 - multi-packet state machines
- Don't allocate in UDP receive path close to merge, see mozilla/neqo#2184.
-
Apple platform
- Support for sendmsg_x and recvmsg_x in quinn-udp making progress, see quinn-rs/quinn#1993 and quinn-rs/quinn#2010.
-
-
Implement WebTransport based on HTTP/2
- No update
-
Performance work:
-
[acreskey] thanks to Sean Kim for adding navStart to request start to pageload event
-
Meeting 2024-10-15
-
Team calendar
- Next on Necko triage: Ed
-
New contributors / Friends of Necko THANK YOU!!
-
Round Table
-
[valentin] Related to 1910991 above, I tried using wireshark to see the decoded requests.
- ECH is enabled on Cloudlare, which means Wireshark is unable to decode the packets. Yaroslav Rosomakho from zscaler has patches for NSS and Wireshark - will submit them next week. Until then network.dns.native_https_query:false and network.trr.mode:5 should avoid ECH
-
-
Active Projects roadmap Fx132 rel Oct 29, Fx133 freeze Oct 24
-
3rd Party Cookie Deprecation (in progress, target Fx134)
-
3PCD timeline
-
131: Enable in nightly all windows(dry run)
- Check back once 131 hits release and see the telemetry
-
132: Enable in PBMode and ETP Strict to release
- Tracking breakage
-
133: Release telemetry on partition limit will start, review it (we are here)
- – enter updates –
-
134: All windows in release (targeting January)
-
136: “Migration”/deletion of TCP cookies (non-chips partitioned)
-
-
-
Fetch keepalive: (in progress, Target Fx133)
-
[Sunil] Pref to enable by default landed.
-
[Sunil] Landed patch to increase the keepalive request quota as we saw request drops due to limits.
-
-
-
HTTP Priorities Experiments (riding the trains, target Fx 132)
-
Experiments running
-
[acreskey] Results from Nightly Experiment (where we can compare pages that use fetchpriority=high on images) look good but we will need a calibration and beta experiment to confirm
-
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
- – enter updates –
-
Interop 2024 URL (in progress, target H2 2024)
-
(sekim) Landed Scheme Bug 1883033 - ws/wss/ssh url query-encoding wpt failures
-
(sekim) Setting non-spec:/.pathname = '/.//p' (rust-url) ready for review
-
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks tracking such blocks using Bug 1901798
- – enter updates –
-
Fast UDP I/O in Firefox (in progress, target H2 2024)
- – enter updates –
-
Implement WebTransport based on HTTP/2
- – enter updates –
-
Performance work:
-
[acreskey] Exposing nimbus features to geckoview - DoH, Kyber, #sockets
- If there any you need, let me know
-
FYI, CRLite experiment
-
FYI, added some useful queries to our experiments page
-
Meeting 2024-10-08
-
Team calendar
- Next on Necko triage: Kershaw
-
New contributors / Friends of Necko THANK YOU!!
-
Round Table
-
[acreskey] HTTP/3 issue, appears to only be on cloudflare servers
-
-
Active Projects roadmap Fx132 rel Oct 29, Fx133 freeze Oct 24
-
3rd Party Cookie Deprecation (in progress, target Fx134, Fx133?)
-
3PCD timeline
-
131: Enable in nightly all windows(dry run)
- Check back once 131 hits release and see the telemetry
-
132: Enable in PBMode and ETP Strict to release
- Tracking breakage
-
133: Release telemetry on partition limit will start, review it (we are here)
- Minimal user impact, proceeding with disabling dry-run
-
134: All windows in release (targeting January)
-
136: “Migration”/deletion of TCP cookies (non-chips partitioned)
-
-
-
Fetch keepalive: (in progress, Target Fx133)
-
[Sunil] Pref to enable by default landed.
-
Telemetry data indicates the feature is being used widely.
-
Added relnote-firefox flag and dev-doc-needed
-
Anything else left before this is shipped? Intent to ship email?
-
-
-
HTTP Priorities Experiments (riding the trains, target Fx 132)
-
Experiments running
- Writing queries to compare pages where fetchPriority is used
-
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
[kershaw]
-
-
R?
-
Should be landing soon
-
-
-
-
Interop 2024 URL (in progress, target H2 2024)
-
DefaultURI bypass patch: comments addressed another review cycle
-
Created Meta for file URL’s with hostnames sec mitigations
- If you have any cycles and would like to help out with interop 2024, might be a good place to start
-
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks tracking such blocks using Bug 1901798
-
(sekim) Filed few bugs for future P1 glean probe migration (moved to next, marked them as P2 N/A)
-
(sekim) Added alias for Bug 1901798 (necko-ifndef-removal)
-
-
Fast UDP I/O in Firefox (in progress, target H2 2024)
-
milestone 5 - multi-packet state machines
- Don't allocate in UDP send & receive path back to draft github#2093. Will be split up into smaller atomic patches.
-
-
Implement WebTransport based on HTTP/2
- (sekim) Currently trying to test if FAILS component supports WebTransport over H2
-
Performance work:
- Focusing on Android issues with connection migration
Meeting 2024-10-01
-
Team calendar
- Next on Necko triage: Randell
-
New contributors / Friends of Necko THANK YOU!!
-
Round Table
- No public topics this week
-
Active Projects roadmap Fx131 rel Oct 01, Fx132 freeze Sep 26
-
3rd Party Cookie Deprecation (in progress, target Fx134)
-
3PCD shipped to nightly
-
Tracking breakage: https://bugzilla.mozilla.org/show_bug.cgi?id=1917788
-
3PCD timeline
-
131: Enable in nightly all windows(dry run)
- Check back once 131 hits release and see the telemetry
-
132: Enable in PBMode and ETP Strict to release (we are here)
-
133: Release telemetry on partition limit will start, review it
-
134: All windows in release (targeting January)
-
136: “Migration”/deletion of TCP cookies (non-chips partitioned)
-
-
-
Fetch keepalive: (in progress, Target Fx133)
- – enter updates –
-
HTTP Priorities Experiments (riding the trains, target Fx 132)
-
[acreskey]
-
Beta followup experiment launching today
-
Nightly followup launching today
- 32-bit int in pageloadEvent to track pages that use FetchPriority on images. See https://phabricator.services.mozilla.com/D222991
-
-
-
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
[kershaw]
-
-
Address review comments
-
Refine conditions used for network throttling
-
-
-
-
Interop 2024 URL (in progress, target H2 2024)
-
[Ed] Made fixes to patch https://phabricator.services.mozilla.com/D207810
- More review comments to address
-
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks tracking such blocks using Bug 1901798
- – enter updates –
-
Fast UDP I/O in Firefox (in progress, target H2 2024)
-
- Transform http_3_ecn_ce_ect0_ratio to custom_distribution to be displayable in Glean bugzilla#1921203
-
-
Proof of concept GSO implementation, see mozilla/neqo#2138.
-
Proof of concept recvmmsg implementation, see mozilla/neqo#2138.
-
-
milestone 5 - multi-packet state machines
- Don't allocate in UDP send & receive path ready for full review, see github#2093.
-
-
Implement WebTransport based on HTTP/2
- – enter updates –
-
Performance work:
- [acreskey] Moving focus to handling of network transitions on Android, HTTP/3
Meeting 2024-09-17
-
Team calendar
- Next on Necko triage: Sunil
-
New contributors / Friends of Necko THANK YOU!!
-
Round Table
-
[greg] Manuel has raised this discussion regarding enabling DNS over SOCKS4 by default?
- SOCKSv4 does not support DNS SOCKSv4a does however we have no ability to determine version
-
-
Active Projects roadmap Fx131 rel Oct 01, Fx132 freeze Sep 26
-
3rd Party Cookie Deprecation (in progress, target Fx134)
-
3PCD shipped to nightly
-
Tracking breakage: https://bugzilla.mozilla.org/show_bug.cgi?id=1917788
-
3PCD timeline
-
131: Enable in nightly all windows(dry run)
- Check back once 131 hits release and see the telemetry
-
132: Enable in PBMode and ETP Strict to release (we are here)
-
133: Release telemetry on partition limit will start, review it
-
134: All windows in release (targeting January)
-
136: “Migration”/deletion of TCP cookies (non-chips partitioned)
-
-
-
Fetch keepalive: (in progress, Target Fx132 (check again on Friday if we still can make it to Fx132)
-
Final Milestone
-
2/4 patches r+d
-
[Sunil] Discussed pending issues for worker keepalive with Eden Chuang
- Incorporating the changes and testing
-
-
HTTP Priorities Experiments (in progress, target Fx 132)
-
[acreskey]
-
fetchpriority=high on images working very well, see 1797715 - [meta] Fetch Priority (was Priority Hints), propose we let ride the feature ride the trains
-
Working on documentation, feedback if you have any
-
Possible bug:
-
-
-
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
[kershaw]
-
Optimize server setup
-
H3 download: 838.66mbps -> 914.76mbps
-
Need ~8Gbps to verify improvement w UDP
-
-
Working on TC scripts
-
-
-
Interop 2024 URL (in progress, target H2 2024)
-
[Ed] Addressing review comments for defaultURI
- Including getting data model created for remote settings server side
-
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks tracking such blocks using Bug 1901798
- – enter updates –
-
Fast UDP I/O in Firefox (in progress, target H2 2024)
-
milestone 1 - basic end-to-end integration
-
Report of network.http.http3.use_nspr_for_io false breaking HTTP3/QUIC on Windows on ARM
-
Still only reproducible on one Windows on ARM machine.
-
Debugging in progress.
-
-
-
-
Landed in Firefox Nightly.
-
See implementation in Github#1678, Bugzilla#1902065.
-
See various metric sources in Glean Dictionary, Glam and Looker.
-
-
milestone 3 - Benchmarks and metrics
-
Adding UDP datagram (segment) size metrics (phabricator#D216034) landed. Should be available in Firefox Nightly soon.
-
Migrating Http3Session::CloseConnectionTelemetry to Glean.
- Work in progress phabricator#D221615.
-
-
milestone 5 - multi-packet state machines
-
Don't allocate in UDP send & receive path (github#2093).
-
Ready for review.
-
"Early benchmarks are promising, showing e.g. a 10% improvement in the Download benchmark, and up to 40% improvement in the neqo-neqo-reno-pacing benchmark."
-
-
-
-
Performance work:
-
[acreskey]
-
Paused the work on evaluating/tuning the ClassOfService tailing system until we ship HTTP Priorities
-
FYI: another profiler bug
-
-
Meeting 2024-09-10
-
Team calendar
- Next on Necko triage: Ed
-
New contributors / Friends of Necko THANK YOU!!
-
Round Table
-
Active Projects roadmap Fx131 rel Oct 01, Fx132 freeze Sep 26
-
3rd Party Cookie Deprecation (in progress, target Fx134)
-
No changes again (sept 10). 3PCD will proceed in a phased approach
-
131: Enable in nightly all windows(dry run)
- Check back once 131 hits release and see the telemetry
-
132: Enable in PBMode and ETP Strict to release
-
133: Release telemetry on partition limit will start, review it
-
134: All windows in release (targeting January)
-
136: “Migration”/deletion of TCP cookies (non-chips partitioned)
-
-
-
Fetch keepalive: (in progress, Target Fx132)
-
[Sunil]
-
Incorporated feedback from Eden, waiting for final patch approval
-
HTTP Priorities Experiments (in progress, target Fx 132)
-
[acreskey]
-
Bug 1915866 - Optimize Class of Service tailing and tracker request postponement
- Experiment Brief incoming
-
HTTP/2 extensible prioritization scheme would be helpful
-
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
[kershaw]
-
Chrome support implemented (patch not landed yet)
-
How to run the test:
-
./mach try fuzzy –full
-
test-linux1804-64-qr/opt-browsertime-network-bench-firefox-h3-upload
- H3 Download: Firefox 850.45 Mbps, Firefox NSPR 838.01 Mbps, Chrome 127 620.6 Mbps
- H3 Upload: Firefox 349.24 Mbps, Firefox NSPR NA, Chrome 127 547.85 Mbps
-
-
-
-
Interop 2024 URL (in progress, target H2 2024)
- [Ed] Addressing more feedback on defaultURI phab/D207810
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks tracking such blocks using Bug 1901798
- (sekim) Migrated few other probes using glean’s new labeled timing distribution
-
Fast UDP I/O in Firefox (in progress, target H2 2024)
-
Milestone 1 - end-to-end integration
-
On Android x86 Focus and Fenix CI startup tests have failed due to a seccomp panic after a `recvmmsg` call.
- Fix blocked on mozilla-central moving to `windows` crate `v0.59.0`. See Matrix discussion.
-
Report of network.http.http3.use_nspr_for_io set to false breaking HTTP3/QUIC on _Windows on ARM.
-
Thus far not reproducible on other _Windows on ARM_ machines. Both native and as VM.
-
See further discussion in Slack thread.
-
-
-
-
Neqo v0.9.0 released, exposing ECN metrics in neqo_transport::Stats.
-
Landed in mozilla-central to phabricator#D221019.
-
Update triggers build failure on tier 2 Windows 2012 platform which is now[fixed with phabricator#D221284.
-
-
Update phabricator#D220062 to use Glean to expose ECN metrics.
-
-
Milestone 3 - Benchmarks and metrics
-
Intermediate Thread-local buffered metrics proposal phabricator#D216034 ready for review.
-
Long term fix in Glean is work-in-progress mozilla/glean#2948.
-
Draft for migrating Http3Session::CloseConnectionTelemetry to Glean bugzilla#1917778
-
-
Milestone 5 - multi-packet state machine
- Draft removing allocations in UDP IO send and receive path mozilla/neqo#2093
-
-
Performance work:
-
[acreskey]
-
Bug 1915700 - Expose socket process network markers with MarkerThreadId::MainThread()
-
Helping Robin Marx get answers to priority questions
-
Performance Telemetry Reports no longer public
-
-
New experiments:
- OMT Decompression for Beta complete next steps??
-
Meeting 2024-09-03
-
Team calendar
- Next on Necko triage: Kershaw
-
New contributors / Friends of Necko THANK YOU!!
-
Round Table
-
[valentin] 1894109 - Not caching byte range request responses
-
Do we want to change our range caching decision logic?
-
Next: Valentin Identify how many HTTPChannels are range requests assess impact and effort
-
May need to do this as part to Compression Dictionary Transport also
-
-
[valentin] 1915982 - isLocalIPv4 should consider 0.0.0.0/8 a local address per RFC1122
- Yes, lets consider as local address
-
[valentin] 1915848 - Pref off HTTP2 push
-
It’s become a webcompat risk. I’ll send the intent to unship email soon.
-
Chrome disabled 2yrs ago, Safari TBD
-
-
-
Active Projects roadmap Fx130 rel Sep 03, Fx131 freeze Aug 29
-
3rd Party Cookie Deprecation (in progress, target Fx133)
-
No changes. 3PCD will proceed in a phased approach
-
131: Enable in nightly all windows
-
132: Enable in PBMode and ETP Strict to release
-
134: All windows in release (targeting January)
-
136: “Migration”/deletion of TCP cookies (non-chips partitioned)
-
-
-
Fetch keepalive: (in progress, Target Fx132)
- – enter updates –
-
HTTP Priorities Experiments (in progress, target Fx 132)
- Need to ship and confirm if priorities get reset
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
Lars/Max to sync with Kershaw next week
-
– enter updates –
-
[kershaw]
-
Bug 1895362 Writing browsertime scripts for testing download and upload
-
WIP
-
Initial result shows no obvious difference between NSPR an quinn-udp
-
-
Bug 1895363 Reuse our current alerting/perfherder system to track results
- WIP
-
-
-
Interop 2024 URL (in progress, target H2 2024)
- [Ed] Patch fixup for defaultURI re-enable
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks tracking such blocks using Bug 1901798
-
[Acreskey] discussion on probes to remove
-
– enter updates –
-
-
Fast UDP I/O in Firefox (in progress, target H2 2024)
-
Milestone 1 - end-to-end integration
-
Android x86 seccomp failure on recvmmsg fixed upstream in quinn-udp v0.5.5.
- Mozilla-central update
-
Fix minor regression introduced in phabricator#D212959, not tracking bytes sent and received on socket for `about:networking#sockets`. See phabricator#D220379.
-
-
-
Early blackhole detection on path migration by Lars merged.
-
Thus mitigating the impact of Android API Level 25 failing to send ECN marked datagrams.
-
See https://github.com/quinn-rs/quinn/pull/1975 for details.
-
-
Pending Neqo v0.9.0 release to bring https://github.com/mozilla/neqo/pull/2072 and https://github.com/mozilla/neqo/pull/2081 into mozilla-central
-
Thus unblocking ECN pref and metrics https://phabricator.services.mozilla.com/D220062
-
-
Milestone 5 - multi-packet state machine
-
Proof-of-concept, removing allocation in UDP receive path.
-
Has a mere 2% performance improvement on Download benchmark.
-
Proof-of-concept for send path in progress.
-
-
Glean metrics http3_udp_datagram_size_send and http3_udp_datagram_size_received
-
Ported buffered metrics proposal (mozilla/glean#2945) into phabricator#D216034. Local testing no longer shows significant CPU usage by Glean on 10 GB download.
-
Discussed steps forward with Jan-Erik (Glean team). They are able to reproduce the performance issue seen in phabricator#D216034 and have a local patch fixing it in Glean directly.
-
-
-
Performance work:
-
– enter updates –
-
New experiments:
-
OMT Decompression + html5Parser, cssLoader for Beta
-
[Sunil] Experiment will re run, check with Sunil
-
We had meetings at MozWeek
-
Improving one of the probes
-
Looking for sites that show significant wins/losses with a local patch
-
-
-
-
Meeting 2024-08-20
-
Team calendar
- Next on Necko triage: Randell
-
New contributors / Friends of Necko THANK YOU!!
-
Round Table
- No public topics this week
-
Active Projects roadmap
-
Native HTTPS RR Implementation (riding the trains, target Fx129)
-
[kershaw] Bug 1910593 proxyDNS is not respected when using proxy.onRequest
- Ready to land
-
-
3rd Party Cookie Deprecation (in progress, target Fx133)
- – enter updates –
-
Fetch keepalive: (in progress, Target Fx131)
- – enter updates –
-
HTTP Priorities Experiments (in progress, target Fx130 )
-
Experiment Perf Reports:
-
Next steps:
-
verify impact with webpagetest.org
-
Consider adding specific telemetry (i.e. only count where used)
-
-
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
[kershaw] Bug 1895359 Install the Node.js server to handle file uploads and the Caddy server to provide HTTP/3 support.
- Address comments
-
-
Interop 2024 URL (in progress, target H2 2024)
- – enter updates –
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks tracking such blocks using Bug 1901798
- – enter updates –
-
Fast UDP I/O in Firefox (in progress, target H2 2024)
-
Milestone 1
-
-
Upstream bug discussion https://github.com/quinn-rs/quinn/issues/1947
-
Accepted upstream fix https://github.com/quinn-rs/quinn/pull/1964
-
Refined upstream fix after conversation with other `quinn` users on minimum supported Android version https://github.com/quinn-rs/quinn/pull/1966
-
-
- Fix has landed in mozilla-central through Neqo v0.8.2 release.
-
-
This is due to users running `network.http.network_access_on_socket_process.enabled`, i.e. running the socket thread in a separate sandbox process
-
Patch accepted and landing https://phabricator.services.mozilla.com/D219110.
-
-
-
General
-
Upstream Rust libc has merged Petr Sumbera's fixes for Illumos/Solaris
-
This is needed to run quinn-udp on Solaris.
-
See also discussion with Petr and quinn pull request.
-
-
Discussed minimum supported Android API level with quinn folks.
-
Adjusted CI tests accordingly
-
Quinn-udp will support Android 4, Firefox supports Android 5
-
-
-
-
Performance work:
-
[acreskey]
-
FYI: Kyber on HTTP/3 in fx 128 experiment results
-
Extending pageloadEvent: connectionTime, tls handshake
-
Considering removing trrDomain (expensive)
-
Throughput on document resource?
-
-
Progress with Mobile Testing on Firebase Test Lab live site Fenix/Chrome pageload tests
-
-
New experiments:
-
OMT Decompression + html5Parser, cssLoader for Beta
-
[Sunil] Experiment is live
-
We had meetings at MozWeek
-
Improving one of the probes
-
Looking for sites that show significant wins/losses with a local patch
-
-
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1664492 - review strategy IPV6
-
[jesup] We should actively start looking at the DNS pre-warmup for intent startups with the android team - Bug 1880491
-
-
Meeting 2024-08-06
-
Team calendar
- Next on Necko triage: Ed
-
New contributors / Friends of Necko THANK YOU!!
-
Round Table
- No public topics this week.
-
Active Projects roadmap
-
Native HTTPS RR Implementation (riding the trains, target Fx129)
-
3rd Party Cookie Deprecation (in progress, target Fx133)
-
[Ed]
-
Need to make fixes to this patch
-
Tim should be back from PTO need to discuss getting chips partition limit to ride the rails
-
-
-
Fetch keepalive: (in progress, Target Fx131)
-
Pushing release to Fx131 to accommodate additional scope to support workers.
-
[Sunil] Milestone 2 Changes implementation review complete, will merge after completion of test review.
-
[Sunil] Started work on Milestone 3 and extending WPTs for workers.
-
-
-
HTTP Priorities Experiments (in progress, target Fx130 )
-
Experiment Perf Reports:
-
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
[kershaw]
-
Bug 1895359 Install the Node.js server to handle file uploads and the Caddy server to provide HTTP/3 support.
- R?
-
Working on traffic shaping scripts
-
-
-
Interop 2024 URL (in progress, target H2 2024)
- [Ed] Addressing code review suggestions for 1889988
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks tracking such blocks using Bug 1901798
- – enter updates –
-
Fast UDP I/O in Firefox (in progress, target H2 2024)
-
Milestone 1
-
Enabled by default on Firefox Nightly https://phabricator.services.mozilla.com/D217830
-
Seccomp failure on Android x86
-
Not able to reproduce in emulator thus far.
-
Using NSPR for now.
-
Crash when reading empty UDP datagram on Windows
-
Will be fixed with upcoming neqo v0.8.2.
-
Using NSPR for now.
-
-
Milestone 2
-
Improve ECN blackhole handling merged.
-
Will be uplifted by upcoming neqo v0.8.2 https://github.com/mozilla/neqo/issues/2040
-
-
Glean metrics
- Andrew Creskey built a dashboard.
-
-
PMTUD for QUIC
-
Still blocked on test failure https://bugzilla.mozilla.org/show_bug.cgi?id=1909910#c3
-
Prioritizing Fast UDP I/O in Firefox milestone 2
-
-
Performance work:
-
[acreskey]
-
Experiment Perf Reports:
-
Update to Network Performance Pulse dashboards
- Pageload metrics by protocol version
-
Fenix slow pageload bugs
-
-
New experiments:
-
OMT Decompression + html5Parser, cssLoader for Beta
-
[Sunil] Experiment is live
- – enter updates –
-
-
Meeting 2024-07-16
-
Team calendar
- Next on Necko triage: Sunil
-
New contributors / Friends of Necko THANK YOU!!
-
Round Table
- No public topics this week
-
Active Projects roadmap
-
Native HTTPS RR Implementation (riding the trains, target Fx129)
-
3rd Party Cookie Deprecation (in progress, target Fx133)
- No data being generated from CHIPS partition limit telemetry, investigating
-
Fetch keepalive: (in progress, Target Fx130)
-
[Sunil] Milestone 2 Work Ongoing.
-
Testing the implementation
-
Will post for review once tests are complete
-
-
-
HTTP Priorities Experiments (in progress, target Fx130 )
-
Experiment live
-
Priority header already shipped in Fx126
-
Fx 128 includes:
-
Implement Extensible Prioritization Scheme for HTTP/2
-
Incremental flag on images, dom
-
[acreskey] Did not see clear, reproducible signal of impact, Fenix 4G browsertime test (realism over noise)
-
-
-
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
[kershaw]
- Close to having a prototype on test machines capable of running upload tests.
-
-
Interop 2024 URL (in progress, target H2 2024)
- [Ed] DefaultURI bypass list - Adding tests for remote settings sync
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks tracking such blocks using Bug 1901798
- (sekim) Migrating more high priority probes (https://phabricator.services.mozilla.com/D215537, https://phabricator.services.mozilla.com/D216204, https://phabricator.services.mozilla.com/D216620)
-
Fast UDP I/O in Firefox (in progress, target H2 2024)
-
[kershaw]
- Improve test coverage by turning on HTTP/3 tests on Android. Ready for review.
-
[mxinden]
-
Glean probes
-
http3_udp_datagram_size_send
-
Http3_udp_datagram_size_received
-
Need to measure performance impact of measurement itself. See discussion.
-
-
Milestone 1
-
Blocked on false-positive cargo vet failure.
-
Needs audit for `tracing*` and `tokio`.
-
-
Add Firefox `about:config` pref. Default is UDP IO via NSPR. We can later switch default to quinn-udp and eventually remove pref. Allows for fast roll-back in beta or release channel without full-blown patch release. See comment for details.
-
Simplify C++ -> Rust FFI, always using `i64`, thus preventing all implicit type casts.
-
Fix `RefCell` double-mut-borrow regression in neqo `v0.8.0` refactoring the `RefCell` away, thus making this impossible. Blocker to propagate neqo v0.8.0 changes into mozilla-central.
-
Manual testing on Linux 64bit, Windows 64bit VM and MacOS (M2 with and without Rosetta)
-
Petr making progress on Solaris support for quinn-udp
-
-
Milestone 2
- Improve ECN blackhole handling (thanks Lars!).
-
-
-
Performance work:
-
-
Landed telemetry on socket pool exhaustion https://bugzilla.mozilla.org/show_bug.cgi?id=1901855
-
No improvement measured so far on local browsertime tests (high latency, low bandwidth)
-
CI picked up loadtime improvements but vismet regressions, recordings missing
-
Patch up that increases to 128 sockets
-
-
New experiments:
-
OMT Decompression + html5Parser, cssLoader
-
[Sunil] Experiment is live
- – enter updates –
-
-
-
Meeting 2024-07-09
-
Team calendar
- Next on Necko triage: Sunil
-
New contributors / Friends of Necko THANK YOU!!
-
Round Table
-
[acreskey] Summary of Fenix pain points:
-
PlayStore review summaries:
-
(June 21 - June 27)
- “Users are reporting slow page loading, pages not loading, slow browsing speed, slow app responsiveness, and slow media.”
-
(June 14 - June 20)
- Users are reporting slow page loading, pages not loading, slow browsing speed, slow app responsiveness, and slow media.
-
(May 31 - June 6)
- Users are reporting slow page loading, pages not loading, slow browsing speed, slow app responsiveness, and slow media.
-
“Well, dear firefox. I like your performance.. but you MUST improve page loading speeds to be on par with chromium based ones on Android. Firefox does well on Linux desktops, but that speed.... It's missing here. Hope you'll get it done.”
-
-
Bug 1879387 - Fenix fails to gracefully handle network transition during pageload
-
Bug 1906733 - Very long resource loads for https://www.girince.com
-
20-30% slower than Chrome in vismets, 3mpbs, +100ms rtt (small sampling of sites): results
-
-
-
Active Projects roadmap Fx128 rel July 09, Fx 129 soft freeze July 04
-
Native HTTPS RR Implementation (riding the trains, target Fx129)
- Shipped
-
3rd Party Cookie Deprecation (in progress, target Fx133)
-
Phase 1 landed in Fx129
-
Phase 2 discussions with a review of incoming telemetry in 2 weeks
-
-
Fetch keepalive: (in progress, Target Fx130)
-
-
HTTP Priorities Experiments (in progress, target Fx130 )
-
Experiment live
-
Priority header already shipped in Fx126
-
Fx 128 includes:
-
Implement Extensible Prioritization Scheme for HTTP/2
-
Incremental flag on images, dom
-
-
-
Browsertime pageload tests coming
-
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
[kershaw]
-
Run browsertime-upload tests on new test machines
-
Bug 1895357 Modify Taskcluster to run performance tests on the specific pool
- r?
-
-
Interop 2024 URL (in progress, target H2 2024)
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks, tracking such blocks using Bug 1901798
-
- Considering disabling some existing probes
-
(sekim) Added a few more migration bugs for planning
-
-
Fast UDP I/O in Firefox (in progress, target H2 2024)
-
[kershaw]
- Improve test coverage by turning on HTTP/3 tests on Android
-
[mxinden]
-
Summary of relevant OS APIs per Firefox tier 1 build target.
-
Glean probes
-
Propose the addition of two new Glean probes
-
http3_udp_datagram_size_send
-
http3_udp_datagram_size_received
-
This will enable us to measure the impact of:
-
-
-
-
Implementation of Packetization Layer Path MTU Discovery for Datagram Transports (RFC 8899) in Neqo
-
Milestone 1
-
Blocked on false-positive cargo vet failure.
- (Will follow-up tomorrow.)
-
Manual testing on Windows 64bit VM and MacOS (M2 via Rosetta)
- Seeing up to 10 datagrams read in single GRO read.
-
-
Milestone 2
- Additional testing on ECN blackhole path https://github.com/mozilla/neqo/pull/1964
-
Performance work:
-
-
Landing telemetry on socket pool exhaustion: (data review) https://bugzilla.mozilla.org/show_bug.cgi?id=1901855
-
No improvement measured so far on local browsertime tests (high latency, low bandwidth)
-
CI picked up loadtime improvements but vismet regressions, yet to analyze
-
-
New experiments:
-
OMT Decompression + html5Parser, cssLoader
-
[Sunil] Experiment is live
-
-
Meeting 2024-07-02
-
Team calendar
- Next on Necko triage: Kershaw
-
New contributors / Friends of Necko THANK YOU!!
-
Round Table
- No public topics this week
-
Active Projects roadmap Fx128 rel July 09, Fx 129 soft freeze July 04
-
Native HTTPS RR Implementation (in progress, target Fx129)
-
[kershaw] another potential blocker:
-
Bug 1895741 Intermittent valgrind-test | 28 bytes in 1 blocks are definitely lost at malloc / __res_context_send / __res_context_query / __res_context_querydomain
-
[kerahaw]
- r?
-
-
-
-
3rd Party Cookie Deprecation (in progress, target Fx132)
- [Ed] Move to 133 TBD
-
Fetch keepalive: (in progress, Target Fx130)
- 1871378 Addressed review comments, waiting on review.
-
HTTP Priorities Experiments (in progress, target Fx130 )
-
[acreskey]
-
Experiment live
-
Priority header already shipped in Fx126
-
Fx 128 includes:
-
Implement Extensible Prioritization Scheme for HTTP/2
-
Incremental flag on images, dom
-
-
-
-
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
[kershaw]
- Working on taskcluster
-
-
Interop 2024 URL (in progress, target H2 2024)
- Fixing Bug 1904582
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks, tracking such blocks using Bug 1901798
-
Fast UDP I/O in Firefox (in progress, target H2 2024)
-
Milestone 1 - Integrate quinn_udp into Necko (single-packet)
-
Blocked on false-positive cargo vet failure.
-
Needs testing on Windows. Setting up a virtual machine next.
-
Needs testing on MacOS. Will get Mac Book from servicedesk
-
Needs a decision whether fallback to NSPR is required.
-
-
Milestone 2 - Hookup ECN
- Need to investigate behavior on path dropping all ECN marked packets.
-
-
Performance work:
-
-
Dashboards convert impact via backout
-
Landing telemetry on socket pool exhaustion: https://bugzilla.mozilla.org/show_bug.cgi?id=1901855
-
Then intention is to land increase in Nightly, ride the trains
-
-
New experiments:
-
OMT Decompression + html5Parser, cssLoader
-
[Sunil] Experiment is live
-
-
-
[jesup] overhead per-request (See https://share.firefox.dev/4bkNrqS)
-
Meeting 2024-06-25
-
Team calendar
- Next on Necko triage: Kershaw
-
New contributors / Friends of Necko THANK YOU!!
-
Round Table
- – no public topics this week –
-
Active Projects roadmap Fx128 rel July 09, Fx 129 soft freeze July 04
-
Native HTTPS RR Implementation (in progress, target Fx129)
-
[kershaw] another potential blocker:
-
Bug 1895741 Intermittent valgrind-test | 28 bytes in 1 blocks are definitely lost at malloc / __res_context_send / __res_context_query / __res_context_querydomain
- Need review
-
-
-
3rd Party Cookie Deprecation (in progress, target Fx132)
-
[Ed] CHIPS partition limit: Reviews are coming back, making necessary fixes
-
Working to address review comments, may move to 133 TBD
-
-
Fetch keepalive: (in progress, Target Fx130)
-
(greg) Reminder to ping Jason Kratzer once ms 1 has landed and we have added the fuzzing pref
- [Sunil] Will do
-
[Sunil] Bug 1871378 - Incorporating review comments. MS1 can be marked done after merging this. We pass all WPTs now
-
[Sunil] Will start work on MS2 next week.
-
-
HTTP Priorities Experiments (in progress, target Fx130 )
-
[acreskey]
-
Bringing to DS Wednesday, Beta 128 (start as soon as approved)
-
https://mozilla-hub.atlassian.net/wiki/spaces/FIREFOX/pages/11047744/Experiments+Necko
-
Will run broad local tests
-
priorityHeader currently riding the trains; probably want to stop it
-
-
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
(greg) Can we use this environment to verify Fast UDP I/O(GSO)?
-
– enter updates –
-
[kershaw]
-
Test machines ready
-
Start working
-
-
-
Interop 2024 URL (in progress, target H2 2024)
-
(sekim) Landed %2e entered in URL bar not normalized leading to denormalized request, this bug may also fix Bug 1902331.
-
[Ed] Added some tests for adding remote settings defaultURI bypass list, made some fixes as well.
-
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks, tracking such blocks using Bug 1901798
-
[acreskey] Continue to hold on Android until further notice
-
(sekim) Dashboard for tracking networking_http_channel_disposition and networking_http_channel_onstart_status
-
(sekim) Landed Migrate HTTP_RESPONSE_STATUS_CODE probe to glean
-
(sekim) Added HTTP_RESPONSE_STATUS_CODE to the above dashboard.
-
-
Fast UDP I/O in Firefox (in progress, target H2 2024)
-
Congrats Max Inden for getting first project approved!
-
Allow getsock* syscalls in Rust code unblocking milestone 1.
-
Do `cargo vet` `safe-to-deploy` _audit_ for `quinn-udp`. Needed to import `quinn-udp` into `neqo_glue`'s dependency tree.
-
Propose patch to remove `quinn-udp`'s dependency on `tracing-attributes`. One less dependency to audit for milestone 1.
-
Debug false positive CI check, requiring `safe-to-deploy` audit for `tokio` crate. See Phabricator comment.
-
Tested https://github.com/cloudflare/quiche/pull/1764 as an alternative to `quinn-udp`. We will proceed with `quinn-udp` given that it supports all the Firefox tier 1 platforms.
-
-
Performance work:
-
-
Via Performance Pulse dashboards, saw improvements of 5-20%, P50 onwards in probes where you could expect changes:
-
http channel page open to first_sent
-
http channel sub item open to first sent
-
transaction wait time
-
-
Backed out to double-check impact.
-
Proposal:
-
Land os-limits telemetry
-
Increase in nightly, 128 sockets (beta & earlier)
-
Uplift to beta to observe impact of single change
-
Consider Fenix release population experiment
-
-
-
New experiments:
-
Performance Calibration (A/A/A) on Fenix, live (release channel might be affected, some probes)
-
[acreskey] Completed and summarized:
-
Top-level metrics show less variance than desktop, despite much smaller population sizes
-
-
OMT Decompression + html5Parser, cssLoader
-
-
-
Meeting 2024-06-18
-
Team calendar
- Next on Necko triage: Randell
-
New contributors / Friends of Necko THANK YOU!!
-
bugmail@asutherland.org
-
fwang@igalia.com
-
ctuns@mozilla.com
-
-
Round Table
-
(greg) Standards positions:
-
Bug: 1475599 Implement Cookie-Store API
-
Web compatibility with Chrome and Safari
- Safari recent, web compatibility risk is higher
-
-
Request standards position review?
-
Randell ping Simon in channel
- Mondays standards meeting
-
Zstd - standards position update?
-
We’re positive already: https://github.com/mozilla/standards-positions/issues/775
-
The dashboard shows an old position, and needs to be updated
-
Will bring to standards meeting monday
-
-
-
-
Active Projects roadmap Fx128 rel July 09, Fx 129 soft freeze July 04
-
Native HTTPS RR Implementation (in progress, target Fx129)
-
Performance regression identified in Nightly https://bugzilla.mozilla.org/show_bug.cgi?id=1895908#c15
-
[kershaw]
-
Bug 1898191 Improving HTTPS RR Handling to Mitigate Performance Regression
-
(greg) Looks like we have fixed performance regression - confirmed
- [Andrew] Consider future optimizations for DoH - HTTPS RR
-
[acreskey] FYI, full query
-
Cached performance pulse
-
Do we know perf impact on Page_open_to_first_sent with DoH?
- Smaller scale desktop regression? dashboard
-
-
[kershaw] another potential blocker:
- Bug 1895741 Intermittent valgrind-test | 28 bytes in 1 blocks are definitely lost at malloc / __res_context_send / __res_context_query / __res_context_querydomain
-
-
-
3rd Party Cookie Deprecation (in progress, target Fx132)
-
[Ed] Received some feedback on patches, addressing this week
-
-
Fetch keepalive: (in progress, Target Fx129)
-
[Sunil] Merged 1871376 and 1871377. Keepalive WPTs now pass except for resource limits tests.
-
[Sunil] Working on patch for Bug 1871378
-
[Sunil] Won't be able to land in Fx129.
-
-
HTTP Priorities Experiments (in progress, target Fx130 )
- Valentin to share this week
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
[kershaw]
- Test machines should be ready soon
-
-
Interop 2024 URL (in progress, target H2 2024)
- (sekim): Incorrect parsing: file:c:\\foo\\bar.html against file:///tmp/mock/path landed.
-
necko-glean: (sekim) Landing glean patches using #ifndef ANDROID blocks, tracking such blocks using Bug 1901798
- [acreskey] Please continue to #ifndef non-essential probes on Android, I am re-raising this
-
-
Milestone 1 - quinn-udp in Firefox
-
Ready for review
-
Looking into telemetry probes to add.
-
Discussion on static check disallowing Rust network calls.
-
-
Milestone 2 - sending and receiving ECN
- Blocked on https://github.com/mozilla/neqo/issues/1925
-
-
Performance work:
-
[acreskey] Landed increase socket pool of 40 to 100, android
-
New experiments:
-
Performance Calibration (A/A/A) on Fenix, live (release channel might be affected, some probes)
- Experiments completed; need changes to Performance Telemetry Reports to compare glean timing distributions
-
OMT Decompression + html5Parser, cssLoader
-
Potential conflict with HTTP Priorities, push OMT first
-
-
-
Meeting 2024-06-11
-
Team calendar
- Next on Necko triage: Valentin
-
New contributors / Friends of Necko THANK YOU!!
-
nika@thelayzells.com fixed Bug: 1718673 text/event-stream mime type starts downloading instead of streaming content
-
fwang@igalia.com fixed
-
jschanck@mozilla.com fixed Bug: 1892528 Enable Xyber768 in Http/3 TLS handshakes under a pref
-
bugmail@asutherland.org fixed Bug: 1900681 XMLHttpRequestMainThread::DisconnectFromOwner should not call Abort for `mForWorker` XHRs because it double-clocks the state machine
-
-
Round Table
-
Potential performance opportunity? https://www.bleepingcomputer.com/news/google/google-chrome-reduced-cookie-requests-to-improve-performance/
- Relaying same cookie that has been broadcast multiple times, we could be duping sends - Ed to review and consider
-
Standards positions:
-
Bug: 1475599 Implement Cookie-Store API
-
Web compatibility with Chrome and Safari
- Safari recent, web compatibility risk is higher
-
-
Request standards position review?
-
Randell ping Simon in channel
-
Zstd - standards position update? Randell to ping Simon
-
-
-
Active Projects roadmap Fx127 rel June 11, Fx128 rel July 09, Fx 129 soft freeze July 04
-
Native HTTPS RR Implementation (in progress, target Fx129)
-
Performance regression identified in Nightly https://bugzilla.mozilla.org/show_bug.cgi?id=1895908#c15
-
[kershaw]
-
Bug 1898191 Improving HTTPS RR Handling to Mitigate Performance Regression
-
-
-
3rd Party Cookie Deprecation (in progress, target Fx132)
-
[Ed] Added tests and put into review, two patches now in review:
-
-
Fetch keepalive: (in progress, Target Fx129)
-
(greg) Jason Kratzer I see that this is behind a pref. Is this ready for fuzz testing? Not yet, landing MS1 next week. Could be tested after next week we have all WPT passing
- [Sunil] Can test after
-
Started working on 1871378.
-
-
-
HTTP Priorities Experiments (in progress, target Fx130 )
- (valentin) Working on experiment brief. Will sync up with Andrew to launch experiment.
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
- – enter updates –
-
Interop 2024 URL (in progress, target H2 2024)
-
(sekim) Patch for Bug 1874118 - Fix handling of trailing characters in opaque paths in URL
-
(sekim) Currently debugging a Rust URL bug
-
(sekim) Few other patches are waiting for review.
-
(sekim) This Patch works except for Windows, Testing URL on Windows?
-
-
necko-glean: (sekim) due to incidents, currently on hold.
- – enter updates –
-
Fast UDP I/O in Firefox
-
[mxinden] Fast UDP for Firefox Project Plan - Fast UDP for Firefox
-
Milestone 1
-
QUIC UDP I/O using quinn-udp
-
Milestone 2
- Neqo sending and receiving ECN markings
-
Milestone 4
- Neqo receiving multi-packet via GRO
-
Each still needs a lot of work, especially across platforms.
-
-
Performance work:
-
Glean on Android update
- [acreskey] Please #ifndef Android new glean probes unless specifically needed, until glean performance is improved
-
[acreskey] FYI:
-
Fenix TLS connection times appear to have increased around March 19, 2024
-
-
New experiments:
-
Performance Calibration (A/A/A) on Fenix, live (release channel might be affected, some probes)
-
OMT Decompression + html5Parser, cssLoader
-
Data team on work-week. Will attend data office hours next week.
-
-
Meeting 2024-06-04
-
Team calendar
- Next on Necko triage: Sunil
-
New contributors / Friends of Necko THANK YOU!!
-
Round Table
- No public topics this week
-
Active Projects roadmap Fx127 rel June 11, Fx128 soft freeze June 06
-
Native HTTPS RR Implementation (in progress, target Fx129)
-
Performance regression identified in Nightly https://bugzilla.mozilla.org/show_bug.cgi?id=1895908#c15
-
[kershaw]
-
Bug 1898191 Improving HTTPS RR Handling to Mitigate Performance Regression
-
-
-
3rd Party Cookie Deprecation (in progress, target Fx129)
-
[Ed] Added telemetry and submitted for data approval
-
Just need to add a few more tests
-
Note: CHIPS will be enabled soon
- Let’s keep an eye on cookie same-site/cross-origin related bugs
-
-
Fetch keepalive: (in progress, Target Fx129)
-
(greg) Jason Kratzer I see that this is behind a pref. Is this ready for fuzz testing? Not yet, landing MS1 next week. Could be tested after next week we have all WPT passing
-
Service worker support missing in WPT.
-
– enter updates –
-
-
HTTP Priorities Experiments (in progress, target Fx129 )
-
(valentin) 1900555 - Add fetchpriority prefs to the Feature Manifest planning to land before code freeze
-
Frederic from Igalia has been landing some tests.
-
Working on experiment brief.
-
-
Firefox/Chrome benchmark test suite (in progress, Fx132)
-
[kershaw]
- Test machines will be ready by the end of this week
-
-
Interop 2024 URL (in progress, target H2 2024)
-
(sekim) A patch backed out due to regressions: https://phabricator.services.mozilla.com/D211898
-
(sekim) Two patches waiting for review/wip, will be complete soon.
-
(sekim) Although not part of Interop 2024 URL, fixed a related bug (can be landed after windows fix with ‘/’): https://phabricator.services.mozilla.com/D212193
-
-
necko-glean: (sekim) due to incidents, currently on hold.
-
Performance work:
-
Glean on Android update
-
Probes disabled in Release: https://pastebin.mozilla.org/eJEZEmLo
-
Batched DB writes issues fixed in Nightly, being uplifted:
-
-
Unrelated: Glam for Fenix stuck at April 13 updates:
-
New experiments:
-
Performance Calibration (A/A/A) on Fenix, live (release channel might be affected, some probes)
-
OMT Decompression + html5Parser, cssLoader
-
-
FYI, updated impact of Cookie Banner Handling documented here. Android results coming.
-
-
Meeting 2024-05-28
-
Team calendar
- Next on Necko triage: Ed
-
New contributors / Friends of Necko THANK YOU!!
- Bug: 1741375 Proxy DNS by default when using SOCKS v5 (manuel@mozilla.com)
- Bug: 1895319 refactor http3server to use neqo-bin for I/O, timers, event-loop etc. ( mail@max-inden.de)
- Bug: 1896475 Implement Request/Response
.bytes()
method (evilpies@gmail.com) - Bug: 1897959 Perma /client-hints/sec-ch-width.https.html | Sec-CH-Width should be set - assert_equals: expected 100 but got 1 (aborovova@mozilla.com)
- Bug: 1898129 Perma [tier 2] /fetch/api/abort/serviceworker-intercepted.https.html | response.bytes() rejects if already aborted - promise_test: Unhandled rejection with value: object "TypeError: response[bodyMethod] is not a function" (aborovova@mozilla.com)
-
Round Table
-
Revive 1676432 - Add a UDP DNS resolver ?
-
Chrome has their own native resolver that uses TCP/UDP
-
Could help bypass perf issues
-
Add to performance opportunities, experiment WIP patches
-
Current patch for not performing IPV6 when not available, if this does not resolve issue we will continue to explore this.
-
1122907 - Slow DNS lookupconnection timings on 64 bit Linux.
-
-
-
- Manuel landed a patch.
-
-
Total Bugs updated: 197(7 off team)
-
Closed: 41 (3 off team)!
-
14 fixed
-
6 invalid
-
11 won’t fix
-
8 works for me
-
1 duplicate
-
4 incomplete
-
By Severity:
-
S3: 24
-
S4: 6
-
– : 6
-
NA: 5
-
-
-
Priority/severity updated: 16
-
Blocks updated: 28
-
Necko Priority Queue: 3 added
-
-
-
(Sunil) Simon Peter will present Contributing to Standards Talk on 2nd August in Let’s Decipher Necko Session.
-
-
Active Projects roadmap Fx127 rel June 11, Fx128 soft freeze June 06
-
Native HTTPS RR Implementation (in progress, target Fx128)
-
Sent Intent To Ship: Resolving HTTPS records using platform DNS APIs
-
Performance regression identified in Nightly https://bugzilla.mozilla.org/show_bug.cgi?id=1895908#c15
-
[kershaw]
-
Bug 1898191 Improving HTTPS RR Handling to Mitigate Performance Regression
- Patches r+ed.
-
-
-
3rd Party Cookie Deprecation (in progress, target Fx128)
-
[Ed] Writing telemetry for partition limit purging dry run
-
[Ed] A few reviews for the privacy team
-
-
Fetch keepalive: (in progress, Target Fx129)
-
[Sunil] 2 out of 3 patch stacks r+. Incorporating review comments on the final patch.
-
[Sunil] Need to complete https://bugzilla.mozilla.org/show_bug.cgi?id=1871378 for Milestone 1 (Implement keepalive as per Fetch standard)
-
-
-
HTTP Priorities Experiments (in progress, target Fx 129 )
-
1865040 - Implement Extensible Prioritization Scheme for HTTP2 landed
-
1864392 - Honor `fetchpriority` attribute for HTTP3 requests was backed out for a test failure. Will land again.
-
-
Firefox/Chrome benchmark test suite (in progress, Fx 129)
-
[kershaw]
- Configuring the test environment in VM
-
-
Interop 2024 URL (in progress, target H2 2024)
-
[Ed] No progress on DefaultURI bypass
-
[Sean] Landed null origin blob
-
-
Performance work:
-
New experiments:
-
Performance Calibration (A/A/A) on Fenix, live
-
Acreskey: fyi, possibility of telemetry being disabled on Android
-
https://experimenter.services.mozilla.com/nimbus/fenix-performance-metric-calibration/edit/overview
-
-
OMT Decompression + html5Parser, cssLoader
-
[Sunil] https://bugzilla.mozilla.org/show_bug.cgi?id=1899233
-
Started writing experiment brief
-
-
-
Meeting 2024-05-21
-
Team calendar
- Next on Necko triage: Kershaw
-
New contributors / Friends of Necko
-
freddy fixed 1897132 - make netwerktestbrowserbrowser_dns_prefetch_link_header.js work with https-first
-
mconley fixed 1896929 - Allow nsInputStreamChannel to have an arbitrary content type set on it
-
cpeterson fixed 1894429 - Spoof Android 10 OS version in Firefox Android’s User-Agent string on Android versions = 10
-
-
Round Table
- – enter topics –
-
Active Projects roadmap Fx127 rel June 11, Fx128 soft freeze June 06
-
Native HTTPS RR Implementation (in progress, target Fx128)
-
Sent Intent To Ship: Resolving HTTPS records using platform DNS APIs
-
Performance regression identified in Nightly https://bugzilla.mozilla.org/show_bug.cgi?id=1895908#c15
-
-
3rd Party Cookie Deprecation (in progress, target Fx128)
- [Ed] Started implementation of telemetry for chips partition limit, still in progress
-
Fetch keepalive: (in progress, Target Fx129)
-
[Sunil] Follow-up bug for enabling PFetch for all main thread Fetch requests
-
[Sunil] Addressing final comments from Eden, mostly will land the patch this week for Milestone 1.
-
-
-
HTTP Priorities Experiments (in progress, target Fx 128 )
-
1784496 - The necko consumers should use the HTTP3 priority's incremental flag landed last week
-
1865040 - Implement Extensible Prioritization Scheme for HTTP2 on autoland
-
1864392 - Honor `fetchpriority` attribute for HTTP3 requests planned to land for later this week
-
-
Firefox/Chrome benchmark test suite (in progress, target H1 2024)
-
[kershaw]
-
Learning taskcluster, puppet, …
-
Start with a VM nearly identically as the test hardware
-
-
-
Interop 2024 URL (in progress, target H2 2024)
- [Ed] Discussed default URI bypass list blocker, startup URLs with valentin: startup URLs shouldn’t need access to bypass list so we should be fine to continue
-
Performance work:
-
New experiments:
-
Performance Calibration (A/A/A) on Fenix, live
-
OMT Decompression + html5Parser, cssLoader
-
[Sunil] Started the experiment preparation. Finished Experimenter Onboarding Training and overview of Nimbus.
-
Will start writing experiment brief this week
-
-
-
Meeting 2024-05-14
-
Team calendar
- Next on Necko triage: Valentin
-
New contributors / Friends of Necko
- None in the last week
-
Round Table
-
(sunil) Enable redirects for auth retries in release
-
Start rollout for using Release Experiments
-
Do we need more telemetry probes to identify regression sooner?
-
Probes for channel status exist
-
Success rate of channel monitor changes in trend
-
How can we see exact regressions introduced?
-
If regression we will never resolve 200 after 401
-
[acreskey]: Feature Manifest
-
https://searchfox.org/mozilla-central/source/toolkit/components/nimbus/FeatureManifest.yaml
-
Leverage a gradual rollout
-
Can we target users with specific auth?
-
Ask data folks for guidance on % of population
-
-
-
-
-
-
(sunil) Currently we use PFetch for workers and keepalive. Proposal to use PFetch for all Fetch requests.
-
Reduces main thread contention
-
HTTPChannelParent/Child, logging and cookies dependencies
-
Needs investigation/scoping, needs decision before we implement Fetch Streaming Upload
-
-
-
Active Projects roadmap Fx126 rel May 14, Fx127 soft freeze May 09
-
OMT: Move OnStartRequest and OnStopRequest to the content process (paused, target: TBD)
-
new Project Plan
-
Split HTML5Parser OnStop - OMT Shipped in Fx122
-
Split CSSLoader OnStop - OMT riding the trains in Fx126
-
OnStart consumer
-
– enter updates –
-
Optimize, Measure and add tests for Speculative Connections (riding the trains, target: Fx126)
- – enter updates –
-
zstd content-encoding: (riding the trains, Fx126)
- – enter updates –
-
Native HTTPS RR Implementation (in progress, target Fx127)
-
Riding the trains in 127
-
Sent Intent To Ship: Resolving HTTPS records using platform DNS APIs
-
-
3rd Party Cookie Deprecation (in progress, target Fx128)
-
[Ed] Wrote test for current implementation so far.
-
[Ed] Next steps: add test for insecure purging first
-
-
Fetch keepalive: (in progress, Target Fx129)
-
[Sunil] Addressing review comments from Eden.
-
We pass all the WPTs for the implemented feature.
-
Plan to merge the changes this week.
-
-
-
HTTP Priorities Experiments (in progress, target Fx 128 )
- Will start landing patches this week.
-
Firefox/Chrome benchmark test suite (in progress, target H1 2024)
- Created a JIRA issue to request test machines.
-
Interop 2024 URL (in progress, target H2 2024)
- [Ed] Continuing work on default-uri bypass list
-
Performance work:
-
New experiments:
-
Performance Calibration (A/A/A) on Fenix, planned to start today, nightly, beta, release
-
OMT Decompression + html5Parser, cssLoader (Thank you Sunil)
-
-
[acreskey]
-
Investigating: First visual change and reported time to first byte 1 second slower on Fenix compared to Chrome, en.m.wikipedia.org, high latency network
-
-
FYI:
-
Predictor christmas tree:
-
(greg) Keep enabled?
- Continue investigating and assess performance priority
-
-
[jesup] Working on a next-stage OMT proposal
-
-
[jesup] WebSocketStream - Chrome is pushing it. Mt is very slightly positive if we remove some random cruft from the PR. Kagami and I are skeptical; we could do it; it wouldn’t be hard - but the big question would be “why not WebTransport?” (especially once WebTransport over H2 is available globally).
Meeting 2024-04-30
-
Team calendar
- Next on Necko triage: Sunil
-
New contributors / Friends of Necko
-
Thomas Wisniewski fixed bugs 1889075, 1893257, 1893219
-
Robert Longson fixed 1892748
-
-
Round Table
- No public topics this week
-
Active Projects roadmap
-
Active Projects: Fx126 rel May 14, Fx127 soft freeze May 09
-
OMT: Move OnStartRequest and OnStopRequest to the content process (paused, target: TBD)
-
new Project Plan
-
Split HTML5Parser OnStop - OMT Shipped in Fx122
-
Split CSSLoader OnStop - OMT riding the trains in Fx126
- – enter updates –
-
OnStart consumer
- No response from other team on ImageLoader
-
[acreskey] Will re-run this experiment, adding in OMT compression variants (up for volunteers as well)
-
Next:
-
Review other OnStop consumers largest opportunity wins
-
Write a short doc on strategy, current/future states and opportunities identified
-
-
Optimize, Measure and add tests for Speculative Connections (riding the trains, target: Fx126)
- [acreskey] Will re-run local tests to see if we budge LCP, FCP
-
Native HTTPS RR Implementation (in progress, target Fx127)
-
New regressions:
-
1891423 - Hosts file no longer blocks some sites since native HTTPS resolver was enabled on Ubuntu
- Should we check /etc/hosts before doing a HTTPS lookup?
-
Bug: 1893944 Resolving any .local domain takes at least 10 seconds
-
[kershaw]
- Patch in review
-
-
-
– enter updates –
-
-
Interop 2024 URL (in progress, target H2 2024)
- – enter updates –
-
3rd Party Cookie Deprecation (in progress, target Apr 9)
- – enter updates –
-
zstd content-encoding: (riding the trains, Fx126)
-
– enter updates –
-
[Dylan]
- Landed devtools https://bugzilla.mozilla.org/show_bug.cgi?id=1891610
-
[jesup] Riding to release
-
Next
-
-
Fetch keepalive: (in progress, Target Fx128)
- – enter updates –
-
Performance work:
-
[acreskey] Setting up Rasberry Pi throttling host to investigate Fenix connection time issues
-
[valentin] I found an issue with speculative connect having the wrong isolation key: 1894206 - Speculative connect for HTTPS upgraded page loads has the wrong originAttributes
-
-
-
Meeting 2024-04-16
-
Team calendar
- Next on Necko triage: Kershaw
-
New contributors / Friends of Necko
-
New contributor Serfreeman1337 fixed 1810362 - Firefox does not seem to support IPv6 unless DNS-over-HTTPS is enabled
-
Thomas Wisniewski fixed 1886757 - network.dns.localdomains does not apply to FQDN
-
Chris Peterson fixed 1873273 - Freeze UA string and navigator.platform on 32-bit x86 Linux to match Chrome's frozen navigator.platform (Linux x86_64)
-
-
Round Table
- (valentin) Next ESR is 128 - code freeze date: June 6 - that means if we have big refactorings we should aim to get them done by then, to avoid conflicts when uplifting stuff later.
-
Active Projects roadmap
-
Active Projects: Fx125 rel Apr 16, Fx126 soft freeze Apr 11
-
OMT: Move OnStartRequest and OnStopRequest to the content process (paused, target: TBD)
-
new Project Plan
-
Split HTML5Parser OnStop - OMT Shipped in Fx122
-
Split CSSLoader OnStop - OMT to track in Fx126
- – enter updates –
-
OnStart consumer
- – enter updates –
-
Optimize, Measure and add tests for Speculative Connections (in progress, target: Fx126)
- No updates
-
Native HTTPS RR Implementation (in progress, target Fx126)
-
New regression: 1891423 - Hosts file no longer blocks some sites since native HTTPS resolver was enabled on Ubuntu
- Should we check /etc/hosts before doing a HTTPS lookup?
-
-
Interop 2024 URL (in progress, target H2 2024)
- [Ed] Looking at how to use RemoteSettings to get our default bypass list into the program from the cloud
-
3rd Party Cookie Deprecation (in progress, target Apr 9)
-
[Ed] Added priority purging of insecure cookies, also byte limit check on cookie overwrite
-
[Ed] Started writing the test for cookie partition limit purging
-
-
zstd content-encoding: (in progress, Fx126)
-
[jesup] zstd landed and is in beta! No known regressions
-
[jesup] Performance results from the OMT decompression patch were surprisingly good from GLAM telemetry
- FCP/LCP/DOM Dontent Loaded/etc improved by 10% in many cases, 30% in some higher %iles
-
[Dylan]
-
done devtools support
-
Writing zstd devtools test
-
-
-
Fetch keepalive: (in progress, Target Fx128)
-
-
[Sunil] Bug 1871377 , Bug 1871376
-
Most of the functionality required for Milestone 1 is working and wpt verified.
-
Will publish patches for review
Meeting 2024-04-09
-
Team calendar
- Next on Necko triage: Randell
-
Round Table
- none
-
Active Projects roadmap
-
Active Projects: Fx125 rel Apr 16, Fx126 soft freeze Apr 11
-
OMT: Move OnStartRequest and OnStopRequest to the content process (paused, target: TBD)
-
new Project Plan
-
Split HTML5Parser OnStop - OMT Shipped in Fx122
-
Split CSSLoader OnStop - OMT to track in Fx126
-
Experiment ended
-
No obvious changes in the field
-
-
OnStart consumer
-
Still no response from tnikkel
-
Probably drop for now
-
-
Optimize, Measure and add tests for Speculative Connections (in progress, target: Fx126)
-
[acreskey] Complete: landed in Fx 126, summarized here:
-
-
Native HTTPS RR Implementation (in progress, target Fx126)
-
[valentin] Will ride the trains
-
Investigate increase in DNS queueing time with native HTTPS records was fixed
-
-
Interop 2024 URL (in progress, target H2 2024)
-
[Ed] Landed defaultURI bypass pref default URI bypass pref
-
[Ed] Starting remote settings to update pref
-
[Dylan] landed https://bugzilla.mozilla.org/show_bug.cgi?id=1874117
-
[Dylan] started https://bugzilla.mozilla.org/show_bug.cgi?id=1874119
-
-
3rd Party Cookie Deprecation (in progress, target Apr 9)
-
[Ed] Added FIFO (older) cookie purging at partition byte limit
-
[Ed] Need to also add insecure cookie purging first (before older cookies)
-
-
zstd content-encoding: (in progress, Fx126)
-
[jesup] On autoland!
-
Anna Weine will be adding cert decompression with zstd
-
Dylan is looking at devtools
-
-
Fetch keepalive: (in progress, Target Fx128)
- – enter updates –
-
Performance work:
- Look for more OMT
-
-
Meeting 2024-04-02
-
Team calendar
- Next on Necko triage: Valentin
-
Round Table
-
Necko Performance Opportunities select priorities for H1
-
Performance priorities selected for H1-2024
-
HTTP3 Upload Speed
-
Enable DNS pre-fetch for https
-
Bug: 1709175 Switch from select() to poll for MacOS to reduce CPU usage
-
HTTP/2, HTTP/3 priorities, urgencies, incremental flag(meta bug)
-
Optimize socket pool constants - Android
-
-
-
[acreskey] FYI:
-
Fenix performance gap to Chrome through throttling VPN reproduced
-
https://share.firefox.dev/3TVlXT3
- Problems with tls, general request times
-
-
-
Active Projects roadmap
-
Active Projects: Fx125 rel Apr 16, Fx126 soft freeze Apr 11
-
OMT: Move OnStartRequest and OnStopRequest to the content process (paused, target: TBD)
-
new Project Plan
-
Split HTML5Parser OnStop - OMT Shipped in Fx122
-
Split CSSLoader OnStop - OMT to track in Fx126
- Experiment started
-
OnStart consumer
- – enter updates –
-
Optimize, Measure and add tests for Speculative Connections (in progress, target: Fx126)
-
[acreskey] Update:
-
Beta experiment live, ended Mar 19, 2024 - no measurable improvements via telemetry
-
Local browsertime tests show significant improvements to sub-resource connections times (up to 50%) on some sites
-
(quick demo)
-
We don’t hit socket pool exhaustion on Desktop:
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1819556
We removed the telemetry for desktop socket exhaustion- NETWORK_SESSION_AT_900FD probes. Telemetry shows all users are able to poll up to 1000 sockets - see glam
-
-
Landing patch to set Desktop to 20 for Fx126
-
-
-
Native HTTPS RR Implementation (in progress, target Fx126)
-
[valentin] Enabled on Nightly and Early beta 125
-
Investigating issues:
-
1885529 - Investigate increase in DNS queueing time with native HTTPS records (Windows)
-
Telemetry patch ready.
-
I can repro locally on win11 (investigating)
-
-
1885556 - 4.62 - 4.32% fandom ContentfulSpeedIndex fandom loadtime + 1 more (Linux) regression
- No progress yet
-
-
-
Interop 2024 URL (in progress, target H2 2024)
-
[Ed] In progress: unknown scheme default URI bypass list
-
[Dylan]
-
Submitted patch in rust-url https://bugzilla.mozilla.org/show_bug.cgi?id=1874117
-
-
3rd Party Cookie Deprecation (in progress, target Apr 9)
-
[Ed] reviewed telemetry for guidance on order of potential purging when reaching cookie partition byte count limit (FIFO vs FILO)
-
Currently it’s not even clear on if this should be enforced at all
-
No existing telemetry to indicate how often a limit would be reached and potentially interfere with web compat
-
We can probably proceed with multiple purging implementations behind feature flags and then decide based on some telemetry that ships ahead of it.
-
Any concerns/differing opinions?
-
-
-
zstd content-encoding: (in progress, target H1 2024)
-
Code r+’d to land
-
xz library exploit doesn’t affect our import since we don’t build zstd binaries
-
Likely will update the library anyways since a new release with performance improvements, etc was just made to coincide with Chrome enabling zstd in release.
-
-
Works well with facebook
-
In contact with decoder about fuzzing
-
Remaining work with sec team to TLS cert comp and dev tools
-
-
Fetch keepalive: (in progress, Target Fx128)
- Testing the initial implementation
-
Performance work:
-
[jesup] Results are in from the OMT decompression landing: https://treeherder.mozilla.org/perfherder/alerts?id=41924
-
Some red. Lots and lots of big green through
-
Filtering to speedindex looks even better. 100% green for FCP and FirstVisualChange. LCP is good, though not all green.
-
Pushed tries for a patch that leaves things on MainThread if the compressed size is known and is small (512 and 1024 bytes). This could avoid overhead in cases where decompression is almost certainly very short.
-
512 shows improvement of 1-7% on 4 sites (of 30)
-
1024 shows improvement of 1-3.5% on 5 sites, regression of 1-3% on 2 sites.
-
Planning to land with 512; includes a pref for size
-
-
-
-
-
Meeting 2024-03-26
-
Team calendar
- Next on Necko triage: Ed
-
Round Table
-
Bug 1420777 - Http/2 connection reuse to non-origin server for new hostname on DNS overlap was finally resolved, which fixes an annoying corner case for many developers.
- Backed out, Valentin will resolve and reland
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1741375
- Telemetry landed - reminder set for 03/18
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1887714
- May need to work with IT to get to bottom of it
-
[acreskey] FYI: tooling to extract and compare PerfStats from local browsertime comparison runs:
-
https://github.com/acreskeyMoz/perfstats_from_browsertime/blob/main/README.md
-
NEL, can impl on our end and let CF know once ready and review telemetry
-
No need to schedule and coordinate
-
Send JSON to server if something goes wrong loading the page
-
If we find privacy leaks we will not send the data, anything we send is better than nothing.
-
Target in H2 2024, be nice to get it in
-
-
103 Early Hints can be used to break adblocking (thread)
-
I don't see a good outcome here. Chrome lets sites exfiltrate data with prefetch; we allow sites to detect blocking of exfiltration with prefetch. We're going to have to change how prefetch works to manage this, I think.
- POC, Kershaw will review and file a bug
-
-
Active Projects roadmap
-
Active Projects: Fx125 rel Apr 16, Fx126 soft freeze Apr 11
-
OMT: Move OnStartRequest and OnStopRequest to the content process (paused, target: TBD)
-
new Project Plan
-
Split HTML5Parser OnStop - OMT Shipped in Fx122
-
Split CSSLoader OnStop - OMT to track in Fx126
- Experiment started
-
OnStart consumer
- – enter updates –
-
Optimize, Measure and add tests for Speculative Connections (in progress, target: Fx126)
-
[acreskey]
-
Beta experiment live, ended Mar 19, 2024
-
No clear signal of improvements to top-level metrics for increasing # of speculative sockets and similarly no regression detected in top-level metrics for disabling rel=preconnect
-
Experiments page updated: https://mozilla-hub.atlassian.net/wiki/spaces/FIREFOX/pages/11047744/Experiments+Necko#Conclusions
-
Worth considering that significant changes in top-level metrics may take numerous improvements to be measurable in the wild.
-
Would like to try to find signal in a local browsertime run (timeboxed, 2 days)
-
-
-
Native HTTPS RR Implementation (in progress, target Fx126)
-
[valentin] Enabled on Nightly and Early beta 125
-
Investigating issues:
-
-
Interop 2024 URL (in progress, target H2 2024)
-
[Ed] Not much progress on my side
-
[Dylan]
-
-
3rd Party Cookie Deprecation (in progress, target Apr 9)
-
[Ed] Cookie capping: Agreed upon on putting capacity limit rejection behind a feature flag until we know if safe (telem or google fully ships)
-
[Ed] Some code review
-
-
zstd content-encoding: (in progress, target H1 2024)
- approved
-
Fetch keepalive: (in progress, Target Fx128)
-
[Sunil] Added Keepalive attribute support under pref
-
[Sunil] Currently adding PFetch Support to keepalive.
-
-
Performance work: [jesup]
-
Preliminary results for Bug 1356686 - Do decompression off main thread in content
-
Bounced last night (1 failure on android and a non-unified-build issue); will try again hopefully today
-
-
-
Meeting 2024-03-19
-
Team calendar
- Next on Necko triage: Ed
-
Round Table
-
(greg) https://mozilla-necko.github.io/newsletter/2024/03/15/community.html
-
Awesome job, Manuel Bucher thank you for coordinating and publishing!
-
Tracking community contributions? Are we seeing an increase?
-
Manuel effort to monitor
-
Could use whiteboard tag when we land to easily filter out
- When review patch and land add tag to track
-
Review bugs landed each week off necko
-
Can we use bugbot to do this for us?
- Sunil to investigate
-
-
-
Improve coordination, regular cadence?
-
Schedule every 2 retro’s (12 wks)
-
Prepare google doc, review w team
-
[Greg] Reminder calendar item
-
-
-
-
-
Active Projects roadmap
-
Active Projects: Fx124 rel Mar 19, Fx125 soft freeze Mar 14
-
OMT: Move OnStartRequest and OnStopRequest to the content process (paused, target: TBD)
-
new Project Plan
-
Split HTML5Parser OnStop - OMT Shipped in Fx122
-
Split CSSLoader OnStop - OMT to track in Fx126
- – enter updates –
-
OnStart consumer
- – enter updates –
-
Optimize, Measure and add tests for Speculative Connections (in progress, target: Fx125)
- Beta experiment live, ends Mar 19, 2024
-
Native HTTPS RR Implementation (in progress, target Fx126)
-
[valentin] Enabled on Nightly and Early beta 125
-
Investigating issues:
-
-
Interop 2024 URL (scheduled, target H2 2024)
-
Comments: reviewing comments from Brian and Thomas
-
[dylan] https://bugzilla.mozilla.org/show_bug.cgi?id=1873944
- Pass some tests, fixing try push
-
-
H3 Upload speed
-
-
Project Plan - Advancing neqo Library Performance and Developing a Robust Testing Framework
-
https://lookerstudio.google.com/reporting/4b5fbec3-2ead-40c1-864b-26490b85b6f5/page/p_7d9166xidd
-
Chrome Benchmark results https://lookerstudio.google.com/reporting/3dcd8af9-9d9d-4197-a326-58b54f73bb36
-
[kershaw]
-
Project plan for build a network performance test framework
-
In review process
-
Waiting for aerickson’s feedback
-
Will schedule a follow up meeting
-
-
-
-
-
3rd Party Cookie Deprecation (in progress, target TBD)
-
[Ed] bvandersloot pushing to help resolve cookie limit behaviour
-
[Ed] looked into how we can trigger child-side SetCookieStringFromHttp for more thorough testing
-
-
Fetch keepalive: (in progress, Target Fx128)
-
[Sunil] Adding Keepalive attribute support. Will land these by tomorrow:
-
-
-
-
Performance work: [jesup]
-
Preliminary results for Bug 1356686 - Do decompression off main thread in content
-
Bounced last night (1 failure on android and a non-unified-build issue); will try again hopefully today
-
Meeting 2024-03-12
-
Team calendar
- Next on Necko triage: Kershaw
-
Round Table
-
(greg) HTTPS upgrade tracking telemetry https://bugzilla.mozilla.org/show_bug.cgi?id=1883954
-
Yeah, looking at the bug I see that consolidating seems to break continuity in the existing probes. I think it's fair to keep them separate for now. I think we'll still be able to draw meaningful conclusions from separate sources
-
Any concerns if we leave it as is?
-
-
(vg) WebSocketStream · Issue 970 · mozillastandards-positions
-
Randell Jesup what do you think?
-
Randell to file for standards position, current assessment is negative as this functionality is best supported with WebTransport over H2
-
-
-
Active Projects roadmap
-
Active Projects: Fx124 rel Mar 19, Fx125 soft freeze Mar 14
-
OMT: Move OnStartRequest and OnStopRequest to the content process (paused, target: TBD)
-
new Project Plan
-
Split HTML5Parser OnStop - OMT Shipped in Fx122
-
Split CSSLoader OnStop - OMT to track in Fx126
- [Sunil] CSSLoader and telemetry probes merged
-
OnStart consumer
- – enter updates –
-
Optimize, Measure and add tests for Speculative Connections (in progress, target: Fx125)
- Beta experiment live, ends Mar 19, 2024
-
Native HTTPS RR Implementation (in progress, target Fx125)
-
1874464 - Turn on native HTTPS resolver on Nightly landed!
-
Currently disabled on OSX due to intermittent crashes in dns_res_send - see Bug 1882856 - Marionette crash in dns_res_send with network.dns.native_https_query on OSX
-
Platforms where it currently works: Windows 11, Linux, Android 10+
-
Platforms where it doesn’t work: OSX, Windows 10, Android 9 and lower
-
-
Should it ride the trains or stay in Nightly?
-
Will send intent to ship soon.
-
-
H3 Upload speed
-
-
Project Plan - Advancing neqo Library Performance and Developing a Robust Testing Framework
-
https://lookerstudio.google.com/reporting/4b5fbec3-2ead-40c1-864b-26490b85b6f5/page/p_7d9166xidd
-
Chrome Benchmark results https://lookerstudio.google.com/reporting/3dcd8af9-9d9d-4197-a326-58b54f73bb36
-
[kershaw]
-
Investigating running upload test with the my own worker
-
Asked some questions on #Taskcluster, but no response yet
-
-
-
-
3rd Party Cookie Deprecation (in progress, target TBD)
-
[Ed] cookie capping - cookie limit behaviour
-
still need browser community insight from https://github.com/privacycg/CHIPS/issues/74
-
Ben will handle when he gets back next week
-
-
cookie capping - session cookies
-
not clear on whether they need to be rejected/counted against the capacity
-
need to look into how we are currently counting cookie space and discuss with 3PCD team
-
-
Tests for setting cookie from http child-side not obvious
- Leander and I will be collaborating to get coverage here
-
Some code reviews happening as well
-
-
Fetch keepalive: target H1 2024 - Scheduled
-
WebTransport over H2: Targeting 2024 - Scheduled
-
Performance work: [jesup]
-
Preliminary results for Bug 1356686 - Do decompression off main thread in content
-
– enter updates –
-
-
-
Meeting 2024-03-05
-
Team calendar
- Next on Necko triage: Randell
-
Round Table
-
Thanks Dr. Marten Richter for implementing serverCertificateHashes correctly! (Bug 1873263)
-
[acreskey] FYI, Firefox for Android vs Chrome pageload results, live sites, Pixel 3
-
-
Active Projects roadmap
-
Active Projects: Fx124 rel Mar 19, Fx125 soft freeze Mar 14
-
OMT: Move OnStartRequest and OnStopRequest to the content process (paused, target: TBD)
-
new Project Plan
-
Split HTML5Parser OnStop - OMT Shipped in Fx122
-
Split CSSLoader OnStop - OMT to track in Fx125
-
OnStart consumer
-
Email sent to tnikkel
-
Lots of discussion of feasibility in OMT matrix channel
- OnDataStarting might not be practical unless we can sufficiently set up the transfer to allow OnDataAvailable to happen before OnStartRequest runs on MT.
-
-
Optimize, Measure and add tests for Speculative Connections (in progress, target: Fx125)
- Beta experiment live, ends Mar 19, 2024
-
Native HTTPS RR Implementation (in progress, target Fx125)
- 1874464 - Turn on native HTTPS resolver on Nightly currently on autoland. Hopefully it will stick this time.
-
H3 Upload speed
-
-
Project Plan - Advancing neqo Library Performance and Developing a Robust Testing Framework
-
https://lookerstudio.google.com/reporting/4b5fbec3-2ead-40c1-864b-26490b85b6f5/page/p_7d9166xidd
-
[kershaw]
-
Investigating how to use quinn-udp in gecko
-
Quinn-udp doesn’t provide polling, so we need to use libc::poll directly or use mio.
-
-
-
-
3rd Party Cookie Deprecation (in progress, target TBD)
-
[Ed] Clarifying question made to browser implementers of per-partition cookie cap here
-
Also work continues on implementation/test of cookie cap
-
-
Fetch keepalive: target H1 2024 - Scheduled
-
WebTransport over H2: Targeting 2024 - Scheduled
-
Performance work: [jesup]
-
Preliminary results for Bug 1356686 - Do decompression off main thread in content
-
Big wins on pageload, up to 30+% on ESPN; many 5-10% wins
-
Surprising that we get this big a win; investigating
-
-
-
Meeting 2024-02-27
-
Team calendar
- Next on Necko triage: Manuel
-
Round Table
-
Moving team discussions to matrix to encourage and support external contributors
-
Let's use more matrix instead of slack ourself?
-
Slack #quicdev -> Public #neqo:mozilla.org
-
Move to matrix
-
Close quicdev
-
-
Slack #necko-team -> Internal #necko-team:mozilla.org
-
-
-
(greg) Necko Bug Bash Day review bug stats 🎉
-
Total Bugs updated: 210
-
How could we improve by 10%?
-
Focus on another area next time
-
Rotate on areas, divide and have more overlap
- One person focus on one area, rest of team move on to next ones, increase parallelism
-
Try to fix some bugs together outside bash days (1-2hrs per week, with another team member)
-
-
Meta bug owners: Necko Meta Owners
-
(Sunil) What should be our plan going forward for driving our meta bugs?
-
Should we try to push 1-2 bugs into priority queue?
-
Discuss them in bug review and take appropriate action?
-
-
(greg) Meta Owner responsibilities?
-
Project meta
-
Maintenance
-
Promote priorities to queue
-
Clean up bugs and drive fixes
-
Raise larger issues/initiatives in roadmap planning
-
-
-
(manuel) Displaying ownership (meta bug assignee) in the necko-triage-helper
-
-
-
https://mozilla.social/@necko/ posts updates on our meeting notes.
-
[acreskey] FYI, thumbs up from Denis Jackson dns-prefetch for https
-
[jesup] Planning for possible ‘book club’ around “The Software Engineer’s Guidebook”
-
By Gergely Orosz, the author of The Pragmatic Engineer Newsletter and Building Mobile Apps at Scale
-
Perhaps in place of some Deciphering Necko sessions
-
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1805796 tracked in Fx124/125
-
[cam] https://www.amazon.com/Beyond-Code-Setting-Software-Engineer/dp/B0CV5YMJB1
-
-
Active Projects
-
Active Projects: Fx124 code freeze Feb 15th roadmap Fx123 rel Feb 20
-
OMT: Move OnStartRequest and OnStopRequest to the content process (paused, target: TBD)
-
new Project Plan
-
Split HTML5Parser OnStop - OMT Shipped in Fx122
- Release experiment ends next week
-
Split CSSLoader OnStop - OMT to track in Fx125
-
Debugging TSAN issue and testing updated changes.
-
[jesup] let’s push a perf try run
-
-
OnStart consumer
-
Jrmuziel positive on idea
-
Tnikkel responded, opening email conversation with him
-
-
Optimize, Measure and add tests for Speculative Connections (in progress, target: Fx125)
- Beta experiment live, ends Mar 19, 2024
-
Native HTTPS RR Implementation (in progress, target Fx125)
- Landed a bunch of fixes. Turning on again this week.
-
H3 Upload speed
-
-
Project Plan - Advancing neqo Library Performance and Developing a Robust Testing Framework
-
https://lookerstudio.google.com/reporting/4b5fbec3-2ead-40c1-864b-26490b85b6f5/page/p_7d9166xidd
-
[kershaw]
-
Bug 1881490 Avoid duplicate process_output calls
-
Small fix to save 0.2~0.5% CPU usage
-
[jesup] r+’d
-
-
Investigating the performance difference between chrome and firefox
-
Packet reordering issue
- Manuel will work on a patch to handle multiple ACKs at the same time
-
-
[jesup] issue with qlog cpu use at high bandwidths, even without qlog enabled
-
-
-
3rd Party Cookie Deprecation (in progress, target TBD)
-
[Ed]
-
WIP patch in progress for cookie capping
-
Will be reviewing this patch ASAP
-
-
-
Fetch keepalive: target H1 2024 - Scheduled
-
WebTransport over H2: Targeting 2024 - Scheduled
-
-
Meeting 2024-02-20
-
Team calendar
-
Next on Necko triage: Valentin
-
Bug bash day Friday Feb 23
-
IETF 16-22 March in Brisbane
-
-
Round Table
-
-
With Google(Shipping 123) doing it we can follow, add to future watch list, maybe 2025
-
Indicated we’d probably look at it in 2024 in https://bugzilla.mozilla.org/show_bug.cgi?id=1481298#c6
-
See also https://bugzilla.mozilla.org/show_bug.cgi?id=1481298
-
(greg) Bug 1880173 - Networking: Domain Lists have moved to graveyard
-
(greg) Bug 1880165 - Move Proxy bugs into new Core :: Networking: Proxy component
- In progress
-
(acreskey) non-comprehensive list of FOSDEM 2024 web perf talks of interest
-
Some other talks in here: Web Performance devroom - FOSDEM 2024
-
Firefox power profiling: a powerful visualization of web sustainability
-
(manuel) Another good FOSDEM 2024 talk: So You Think You Know Git (on fosdem.org)
-
(manuel) 103 Early Hints - preload (Shipped Fx123!)
-
(greg) Internet security and attacks stats from Cloudflare and privacytests.org
-
-
Active Projects
-
Active Projects: Fx124 code freeze Feb 15th roadmap Fx123 rel Feb 20
-
OMT: Move OnStartRequest and OnStopRequest to the content process (paused, target: TBD)
-
new Project Plan
-
Split HTML5Parser OnStop - OMT Shipped in Fx122
-
Release verification experiment running, ends march 5th
-
Early results seem at odds with beta experiment
- Not clear they’re significant
-
Normal glean telemetry shows the same wins we saw in nightly and beta
-
-
Split CSSLoader OnStop - OMT to track in Fx125
- [Sunil] WIll resume landing after code freeze.
-
OnStart consumer
- — enter updates —
-
Optimize, Measure and add tests for Speculative Connections (in progress, target: Fx125)
- [acreskey] Beta experiment w/ rel=preconnect starting today
-
Native HTTPS RR Implementation (in progress, target Fx125)
- — enter updates —
-
H3 Upload speed
-
-
Project Plan - Advancing neqo Library Performance and Developing a Robust Testing Framework
-
https://lookerstudio.google.com/reporting/4b5fbec3-2ead-40c1-864b-26490b85b6f5/page/p_7d9166xidd
-
[kershaw] (read only)
-
New neqo 0.7.1 released
-
Reduces CPU use at high bandwidth, should raise max bandwidth
-
-
-
-
3rd Party Cookie Deprecation (in progress, target TBD)
- — enter updates —
-
Fetch keepalive: target H1 2024 - Scheduled
-
WebTransport over H2: Targeting 2024 - Scheduled
-
-
Meeting 2024-02-13
-
[acreskey] If you’ve experienced Android problems under network change or poor networks, let me know or add to this bug. https://bugzilla.mozilla.org/show_bug.cgi?id=1879387 So far the biggest issue seems to be that “Pull to refresh” is disabled again in Firefox for Android
-
[acreskey] FYI, Performance Team has an OKR about full pageload performance benchmark that runs the entire network stack
-
(greg) Networking components have been updated: FTP removed, Proxy added.
-
H3 upload speed
-
[kershaw]
-
Firefox v.s. Chrome result
-
Only preliminary results. Will redo on another machine to see if the result is reproducible.
-
Observed packet loss on loopback interface when there is no traffic shaper enabled.
-
-
-
-
Zstandard [jesup] :
-
Chrome just sent Intent To Ship
-
Ready for ticket
-
Initial code to support a sandboxed utility process written
-
Unbitrotted OMT decompression for all decompression types patch (Bug 1356686)
- Orange on mochitests on Try, debugging (all pass locally)
-
-
[valentin] jschanck: Hi all, I plan to enable the X25519+Kyber768 key agreement mechanism for TLS 1.3 over TCP on the desktop Nightly channel on Monday. This is the first step in our migration to post-quantum cryptography, and I think it's (very!) important. However, we may see some negative performance impact on the tails due to Kyber's large public keys (1184 bytes sent by the client) and ciphertexts (1088 bytes sent by the server). Please reach out if you hear any reports of breakage or performance issues. The mechanism can be disabled by setting security.tls.enable_kyber to false. (dev-platform, Bug 1878725)
-
[valentin] Bug 1824218 - Captive portal login tab does not get closed automatically
- I happened to look through this report (even though I don’t have a lot of experience with the UI parts of captive-portal). I think this patch should reduce the number of reports from users who’s windows don’t close because of the race.
Meeting 2024-02-06
-
Manuel Bucher gave a talk at FOSDEM this weekend “Debugging HTTP/3 upload speed in Firefox”. Recording should be available soon: https://video.fosdem.org/2024/h1302/
-
We’ve had to backout 1603699 - Enable DefaultURI use for unknown schemes due to breaking some protocol handlers.
-
Some older websites use a protocol format that don’t conform to the URL standard (example: https://en.wikipedia.org/wiki/Ed2k_URI_scheme#File_link_format )
-
We will try to enable this feature again, but add an allow list for known schemes that are broken.
-
-
Contributor Max Inden has been making some great contributions to neqo lately.
Meeting 2024-01-30
-
Valentin: Following discussions in the previous meetings we decided we want to start publishing public meeting notes again, to increase visibility of the team’s achievements.
-
The team’s meeting document will include a Public section. Add all of your updates there.
-
After the meeting one team member will upload this section to https://github.com/mozilla-necko/meeting-notes/
-
I’ve built a simple web-extension to upload clipboard contents to github.
-
Copy the contents of this section to the clipboard
-
Click webextension to upload to github
-
(optional) Update file title and contents.
-
DEMO
-
-
-
Valentin: 1874137 - (necko-pref-flips) meta Tracking bug for necko pref flips
-
We sometimes land fixed/features preffed-off and forget to turn them back on
-
We should start tracking these prefs and make sure to enable them as soon as possible to avoid issues. I’ve created a confluence page to define a process for tracking such prefs.
-
Could use timer additionally: Reminder Functionality in Bugzilla (via Autonag Bot), Example usage: https://bugzilla.mozilla.org/show_bug.cgi?id=1841061
-
-
Manuel: 103 Early Hints preload (riding the trains, target: Fx123)
-
Sent out Intent to ship
-
Bug 1875268 - Fixed critical bug – uplifted to beta Fx123
-
Make sure added to release notes, mention to #web-performance-slack
-
-
Bug 1868987 comment 20 HTTP/2 upload canceled due to ping timeout
-
Same problem as 12 years ago: Bug 790184 comment 11 and following. Workaround turned into the HTTP/2 upload problem we fixed last year.
-
Need help to figure out exactly what we want to do to handle
-
-
Fosdem in Feb 3-4 https://fosdem.org/2024/
- Manuel is speaking in the Mozilla devroom Sunday 14:50: Debugging HTTP/3 Upload speed in Firefox 🎉
Meeting 2020-08-19
Round table:
- Bug 1659040 firefox dev edition not able to access internet intermittently
Next on triage duty:
Valentin
[in review]
Bug 1659132 - Make AddrInfo immutable
Bug 1645108 - Parse additional section of TRR response
[working on]
Bug 1525854 - TRR shouldn't fallback to DNS on DNSSEC error (extended error support)
Bug 1658277 - Record telemetry for the time between TRR mode change events.
Bug 1658278 - Figure out better confirmation process for TRR
Bug 1656884 - Issue parallel AAAA/A and SVCB queries for the name
Meeting 2020-08-13
Round table:
Next on triage duty: Dragana
Valentin
1651672 | Clear and remove DataStorageClass::TRRBlacklist
1656862 | Improve TRR_SKIP_REASON telemetry
1657582 | Merge asyncResolveByType and asyncResolveWithTRRServer into asyncResolve
1657897 | Convert TRR split horizon mitigations to a doh-rollout heuristic
Meeting 2020-08-06
Round table:
- Honza: 1564034 - Confusing error message is displayed when a webpage can't be loaded
- who in mozilla is responsible for updating error pages with respect to UX?
Next on triage duty: Kershaw
mayhemer
- analyzing rel=preload regressions found by Andrew (time consuming)
- assigned to emilio 1657173 - [rel=preload] stylesheets that are only preloaded with must not block document's onload
- still needs more care, but deprioritized now: 1609410 - 421 response code from
icloud.com
not handled well with a proxy, NTLM involved - diagnosed 1655567 - Not gracefully erroring an h2 stream with more summed data from DATA frames than announced by content-length
- next 1654585 - 1.92 - 2.33% Explicit Memory / Resident Memory (windows10-64-shippable-qr) regression (Mon July 20 2020)
- likely caused by my cookie console warning patch
- logan added a small feature: clicking the new wallclock icon (icons appearing on the left when hovering a line) will set that line as 0-time and show a relative time on all other lines in ms. useful for perf diagnoses
- triage
Dragana
Bug 1655843 Call ProcessPendingQueue when a Http3 connection changes to state CONNECTED
Bug 1655782 Turn on the QPACK dynamic table
bug 1656870 - Crash in [@ neqo_http3::recv_message::RecvMessage::receive_internal]
PR 899 - We were entering same stream multiple time into the block streams list
PR 898 Send Qpack's StreamCancelled instruction
Server-side tests in network simulator:
PR 886 Set granularity of the server timer to 1ms
PR 888 Write datagrams into socket immediately
PR 906 In neqo-http3-server we should read from the sockets more often
Working on:
PR for issue 895: Add more tests with simulated network conditions
PR for issue 896: Have a way to measure throughput for the net simulation tests
Junior
- This week
- Bug 1647950 - Intermittent ASSERTION: Did not receive all required callbacks!: 'NS_FAILED(mResult) || mExpectedCallbacks == 0', file /netwerk/base/nsAsyncRedirectVerifyHelper.cpp | assertion count 1 is more than expected 0 assertions
- Bug 1655566 - HTTP3 probes in cpp side to detect regressions
- time to reuse of idle connection
- delay from HTTP3 timers
- blocked by stream limits
- blocked by flow control as a sender
- Bug 1655636 - avoid reinitializing the timers in HTTP3
- Bug 1655895 - bogus timeout passed to Http3Session::SetupTimer
- Next week
Tania
Worked on docs.
Added more benches.
Experimented with making serialization faster.
Made minor changes in wrapper.
Kershaw
Landed:
- Bug 1650773 - [socket process] improve sending data directly to child processes
- Bug 1600129 - [socket process] Send ODA data to HttpTransactionParent in chunks
- Reland websocket patches
Ongoing:
- Bug 1652655 - Using HTTPSSVC as an AltSvc
- Bug 1652668 - Create a domain exclusion list for SvcDomainName that have failed
- Bug 1652670 - Add
echconfig
and A/AAAA DNS record to nsHttpConnectionInfo
Michal
- 1656128 Remove probe NETWORK_PAC_URL_SCHEME in Firefox 82
- QNS: Server test failures (DC,M)
- neqo vs TCP testing
- Enable http3 xpcshell test on Asan/Tsan
Valentin
Bug 1652106 - Address httpsvc draft changes [landed]
Bug 1656862 - Improve TRR_SKIP_REASON telemetry [landed]
Doing some more investigations about weird probe data Bug 1657582 - Merge asyncResolveByType and asyncResolveWithTRRServer into asyncResolve
Andy
Neqo (6, 48, 62)(+2, +0, +4):
- [merged] qlog: Fix packet length calculation 900
- [merged] Add APIs to get odcid to Connection and Http3Client 890
- [merged] client: Fix client for http3 889
- [in-review] Don't cleanup bidi recv stream until send stream is done 871
- [needs-revisions] Fix panic on QNS when using 0.9 server 877
- Diagnosed issue against Cloudflare server 614 which they fixed
- 0.4.9 tagged and autolanded
- [done] Rename master branch to main 845
Next:
- Fix or explain all QNS issues
- Make suggested changes to Add network.http.http3.qlog_dir pref to Firefox
Meeting 2020-07-30
Round table:
Next on triage duty: Honza
Andy
Neqo (4, 48, 58)(-1, +0, +3):
- [merged] Use indexmap instead of HashMap for send streams 874
- [merged] Do not report blocked to peer until credits run out 872
- [merged] Do not disable PTO when packets outstanding == 0 for initial/handshake 864
- [merged] Add qlog::connection_state_updated 859
- [in-review] Don't cleanup bidi recv stream until send stream is done 871
- [in-review] Fix some congestion control bugs and improve cwnd qlogging 878
- quic-network-simulator: More info for packet disposition for drop/corrupt scenarios 76
- quic-interop-runner: Give more info about end time and estimated next end time 121
- [Aug 1] Rename master branch to main 845
Next:
- Complete my tasks for Neqo Milestone 1 and 1.5, esp. 799
- Make suggested changes to Add network.http.http3.qlog_dir pref to Firefox
Tania
Fixing issues in wrapper
Adding benchmarks for the crate
Michal
- triage
- netsim for CI
- QNS: Server test failures (DC, B)
Kershaw
Ongoing:
- Bug 1652655 - Using HTTPSSVC as an AltSvc Working on creating a test.
Meeting 2020-07-23
Round table:
Next on triage duty: Michal
Kershaw
Landed:
- Bug 1652762 - Intermittent SUMMARY: ThreadSanitizer: data race /builds/worker/checkouts/gecko/netwerk/dns/TRRServiceBase.cpp:71:22 in CheckURIPrefs
Ongoing:
- Bug 1652655 - Using HTTPSSVC as an AltSvc
- Bug 1497249 - [socket-proc] Connection stickiness handling for upgrade observers
- Bug 1654282 - websocket fails to connect
- Bug 1653642 - Crash in [@ mozilla::net::CallOnStop::~CallOnStop]
Tania
Made minor changes to both crate and bindings
Added more tests
Wrote documentation
Andy
Triage
Neqo (5, 48, 58)(+2, +2, +4):
- [in-progress] QNS/client: Fix issues with handshakecorruption (C1) and handshakeloss (L1) tests 799
- [in-progress] QNS: handshakeloss (L1) failure with aioquic 841
- In working on aioquic issues, discovered we are not counting PTO packets as congestion control bytes-in-flight and other issues, causing Neqo to not match the spec. Now fixed, but work remains to pass handshake tests with aioquic.
- [in-review] Do not allow initial packet to exceed cwnd in persistent congestion 829
- Adding Neqo in server role in QNS has caused an increase in reported issues from other implementers -- opened 846 and 847
DoH:
- Issue with my WiFI AP's DNS not handling doh.test turned out to be nothing.
Next:
- Complete my tasks for Neqo Milestone 1 and 1.5, esp. 799
- Make suggested changes to Add network.http.http3.qlog_dir pref to Firefox
mayhemer
- [postponed] 1554652 - Implement asynchronous opening of alternative output stream
- [landed] 1605895
- [landed] 1596741 - Emit warning to console when rejecting to set cookie (from cross-site/foreign domain)
- [landing soon] 1654556 - Log also "failed the samesite tests" cookie rejection reason.
- [landing soon] 1609410 - 421 response code from
icloud.com
not handled well with a proxy - [pending r?] 1649813 - Test that browser.dns APIs don't work when the proxy should be handling DNS
- [landed] 1628713 - Add
Tokenizer::CheckPhrase
to quickly check for compound strings - [in prog] 1652898 - The stream transport service's thread pool keeps starting and stopping threads during downloads
- [landed] 1652300 - ThreadSanitizer: data race [@ mozilla::net::CacheEntry::InvokeAvailableCallback] vs. [@ mozilla::net::CacheEntry::OnHandleClosed]
- r?, ni?
Michal
- Bug 1650363 Performance testing of HTTP3 in Firefox using only xpcshell tests
- Bug 1646025 Add a test for 421 response
- QNS: Server test failures (DC, B)
Junior
- This week
- Next week
- QUIC telemetry
Dragana
ECH: proposal for the API between necko and nss(psm)
HTTP3:
- Meeting about Network Throttling for performance testing
- Looking to define what we need to test before a study in Nightly
- Defining fro performance test
- Define HTTP3 telemetry that we want to collect
Meeting 2020-07-16
Round table:
- osclientcerts
Next on triage duty: Andy
Dragana
HTTP3:
Bug 1652573 - Neqo 0.4.8 in mozilla-central
Bug 1652104 - Telemetry about HTTP3 usage
Bug 1651814 - Do not use Http3 if be-conservative flag is set
Bug 1650992 - http3 POST request never gets an answer
DoH:
Looking at TRR fraction (does not look that bad on Nightly and Beta)
planning to look at TRR fraction on release and at TRR_SKIP_REASON_TRR_FIRST probe
ECH/HTTPSSVC(HTTPS DNS record)
Revise the project plan and open bugs
mayhemer
- landed 1651661 -
HttpChannelChild::Redirect3Complete
doesn't call the channel listener on failure - fixed 1649813 - Test that browser.dns APIs don't work when the proxy should be handling DNS
- landed 1651068 - Include
Task
fromTaskController
in MOZ_LOG=events - landed 1650613 - about:cache shows error message: Unrecognized storage name 'appcache' in about:cache URL
- r? 1596741 - Emit warning to console when rejecting to set cookie (from cross-site/foreign domain)
- r? 1649320 - null pointer passed as argument 2, which is declared to never be null in netwerk/cache/nsCacheMetaData.cpp
- ongoing 1554652 - Implement asynchronous opening of alternative output stream
- investigating preload regressions mainly on cnn
- waiting for more results from acreskey
- still investigating 1605895
- investigating 1641696 - Firefox takes 50% more time than Microsoft Edge to display first paint of comments in reddit posts
- investigating 1652083 - Slower than expected load of cnn.com
- seems like proxy resolution (the thread) is hogged
- not related to preload
- few more I didn't make note of
- r?, ni?
Kershaw
Landed:
- Bug 1497249 - [socket-proc] Connection stickiness handling for upgrade observers
- Bug 1646358 - [socket process] Fix test failures regarding devtool tests
Ongoing:
- Wrap up socket process project in this doc.
- Bug 1650773 - [socket process] improve sending data directly to child processes
- Bug 1600129 - [socket process] Send ODA data to HttpTransactionParent in chunks
- Bug 1648996 - [socket process] devtools/client/netmonitor/test/browser_net_truncate-post-data.js failed with socket process enabled
- Bug 1648515 - AddressSanitizer: heap-use-after-free /builds/worker/checkouts/gecko/dom/fetch/Fetch.cpp:600:9 in mozilla::dom::MainThreadFetchResolver::OnResponseAvailableInternal(mozilla::dom::InternalResponse*)
- Bug 1652762 - Intermittent SUMMARY: ThreadSanitizer: data race /builds/worker/checkouts/gecko/netwerk/dns/TRRServiceBase.cpp:71:22 in CheckURIPrefs
Junior
- [land] Bug 1596904 - Intermittent TEST-UNEXPECTED-TIMEOUT | toolkit/components/extensions/test/xpcshell/test_ext_webRequest_filterResponseData.js | Test timed out
- [land] Bug 1647954 - Intermittent toolkit/components/extensions/test/xpcshell/test_ext_webRequest_filterResponseData.js | test_alternate_cached_data - [test_alternate_cached_data : 392] message queue is empty - "[\"onHeadersReceived\"]" == "[]" After xpcshell return code: 0
- Bug 1633342 - [meta] Crash in [mozilla::net::nsHttpConnectionMgr::Shutdown] and other net related places. Shutdown hang.
- Bug 1651973 - 3.57 - 15.01% raptor-tp6-slides-firefox-cold / raptor-tp6-slides-firefox-cold loadtime (windows10-64-shippable-qr) regression on push d59f0a83a7e9ec6fda8f7327f3154d67b266ec65 (Wed July 8 2020)
Tania
Worked on minor changes to structured headers crate
Finished writing tests for xpidl bindings
Andy
Neqo (3, 46, 54)(-1,-5,+5):
- [merged] Large transport bufs follow-on PR 810
- [merged] QNS H/3 & H/0.9 server tests 808 815
- [in-progress] QNS/client: Fix issues with handshakecorruption (C1) and handshakeloss (L1) tests 799
- Reviewed/merged mt's 822 to keep PTO active after Initial keys dropped
- 2 servers went green but 2 others still remaining as failing
DoH:
- Investigating if my Wifi AP's DNS forwarder is blocking doh.test
Next:
- Complete my tasks for Neqo Milestone 1 and 1.5, esp. 799
- Revise "OS based DoH" doc.
- Make suggested changes to Add network.http.http3.qlog_dir pref to Firefox
Michal
- 1621345 Support for nsIWebSocketEventListener.send() API
- 1645051 Calculated smart max cache size shouldn't overwrite browser.cache.disk.capacity pref
- 1646024 The Http3 timer sometimes fires too early
- Issue 819 QNS: server data-send tests failing
Meeting 2020-07-09
Round table:
- bug 1648635 - channel.setResponseHeader
- Sending ODA from socket process to child process directly will break RCWN.
Next on triage duty: Junior
Kershaw
Landed:
- Bug 1647759 - Intermittent SUMMARY: ThreadSanitizer: data race /builds/worker/checkouts/gecko/netwerk/base/nsIOService.cpp:1280:16 in mozilla::net::nsIOService::SetOffline(bool)
- Bug 1527256 - [socket process] make about:networking work
- Bug 1644834 - about:memory tests fail on my machines (macOS Catalina, Ubuntu 18.04)
Ongoing:
- Bug 1650773 - [socket process] improve sending data directly to child processes
- Bug 1648996 - [socket process] devtools/client/netmonitor/test/browser_net_truncate-post-data.js failed with socket process enabled
Tania
Writing tests for xpidl bindings
mayhemer
- progressing on 1596741 - Emit warning to console when rejecting to set cookie (from cross-site/foreign domain)
- progressing on one sec bug
- progressing on 1554652 - Implement asynchronous opening of alternative output stream rebase + try push
- progressing on 1651068 - Include
Task
fromTaskController
in MOZ_LOG=events to diagnose 1641696 - Firefox takes 50% more time than Microsoft Edge to display first paint of comments in reddit posts - progressed and then given away 1605305 - Origin header field is not set to HTTP request in cases where it is required
preload: acreskey found regressions on cnn and booking.com via testing, will look at them soon.
Junior
- Landed
- Bug 1646592 - Sending endpoint of stream filter should not block main thread IPC
- Bug 1645901 - Send necessary cookie through pBackground before OnStartRequest
- Bug 1649965 - only waiting for main thread OnStartRequestSent for document load
- Bug 1647978 - Intermittent toolkit/components/extensions/test/xpcshell/test_ext_webRequest_filterResponseData.js | test_filter_content_fetch - [test_filter_content_fetch : 311] Expected response for http://example.com/redirect?redirect_uri=http://example.net/dummy -
- Next
Michal
- extending QNS interop runner
- neqo testing
Dragana
neqo:
Server Push landed
PR 800 - Document errors for neqo-transport::Connection::stream_recv
PR 801 - Add better handling of transport errors in send_request_body function
PR 802 - Fix error handling in read_response_data
PR 803 - Handle properly errors from set_resumption_token
PR 805 - Faster fetch
Bug 1651489 - update neqo to 0.4.6
Looking at DoH telemetry
Andy
Neqo (4, 51, 54)(+1,-1,+1):
- Large transport bufs PR 806
- [in-progress] QNS: neqo-server transfer test case
- [in-progress] QNS/client: Fix issues with handshakecorruption (C1) and handshakeloss (L1) tests
- [merged] qlog: Refactor
- Neqo 0.4.6
DoH:
- Wrote a draft doc "Response Options for ISP Blocking of Global Canary"
Next:
- Complete my tasks for Neqo Milestone 1
- Revise the above doc, and the "OS based DoH" doc.
- Make suggested changes to Add network.http.http3.qlog_dir pref to Firefox
Meeting 2020-07-02
Round table:
Next on triage duty: Dragana
Valentin
[landed]
1618271 - DNS leaks about browser.dns
API
1641222 - Follow CNAME/AliasForm chains
1649401 - Minor TRR code cleanup
1649417 - Don't follow CNAME chains when not necessary
[working on]
1649127 - Make sure we only set AddrHostRecord::mTRRUsed = true when we actually send the request
1649143 - Record telemetry with reason we fell back to Do53
[triage]
PTO for 3 weeks - still working 20% with Tania and urgent issues.
Tania
Continue working on xpidl bindings for structured-headers
Junior
- Land
- Bug 1633935 - Allow sending onStartRequest via pHttpBackgroundChannel
- Bug 1648035 - Intermittent Assertion failure: mChannelChild (no channel child in RecvOnStatus), at /builds/worker/checkouts/gecko/netwerk/protocol/http/HttpBackgroundChannelChild.cpp:160
- Bug 1648712 - Intermittent dom/base/test/chrome/test_bug884693.xhtml | Got expected message count - got 1, expected +0
- Bug 1578230 - Crash [@ mozilla::net::SpdyConnectTransaction::MapStreamToHttpConnection] with HTTP2 Proxy
- dup -Bug 1647096 - GeckoProfiler.Markers gtest crashes after changing tests to use socket process
- Ongoing
- Bug 1649848 - [meta] make test_ext_webRequest_filterResponseData.js stable
- other regressions
- cookie and permission via pBg
mayhemer
- investigated 1567863 - Firefox startup slow - window loads quickly, but first network call delayed, works normal after that
- lot of ~8 seconds delays here and there (I/O, script execution blocking main thread)
- took over and tuning 1605305 - Origin header field is not set to HTTP request in cases where it is required
- some tests need care
- investigating two sec bugs
- fixed and waiting for field test 1609410 - 421 response code from icloud.com not handled well with a proxy
- fixed 1615121 - Intermittent GECKO(1119) | SUMMARY: ThreadSanitizer: data race /builds/worker/workspace/build/src/netwerk/cache2/CacheEntry.cpp:1436:33 in mozilla::net::CacheEntry::MetaDataReady()
- fixed 1632215 - Intermittent SUMMARY: ThreadSanitizer: data race /builds/worker/checkouts/gecko/netwerk/protocol/http/nsHttpChannel.cpp:8439:7 in mozilla::net::nsHttpChannel::OnDataAvailable(nsIRequest*, nsIInputStream*, unsigned long, unsigned int)
- fixed 1649003 - Log JS stack on more places in nsHttpChannel and Child
- fixed 1648781 - Log timer events
- fixed 1642602 - Some disk cache values in about:cache are incorrect.
- duplicated 1560090 - High refresh rate monitor (>200Hz) slows performance
- an idle dispatch (with 250ms timeout) on the critical path for all resource loads when filtering extensions are involved
- blog post about preload
- preload for workers (fetch/xhr) seems not be a priority
- plan for better network markers in "Waiting for socket thread" span
- don't expect anything soonish
- ni, r
Andy
Neqo (3, 52, 53)(-3,+3,-4):
- [merged] Implement more qlog traces: CC and Recovery state
- [merged] client: Make H9 code read all available data on RecvStreamReadable
- [in-review] Add network.http.http3.qlog_dir pref to Firefox
- [approved] qlog: Refactor
- [approved] qlog: more-unique filenames
- QUIC planning mtg: Realization of the scope of work for testing needed for rollout. Prioritization of work vs other projects like Fission. Contacts and coordination with QA. Introduction of Milestone 1.5. Followup mtg early next week.
DoH:
- Wrote a draft doc to start talking about how to interact with OSes rolling out DoH support
Next:
- Write a policy options doc for dealing with ISPs who block canary
- Fix Neqo interop issues
- Confirm DoH canary abuse and take follow-up actions
Kershaw
Landed:
- Bug 1648189 - [socket process] Perma Assertion failure: tqParent, at /builds/worker/checkouts/gecko/netwerk/protocol/http/HttpTransactionParent.cpp:173
- Bug 1650068 - [socket process] reenable profiler tests
- Bug 1648008 - Unable to connect to Google first time using it through DuckDuckGo bang after clearing all history
Ongoing:
- Bug 1527256 - [socket process] make about:networking work
- Bug 1646358 - [socket process] Fix test failures regarding devtool tests
- Bug 1648996 - [socket process] devtools/client/netmonitor/test/browser_net_truncate-post-data.js failed with socket process enabled
Michal
- 1627910 Enable test netwerk/test/unit/test_http3
- 1649410 [socket-process] test_version_fallback() in netwerk/test/unit/test_http3.js fails
- neqo testing
Dragana
Finishing up PUSH for neqo,
Looking into how errors are propagated in necko: there are 3(4) layers and looking which layer should handle which error.
Looking at goodput and crosstraffic test result -> flow control need to be improved.
PR 769 Small changes
PR 770 Small fix 2
Bug 1642559 SPDY_REQUEST_PER_CONN_2 looks broken
Bug 1595269 HTTP/2.0 still displayed even if HTTP/3.0 is used
1648553 Sometimes page loads start hanging in all tabs with http3
Meeting 2020-06-11
Round table:
Next on triage duty: Valentin
mayhemer
READONLY (can't attend for personal reasons)
- 1648471 - [rel=preload] Enable fully on Beta 79 we don't have a macro for that
- landed 1631327 - Crash in [@ IPCError-browser | RecvPredLearn]
- landed 1487101 - CacheStorageService::PurgeOverMemoryLimit() doesn't work correctly under specific circumstances
- landed 1603542 - [rel=preload] Log a warning when preloaded resources are not used
- landed 1638925 - Extend events MOZ_LOG module, includes IPC, DOM promises, message queue, logan updated too, I will intro some other time
- moved on a bit with 1605895
- reduced my ni? queue greatly!
- next 1639914 - SEC_ERROR_OCSP_SERVER_ERROR with most https websites when security.OCSP.require is set to true and a https .pac file is used
- next 1632215 - Intermittent SUMMARY: ThreadSanitizer: data race /builds/worker/checkouts/gecko/netwerk/protocol/http/nsHttpChannel.cpp:8439:7 in mozilla::net::nsHttpChannel::OnDataAvailable(nsIRequest*, nsIInputStream*, unsigned long, unsigned int)
- next 1560090 - High refresh rate monitor (>200Hz) slows performance
Michal
readonly
- triage
- 1643866 Firefox fails to resolve specific domain: NS_ERROR_UNKNOWN_HOST
- 1645797 PR_CONNECT_RESET_ERROR when connecting to belastingdienst.nl
- 1644374 Assertion *countWritten > 0 in nsHttpTransaction::WritePipeSegment
- PR750 neqo-qns
- PR755 QNS qlog
- PR768 neqo-client: fix QNS compliance check
- PR765 - fix zerortt QNS test
- 1627910 Enable test netwerk/test/unit/test_http3
Kershaw
Landed:
- Bug 1644239 - Crash in [@ mozilla::net::Http2Session::RecvPushPromise]
- Bug 1644834 - about:memory tests fail on my machines (macOS Catalina, Ubuntu 18.04)
- Bug 1643515 - Crash in [@ mozilla::net::HttpTransactionParent::DoNotifyListener]
- Bug 1640612 - socket process gets killed due to sandboxing
Ongoing:
- triage
- Bug 1646358 - [socket process] Fix test failures regarding devtool tests
- Bug 1647096 - GeckoProfiler.Markers gtest crashes after changing tests to use socket process
- Bug 1646689 - 2.01 - 4.86% raptor-tp6m-allrecipes-geckoview-cold loadtime / raptor-tp6m-cnn-geckoview-cold confidence (android-hw-g5-7-0-arm7-api-16-shippable) regression on push 567513cee4895872b1e7fb53fbd2793593d11f97 (Fri June 5 2020)
- Bug 1648189 - [socket process] Perma Assertion failure: tqParent, at /builds/worker/checkouts/gecko/netwerk/protocol/http/HttpTransactionParent.cpp:173
Tania
Implemented headers serializer
Added specification tests from https://github.com/httpwg/structured-field-tests
Working on XPIDL bindings for structured-headers crate
Junior
- Landed
- Next
- Bug 1645901 - Send necessary cookie through pBackground before OnStartRequest
- Bug 1646592 - Sending endpoint of stream filter should not block main thread IPC
- Bug 1648035 - Intermittent Assertion failure: mChannelChild (no channel child in RecvOnStatus), at /builds/worker/checkouts/gecko/netwerk/protocol/http/HttpBackgroundChannelChild.cpp:160
- Bug 1578230 - Crash [@ mozilla::net::SpdyConnectTransaction::MapStreamToHttpConnection] with HTTP2 Proxy
Valentin
Bug 1647638 Add nsStandardURL assertions
Bug 1618271 - DNS leaks about browser.dns
API
TRR documentation
rust-url fixes
DNS code refactoring
Andy
Neqo (6,49,57)(+0,+3,+1):
- Neqo 0.4.4 tagged and merged into m-c.
- PR 754 Properly handle receipt of StreamDataBlocked frame
- PR 746 Avoid borrowing FlowMgr twice when handling lost MaxStreamData token
- [in-review] PR 752 Implement more qlog traces: CC and Recovery state
- WIP: Add network.http.http3.qlog_dir pref to Firefox. Works, but needs as-yet-untagged Neqo changes before can be posted for review
- WIP: Set Qlog dir via about:networking (depends on above)
- PR Reviews
- Tried to get QNS Docker image autobuilding from GitHub commit without success. Some sort of permissions issue? Maybe moving neqo repo to mozilla-necko org would make easier.
Next:
- Fix Neqo issues
- Confirm DoH canary abuse and take follow-up actions
Dragana
Doc about HTTP3 Performance study
Requirements for turning Http3 in Nightly (a doc)
Looking on Http3 bugs in Firefox
Add support for draft28 and draft29 in m.-c.
PR 766 - Write the header block's prefix properly
Bug 1646318 - test_post and test_patch in netwerk/test/unit/test_http3.js time out
Meeting 2020-06-04
Round table:
Next on triage duty: Honza
Andy
Neqo (8, 39, 55)(+3,+0,+1):
- Neqo 0.4.0 tagged and merged into m-c
- Worked on draft 28 support while still keeping draft 27 support (#686) 27 needed for deployed QUIC sites (FB, Google, CF) with FF but interop/testing (e.g. QNS) quickly moved to 28
- merged: Persistent congestion interval start time
- PR Reviews
- News: Virtual interop June 10. Draft 29 in the works, may be the final draft release
PTO
Next:
- Finish draft 28 and dual-version PR
- Plan for another quick Neqo tag and m-c merge
Valentin
[landed]
Bug 1631748 - Fix COOP expected fails
Bug 1637512 - Loss of network connections when IPv6 and DoH enabled
Bug 1640867 - Record TRR steering telemetry separately
Bug 1641901 - MOZ_RELEASE_ASSERT(is
Bug 1642318 - network.http.sanitize-headers-in-logs should be RelaxedAtomicBool
Bug 1643264 - Failed ResolveWithTRR requests should not be retried to get the TTL
[in review]
Bug 1636888 - Allow specifying entire rust modules in MOZ_LOG
[working on]
Bug 1640724 - Intermittent netwerk/test/unit/test_trr_case_sensitivity.js
Bug 1640091 - dnsResolve() failure in Proxy Auto-Configuration (PAC)
Kershaw
Landed:
- Bug 1641496 - [socket process] Investigate disabled xpcshell tests
- Bug 1524035 - Assertions in socket process do not output a stack trace
Ongoing:
- Bug 1640612 - socket process gets killed due to sandboxing
- Bug 1640105 - [socket process] Run mochitest with networking over socket process enabled
- Bug 1643382 - [socket process] make sure we don't leak HttpBackgroundChannelChild and BackgroundDataBridgeChild
- Bug 1642193 - 3 /xhr/ web-platform tests are expected TIMEOUT
Tania
Working on tests for structured-headers.
Michal
- 1621345 Support for nsIWebSocketEventListener.send() API
- FTP PAC telemetry data from release
- Neqo PR682 - neqo-client: fix multiplexing test
- 1635935 HTTP/2 issue when toggling VPN state
- 1569715 CORS preflight requests are cached when 'Disable cache' is checked
- Issue 676 - neqo-server: implement "transfer" test case
Dragana
PR 677 - Server Push: client side only
Reviewing quic docs and looking what is missing in http3 and qpack part
Meeting 2020-05-28
Round table:
Next on triage duty: Dragana
mayhemer
- preload:
- enabled by default on Nightly (and rides to Early Beta only)
- investigating a perf regressions: 1641532 - 2.9 - 17.82% raptor-tp6- (linux64, macosx1014-64-shippable, windows10) regression on push 2bccc3e80006f2ad27060453135b19fac2d43460 (Tue May 26 2020)
- reviews and ni?
Valentin
[landed]
Bug 1611990 - Rust log messages of less than WARN level are optimized out #645
Bug 1635566 - logincdn.msauth.net fails to resolve if network.trr.mode=3
Bug 1636891 - Move logging specifics from toolkit/library/rust/shared/lib.rs to the gecko_logger crate
Bug 1640872 - Add more TRR logging
Bug 1640879 - Fix COEP data.http.html test
[working on]
Bug 1641222 - Follow CNAME/AliasForm chains
Bug 1616252 - Maybe add a /etc/hosts parser
Bug 1636888 - Allow specifying entire rust modules in MOZ_LOG
Bug 1627800 - 404 http error isn't displayed in Firefox
Bug 1629862 - Improve error messages for COEP failures
Dragana
Working on improving neqo-http3 code and implementing ServerPush:
- Done: PR 657 - Use separate send_message/recv_message instead of transactions
- One more small refactor and ServerPush PRs almost ready
Working on HTTP3/QUIC telemetry doc
PR 669 - Drop packets with unknown versions
neqo reviews
Open some Http3 spec issues
Michal
- [landed] 1637947 network ID: link status isn't updated in NetlinkService::OnAddrMessage()
- [landed] Neqo PR667 - Add test chacha20
- [landed] Neqo PR663 - Add retry, resumption and zerortt tests
- Issue 674 - Handle Error::StreamLimitError returned from Connection::stream_create
- Issue 676 - neqo-server: implement "transfer" test case
- 1621345 Support for nsIWebSocketEventListener.send() API
- FTP PAC telemetry data from release
Tania
Continue working on structured http headers parser
Kershaw
Landed:
- Bug 1629457 - Intermittent netwerk/test/unit/test_trr.js | application crashed [@ __thiscall InitHash::InitHash + 0x12d3] | TRRServiceChannel using nsWeakReference OffMainThread
- Bug 1546358 - [socket process] cache storage service is used in Http2Session
- Bug 1602832 - [socket process] Enable xpcshell tests for socket process
- Bug 1641427 - startup Crash in [@ mozilla::SandboxBroker::LaunchApp]
Ongoing:
- Bug 1637648 - [socket process] Forward observer notifications in nsHttpHandler to socket process
- Bug 1641496 - [socket process] Investigate disabled xpcshell tests
- Bug 1640612 - socket process gets killed due to sandboxing
- Bug 1640105 - [socket process] Run mochitest with networking over socket process enabled
- Bug 1524035 - Assertions in socket process do not output a stack trace
- Bug 1638387 - nsOSXSystemProxySettings::Init() is failed in socket process when sandbox is enabled
Junior
Bug 1633935 - Allow sending onStartRequest via pHttpBackgroundChannel
- all r+, fixing oranges - cross-process redirection/onStart before permission received/graphic async test/socket process/...
[landed] Bug 1638172 - avoid name hiding for handling multipart channel in HttpChannelChild
[landed] Bug 1638313 - Cross-Origin request blocked is not visible in Network panel
Meeting 2020-05-21
Round table:
- [mayhemer]: 1628262 - any thoughts about how to move the crash investigation?
- Implement asynchronous opening of alternative output stream
- [grover]: 1636109 - 76.0 doesn't always resend the POST request body after Kerberos authentication
- Odd results testing ./mach browsertime with fission
Next on triage duty: Junior
Andy
Triage
Neqo (5, 39, 54)(-2,+7,+2):
- Targeting re-enabling in Nightly for FF 80
- Worked on neqo_glue changes for header being returned in an event. All other changes needed to land a new Neqo are working.
- in review/changes req'd: Persistent congestion interval start time
- in review/changes req'd: qpack encoder small refactor
- merged: usize and Res simplifications in recv_stream.rs
- merged: Add [self] to padding log
- PR Reviews
Next:
- Still have PR backlog
- Finish glue changes for next Neqo->Gecko merge
- PTO next week
Michal
- 1630000 Hitting Back sometimes shows old cached content
- 1637947 network ID: link status isn't updated in NetlinkService::OnAddrMessage()
- 1635935 HTTP/2 issue when toggling VPN state
- Neqo PR663 - Add retry, resumption and zerortt tests (https://github.com/mozilla/neqo/pull/663)
- review 1497249 - WebSocketConnection
- 1616979 Nightly - Firefox caching too much - Not respecting the "CTRL+ Shift +R" shortcut or the "Disable Cache" checkbox
Junior
[WIP] Bug 1633935 - Allow sending onStartRequest via pHttpBackgroundChannel
[r+] Bug 1638313 - Cross-Origin request blocked is not visible in Network panel
[r+] Bug 1638172 - avoid name hiding for handling multipart channel in HttpChannelChild
[landed] Bug 1633942 - introduce HttpChannelOnStartRequestArgs
mayhemer
- preload
- ready to enable on nightly and early beta next week
- polishing details
- perf and PI scheduled
- r+-
- ni
- investigating 1560090 (defect/P1/critical): High refresh rate monitor (>200Hz) slows performance
Valentin
Bug 1638789 - Also log originAttributes in nsHostResolver::ResolveHost [landed]
Bug 1636891 - Move logging specifics from toolkit/library/rust/shared/lib.rs to the gecko_logger crate
Bug 1636888 - Allow specifying entire rust modules in MOZ_LOG
Bug 1616252 - Maybe add a /etc/hosts parser
Bug 1631748 - Fix COOP expected fails
Bug 1627800 - 404 http error isn't displayed in Firefox
Meeting 2020-05-14
Round table:
- what should we do with 404 response with no content ?
- 1604056 kernel panic on LineageOS
- HTTP/2 issue when toggling VPN state
Next on triage duty: Andy
Valentin
Triage / Outreachy
[Landed]
Bug 1572513 - Abort and BFCache handling for COEP headers
Bug 1614988 - COOP+COEP data URL tests timing out
Bug 1624090 - We should make possible to turn on neqo logging in about:networking
Bug 1635899 - We should cancel TRR::mTimeout in OnStopRequest.
Bug 1634462 - Check doh-rollout.mode in TRRService
Bug 1635566 - TRR: Perform a case-insensitive match for the host name
[Working on]
Bug 1636888 - Allow specifying entire rust modules in MOZ_LOG
#528 - Implement all qlog probes
Bug 1595848 - Intermittent COOP/COEP tests
Andy
Neqo (7, 32, 52)(-2,+1,+1):
- Project Plan 0.2
- Q: What are conditions to re-enable in Nightly? A: Serious quic-network-sim (QNS) progress and no prio=high issues remaining
- #101 Can't xfer data with winquic - Reproduced with another QUIC impl. It's not us, it's them. (It's only HTTP 0.9 so not critical tbh.) Closed.
- Google interop: They report an issue when initial CID != 8 bytes. We do this. They estimate 3 weeks to fix & roll out. No temporary workaround on our side planned.
- Worked on neqo_glue changes for header being returned in an event.
- Reviewed many PRs from mt, dragana, & vonasek. Wow!
Next:
- Even more PRs to review!
- Work on glue changes for next Neqo->Gecko merge
- Maybe Persistent congestion interval start time
Michal
- 1630000 Hitting Back sometimes shows old cached content
- https://github.com/mozilla/neqo/pull/619
- https://github.com/mozilla/neqo/issues/621
- https://github.com/mozilla-necko/neqo-qns/pull/2
- Quic network-simulator
- 1635935 HTTP/2 issue when toggling VPN state
- 1637947 network ID: link status isn't updated in NetlinkService::OnAddrMessage()
mayhemer
- preload
- landed: M1 and half of M2, still disabled
- dogfood at will!
- missing: fetch(), XHR, Link:
- on track: perf and integrity testing
- landed:
MOZ_LOG=events:1
and logan - planned: MOZ_LOG=events to add IPC
- updated: our triage helper
- ni?, r?, here and there
Kershaw
Landed:
- Bug 1549323 - [socket-process] Check whether SSL_ClearSessionCache() is called on the socket process.
- Bug 1636999 - [socket process] handle the case that connection manager is used when socket process is not ready
- Bug 1636930 - [socket process] Make sure http response head can be serialized and deserialized properly
Ongoing:
- Bug 1539819 - [socket process] TRR is not working in socket process
- Bug 1637648 - [socket process] Forward observer notifications in nsHttpHandler to socket process
- Bug 1616014 - DNSListenerProxy::mListener should not be a main thread pointer holder
Dragana
Finishing HTTPSSVC design
Done
- PR 601 Close a connection if critical streams are reset or a stop_sending is received
- PR 598 - Improve table.rs
- PR 611 - Add an encoder's max_table_size.
- PR 612 - Remove total_num_of_inserts, use table.base() instead
- PR 614 - Refactor qpack errors
- PR 617 - Add a reference to a qpack dynamic table entry as soon as it is referred in a header block encoding
- PR 616 - The qpack encoder uses stream_send_atomic to send instructions
Next
- Issue 459 - qpack: Fix Header Block Prefix
- Issue 300 - Implement server push, client side
- Issue 417 - telemetry
Junior
- [land] Bug 1632045 - Content-Type and related headers not stripped for certain redirects when using XMLHttpRequest
- Bug 1636572 - [webvtt] The testcase fails if we allow sending onStartRequest via pHttpBackgroundChannel
- Bug 1633935 - Allow sending onStartRequest via pHttpBackgroundChannel
- P2 let HttpChannelBackgroundChild know the sink events before OnStartRequest
Meeting 2020-05-07
Round table:
- New table of triage helper: Bugs awaiting for ni are shown in the new table.
- [triage person] look at NIs older than 2 months and do something about them
- [triage person] drop the
necko-triaged
tag, maybe starting in June - [Honza] fix problems with main table containing bugs that are NI'ed
- [Honza] review the overlap with triage center and see if we need to maintain our own triage center
- 1569715 - caching preflight requests
- Necko bi-weekly updates
Next on triage duty: Valentin
Valentin
Bug 1623126 - Implement HTTPSSVC [landed]
Bug 1629882 - COEP requires a secure context [landed]
Bug 1635899 - We should cancel TRR::mTimeout in OnStopRequest [landed]
Bug 1624090 - We should make possible to turn on neqo logging in about:networking
Bug 1634462 - Check doh-rollout.mode in TRRService
Bug 1635566 - TRR cname resolution is case sensitive
Bug 1630439 - Issue opening url with underscore at the end on Android
- got to look at the chrome dns code
Outreachy intern starts on 19th of May
mayhemer
- preload:
- just rebased all patches, pushed to try, landing when green, still disabled
- the image patch has a leak, Edgar notified
- PI request for 78 refiled
- continuing the work, had a talk with Emilio about css coalescing, a little rework is on the way
- left: SRI, XHR, fetch
- updated necko triage helper
- do we still need [necko-triaged]?
- having a patch pending r for logging runnables in nsThread, pool, cache... with APIs we can add around our code to have more event tracking, it conveniently displays in logan (a distillation of backtrack in a well known tool)
- ni? f?
Kershaw
Landed:
Bug 1623380 - [socket process] Send data directly from the socket process to a content process
Ongoing:
- Triage
- Bug 1539819 - [socket process] TRR is not working in socket process
- Bug 1629457 - Intermittent netwerk/test/unit/test_trr.js | application crashed [@ __thiscall InitHash::InitHash + 0x12d3] | TRRServiceChannel using nsWeakReference OffMainThread
- Fix test failures for socket process
Michal
- 1631341 Random form body loss for concurrent HTTP/2.0 POST requests
- 1569715 CORS preflight requests are cached when 'Disable cache' is checked.
- 1621345 Support for nsIWebSocketEventListener.send() API
- https://github.com/mozilla/neqo/issues/595
- https://github.com/mozilla/neqo/pull/600
- https://github.com/mozilla/neqo/pull/604
- Quic network-simulator
- 1630000 Hitting Back sometimes shows old cached content
Junior
Bug 1633935 - Allow sending onStartRequest via pHttpBackgroundChannel
Bug 1633942 - introduce HttpChannelOnStartRequestArgs
[land] Bug 1582117 - test_prompt_http.html|test_prompt_async.html Fission failure: mCrossOrigin/Ci.nsIAuthInformation.CROSS_ORIGIN_SUB_RESOURCE isn't true
Dragana
-
PR 576 - Write encoder instruction directly into a transport stream
-
PR 598 - Improve table.rs
-
PR 599 - Send DATA_BLOCKED and/or STREAM_DATA_BLOCKED if qpack cannot write complete instructions into a transport stream
-
PR 601 - Close a connection if critical streams are reset or a stop_sending is received
-
google issue with Firefox http3
-
Some reviews (rust API for http request will use nsHttpChannel)
-
Review HTTPSSVC draft
Andy
- Project Plan 0.2
- Lean more heavily on GitHub for individual time estimations. Heavily using labels.
- Update for current status (emphasis on interop, fixing bugs)
- #101 Can't xfer data with winquic - asked for assistance from MS devs
- #597 http://quic.aiortc.org/ works with neqo-client but not in the browser - cert issue
- Team is also working on Google interop issues
- #591 Prepare for sending less frequent ACKs [landed] - more work TBD in this area
Misc:
- Root-caused 1629982 SEC_ERROR_NO_TOKEN when using neqo-client (SSL_HkdfExtract) as distro-specific
Next:
- Review backlog of PRs
- Work on glue changes for next Neqo->Gecko merge
- Solicit initial feedback on revised Project Plan
- Resolve #101
- More ACK work
Meeting 2020-04-30
Round table:
- intermittent leaks (PSimpleChannelChild)
- dFPI bugs 1634080, 1634079
- change to triage process
Next on triage duty: Kershaw
Kershaw
Landed/Complete:
-
Bug 1512478 - Have IPC for picking client certificate for authentication
-
Project plan for proxy resolution in socket process https://docs.google.com/document/d/1BM-m1iUNSobiVu24BlRrLS35k6ZsiKHfCwnC5xVM2G8/edit?usp=sharing
Ongoing:
- Bug 1497249 - [socket-proc] Connection stickiness handling for upgrade observers
- Bug 1539819 - [socket process] TRR is not working in socket process
- Bug 1632881
- Bug 1607426 - ThreadSanitizer: data race [@ get] vs. [@ assign_assuming_AddRef] ([@ nsPACMan::ProcessPending] vs. [@ PACLoadComplete::Run])
- Bug 1629457 - Intermittent netwerk/test/unit/test_trr.js | application crashed [@ __thiscall InitHash::InitHash + 0x12d3] | TRRServiceChannel using nsWeakReference OffMainThread
Junior
OnStart/StopRequest OMT in child
Bug 1633942 - introduce HttpChannelOnStartRequestArgs
Bug 1633935 - Allow sending onStartRequest via pHttpBackgroundChannel
[landed] Bug 1632204 - Origin is null for an XHR request to the same origin when Referrer-Policy is no-referrer
Michal
- triage
- 1631341 Random form body loss for concurrent HTTP/2.0 POST requests
- Quic network-simulator
- https://github.com/mozilla/neqo/pull/588
- 1630000 Hitting Back sometimes shows old cached content
Andy
Neqo:
- Project (13, 25, 50): Triaged backlog (~20 issues). Now at 0 untriaged issues. All priority=high issues assigned owners. Please make sure to tag new issues into the "1H 2020 Triage" project.
- 0.3 Integration into Gecko: Found an issue in 0.3 leading to 0.3.1. Still seeing instability and variability in results on test sites. Holding off on integration until things stabilize.
- Working on sending fewer ack frames, implemented but not passing all tests yet
- Reviewed PRs
- Working on improving reporting/metrics on Neqo dev activity
DoH:
- Nothing this week
Misc:
- NSS 1629982 SEC_ERROR_NO_TOKEN when using neqo-client (SSL_HkdfExtract)
- 1 day PTO
Next:
- Revise Neqo Project Plan
mayhemer
preload:
- one patch still needs r+, postponing landing, too late now
- working on M2 bugs: different coalescing, SRI checking
- next: XHR, fetch
Valentin
Bug 1626057 - Implement TRR steering platform APIs [landed]
Bug 1633567 - Re-enabled AppCache [landed]
Bug 1572513 - Abort and BFCache handling for COEP headers
Bug 1623126 - Implement HTTPSSVC
Bug 1634462 - Check doh-rollout.mode in TRRService
Dragana
review of HTTPSSVC
PR 572 - Make HeaderReady hold headers
PR 579 - If there is no more data to read in read_response_data we should exit the loop
PR 573 - It should not be possible to create new streams in GoAway state.
PR 570 - A transaction should try to read the next frame when it is done reading a data frame
PR 567 - Remove DataReadable events when a stream is done
In progress:
PR 576 - Write encoder instruction directly into a transport stream
PR 587 - Enforce a correct stream id in a GOAWAY frame
Meeting 2020-04-23
Round table:
- necko-reviewers can be removed now
- Fetch from rust: https://phabricator.services.mozilla.com/D70257
- High refresh rate monitor (>200Hz) slows performance
Next on triage duty: Michal
mayhemer
possibly READONLY:
- preload:
- need two simple test-change reviews from dragana
- need two small reviews from baku
- need one review of edgar's image loading patch
- has a green try! --> ready to land
- thinking: land now (disabled) and possibly open users with this flipped on to sec issues or wait for early 78? probably the latter
Dragana
Mostly neqo:
Issue 567 - Remove DataReadable events when a stream is done
Issue 563 - Use a tree as a helper structure for the huffman decoder.
Issue 547 - Turn on clippy pedantics for neqo-http3
Issue 570 - A transaction should try to read the next frame when it is done reading a data frame
Issue 569 - HeaderReady event should have headers as well
Andy
Neqo
- Bug triage and documenting things. New Neqo Eng Weekly meeting
- Preparing for Neqo 0.3.0 release: PR reviews; Tested Gecko with latest incl. API changes
- Finally landed qlog PR :tada:
- Some tiny PRs
- Google: Enabled H3 (for me) on YouTube, seeing it used there, but just a little
DoH
- Mtg with Markus the UX person and everyone. Selena wants more info on why users are choosing Disable when presented with doorhanger.
- Canary: Telemetry shows canary abuse by CenturyLink and now Cox, both large US ISPs. Peter is attempting to contact.
Next:
- Review & document: timers and recovery state machine
- Tag 0.3.0 and merge into m-c
- More interop/testing work
Kershaw
Landed/Complete:
- Bug 1626076 - Use DataStorage on socket process
- Bug 1485652 - Make nsNSSSocketInfo::IsAcceptableForHost work asynchronously on the socket process
- Bug 1624996 - Add a telemetry to see how often TRR request is redirected
Ongoing:
- Bug 1497249 - [socket-proc] Connection stickiness handling for upgrade observers
- Bug 1539819 - [socket process] TRR is not working in socket process
- Bug 1512478 - Have IPC for picking client certificate for authentication
Junior
[landed] Bug 1554218 - Handle 407 from a HTTP/2 proxy
[landed] Bug 1341689 - Missing Origin header when requests to the same-origin and crossorigin set
OnStart/StopRequest OMT in child
Bug 1632045 - Content-Type and related headers not stripped for certain redirects when using XMLHttpRequest
Valentin
reviews 🙂
Bug 1629882 - COEP requires a secure context
Bug 1631751 - Fix COEP expected fails
Bug 1631748 - Fix COOP expected fails
Bug 1572513 - Abort and BFCache handling for COEP headers
Bug 1623126 - Implement HTTPSSVC
Bug 1626057 - Implement TRR steering platform APIs
Bug 1624090 - We should make possible to turn on neqo logging in about:networking
Michal
- [landed] 1630899 Update NETWORK_PAC_URL_SCHEME probe to collect data on release
- [landed] 1624515 Fix data race on CacheStorageService::mShutdown
- 1630486 websocket binary message splitting
- 1630000 Hitting Back sometimes shows old cached content
- https://github.com/mozilla/neqo/issues/529
- 1631016 Find out why HTTP_SUB_COMPLETE_LOAD_V2 reports longer load times with every new release since beta 73
Meeting 2020-04-16
Round table:
- Moving proxy resolution to socket process. Can we detect proxy configuration changes?
- unassigned P1
- PAC scripts over FTP
Next on triage duty: Honza.
Andy
Triage
Neqo
- H3 disabled in Nightly due to Google* issues
- New Neqo Eng Weekly meeting
- interop container image issues
- qlog PR good to land (once reviewer comments addressed)
- Neqo breakage due to NSS changes
- Simplifying API work: eliminating process_http3(); eliminating process_timer()
DoH
- Canary: Telemetry shows canary abuse by CenturyLink. First response is to reach out and ask what's up.
- UI: We have a UI person, initial meeting with them on Tuesday
Next:
- Get more organized for more people on Neqo, more mgmt scrutiny
- Land qlog
- Resolve API issues
- More interop/testing work
Valentin
Bug 1595886 - [done]
Bug 1625749 - [done]
Bug 1625563 - Intermittent test_trr.js::test_resolve_not_confirmed [landed]
Bug 1619673 - Disable appcache in release [landed]
Bug 1623126 - Implement HTTPSSVC
Bug 1595848 - Intermittent COOP/COEP tests
Dragana
need-infos and reviews
neqo:
Issue 547 - Turn on clippy pedantics for neqo-http3
Issue 544 - Set the idle timeout to 30s
Issue 538 - Check if transaction is done(), do not check only fin before removing a transaction
Issue 537 - Fix debug assertion in encode_headr_block
Kershaw
Landed/Complete:
rel=preload
review
Ongoing:
- Bug 1497249 - [socket-proc] Connection stickiness handling for upgrade observers
- Bug 1626076 - Use DataStorage on socket process
- Bug 1539819 - [socket process] TRR is not working in socket process
- Bug 1485652 - Make nsNSSSocketInfo::IsAcceptableForHost work asynchronously on the socket process
Junior
Bug 1554218 - Handle 407 from a HTTP/2 proxy
OnStart/StopRequest OMT: image (good to OMT but not trivial), CSS (no)
Michal
- 1622335 Add telemetry for PAC scripts served over FTP
- Effect of cache partitioning
- Quic network-simulator
mayhemer
- preload
- all M1 bugs but one patch r+
- pushing to try
- perf testing request when green (enough)
- some bugs for M2 on the way (fetch, font: r?)
- Bug 1605895
Meeting 2020-04-09
Round table:
- OnStartRequest/OnStopRequest OMT
- Review queue
- DocumentChannel regression/failures
- Bug 1627407 - Support Save-Data: Request Header so users can save bandwidth
- Bug 1625262 - (from 800MB heap-unclassified) unreported 86MB from Http2Session::WriteSegmentsAgain
Next on triage duty: Andy
Valentin
Bug 1625213 - Refactor DNS code to remove OnLookupByTypeComplete [landed]
Bug 1623126 - Implement HTTPSSVC
Bug 1624090 - We should make possible to turn on neqo logging in about:networking
Bug 1572513 - Abort and BFCache handling for COEP headers
Bug 1595886 - ??
- Outreachy application time is over.
- #necko reviewer group bug 1628714
- AppCache plan - disable in 77. Keep pref in 78 (for ESR). Disable in 79
Kershaw
Landed:
- Bug 1568028 - [wfh] about:support doesn't report/show separate socket process in "Remote Processes" section
- Bug 1626743 - [socket process] Fix test test_content_sniffer.js
- Bug 1625151 - [socket process] Move DNS resolution to socket process
- Bug 1627654 - Padlock in URL bar is sometimes missing when a FPN session is active
Ongoing:
- Bug 1626076 - Use DataStorage on socket process
- Bug 1539819 - [socket process] TRR is not working in socket process
- External mentoring about socket process.
Michal
- [landed] 1627635 Websocket connects to DIRECT instead of Proxy-HTTP/HTTPS with SystemProxySettings on Linux
- [landed] 1622409 Put FTP code behind a pref
- [landed] https://github.com/mozilla/neqo/issues/533
- 1627910 Enable test netwerk/test/unit/test_http3
- https://github.com/mozilla/neqo/issues/505
- reviews (Outreachy)
- 1628660 netwerk/test/http3server fails to build on Tier3 platforms
Junior
triage
Bug 1554218 - Handle 407 from a HTTP/2 proxy
[land] Bug 1601671 - websocket connects to DIRECT instead of Proxy-HTTP/HTTPS with SystemProxySettings in Windows
next:
OnStart/StopRequest OMT
Bug 1341689 - Missing Origin header when requests to the same-origin and crossorigin set
mayhemer
- preload
- milestone 1: 1 patch r?, 1 patch delegated, 1 simple patch in-progress, all other r+
- we have automated tests: wpt and cover for the current implementation
- answer from yoav
- reviews, ni?
- some mentoring
- Tokenizer::CheckString("foo bar")
- landed 1626809 - disk-storage memory reporter does not properly anonymize
- landed 1627572 - Intermittent tsan: ThreadSanitizer: data race /builds/worker/checkouts/gecko/xpcom/io/FilePreferences.cpp:272:7 in mozilla::FilePreferences::IsAllowedPath(nsTSubstring
const&) - investigating bug 1605895 with a life diagnostic patch, needs update
Andy
Neqo
- Posted new version of qlog PR for review, using new streaming log API. There will be further work to add probes in the code.
- PR reviews
Next:
- qlog: Address any additional review comments
- Some Neqo bugs need more investigation
- Blog post on H/3 in Nightly
- Triage
Dragana
- HTTP/3 is turned on, looks good
- QPACK is turned off for now
- Bug 1628008 - HTTP/0.9 Shoutcast stopped working in v76.0b1
- Bug 1618158
neqo:
- Issue 525 - We can still have RecvStreamReadable after a stream has been read completely
- Issue 520 - Turn on clippy:pedantic for neqo-qpack
Working on:
- Issue 159 - Fold process_timer() into process_output()
- Issue 276 - Do not increase congestion window if under utilized
Meeting 2020-04-02
Round table:
- Remove appcache (meta bug: 1584984)
- performance bug?
- Bug 1626026 - Appcache regression in Firefox 74
- bug 1586630
- FTP deprecation: addon support concern (see doc in bug 1626365)
- controlling TRR prefs
Next on triage duty: @JuniorHsu
Valentin
[Outreachy][reviews]
Bug 1623807 - FQDN DoH queries are encoded incorrectly [landed]
Bug 1626057 - steering heuristics
Bug 1625213 - Refactor DNS code to remove OnLookupByTypeComplete
Bug 1623126 - Implement HTTPSSVC
Bug 1572513 - Abort and BFCache handling for COEP headers
Michal
- [landed] 1625284 Increase receive buffer size of QUIC socket
- [landed] 1587353 Add tests for http3
- [landed] 1622335 Add telemetry for PAC scripts served over FTP
- 1622409 Put FTP code behind a pref
- 1601671 websocket connects to DIRECT instead of Proxy-HTTP/HTTPS with SystemProxySettings
- try to enable http3 tests
- measure QUIC throughput
Junior
Project Plan: OMT OnStartRequest/OnStopRequest on child
Bug 1554218 - Handle 407 from a HTTP/2 proxy
Dragana
Http3 testing
Bug 1626799 - Update Neqo to 0.2.3
Bug 1626359 - Crash in [@ mozilla::net::Http3Stream::WriteSegments]
Bug 1625841 - Crash in [@ mozilla::net::Http3Session::Authenticated]
Bug 1625198 - Number of bytes read reported n HttpConnectionUDP::OnSocketReadable is bogus
mayhemer
- preload
- done css and image
- image needs more care, given to Edgar Chan
- giving font to Cameron
- restarted comm with Yoav and Addy
- running WPT tests for preload
- external and internal mentoring
Andy
Neqo
- Reviving qlog PR: Rebased & coalesced commits
DoH
- Minimal UI rework doc revised 2x
Next:
- qlog: Address review comments, move to new streaming API in qlog 0.2
- Fix more Neqo bugs
- More testing of H3 in Gecko
Meeting 2020-03-26
Round table:
- Can we turn on rust logging from about:networking? Bug 1624090
- AsyncOpen OMT
Next on triage duty: Dragana
Dragana
Http3/Quic bugs:
Issue 47 - Timers that end up being set in the past
Bug 1618158
Bug 1623501 - HTTP3 - Websocket - Firefox can’t establish a connection to the server at wss://web.whatsapp.com/ws - Whatsapp
Bug 1616323 - H3: Cached H3 resources show "HTTP/3.0" instead of "HTTP/3" in webtools Version field
Looking at AltSvc with HTTP/3
Looking into moving the DoH heuristics into platform
It is IETF virtual meeting week
Valentin
[Outreachy][reviews][triage]
steering heuristics
- impl more complicated than initially expected
- will pass back to Nihanth
Bug 1623807 - FQDN DoH queries are encoded incorrectly
Bug 1595886 - Use temp string
Bug 1625213 - Refactor DNS code to remove OnLookupByTypeComplete
Bug 1623126 - Implement HTTPSSVC
Bug 1614962 - Intermittent netwerk/test/unit/test_trr.js
Michal
- [landed] 1624105 We don't try to activate Http3Stream again if it failed once
- 1587353 Add tests for http3
- 1622335 Add telemetry for PAC scripts served over FTP
- Http3 tests intermittent failures
- 1622409 Put FTP code behind a pref
Kershaw
Landed:
- Bug 1607221 - ThreadSanitizer: data race [@ mozilla::net::nsSocketTransport::OnSocketEvent] vs. [@ SetTimeout]
Ongoing:
- Bug 1623380 - [socket process] Send data directly from the socket process to a content process
- Bug 1539819 - [socket process] TRR is not working in socket process
- Bug 1625151 - [socket process] Move DNS resolution to socket process
- Bug 1485652 - Make nsNSSSocketInfo::IsAcceptableForHost work asynchronously on the socket process
Junior
OMT OnStartRequest/OnStopRequest
Bug 1570889 - blob URLs and CSP sandbox'ed pages should inherit Cross-Origin-Opener-Policy
Bug 1601671 - websocket connects to DIRECT instead of Proxy-HTTP/HTTPS with SystemProxySettings in Windows
Andy
Neqo
- 1624800 panic when indexing into CryptoStreams fix in review
- Some Outreachy interactions
- PR/Phab reviews
- Our Docker image (repo here) for QUIC Network Sim (QNS) now working for http3 test in client role. TODO: Enable other tests, and server role.
DoH
Next:
- Fix more Neqo bugs
- Refine doc & reach consensus within our team on Minimal UI plan
- More testing of H3 in Gecko
mayhemer
- preload: continuation
- reviews
Meeting 2020-03-19
Round table:
- potential breaking changes in next few releases
Next on triage duty: Valentin
Kershaw
Landed:
- Bug 1619584 - TRR: Support redirect for TRR request channel
- Bug 1607257 - Enable SSLTokenCache on nightly
- Bug 1621601 - Assertion failure: PR_GetEnv("MOZ_SANDBOXED") != nullptr
- Bug 1527384 - [socket process] Make SpeculativeConnect work
- Bug 1620824 - Tabs do not load after restart with network.trr.fetch_off_main_thread=true and under specific condition
Ongoing:
- Triage
- Bug 1623380 - [socket process] Send data directly from the socket process to a content process
Valentin
[outreachy]
Bug 1617889 - Fix COOP comparison
Bug 1618042 - early DNS lookups fail with network.trr.mode=3 using network.trr.uri with hostname in it
Bug 1621877 - Add more unit tests for setting an empty host on URLTYPE_AUTHORITY URLs
Next:
Bug 1623126 - Implement draft-ietf-dnsop-svcb-httpssvc + DNS refactoring
Junior
Bug 1272302 - navigator.sendBeacon doesn't set Origin header for same-origin request
Bug 1570889 - blob URLs and CSP sandbox'ed pages should inherit Cross-Origin-Opener-Policy
Andy
Neqo
- Another serious bug fixed. Neqo 0.2.2 tagged and merged into m-c
- Trying to help some Outreachy people get started
next:
- Fix more Neqo bugs
- Review Dragana's QUIC/H3 project plan
- Review Valentin's Comcast DoH doc
- More testing of H3 in Gecko
- More quic-network-interop
Michal
-
1587353 Add tests for http3 next
-
1622335 Add telemetry for PAC scripts served over FTP
-
1622409 Put FTP code behind a pref
mayhemer
- 5 rel=preload bugs now have first patches
- reviews
- here and there
next:
- file sec review request for rel=preload
- schedule meeting with Olli for next steps in DOM code
Dragana
Bug 1623312 We should support slow read in Http3
Bug 1622861 Improve Http3 closing
Bug to be filed - Parsing ReponseHead from cache is wrong
Http3 testing in Firefox
Meeting 2020-03-12
Round table:
- 1608087 - Assertion failure
- valentin: If you know of any code that can use some light refactoring, please add it to the spreadsheet. I'll mentor it.
- 1620708 - cookies/samesite/iframe-reload.https.html.ini WPT FAIL with Fission
- 1620713 - offline/appcache/appcache-iframe.https.html.ini WPT FAIL or TIMEOUT with Fission
- 1620750 - ws-over-h2
- ftp resources, PAC scripts
Next on triage duty: kershaw
Valentin
ReadOnly:
outreachy mentoring
Bug 1611651 - TRR: Infinite loop when visiting https://1.1.1.1/help
Bug 1618042 - early DNS lookups fail with network.trr.mode=3 using network.trr.uri with hostname in it
Bug 1621877 - Add more unit tests for setting an empty host on URLTYPE_AUTHORITY URLs
Bug 1617889 - Fix COOP comparison
Michal
- [landed] 1470571 Sync with cache IO thread before checking alt-data flag in index
- [landed] https://github.com/mozilla/neqo/issues/475
- 1619520 Abrupt Websocket disconnect
- 1619618 sMmapAccessScope; error: initializer for thread-local variable must be a constant expression
- 1616979 Nightly - Firefox caching too much - Not respecting the "CTRL+ Shift +R" shortcut or the "Disable Cache" checkbox
- 1587353 Add tests for http3
mayhemer
- DONE preload plan
- only left: file sec review req
- DONE 1616082 - Crash in [@ shutdownhang | nsThread::Shutdown | mozilla::net::WaitForThreadShutdown::Run | nsThread::Shutdown | ProfileResetCleanupResultTask::Run]
- not a regression
- IN-PROG 1611081 (defect/P1/critical): Blank content area when reloading multipart/x-mixed-replace page with developer tools pane open
- recent dev tools doc channel regression
- IN-PROG ni+
- ? Priority of h2 priories rewrite
Andy
Neqo:
- Serious bug fixed. Neqo 0.2.1 tagged and merged into m-c
- More changes for quic-network-sim interop. Very close to working (knock on wood)
- virtual interop: Worked through some alt-svc issues with F5
DoH canary
- Focusing first on detecting possible canary abuse. Looped in data privacy folks about telemetry on client's ISP (doc link)
Misc:
- IETF 107 cancelled
next:
- More testing of H3 in Gecko
- More quic-network-interop
- Review Dragana's QUIC/H3 project plan
Dragana
Refactoring of QPACK landed,
Writing project plan for QUIC/HTTP3.
Looking at:
Bug 1616005 - Crash in [@ mozilla::net::nsHttpConnection::OnWriteSegment]
Bug 1618158
Meeting 2020-03-05
Round table:
- AppCache
- Cache and files
- Bug 1615698 - Browser caching does not work with ranges that don't start with zero
- Bug 1612701 - WebSocket blocked by uBlock Origin still does a DNS request
Next on triage duty: Michal
Kershaw
Landed:
- Bug 1613873 - Create a simple http channel which is only used for TRR
- Bug 1615335 - TRR: Use SimpleHttpChannel off main thread
- Bug 1584104 - We need to have a clone of TransportSecurityInfo on the parent process
- Bug 1512471 - Proxy certificate validation from Socket Process/Socket Thread to Parent Process
Ongoing:
- Bug 1527384 - [socket process] Make SpeculativeConnect work
- Bug 1537761 - Make AlternateServices work when socket process is enabled
- Bug 1619582 - TRR: Rename SimpleHttpChannel
Michal
- [landed] 1614619 Eviction algorithm should first evict entries of a content type that’s above a limit
- 1587353 Add tests for http3
Andy
Neqo:
- Neqo 0.2.0 tagged and merged into m-c
- Interop: Testing client congestion control may require new tests
DoH canary
- Options for querying network ASN via MLS-like webservice (doc link)
next:
- Neqo bugs & H3 testing
- More quic-network-interop
- Address comments on qlog PR
- Doc: Plan for Neqo features in future Firefox versions
Valentin
[landed]
Bug 1616345 - Clear DNS on HTTP 421
Bug 1618130 - Add API to override platform DNS results
[working on]
Bug 1617889 - Fix CrossOriginOpenerPolicy inheritance from a cross origin iframe
Dragana
Neqo:
- QPack refactor in review
Necko:
- Bug 1619813 - Handle http3 streams being blocked on max_stream_data
- Bug 1619793 - Make sure we do not AltSvc mapping for Http3 if Http3 is disabled
- Bug 1619764 - Make Http3Session easier to understand
Meeting 2020-02-27
Round table:
Next on triage duty: Honza - being OK with it
mayhemer
- Preload project planning (being approved)
- Investigating 1616082 - Crash in [@ shutdownhang | nsThread::Shutdown | mozilla::net::WaitForThreadShutdown::Run | nsThread::Shutdown | ProfileResetCleanupResultTask::Run]
- reviews
- ni?
- having issues with my main desktop dev machine at the time :/ (lost all emails!)
Valentin
Read-only (PTO)
Bug 1617889 - Fix COOP comparison
Bug 1595848 - Intermittent COOP/COEP tests
Bug 1618130 - Add API to override platform DNS results
Bug 1605775 - ESNI: Repeated DNS lookups over DoH
Bug 1611651 - TRR: Infinite loop when visiting https://1.1.1.1/help
- isolated a test case
- caused by stale-while-revalidate -> Honza
Shout-out to Kershaw for finding and fixing TRR performance bug
Bug 1618173 - TRR: We don't use DNS cache at all for the URL of DoH server
Michal
- [landed] 1617036 Remove NETWORK_TIME_BETWEEN_NETWORK_CHANGE_EVENTS probe
- [landed] 1614610 Have cache occupancy for each content-type in cache index
- [landed] 1616507 Data race /builds/worker/workspace/build/src/netwerk/cache2/CacheFile.cpp:2362:48 in EntryWouldExceedLimit
- 1614619 Eviction algorithm should first evict entries of a content type that's above a limit
- 1615017 ThreadSanitizer: data race [@ mozilla::net::CacheFileMetadata::SetHash] vs. [@ MemoryUsage]
- 1615533 Can not establish websocket connections with socks proxy
- 1424820 "Use system proxy settings" uses SOCKSv4
- 1601671 websocket connects to DIRECT instead of Proxy-HTTP/HTTPS with SystemProxySettings in Windows
- 1587353 Add tests for http3
Kershaw
Landed:
- Bug 1616549 - toolkit/components/antitracking/test/browser/browser_networkIsolation.js failed with SSLTokensCache enabled
- Bug 1618173 - TRR: We don't use DNS cache at all for the URL of DoH server
- Bug 1607134 - ThreadSanitizer: data race [@ mozilla::net::ProxyAutoConfig::SetThreadLocalIndex] vs. [@ GetRunning] on mozilla::net::sRunningIndex
- Bug 1607445 - Make it possible to clear session cache stored in SSLTokensCache
Ongoing:
- Security review for SimpleHttpChannel
- Bug 1613873 - Create a simple http channel which is only used for TRR
- Bug 1615335 - TRR: Use SimpleHttpChannel off main thread
- Bug 1584104 - We need to have a clone of TransportSecurityInfo on the parent process
- Bug 1527384 - [socket process] Make SpeculativeConnect work
Andy
Neqo:
- QLOG support PR posted for review
- Review of other PRs
- Support for quic-network-interop
- Docker image
- changes needed to neqo-client
doh canary
- Write-up on disabling canary for ISPs that abuse it
next:
- Neqo bugs
- more quic-network-interop
- address comments on qlog PR
Dragana
Bug 1582663 - Maybe we should split nsHttpConnection - ready to land
Working on:
- QPack refactor
- testing Http3 in Firefox and fixing some bugs (I need to file bug yet)
Meeting 2020-02-20
Round table:
- Bug 1614216 - AF_UNIX support
- Bug 1615698 - Browser caching does not work with ranges that don't start with zero
- Bug 697151 - Synchronous XMLHttpRequest (XHR) does not block readyState events for async XHR
- (valentin) Add easy tasks to the outreachy spreadsheet
- Duplicate code of SimpleHttpChannel
Next on triage duty: Honza
Dragana
Read only:
- working on separating nsHttpConnection into HttpConnectionBase, HttpConnectionUDP and nsHttpConnection (for TCP base connections, maybe it will be called HttpConnectionTCP)
- WebTransport
Valentin
Read only:
[landed]
Bug 1543331 - Crash in [@ @0x0 | nsHostResolver::FlushCache]
Bug 1607460 - Align with Cross-Origin-Opener-Policy changes
Bug 1615058 - Do not load library for DnsQuery_A at runtime
Outreachy project - ACCEPTED
- Can change project description until Friday
- Add easy tasks to the outreachy [spreadsheet](https://docs.google.com/spreadsheets/d/10IS1O4ePVHqGlL-2JnSTs4-z0neiQjN0xfySwSXGWz0/edit#gid=0)
OOO Wed 19 - Fri 21
Andy
triage
Presidents Day
Neqo
- testing in Gecko against test sites, opening bugs
- working on Docker image that can be used for interop
DoH
Kershaw
Landed:
- Bug 1614530 - member call on null pointer of type 'mozilla::net::nsIOService' in netwerk/base/SSLTokensCache.cpp:70
- Bug 1614730 - Crash in [@ SetValidationOptionsCommon]
- Bug 1614905 - Extend SESSION_RESUMPTION_WITH_*_CACHE_TIME_UNTIL_READY_MS telemetry
Ongoing:
- Bug 1613873 - Create a simple http channel which is only used for TRR
- Bug 1616549 - toolkit/components/antitracking/test/browser/browser_networkIsolation.js failed with SSLTokensCache enabled
Michal
- [landed] 1616069 Extend telemetry probes for RCWN and e10s back pressure
- [landed] 1614637 ThreadSanitizer: data race [@ assign_assuming_AddRef] vs. [@ operator bool] in CacheStorageService
- 1548544 Partition cache by content type
- 1614610 Have cache occupancy for each content-type in cache index
- 1615533 Can not establish websocket connections with socks proxy
Meeting 2020-02-13
Round table:
- Bug 1613943 - Intermittent blank page when logging into Royal Canadian Bank
- Bug 1614569 - Look into error codes that are returned form OnStart/OnStop/OnData or set by Cancel(), they should not be hard network errors
- Bug 1614751 - DoH canary domain use-application-dns.net not honored
- Bug 1615212 - Http/2 connection slow
- Outreachy Round 20
- PI Requests for 75
- product management
Next on triage duty:
Junior Andy
mayhemer
READONLY:
- (landed) 1610371 - Exceptions of cookies, must only apply to the main domain, must not include third parties.
- getting rid of my needinfo list (slow)
- pinged Olli second time for the preload arch doc, no response
- Dragana, can you quickly overlook?
- it's still more an arch doc than a plan doc right now, I want to make sure it makes sense before breaking down to bugs
Michal
- [landed] 1611185 Make HTTP_CACHE_DISPOSITION_2_V2 probe keyed by content type
- [landed] 1614629 Fix freeSpace check in CacheFileIOManager::OverLimitEvictionInternal
- [landed] 1614706 ThreadSanitizer: data race [@ Release] vs. [@ CloseWithStatusLocked] in CacheFileInputStream
- 1615017 ThreadSanitizer: data race [@ mozilla::net::CacheFileMetadata::SetHash] vs. [@ MemoryUsage]
- 1614637 ThreadSanitizer: data race [@ assign_assuming_AddRef] vs. [@ operator bool] in CacheStorageService
- 1551562 Crash in [@ memcpy | nsJARInputStream::Read]
- 1548544 Partition cache by content type
Valentin
[landed]
Bug 1613140 - transferSize on PerformanceNavigationTiming is not available till after window.onload
Bug 1613497 - Use the background thread pool for the predictor
Bug 1613631 - Make nsHostRecord remember the effective TRR mode and report telemetry accordingly
Bug 1614267 - Don't proxy URI release to the main thread for HttpBaseChannel
[current]
Bug 1607460 - Align with Cross-Origin-Opener-Policy changes
Bug 1615058 - Do not load library for DnsQuery_A at runtime
Bug 1613860 - Make network change events consistent across platforms
rewriting captive portal detector in C++
refactor nsHostResolver
Andy
- IETF interim trip minutes https://github.com/quicwg/wg-materials/blob/master/interim-20-02/minutes.md
- Basically, short meeting, issues list is small, people are shifting to talking about extensions
- Transport parameter encoding changed, for consistency's sake. draft 26 soon.
- Trying to get latest Neqo into Gecko
- NSS build failures cause Neqo CI to fail
- Ensure required Rust is supported for Gecko builds
- Trying to get sccache setup to do faster local builds when working from home
TODO:
- Get Neqo latest in Nightly and test (hampered by limited draft 25 support as of now)
- Talk to Arthur more about DoH UI changes. Push is for minimizing pref UI -- how stripped down can we get?
Dragana
WebTransport
Bug 1613943 - Intermittent blank page when logging into Royal Canadian Bank
Bug 1615212 - Http/2 connection slow
Meeting 2020-02-06
Round table:
Next on triage duty: Dragana
Kershaw
Landed:
- Bug 1600254 - [socket process] Land missing parts of nsHttpTransaction
- Bug 1607194 - Preparatory work for doing certificate verfication with socket process enabled
Ongoing:
- Triage
- Bug 1607445 - Make it possible to clear session cache stored in SSLTokensCache
- Bug 1539819 - [socket process] TRR is not working in socket process
- Bug 1512471- Proxy certificate validation from Socket Process/Socket Thread to Parent Process
Michal
- [landed] 1607142 Hold lock in CacheFile::IsWriteInProgress to avoid data race
- [landed] 1610810 FTP download prompt appears while authentication dialog is displayed
- 1602277 Firefox will not allow plain text files to be viewed inline when character present
- 1611185 Make HTTP_CACHE_DISPOSITION_2_V2 probe keyed by content type
- 1551562 Crash in [@ memcpy | nsJARInputStream::Read]
Valentin
reviews
[fixed]
Bug 1611469 - backgroundPageThumbsContent.js mixes nsIRequest and nsIWebNavigation load flags
Bug 1610836 - Don't fail TRR_FIRST requests if the TRR service is not ready
Bug 1595572 - Assertion failure: false (Unknown request), at netwerk/base/NetworkConnectivityService.cpp:295
Bug 1482224 - Move nsLocalFileWin::Reveal to the background thread pool
[working on]
Bug 1608114 - Delay of ~20ms between receiving a DoH response and sending a SYN packet still not fixed
Figured out Bug 1606300 - When saving a video with a URL Encoded filename, it's saved with the encoded (rather than decoded) file name
Looked into Bug 1610102 - complete website content only displaying in Nightly+Dev edition, not in Release+Beta
Bug 1613497 - Use the background thread pool for the predictor
Bug 1613631 - Remember the effective TRR mode for each request
mayhemer
- preload in DOM planning doc rel=preload in DOM detailed plan - Google Docs
- fenix tests enabling 1613362 - Enable some lately fixed android network xpcshell tests
- fenix back-to-old bug fixed 1545909 - Hitting Back sometimes shows old cached content
- ni?
- BT -> mstange?
- fenix main thread bypass experiment -> mattw
Meeting 2020-01-23
Round table:
- meeting with Perf team
- networking section in Preferences
- conflicting meetings in Berlin: Necko planning meeting vs DocumentChannel explanation
Next on triage duty: Valentin
Andy
Triage
Neqo:
- PR reviews
- More work & discussion about qlog
- Neqo planning/bug scrub in Berlin, please rsvp if interested
1 day holiday, 1 day PSL
Valentin
[landed]
Bug 1590166 - WindowGlobalChild::Create should call GetCrossOriginOpenerPolicy instead of ComputeCrossOriginOpenerPolicy
Bug 1609869 - Make about:networking an HTML page
[working on]
Bug 1609395 - DNS request are still captured while trr mode 3 is enabled - INVALID
Bug 1608713 - Captive portal login tab should setTRRMode(Ci.nsIRequest.TRR_DISABLED_MODE) (blocks bug 1610834)
Bug 1608114 - Delay of ~20ms between receiving a DoH response and sending a SYN packet
Bug 1607460 - Align with Cross-Origin-Opener-Policy changes
Bug 1609203 - Some tabs fail to load on start with DNS "host not found" errors due to DoH, and work correctly without DoH
Michal
- [landed] 1606207 Remove first-party cache isolation telemetry
- [landed] 1607224 Data race on CacheFileHandle::mFileSize
- [landed] 1606643 Race condition in ZipArchiveLogger
- 1607142 Hold lock in CacheFile::IsWriteInProgress to avoid data race
- 1611185 Make HTTP_CACHE_DISPOSITION_2_V2 probe keyed by content type
mayhemer
in progress
- 1608224 - Source for Twitter page not shown as expected
- simple patch done
- "more proper" patch in progress
- check Junior's asyncopen OMT plat
- 1602313 - ThreadSanitizer: data race [@ mozilla::net::nsHttpChannel::OnCacheEntryCheck] vs. [@ ~AutoCacheWaitFlags]
- just submit for r?
done
- some notes added to rel=preload in the HTML Parser and DOM - Google Docs
- some berlin preps
- diagnosed 1610790 - firefox no longer works after bug 1610485 - gdata AV interference with sandboxing
Meeting 2020-01-16
Round table:
Next on triage duty: Andy
Valentin
[landed]
Bug 1608207 - Make sure TRR requests don't use the HTTP cache
Bug 1608114 - Delay of ~20ms between receiving a DoH response and sending a SYN packet
Bug 1602363 - Let Cross-Origin-Resource-Policy ride the trains
[Working on]
reviewed mode3 QA testcases + meetings with QA
Fixing TRR delay. The plan was to make the TRR onStopRequest go to the socket thread instead so we do the processing there, but it seems the onDataAvailable is also seriously delayed, even when retargetted to go to be on the socketThread. Currently investigating if it's retargetting to another thread works better.
(Note) the delay is less pronounced on official (PGO?) nightly builds, even on the reference hardware (at most 25ms)
Michal
- Partition cache by content type
- 1605109 Shutdown failed after loading https://geekflare.com
mayhemer
landed (or nearly):
- 1596799 - Add a preference for socket peer port remapping
- 1546191 - Crash in [@ nsCORSListenerProxy::OnStopRequest]
- triage
in-progress:
- the Fenix test re-enabling:
- 1608126 - Node.js is not available when running xpcshell tests on Fenix, making HTTP/2 tests fail
- Valentin to take over?
- 1567341 - setup content process in xpcshell-test //unit_ipc/ for fenix
- raised to P2
next:
- preload in DOM
Dragana
Neqo:
- multiple PTO times,
- discarding keys,
- a small typo
Necko:
- 1608967 - adapt necko to new neqo
Andy
Neqo:
- Polishing QUIC/H3 release blog post ahead of enabling by default in nightly
- QLOG proof-of-concept help-wanted PR
- Next: PR reviews, meeting planning for all-hands, triage
Meeting 2020-01-09
Round table:
- Berlin Train reservation
- enable sameSite=lax by default (bug 1604212)
- TLS handshake fails on CORS preflight requests because no certificate is sent [per spec]
- Bug 1608207 - Make sure TRR requests don't use the HTTP cache
Next on triage duty: Honza
Valentin
[landed]
Bug 1552176 - TRR: Make it possible to selectively enable TRR for pbmode/container/window/etc
Bug 1607468 - Remove NETWORK_CROSS_ORIGIN_STYLESHEET_CONTENT_TYPE telemetry r=kershaw
[working on]
Bug 1603484 - Walmart Grocery website serviceworker bug (debugging)
Bug 1590166 - Check if WindowGlobalChild::Create should call GetCrossOriginOpenerPolicy instead of ComputeCrossOriginOpenerPolicy
Bug 1603699 - Enable DefaultURI use for unknown schemes
[next]
Bug 1608114 - Delay of ~20ms between receiving a DoH response and sending a SYN packet
Michal
- [landed] 1519126 Assertion failure: !chunk->IsReady()
- [landed] 1601712
- 1583735 Find out why accessing mmaped JAR file generates SIGBUS
- 1606098 Secure connection failed when accessing Outlook app in Office 365
- 1606207 Remove first-party cache isolation telemetry
- 1606643 ThreadSanitizer: data race [@ AddRef] vs. [@ Release] in nsZipArchive
Dragana
Bug 1607494
Bug 1605895
Bug 1544233 - reading hosts files to add them to TRR exclusion list
Bug 1607731 - Refactor http CONNECT tunnels
Another try to update neqo - in testing
reviews and other needinfos
Andy
Triage
Neqo/QUIC:
- Frame::new_stream() now has tests and should be working now
- Document how to use out-of-tree Neqo with Gecko builds
- Trying to get Wireshark captures and decode using SSLKEYLOGFILE
- Some work on fixing Necko H3 code for connection idle timeout; 0ms callbacks
mayhemer
- 1567097 - [meta] enable necko tests in Fenix
- 1546191 - Crash in [@ nsCORSListenerProxy::OnStopRequest]
- what priority it should have?
- should we just work around it?
- NEXT: 1602313 - ThreadSanitizer: data race [@ mozilla::net::nsHttpChannel::OnCacheEntryCheck] vs. [@ ~AutoCacheWaitFlags]
- NEXT: 1596799 - Add a preference for socket peer port remapping
- preload?
Meeting 2019-12-19
Round table:
Next on triage duty: Junior
Kershaw
Ongoing:
- Bug 1600254 - [socket process] Land missing parts of nsHttpTransaction
- Bug 1602832 - [socket process] Enable xpcshell tests for socket process
- Bug 1603420 - [socket process] Add PBackground between parent and socket process
- Bug 1603504 - ThreadSanitizer: data race [@ NS_CopySegmentToBuffer] vs. [@ Pickle::WriteBytes] (memcpy race) through HttpChannelParent
Michal
- 1601654 Implement PreloadService
Junior
Bug 1601671 - websocket connects to DIRECT instead of Proxy-HTTP/HTTPS with SystemProxySettings in Windows
Bug 1582117 - test_prompt_http.html|test_prompt_async.html Fission failure: mCrossOrigin/Ci.nsIAuthInformation.CROSS_ORIGIN_SUB_RESOURCE isn't true
Bug 1600326 - Several tests unexpected fail/pass after enabling the prefs for COOP, COEP, CORP
Bug 1575068 - Message for CORSMissingAllowHeaderFromPreflight seems inaccurate or at least confusing
Bug 1531708 - nsSyncStreamListener drops error status when waiting for data
mayhemer
- still recovering after my week off, getting better
- finished priority reviews
- preload to be given to the DOM team
Andy
QUIC/Neqo:
- version 0.1.9 tagged. Includes transport congestion control and http3 refactoring and improvements.
- Still working with Dragana to fix some last bugs before merging into m-c. Will tag a 0.1.10 shortly, in all likelihood.
Dragana
Updating neqo in mozilla-central, found some assertions(bug?) in neqo.
Bug 1605096 - It may happen that we open multiple http3 connection
Bug 1605090 - Use next_event() instead of events()
Bug 1605099 - Add some telemetry for http3
helping Michal preload. Michal, thank you for hard work.
Meeting 2019-12-12
Round table:
- 1601871 REGRESSION: Websocket connection behind HTTP proxy does not work
- 8 unassigned P1 bugs
Next on triage duty:
- Valentin
Michal
- 1601871 REGRESSION: Websocket connection behind HTTP proxy does not work
- 1468870 WhatsApp Web broken in Firefox
- 1601654 Register speculative loads for rel=preload at nsPrefetchService
Kershaw
Landed:
- Bug 1602026 - ThreadSanitizer: data race [@ ResolvedByTRR] vs. [@ ResolvedByTRR] on mResolvedByTRR
- Bug 1602009 - ThreadSanitizer: data race [@ mozilla::net::TLSServerConnectionInfo::HandshakeCallback] vs. [@ mozilla::net::TLSServerConnectionInfo::SetSecurityObserver] on mSecurityObserver
Ongoing:
- Triage
- Bug 1600254 - [socket process] Land missing parts of nsHttpTransaction
- Bug 1603420 - [socket process] Add PBackground between parent and socket process
- Bug 1602502 - Firefox beta 72.0b4 closes websocket connection with a code:1006 and an empty reason
- Bug 1217876- [e10s] nsIXMLHttpRequest clients in a frame script don't get any visible AuthPrompt when needed
Junior
[land] Bug 1530230 - Content-type header lingers after redirecting from 302 response to POST while using Fetch API
Bug 1345788 - CORS doesn't correctly enforce restrictions on headers across redirects
Bug 1527242 - Intermittent TEST-UNEXPECTED-TIMEOUT | netwerk/test/unit/test_tls_flags.js | Test timed out
[land]Bug 1567462 - Resurrect telemetry for http redirects
Valentin
Landed:
Bug 1543201 - DoH Privacy Enhancement: Do not set the User-Agent header for DoH requests
Bug 1561860 - Add rust-url based nsIURI implementation
Bug 1586411 - Reenable netwerk/test/mochitests/test_different_domain_in_hierarchy.html
Bug 1598663 - Several mochitests Timeout after enabling prefs for COOP, COEP, CORP
Bug 1599816 - Requests are being handled via TRR while connected to a PPTP VPN server
Working on:
Bug 1598575 - Make nsNotifyAddrListener check the local group policy for DNS suffixes
https://github.com/servo/rust-url/pull/537 review is done. Waiting on https://github.com/servo/rust-url/issues/566 to merge and import into m-c
Bug 1602312 landed which unblocks Bug 1552176 - Make it possible to selectively enable TRR
Looking into Windows DNS suffix issues with ICS.
Andy
Neqo/QUIC:
- Landed Neqo 0.1.7
- Connection close PR merged
- CongCtrl PR tests and changes based on review
- Working on: More CongCtrl tests and review changes
Dragana
Addressing review comments and rebasing neqo patches.
Socket process reviews.
1602541 - Remove excluded headers from Http3
Nhi
- 2020 roadmap
- DoH roadmap
- Q1 OKRs
- sec bug triage
Meeting 2019-12-05
Round table:
- Holiday break - Michal can be on triage
Next on triage duty:
Michal
- triage
- [landed] 1600811 network ID: use hardcoded IP for route checking in nsNetworkLinkService on MacOS
- [landed] 1598321 InputStreamShim::AsyncWait() and OutputStreamShim::AsyncWait() are not one-shot
- [landed] 1601620 ThreadSanitizer: data race in mozilla::net::CacheFileUtils::CachePerfStats
- 1601654 Register speculative loads for rel=preload at nsPrefetchService
Kershaw
Landed:
- Bug 1600678 - Modernize PDNSRequest
- Bug 1596409 - [socket process] Land PHttpTransaction IPC protocol
Ongoing:
- Bug 1600254 - [socket process] Land missing parts of nsHttpTransaction
- Bug 1600638 - Investigate how to detect active VPN interface on macOS
- Bug 1217876- [e10s] nsIXMLHttpRequest clients in a frame script don't get any visible AuthPrompt when needed
Junior
Bug 1530230 - Content-type header lingers after redirecting from 302 response to POST while using Fetch API
Spec PR: https://github.com/whatwg/fetch/pull/977
WPT PR: https://github.com/web-platform-tests/wpt/pull/20596
Valentin
Landed:
Bug 1582647 - Pref off the "public-suffix-list-updated" event
Bug 1590528 - The DNS suffix is not always computed when Firefox starts up # fixes bug 1600616
Bug 1598430 - Investigate why NETWORK_ID_ONLINE is absent in ~10% of cases on MacOS # now we wait for telemetry
Working on:
Bug 1543201 - DoH Privacy Enhancement: Do not set the User-Agent header for DoH requests
Bug 1561860 - Add rust-url based nsIURI implementation
Bug 1590337 - Run mochitests with TRR enabled
Bug 1598663 - Several mochitests Timeout after enabling prefs for COOP, COEP, CORP
Bug 1552176 - TRR: Make it possible to selectively enable TRR for pbmode/container/window/etc # blocked on Hazard build failures - sfink looking into it
Next week:
Bugs blocking bug 1595025 - [meta] DNS Suffix List and TRR split horizon - QA bug tracking
Andy
Neqo/QUIC:
- Will be landing Neqo 0.1.7. Fixes library issues, bug fixes, draft 24 support
- PTO/PMTU PR merged
- Working on: connection close PR, CC PR, PR reviews
Dragana
A refactoring of neqo-http3 - waiting for review
Server push ready for review, waiting for previous issue
DoH addon issues (networkChange stuff)
Meeting 2019-11-28
Round table:
- Bug 1600043 - Figure out a way to load the updated etld on startup
- intermittent test failures: how accurate are they? real bugs vs. flaky tests
Next on triage duty: Michal
Michal
- [landed] 1528850 ws-over-h2 receive seems unreliable
- [landed] 1587534 ASAN failure: ERROR: AddressSanitizer
- preload stuff
- 1519126 Assertion failure: !chunk->IsReady()
mayhemer
done:
- multipart decoder and dochannel design
- reviews
- FPN
- triage
- preload: the experimental patch landed to make working on top of it easier, no effect on users; doc for followup work given to Michal
in-prog:
- BT patch rebasing (in spare time)
next:
- week off
Kershaw
Landed:
- Bug 1597956 - Add telemetry to know the performance improvement of using external session cache
- Bug 1598676 - [OSX] Domains that are part of the DNS suffix list are being handled via TRR
Ongoing:
- Bug 1596409 - [socket process] Land PHttpTransaction IPC protocol
- Bug 1030660 - Is ClearBogusContentEncodingIfNeeded() needed?
- Bug 1599498
Valentin
Bug 1541389 - Fix browser_httpCrossOriginOpenerPolicy.js to remove timeouts and not wait for SSTabRestored
Bug 1565004 - TRR: Check for VPN on Windows to use platform DNS
Bug 1565008 - TRR: Check for Proxy on Windows to use platform DNS
Bug 1565022 - TRR: Check for NRPT on Windows to use platform DNS
Bug 1597137 - Don't load TRR entries from the cache if they are part of the excluded list
Bug 1598635 - test_csp_upgrade_insecure_request_header.js, test_http2-proxy.js fail while enabling the prefs for COOP, COEP, CORP by default
In progress:
Bug 1582647 - Pref off the "public-suffix-list-updated" event
Bug 1561860 - Add rust-url based nsIURI implementation
Bug 1590528 - The DNS suffix is not always computed when Firefox starts up
Bug 1590337 - Run mochitests with TRR enabled
Next:
Bug 1598663 - Several mochitests Timeout after enabling prefs for COOP, COEP, CORP
Review rust-url pull https://github.com/servo/rust-url/pull/537
Dragana
Finishing Http3 Push in neqo
DoH experiment
Reviewing the socket proces
Meeting 2019-11-21
Round table:
- fuzzing of QUIC (priority?, how to do it?)
- NETWORK_ID_ONLINE telemetry
Next on triage duty: Honza
Michal
- [landed] 1596419 Network change event can be hidden by coalescing period on Linux/Android
- 1528850 ws-over-h2 receive seems unreliable
- 1598321 InputStreamShim::AsyncWait() and OutputStreamShim::AsyncWait() are not one-shot
- 1590299 Secure websocket fails after 5 minutes
- 1551562 Crash in [@ memcpy | nsJARInputStream::Read]
- 1587534 ASAN failure: ERROR: AddressSanitizer
Kershaw
Landed:
- Bug 1587686 - Intermittent PID 4676 | Assertion failure: XRE_IsParentProcess(), at z:/build/build/src/toolkit/components/windowwatcher/nsWindowWatcher.cpp:703
- Bug 1579049 - Expose all proxy CONNECT response codes
- Bug 1595079 - [socket process] Add an abstract layer to nsHttpTransaction
Ongoing:
- Bug 1596409 - [socket process] Land PHttpTransaction IPC protocol
- Bug 1595786
- Bug 1597956 - Add telemetry to know the performance improvement of using external session cache
Valentin
Done:
QA guides, meetings, testing walkthrough
Bug 1589446 - Add network id change event (Windows)
Bug 1585106 - Crash in [@ mozilla::net::PACResolver::Notify]
Bug 1595242 - Move the offthread negotiate auth to dispatch to the background thread pool
Bug 1596234 - TRR: Check that pushed entry is not used after DNS suffix list changes
Bug 1597683 - Parse DNS suffix list from registry
Working on:
Bug 1565004 - TRR: Check for VPN on Windows to use platform DNS
Bug 1596234 - TRR: Check that pushed entry is not used after DNS suffix - list changes
- we had some data-races in TRR code
- we don't currently run ASAN/LSAN in automation with TRR on
- will either request uplift to beta or pref off network.notify.dnsSuffixList in beta (landed on 71)
- Must prioritize bug 1590337
Bug 1565008 - TRR: Check for Proxy on Windows to use platform DNS
Bug 1565022 - TRR: Check for NRPT on Windows to use platform DNS
Junior
Bug 1528285 - Allow call of AsyncOpen and OnStart/OnStopRequest off the main thread
https://docs.google.com/document/d/1QFnNm1tIdWMrrtCGZlMkenKZ57I0EHHaHpKQG5hRM4Y/edit#heading=h.tsld38sv3hiq
Bug 1567462 - Resurrect telemetry for http redirects
Bug 1557184 - [socket process] handle conflict with Bug 1545420
[Landed] Bug 1579424 - network ID: detect on MacOS when VPN overrides default gateway
[Landed] Bug 1586944 - Intermittent /html/cross-origin-embedder-policy/none.https.html | "require-corp" top-level noopener popup: navigating to "none" should succeed - assert_true: expected true got false
mayhemer
- documentchannel
- preload
- reviews
- needinfo
- 1578227 - Loading arewefastyet.com can sometimes be very slow, hard to conclude w/o proper tools (BT)
Meeting 2019-11-14
Round table:
- 1574372 - Download should be fully done in the parent process.
- Necko Monday time
- Preferences are not sent to the socket thread - 1595833 - Correctly send preferences during startup to the connection manager on the socket thread
Next on triage duty: Andy can't do it. Dragana volunteered.
Valentin
Done:
intern interview
triage
Bug 1588218 - Expose DNS suffix list (Android)
Bug 1567346 - Prevent stack overflow in TRRService::IsTRRBlacklisted
Bug 1562388 - Remove XP legacy NotifyAddrChange call from nsNotifyAddrListener
Bug 1596045 - Modernize test_esni_dns_fetch.js and make sure we're not clearing the cache when setting the URI pref
Working on:
TRR DNS suffix QA guide
Bug 1565004 - TRR: Check for VPN on Windows to use platform DNS
Bug 1552176 - TRR: Make it possible to selectively enable TRR for pbmode/container/window/etc
Bug 1585106 - Crash in [@ mozilla::net::PACResolver::Notify]
Bug 1589446 - Add network id change event (Windows)
Bug 1596234 - TRR: Check that pushed entry is not used after DNS suffix list changes
Bug 1591724 - Intermittent netwerk/test/unit/test_trr.js | test_dnsSuffix - [test_dnsSuffix : 131]
Kershaw
Completed:
- Prepare an interview plan for internship candidates
Ongoing:
- Bug 1595079 - [socket process] Add an abstract layer to nsHttpTransaction
- Bug 1596409 - [socket process] Land PHttpTransaction IPC protocol
- Bug 1587686 - Intermittent PID 4676 | Assertion failure: XRE_IsParentProcess(), at z:/build/build/src/toolkit/components/windowwatcher/nsWindowWatcher.cpp:703
- Bug 1579049 - Expose all proxy CONNECT response codes
mayhemer
- preload, testing it
- facebook account: new test account that should be anonymous, but now again waiting for photo confirmation
- r+- ni
- port remapping becomes a P1
Junior
Bug 1567341 - Find a way to setup content process for netwerk/test/unit_ipc/* for Fenix
Bug 1570889 - blob URLs and CSP sandbox'ed pages should inherit Cross-Origin-Opener-Policy
[landed] Bug 1593445 - Perma TEST-UNEXPECTED-FAIL | /html/cross-origin-opener-policy/coep-navigate-popup.https.html | Popup navigating to same-site with coop/coep - assert_equals: expected "" when Gecko 72 merges to Beta on 2019-12-02
[landed] Bug 1593439 - Perma TEST-UNEXPECTED-FAIL | toolkit/components/remotebrowserutils/tests/browser/browser_httpCrossOriginOpenerPolicy.js | Test timed out - when Gecko 72 merges to Beta on 2019-12-02
[landed] Bug 1595284 - Perma toolkit/components/remotebrowserutils/tests/browser/browser_httpResponseProcessSelection.js | process switch - when Gecko 72 merges to Beta on 2019-12-02
[landed] Bug 1594147 - AddressSanitizer: SEGV /builds/worker/workspace/build/src/dom/xhr/XMLHttpRequestWorker.cpp:1532:34 in mozilla::dom::XMLHttpRequestWorker::MaybeDispatchPrematureAbortEvents(mozilla::ErrorResult&)
[landed] Bug 1576153 - Intermittent /html/cross-origin-embedder-policy/require-corp.https.html | "require-corp" top-level: creating a "none" popup should succeed. - assert_equals: expected true but got false
Michal
- reviews
- [relanded] 1589447, 1589461 Add network id change event on Linux and Android
- 1528850 ws-over-h2 receive seems unreliable
- 1590299 Secure websocket fails after 5 minutes
Dragana
quic: http3server, 0-RTT, working on Server push
Meeting 2019-11-07
Round table:
- preload testing
- 1523367 - Support equivalent of Chromium's
--host-resolver-rules
in Necko any preference on how to impl this?
- 1523367 - Support equivalent of Chromium's
Next on triage duty: Valentin
mayhemer
done:
- r?
in progress:
- preload, 1594449 - Implement in the content process as a speculative load with higher priority, first draft patch we can test with
next:
- preload, testing it
- if any time left, see what I wrote 14 days ago
Valentin
Done:
Bug 1584397 - NodeServer.execute spawns new node process - unit tests are isolated
Bug 1584743 - Intermittent netwerk/test/unit/test_http2-proxy.js - Just one new session seen after changing the isolation key - 3 == 2
Bug 1594055 - Update telemetry email for ex-necko people
Bug 1544724 - DoH Privacy Enhancement: Do not set the 'accept-language' header for DoH requests
Working on:
Bug 1565004 - TRR: Check for VPN on Windows to use platform DNS
Bug 1588218 - Expose DNS suffix list (Android)
Bug 1552176 - TRR: Make it possible to selectively enable TRR for pbmode/container/window/etc
Bug 1582030 - Enable netwerk/test/unit/test_esni_dns_fetch.js which was disabled for intermittent failures
Next:
Bug 1589446 - Add network id change event (Windows)
Bug 1565008 - TRR: Check for Proxy on Windows to use platform DNS
Bug 1565022 - TRR: Check for NRPT on Windows to use platform DNS
Michal
- rebased patches in bug 1394778
- [landed] 1593658 network ID: ID is different after restart on the same network
- [landed] 1593693 nsINetworkLinkService.isLinkUp returns true when no network connection is available
- 1590299 Secure websocket fails after 5 minutes
- 1528850 ws-over-h2 receive seems unreliable
- 1587534 ASAN failure: ERROR: AddressSanitizer
Junior
triage
[landed] Bug 1544231 - Missing 'image/webp' in default value of the 'Accept' header
Bug 1593445 - Perma TEST-UNEXPECTED-FAIL | /html/cross-origin-opener-policy/coep-navigate-popup.https.html | Popup navigating to same-site with coop/coep - assert_equals: expected "" when Gecko 72 merges to Beta on 2019-12-02
Bug 1579424 - network ID: detect on MacOS when VPN overrides default gateway
Meeting 2019-10-31
Round table:
P1 bugs:
Regression:
Intend to expose:
- Bug 1544231 'image/webp' to default value of the 'Accept' header
DoH study data
Next on triage duty: Junior
Kershaw
Landed or to land:
- Bug 1592296 - [socket process] Use SSLTokensCache when socket process is enabled
- Bug 1546660 - Fix nsHttpActivityDistributor
- Bug 1589448 - Add network id change event (MacOS)
Ongoing:
- Bug 1579049 - Expose all proxy CONNECT response codes
- Bug 1370132 - Intermittent dom/base/test/test_bug435425.html | Wrong event! - got "load", expected "progress" | Wrong event! - got "loadend", expected "load" etc
- Bug 1512471 - Proxy certificate validation from Socket Process/Socket Thread to Parent Process
- Plan for landing socket process codes
- https://docs.google.com/document/d/1cWa8MAXftfsxnrjLh5I_V2TgWquQj_ncSe0LkN-hQw0/edit?usp=sharing
Michal
- [landed] 1589447 Add network id change event (linux)
- [landed] 1589461 Add network id change event (Android)
- [landed] 1550815 Crash in [@ xtolong]
- [landed] 1583735 Find out why accessing mmaped JAR file generates SIGBUS
- 1590299 Secure websocket fails after 5 minutes
- 1545909 Hitting Back sometimes shows old cached content
- https://github.com/mozilla-mobile/fenix/issues/6356
- https://github.com/mozilla-mobile/fenix/issues/6360
- rebase patches in bug 1394778
Junior
Bug 1545423 - WebExtension API for the amount of data sent/received
Bug 1580288 - Crash [@ Length] through [@ mozilla::net::nsHttpTransaction::SetHttpTrailer] due to pointer race
Bug 1544231 - Missing 'image/webp' in default value of the 'Accept' header
Bug 1589609 - overwrite of response header under few circumstances with new version of mozila browser (misparsed header format), this can disable many security headers
Bug 1592477 - non-deterministic output on failure: html/cross-origin-opener-policy/popup-redirect-cache.https.html
Andy
Neqo
- merged: Track packets after they are declared lost
- Reviewed PRs
- developing big PR to fix packet size/mtu, implement congestion control, and probe timeout. Mostly working, want to clean up and post PR asap.
DoH
- Reviewed doc for picking initial TRR when multiple are available
- Will likely be presenting on global canary in IETF ABCD (Application Behavior Considering DNS) BoF mid next month
Dragana
Http3 landed -> backed out -> Bug 1592927 - Test test_anonymous-coalescing is racy -> waiting for review
neqo
WebTransport
Secure proxy
Scoping DoH follow up work
mayhemer
done:
- reviews
- needinfo requests
in progress:
- BT visualization
- rel=preload
Meeting 2019-10-24
Round table:
-
1574372 - Download should be fully done in the parent process.
-
Network id
- Multiple network interfaces. e.g., connecting to Ethernet and Wifi at the same time.
- Detect the change of DNS server?
-
SecEng weekly meeting
Next on triage duty: Dragana
Michal
- reviews
- [landed] 1579507 Fix non-working FTP telemetry probes
- [landed] 1590250 network ID: different ID is detected after re-enabling mobile data
- 1589447 Add network id change event (linux)
- 1589461 Add network id change event (Android)
- 1583633 Incorrect User-Agent information for WebSocket connections
- 1587534 ASAN failure: ERROR: AddressSanitizer
- 1590299 Secure websocket fails after 5 minutes
- 1545909 Hitting Back sometimes shows old cached content
Kershaw
Landed:
- Bug 1588726- Closing crazygames page throws NS_ERROR_UNEXPECTED errors in browser console
Ongoing:
- Triage
- Bug 1589448 - Add network id change event (MacOS)
- Bug 1589417 - We should only use default interface's IPv6 address to hash network id
- Bug 1588217 - Expose DNS suffix list (OSX)
- Bug 1370132- Intermittent dom/base/test/test_bug435425.html | Wrong event! - got "load", expected "progress" | Wrong event! - got "loadend", expected "load" etc
- Socket process
mayhemer
was offline for a week
1586845 - DNS resolve callback removal outside lock didn't help with crashes on androif at all :(
done:
- partial audit of the secure-proxy addon state machine, filed an issue for possible improvement
- diagnosed 1587686 - Intermittent PID 4676 | Assertion failure: XRE_IsParentProcess(), at z:/build/build/src/toolkit/components/windowwatcher/nsWindowWatcher.cpp:703 with a fix plan (unassigned)
- made decision on 650091 - Multiple Proxy-Authenticate headers order-dependency bug causes login popup with NTLM + Basic (pick auth schema by safety rating): we want to order auth schema by safety ranking and stop respecting order as the server has sent it
- 1585236 - Conservative TLS settings prevent connecting to a TLS 1.3-only proxy goes to the release channel
- 1590761 - Occasional check of refcounting thread safety in the field
in progress:
- diagnosing with BT: 1567863 - Firefox startup slow - window loads quickly, but first network call delayed, works normal after that
- diagnoses of 1578227 - Loading arewefastyet.com can sometimes be very slow
next:
- 1510262 - nsIncrementalDownload causes a lot of jank with main thread I/O while downloading updates in the background 20/80 try a 20/80 solution I have in mind to mitigate
- 1554652 - Implement asynchronous opening of alternative output stream
- preload
Junior
Socket process rebasing
Bug 1545423 - WebExtension API for the amount of data sent/received
Dragana
Quic
WebTransport
ESNI
Meeting 2019-10-17
Round table:
Next on triage duty: Kershaw
Kershaw
Bug 1584165 - No Network ID is available for Lan connections on MacOS
Bug 1588217 - Expose DNS suffix list (OSX)
Bug 1588556 - We should use SCNetworkReachabilityCreateWithName to check network reachability
Fix conflicts for socket process rebase.
Michal
- triage
- [landed] 1579507 Collect telemetry on FTP usage
- 1588248 Assertion failure: !mProxy->mSyncLoopTarge
- 1583735 Find out why accessing mmaped JAR file generates SIGBUS
- 1587534 ASAN failure: ERROR: AddressSanitizer
- 1583633 Incorrect User-Agent information for WebSocket connections
Junior
VPN detect on macOS
[land] Bug 1566868 - Cross-Origin-Opener-Policy can be used to escape sandboxing
[land] Bug 1523986 - Add more tests for Process-Switching POST loads
Valentin
Fixed:
Bug 1558840 - Expose DNS suffix list (Windows)
Bug 1582472 - Exclude DHCP Search Suffixes from TRR
Bug 1587604 - crash at null in [@ mozilla::net::nsHttpChannel::ReportContentTypeTelemetryForCrossOriginStylesheets]
Bug 1587741 - Captive Portal Service should use a new detector when we start again
Bug 1580976 - Intermittent netwerk/test/unit/test_trr.js | test1 - [test1 : 125] "127.0.0.1" == "2.2.2.2"
Working on:
Bug 1588218 - Expose DNS suffix list (Android)
Bug 1579992 - Load pages into new webCOOP+COEP process type
Bug 1587875 - Clear TRR cache entries when changing DoH servers
Bug 1588219 - Expose DNS suffix list (Linux)
Bug 1589076 - Add dns suffix list to about:networking
Bug 1589387 - Remove warning in about networking
Bug 1413203 - The css for about:networking is not loading in Android
Dragana
Quic.
1588056 - Telemetry about an effect of coalescing network change events
1587226 - Make HTTP_CHANNEL_ONSTART_SUCCESS available on release channel
Meeting 2019-10-10
Round table:
-
how do we fix bugs affecting fennec since it's now on ESR? (valentin)
-
find assignees:
-
FTP telemetry
-
coalescing networking change events for DoH
-
addon changing TRR
Next on triage duty: Michal
mayhemer
done:
- (!) Bug 1586845
- Bug 1544127 added
stalled
, some feedback from boris, answered back - 1586195 - Crash in [@ mozilla::net::HttpChannelParent::RecvRedirect2Verify]
- diagnosed 1567863 - Firefox startup slow - window loads quickly, but first network call delayed, works normal after that
- diagnosed https://bugzilla.mozilla.org/show_bug.cgi?id=1584804
- feedback on rel=preload cache - Google Docs
- 1585236 - Conservative TLS settings prevent connecting to a TLS 1.3-only proxy
- QUIC/h3 reviews
- nsHttpChannel logan props doc completed: Necko classes and properties · mayhemer/logan Wiki
- triaging
in progress:
- look at arewefastyet.com slow with FPN
- open alt data input stream async: figure what the failure I'm hunting actually is
next:
- audit of SP addon state machine
maybe next:
- appcache sanitization for thumbnail container (mt io)
- 1523367 - Support equivalent of Chromium's --host-resolver-rules in Necko
Valentin
landed
1531405 - Gather telemetry on cross-origin style sheet Content-Type headers
1533957 - cancel requests before removing from LoadGroup
1576480 - fix test_setting_document.domain_idn.html for fission
1586755 - Fix Json::Reader deprecated warning in TestMozURL
working on
1558840 - Add nsINetworkLinkService.dnsSuffixList implementation for windows r=mayhemer
1579992 - coop+coep remote type
1552176 - TRR: Make it possible to selectively enable TRR for pbmode/container/window/etc
1587741 - Captive Portal Service should use a new detector when we start again
Michal
- [landed] 1585920 network ID: fix VPN detection on Linux for non ethernet devices
- [landed] 1586731 network ID: drop routes/addresses when link/address is removed by the kernel
- 1579507 Collect telemetry on FTP usage
- 1549398
- 1550815
- 1583735 Find out why accessing mmaped JAR file generates SIGBUS
Junior
Bug 1579424 - network ID: detect on MacOS when VPN overrides default gateway
- workable, wait for review for the first half. Need to test for more vpn clients.
Bug 1566868 - Cross-Origin-Opener-Policy can be used to escape sandboxing
- spec change, backout
Bug 1523986 - Add more tests for Process-Switching POST loads
- P2 r+, need to work on test of extension next
Dragana
Bug 1584791 - NSPR: Incorrect code found via PVS-Studio Static Analyze
Bug 1581599 - Some HTTP/2 responses are incorrectly marked as weakly framed
neqo-http3 refactor part 1 done.
Bug 1581637 - Add Http3 support
Meeting 2019-10-03
Round table:
- Bug 1563173 - TRR - fallback to a second resolver [mode3] (valentin)
- Bug 1583633 - Incorrect User-Agent information for WebSocket connections (agrover)
Next on triage duty: Honza
Valentin
Bug 1531405 - Gather telemetry on cross-origin style sheet Content-Type headers
Bug 1557292 - Remove assertion peerAddr.Contains(':')
Bug 1576480 - Fix test_setting_document.domain_idn.html for fission
Bug 1585748 - Update test_trr.js to account for network.trr.request-timeout being renamed
Bug 1552176 - TRR: Make it possible to selectively enable TRR for pbmode/container/window/etc
next:
Bug 1579992 - coop+coep remote type
Bug 1572513 - Abort and BFCache handling for COEP headers
Junior
Bug 1582966 - Crash in [@ mozilla::net::FTPChannelParent::NotifyDiversionFailed]
Bug 1580288 - Crash [@ Length] through [@ mozilla::net::nsHttpTransaction::SetHttpTrailer] due to pointer race
Bug 1575799 - Download from a synology NAS is failing
Bug 1584005 - undefined shift in modules/libjar/zipwriter/nsZipHeader.cpp
Michal
- 1584089 "Network ID" column is not empty when there is no internet connection available
- 1582359 Parse host:port correctly when PAC string includes credentials but scheme is not present
- 1585920 network ID: fix VPN detection on Linux for non ethernet devices
mayhemer
- 1544127 no response from bz, nika, added smaug
done
- 1584207 - Forward nsILoadInfo.requestBlockingReason to the parent process for both old and new redirect channels
- 1585236 - Conservative TLS settings prevent connecting to a TLS 1.3-only proxy
- BT on macOS
in progress:
- BT -> OKR
- open alt data input stream async: figure what the failure I'm hunting actually is
- QUIC/h3 reviews
next:
- appcache sanitization for thumbnail container (mt io)
- 1523367 - Support equivalent of Chromium's --host-resolver-rules in Necko
- look at arewefastyet.com slow with FPN
Dragana
-
QUIC interop: https://docs.google.com/spreadsheets/d/1D0tW89vOoaScs3IY9RGC0UesWGAwE6xyLk0l4JtvTVg/edit#gid=1510984897
-
refactor neqo
-
rel=preload
Andy
Triage
DoH
- Answering questions from doh-canary-domain@mozilla.com
- DoH UX discussions
Quic
- PR review
- event refactor
Meeting 2019-09-26
Round table:
- Bug 1582359 - Should we make
http
to default if system proxy doesn't specify protocol? - Bug 1582481 - WebSocket leaks
- Bug 1584151 - Network ID is not updating properly on Windows
- Bug 1584165 - No Network ID is available for Lan connections on MacOS
- Network change events on 69 for DoH rollout:
- no event when DNS server change
- no event when switching to VPN (has logs)
Next on triage duty: Andy
Michal
- helping decoder with FTP fuzzing
- [landed] 1561944 Implement nsINetworkLinkService.networkID for Android
- [landed] 1583204 No Network ID is available when switching between WiFi and Lan networks
- [landed] 1577862 Websockets should prioritize SOCKS5 proxies over HTTP(S) proxies
- 1584089 "Network ID" column is not empty when there is no internet connection available
- 1549398
Kershaw
Bug 1560353 - Cert verification cache
Bug 1580272 - When running tests, ssl external cache is cleared
Bug 1546185 - Assertion failure: !mEventDispatchingSuspended, at /builds/worker/workspace/build/src/dom/xhr/XMLHttpRequestMainThread.cpp:1259
Bug 1567343 - Investigate DNSv6 issues in Fenix
Valentin
Bug 1582515 - Add ability for httpd.js to execute code moz-http2.js and spawn new servers
Bug 1583170 - The Network ID field is not populated
Bug 1533957 - loadgroup cancel
Bug 1572513 - Abort and BFCache handling for COEP headers
Bug 1552176 - TRR: Make it possible to selectively enable TRR for pbmode/container/window/etc
Bug 1531405 - Gather telemetry on cross-origin style sheet Content-Type headers
Intern document & hackerrank questions
- thanks to Kershaw for help and feedback
Dragana
Quic,
rel=preload
Junior
Triage
Larch Rebase - ing
Bug 1574000 - Obtaining COOP only works over a secure context
Bug 1583929 - remove unused flag for FTPChannelParent
mayhemer
done
- 1544127 (not much progress, suspecting CC)
- 1556451 - Requests blocked by CORS, tracking don't display properly in Network panel
in progress:
- BT -> OKR
- open alt data input stream async
next:
- appcache sanitization for thumbnail container (mt io)
- 1523367 - Support equivalent of Chromium's --host-resolver-rules in Necko
Andy
DoH
- http://use-application-dns.net now points at SUMO
- What UX for DoH status?
- DoH Settings UI Rework proposal.
- TODO: Follow up on adding canary for another ISP
- TODO: Ensure reliability & monitoring in place for use-application-dns.net
Quic:
- Cloudflare QUIC blog announcement post includes Mozilla quote https://blog.cloudflare.com/http3-the-past-present-and-future/
- Hacking on transport event refactor, using Server class in neqo-http3-server.
Meeting 2019-09-19
Round table:
- have an IPC "pipe" with an integrated flow control to reuse?
- currently used between HttpChannelParent/Child
- probably used for new actors on the socket process
- TCPSocket (used to be dom exposed, now it's used by webrtc as the main tool for connection establishment when proxying - in progress)
- DevTools request: bug 1556451 (http-on-cancel-request)
- Bug 1581599 - Some HTTP/2 responses are incorrectly marked as weakly framed
- multiple network change events on Windows, none on Linux
- Intern document & hackerrank questions
Next on triage duty: Junior
Junior
larch - expired, need to extend? https://wiki.mozilla.org/ReleaseEngineering/DisposableProjectRepositories#BOOKING_SCHEDULE
Bug 1580976 - Intermittent netwerk/test/unit/test_trr.js | test1 - [test1 : 125] "127.0.0.1" == "2.2.2.2"
Bug 1574000 - Obtaining COOP only works over a secure context (r?nika,bz)
Bug 1566868 - Cross-Origin-Opener-Policy can be used to escape sandboxing (in discussion)
Bug 1557639 - Minor visual bug upon COOP browsing context group switch
Valentin
Triage
Bug 1513574 - Remove UserAgentOverrides.jsm
Bug 1581655 - left shift of negative value -1 in netwerk/base/nsProtocolProxyService.cpp:678:56
Bug 1582051 - Use Buffer.from and Buffer.alloc in moz-http2.js & friends
Bug 1577574 - Assertion failure: false (unexpected scheme), at netwerk/protocol/http/AlternateServices.cpp:43
Bug 1576386 - Set a 2 second timeout when shutting down the Link Monitor thread [landed]
Bug 1580130 - Call calculateNetworkId() after every CheckAdaptersAddresses + better telemetry r=dragana [landed]
Bug 1580750 - More necko fission mochitests
Bug 1581159 - [meta] Improved network attributes detection
Intern document & hackerrank questions
mayhemer
- secure proxy phase 2 updates
done:
- secure proxy crashes: only the one known in 69(.0.0), 47 crashes since FPN release = <<10 a day
- most crash bugs I'm assigned to
- using a build with forced non-t-s refcnt checking for daily browsing: no crashes in 4 days :(
- (in progress) 1582228 - Detect evil concurrent access on RefPtr, nsCOMPtr et al objects draft of a runtime checker for concurrent re-assignment of ref/com/smartptrs; not that easy to do, lot of assumptions about RefPtr being like a "raw ptr", but with some more work added into this I can see some possible way of doing it, see the bug
- 1546191 - Crash in [@ nsCORSListenerProxy::OnStopRequest] duplicate of 1529911, uplifted to esr68 to fix fennec
- 1536772 - Intermittent netwerk/test/crashtests/785753-1.html | application crashed [...] gave up on this, no longer able to repro :( rate is small
- 1580921 - Improve thread-safety checks on mozilla::WeakPtr no crashes found...
- 1580182 - Allow mozilla::SupportsWeakPtr be on base classes as well. landed, not used
- figure possible throttling via Windows Filtering Platform (successor of LSP)
- there is a way but we won't use it, want own non-root solution
- we have a plan for throttling
in progress:
- BT -> OKR
- Necko classes and properties · mayhemer/logan Wiki incrementally documenting the properties you can filter and search by in logan
next:
- open alt data input stream async
- appcache sanitization for thumbnail container (mt io)
- 1523367 - Support equivalent of Chromium's
--host-resolver-rules
in Necko - 4 or 5 P1 DoH bugs
Kershaw
Bug 1560353 - Cert verification cache
Bug 1546816 - Changes needed to make proxy certificate validation from Socket Process/Socket Thread to Parent Process easier
Bug 1555322 - Crash in [@ mozilla::dom::WebSocketImpl::Dispatch]
Help DevTools to implement Server Timings.
Meeting 2019-09-12
Round table:
Next on triage duty: Valentin
Valentin
Bug 1558310 - Remove main thread check in nsStandardURL::nsStandardURL() r=dragana
Bug 1576386 - Don't recompute the networkId during shutdown r=michal [landed]
Bug 1580130 - Call calculateNetworkId() after every CheckAdaptersAddresses + better telemetry r=dragana
Bug 1579331 - URL constructor fails when input is a data URL without a comma r=baku
Bug 1580750 - Enable necko mochitests in fission runs r=JuniorHsu - window.opener was fixed by kmag, so that only leaves 4-5 other mochitests to fix
Updated https://wiki.mozilla.org/Trusted_Recursive_Resolver with pref descriptions
mayhemer
done
- Bug 1574971 (wp in h2), dep on 1579500
- sec-proxy addon bugs
- raptor/throttling talks (see next)
- watching crashes with secure proxy in the net:: code, looking mostly good after the first day in US
- r?/ni?
next
- most crash bugs I'm assigned to
- BT -> OKR
- open alt data input stream async
- appcache sanitization for thumbnail container (mt io)
- figure possible throttling via Windows Filtering Platform (successor of LSP)
Kershaw
Socket process:
Bug 1579874 - SocketProcess misidentified as Content Process in crash reports
Bug 1560353 - Cert verification cache
Bug 1580138 - SSLTokensCache should be isolated by OriginAttributes
Bug 1580272 - When running tests, ssl external cache is cleared
Others:
Bug 1580046 - user-defined network.trr.excluded-domains may get overwritten
Bug 1576171 - Assertion failure: ((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1))) || rv == NS_ERROR_NOT_AVAILABLE, at /builds/worker/workspace/build/src/netwerk/protocol/ftp/FTPChannelParent.cpp:626
Andy
DoH
- Global canary issues: dnssec, Windows Server, domain ownership
- Changing global canary test from "query returns NXDOMAIN" to "query returns any error or success without (A or AAAA)"
- 1st draft of doc on expanding DoH-related UI
- TODO: investigate DNS64 issue
QUIC
- worked on http3 event filtering
- Some thought on Q4 QUIC OKRs
- TODO: catch up on reviews, push to meet Q3 OKRs
Junior
Bug 1571573 - Use node v8.11.3 in toolchain instead of node in tooltool [landed]
Bug 1580108 - Perma [tier 2] IOError: node not found at MOZ_NODE_PATH Z:/task_1568090273/fetches\node/node.exe [P1: test coverage test r+, P2: tryselect r?, arch64: depends on 1578963]
Bug 1579012 - COOP bug within iframes [landed]
Bug 1574690 - Adjust wpt metadata for COOP and COEP tests [landed, fixing wptsync upstream error]
Nhi
- DoH
- test plan review, QA support
- addon rollback/rollforward
- TRR/addon bug triage
- planning
- 71 bug triage
- Q4 OKRs
- Internship 2020
- work week proposal
Dragana
Quic mostly.
Meeting 2019-09-05
Round table:
- Network throttling tool
- browser.dns.resolve(hostname, flags) -> "NS_ERROR_UNKNOWN_HOST" for NXDOMAIN?
- NXDOMAIN testing
Next on triage duty:
Valentin Dragana
Andy
QUIC:
- Trying to get open PRs reviewed and merged. Reviewed mt's retry support PR.
- PR 183 to generate StreamWriteable event only when conn credits, stream credits, and tx buffer space are all available.
- Giving Cloudflare a quote to use in their QUIC support announcement.
DoH:
- DoH initial rollout getting closer
- More flexible DoH configuration UI is needed. Starting to work on doc describing requirements and issues. (due 9/30).
- TODO: Update https://use-application-dns.net with latest text.
Michal
- reviews
- 1561944 Implement nsINetworkLinkService.networkID for Android
- 1578254 10.81% build times (windows2012-aarch64) regression on push c8660505bc7e65f20c5959fb4e940df17a1c3d9e (Tue August 27 2019)
- 1577571 OnStop not called on listener after successful asyncOpen
- 1577862 Websockets should prioritize SOCKS5 proxies over HTTP(S) proxies
- 1575934 Application cache regression in version 67.0
- 1549398
Kershaw
Triage
Bug 1512471 - Proxy certificate validation from Socket Process/Socket Thread to Parent Process
- working
Bug 1546660 - Fix nsHttpActivityDistributor
- working
Bug 1577196 - Assertion failure: mLoadGroup, at /builds/worker/workspace/build/src/dom/fetch/FetchDriver.cpp:510
- r?
Junior
Back on Tue
Bug 1571573 - Update node
- tom prince suggested to use toolchain in this time since all dependent bugs are resolved. I have one workable patch but hit try-select test failure
Bug 1574690 - Adjust wpt metadata for COOP and COEP tests
- WIP
Dragana
- Http3 support in firefox and neqo work
- Helping decoder fuzzing proxies
Nhi
- DoH rollout
- integration tests with DoH enabled?
- 71 prioritization
- Q4 OKRs
- FTP telemetry data?
mayhemer
1574882 - Add .moz_log extension to log files automatically to have a distinction
1575217 - nsHttpTransaction::IsDone, for 69.0.1
1578136 - TLSFilterTransaction::OnReadSegment
1574971 - Consider using weak ptrs
fuzzing
two cookie bugs in 69 express diagnoses
Q(junior): Update node in tooltool to v8 .11 .3 ?
Meeting 2019-08-28
Round table:
- review assigned P2 bugs, adjust for 70
- integration tests with trr.mode == 2
Next on triage duty:
Junior Kershaw
Michal
- 1567616 network id based on default gateway is wrong when VPN overrides default gateway by more specific routes
- 1561944 Implement nsINetworkLinkService.networkID for Android
- 1577186 Remove unused old cache telemetry probes
- 1570932 Add telemetry about how often we observe network change events
- 1576826 Intermittent Assertion failure: isResponse, at /builds/worker/workspace/build/src/netwerk/system/netlink/NetlinkService.cpp:613
- 1577354 Assertion failure: decoded.CountChar('\t') == 2, at /netwerk/cache2/CacheFileContextEvictor.cpp:409
Kershaw
Bug 1576183 - Assertion failure: mWorkerPromise, at /builds/worker/workspace/build/src/dom/promise/Promise.cpp:707
- r+
Bug 1577428 - Not allow nsICertOverrideService to be implemented in js
- r?
Andy
QUIC
- Told Cloudflare we cannot commit to Sep 23 date for joint announcement on QUIC support. Still too many unknowns and missing pieces.
- Continuing work on fixing bugs, reviewing PRs, and implementing missing critical features for initial inclusion in mozilla-central.
DoH rollout
- Preparing for North America DoH rollout with plugin
- Working on SUMO doc around heuristics
- Use of global canary domain: what we're going to do should be considered an interim solution until something better gets standardized, but it's really important that we have some solution at launch
- Expect functionality in plugin will need to eventually transition to the platform, including heuristics. We should expect heuristics and logic around DoH operation will be needed for medium- if not long-term.
Meeting 2019-08-22
Round table:
- Bug 1567931
- SC for Fenix
- UI notification for when TRR fails to resolve
- review P1 bugs for 70 (merge in 10 days): bug list
- Bug 1554652
- unassigned P1s
Next on triage duty: Michal
Michal
- 1569999 Closing Firefox clears JavaScript files from Appcache
- 1569098 Intermittent TEST-UNEXPECTED-TIMEOUT | /fetch/sec-metadata/redirect/redirect-https-downgrade.tentative.sub.html
- 1568816 Intermittent TEST-UNEXPECTED-TIMEOUT | /fetch/sec-metadata/redirect/redirect-http-upgrade.tentative.sub.html
- 1567616 network id based on default gateway is wrong when VPN overrides default gateway by more specific routes
Kershaw
- Bug 1571356 - "Proxy DNS when using SOCKS v5" enabled, but not immediately used
- Bug 1570732 - DIsable DoH if parental controls detected
- Socket process Bug 1546816 - Changes needed to make proxy certificate validation from Socket Process/Socket Thread to Parent Process easier
Bug 1560354 - Improve CertVerifier::VerifySSLServerCert
mayhemer
- docchan rev
- general reviews
- added andy to the triage calendar
- .moz_log mandatory extension
- 1562276 - RST_STREAM with HTTP_1_1_REQUIRED code from the end server not handled (transaction not restarted) when using h2 proxy
- little BT time
Meeting 2019-08-15
Round table:
Bug 1440677 - herokuapp.com - Problems with spaces in filenames (content-disposition not quoted)
Next on triage duty: Honza
Kershaw
-
Triage
-
Bug 1571283 - Crash in [@ mozilla::dom::FetchDriver::OnStartRequest] landed
-
Bug 1570732 - DIsable DoH if parental controls detected not sure what to do
-
Bug 1553267 - Assertion failure: mListener, at /builds/worker/workspace/build/src/netwerk/protocol/http/HttpChannelChild.cpp:673 r?
-
Socket process
Junior
Land:
Bug 1543068 - Final Cross-Origin-Embedder-Policy design
Bug 1543066 - Final Cross-Origin-Opener-Policy design
R?:
Bug 1574000 - Obtaining COOP only works over a secure context
Will focus today and tomorrow:
Different behavior between Nightly and built Nightly
Bug 1566868 - Cross-Origin-Opener-Policy can be used to escape sandboxing
Bug 1572513 - Abort and BFCache handling for COEP headers
Not focus this week:
Bug 1571573 - Update node in tooltool to v8.11.3
Michal
- reviews
- backed out 1544127
- 1569098 Intermittent TEST-UNEXPECTED-TIMEOUT | /fetch/sec-metadata/redirect/redirect-https-downgrade.tentative.sub.html
- 1552373 Secure Connection Failed
- 1544757 Failed assertion MOZ_ASSERT(mRaceCacheWithNetwork || !(mTransactionPump && mCachePump) || mCachedContentIsPartial)
- 1560421 No frames are displayed for some WS connections
- 1550815 Crash in [@ xtolong]
- 1569999 Closing Firefox clears JavaScript files from Appcache
Nhi
- DoH rollout
- TRR bug triage
- SC skyline bug review
mayhemer
BT: fixing overhead when off, getting better, but still some platforms show significant regs
1562276 - RST_STREAM with HTTP_1_1_REQUIRED code from the end server not handled (transaction not restarted) when using h2 proxy some progress made, need to catch with wireshark
TCPSocket for webrtc
a? for some P1 proxy patches
- 1572790
- 1554411 - Failing MOZ_ASSERT(FindTunnelCount(ci)) in Http2Session::UnRegisterTunnel
- 1563027 - h2 tunnel streams queued for reaching session parallelism limits are not dequeued
- 1571405 - Remove the recently added "Active connection not found" assertion
Andy
QUIC/Neqo
- Landed idle timeout PR
- reviewed PRs
- go/nogo meeting next Tuesday with Cloudflare for joint announcement on September 23
- co-operating with CF to test Neqo against their server & resolve issues
- next: cong. control maybe? Or improve loss recovery.
Meeting 2019-08-08
Round table:
-
bug 1570732 DIsable DoH if parental controls detected
-
bug 1370132
XMLHttpRequestMainThread::OnProgress is not called, so it doesn't set mProgressSinceLastProgressEvent to true.
-
Performance cost of detecting split-horizon and parental controls Cost of getting TLD from a URL? Look up some domain names when network changed?
-
TRR mode 5: when?
Next on triage duty: Kershaw
Kershaw
Socket process
- Address review comments
Bug 1569196 - Support webrtc to do DNS lookup on socket process
- done
Bug 1570950 - Crash in [@ mozilla::ipc::MessageChannel::Clear | mozilla::ipc::MessageChannel::~MessageChannel | mozilla::ipc::IToplevelProtocol::~IToplevelProtocol]
- done
Bug 1571987 - Make sure proxy checks work with the socket process
- r?
Bug 1456005 - TRR deadlock when captive portal detection fails
- r?
Bug 1553267 - Assertion failure: mListener, at /builds/worker/workspace/build/src/netwerk/protocol/http/HttpChannelChild.cpp:673
- investigating.
Michal
- 1561944 Implement nsINetworkLinkService.networkID for Android
- 1567616 network id based on default gateway is wrong when VPN overrides default gateway by more specific routes
Junior
Bug 1571573 - Update node in tooltool to v8.11.3
Bug 1543068 - Final Cross-Origin-Embedder-Policy design: all patches r+ed
Bug 1543066 - Final Cross-Origin-Opener-Policy design: r?
Dragana
Quic
WebTransport
Meeting 2019-08-06
Round table: trr bug 1570732 Static prefs Next on triage duty:
Meeting 2019-08-01
Round table: Bug 1546191 - Crash in [@ nsCORSListenerProxy::OnStopRequest]
Next on triage duty: Dragana
Michal
- 1544757 Failed assertion MOZ_ASSERT(mRaceCacheWithNetwork...
- 1570660 Add network ID to about:networking
- 1561944 Implement nsINetworkLinkService.networkID for Android
- 1567616 network id based on default gateway is wrong when VPN overrides default gateway by more specific routes
Junior
triage
Bug 1543068 - Final Cross-Origin-Embedder-Policy design
Bug 1566295 - Evernote Web Clipper (EWC) can't log in
Bug 1569772 - Crash in [@ mozilla::ipc::MessageChannel::CxxStackFrame::CxxStackFrame | mozilla::ipc::MessageChannel::Send | mozilla::net::PNeckoChild::SendRemoveRequestContext]
Bug 1528607 - Intermittent toolkit/components/remotebrowserutils/tests/browser/browser_httpCrossOriginOpenerPolicy.js | Test timed out -
Kershaw
- Bug 1512478 - Have IPC for picking client certificate for authentication rebased and comment addressed.
r?
-
Bug 1542037 - Crash in [@ mozilla::net::nsIOService::NewChannelFromURIWithProxyFlagsInternal] r?
-
Bug 1555322 - Crash in [@ mozilla::dom::WebSocketImpl::Dispatch] investigating
-
Bug 1567774 - Google sites (partially) not working on IETF network with DoH mode 3 worksforme
Meeting 2019-07-25
Round table:
- Bug 1452599 - DNS-Over-HTTPS mode == 3 bypassed during shutdown incoming.telemetry.mozilla.org from pingsender s3-us-west-2.amazonaws.com from crash reporter
Next on triage duty: Junior
Michal
- triage
- 1556207 Tab burst twice when open http://link from file://path/index.html
- 1561273 network ID: ipv4NetworkId/scanArp returns gateway IP instead of its MAC
- network ID
- 1544757 Failed assertion
Junior
Bug 1543068 - Final Cross-Origin-Embedder-Policy design
-- pass all wpt tests except one in dom, waiting for review
Bug 1528607 - Intermittent toolkit/components/remotebrowserutils/tests/browser/browser_httpCrossOriginOpenerPolicy.js | Test timed out -
mayhemer
interesting:
- MOZ_LOG to memory, first patch, needs tuning - still overhead, too many atomics
done:
- BT: talos, f?
- docchannel moves forward (hard to talk to someone on the other side of the globe ;))
- 1561912
- r±, ni✓
Kershaw
-
Bug 1564296 - Download finishes "successfully" when download is interrupted by switching network connection Done
-
Bug 1267643 - Firefox fails with a handshake error when trying to connect to a site requesting a client certificate signed by a different CA than itself r?
-
Bug 1564960 - Assertion failure: !NS_IsMainThread() (Should not be called on the main thread), at netwerk/system/mac/nsNetworkLinkService.mm:327 r?
Meeting 2019-07-18
Round table:
- bug 1530175
- bug 1566998 - WebRTC/TRR
- bug 1477342
- bug 1550815 - crash in xtolong
Next on triage duty: Michal
Junior
Bug 1567097 - Investigate necko test failures in Fenix
Sec: Bug 1565912
Bug 1561712 - Write a test for downloads with COOP enabled : land
Bug 1523986 - Add more tests for Process-Switching POST loads : P1 r? P2 ni?
Re-SAB Investigate COOP and COEP spec change
Kershaw
Bug 1566030 - Remove nsIClientAuthUserDecision
- r?
Bug 1566033 - Update ExportDEREncryptedPrivateKeyInfo and ImportDEREncryptedPrivateKeyInfoAndReturnKey to more modern C++
- r?
Bug 1267643 - Firefox fails with a handshake
error when trying to connect to a site requesting a client certificate
signed by a different CA than itself
- wip
Bug 1242221 - Intermittent| Main app process exited normally | application crashed [None]
- r?
Bug 1564175 - Once CORS header wildcard support is added in , revert the webcompat fix made in .
- Done.
Michal
- DocumentChannel
- 1556207 Tab burst twice when open http://link from file://path/index.html
- 1550815 Crash in [@ xtolong]
- 1544127 secure bug
- 1530175 secure bug
mayhemer
- proxy: new bug 1567133
- bt: fixing builds, getting talos compare
- docchannel: helping matt from the dom team who took over this
- interesting: mitmproxy will no longer be used for talos/perf tests, we again want to rather build something internal (Tarek Ziade)
Nhi
- secure proxy
- DoH triage/rollout planning
- internship application
- contractor interviewing
Meeting 2019-07-11
Round table:
- bug 1550815 - Crash in [@ xtolong]
- Bug 1564296 - Download finishes "successfully" when download is interrupted by switching network connection
- bug 1556711
Next on triage duty: Honza
Kershaw
- Triage
- Bug 1563821 - Intermittent mozilla::ipc::MessageChannel::WillDestroyCurrentMessageLoop assertion in socket process
- Bug 1560636 - IPC messages from socket process happen on main
- Bug 1512478 - Have IPC for picking client certificate for authentication
Andy
Neqo/QUIC
- Virtual Interop day yesterday. Refactoring and testing.
DoH
- global canary I-D filed
- opened 3 BZs for better DNS platform/app integration on Windows (not needed for MVP)
Junior
Bug 1561712 - Write a test for downloads with COOP enabled
Have a workable test. Wait for ni?(nika) to confirm if there's dom issue.
Bug 1523986 - Add more tests for Process-Switching POST loads
Question: did we mock the ftp server in test before?
Michal
- reviews
- DocumentChannel
mayhemer
- sec proxy (new bug found, generally not 100% reliable, still..)
- bt to land!
Meeting 2019-07-04
Round table:
- caching for socket process
- double-keying cache
Next on triage duty: Kershaw
Junior
fission bugs investigation
Bug 1424076 - Enable network.http.sendOriginHeader by default
-- all r+'ed, soft freeze now. Will take the next train. Bug 1562084 - Description for non proxy-ing localhost
[fetch] Remove brief to unhide the note in fetch-redirect #914
Kershaw
Bug 1512478 - Have IPC for picking client certificate for authentication
- r?
Bug 1309358 - [CORS] Add wildcard to Access-Control-Expose-Headers, Access-Control-Allow-Methods, and Access-Control-Allow-Headers
- P1: r+
- P2: r?
Michal
- 1556487 Replace HttpChannelParentListener with a more generic class
mayhemer
secure proxy.......
Dragana
quic security
secure proxy
Nhi
- OKRs
- socket process test plan
- secure proxy triaging
Meeting 2019-06-27
Round table:
- Media team question on mDNS support for WebRTC
- Bug 1561286 Random resources are flagged as downloads instead of normal loads
Next on triage duty: Valentin (will be on leave). Changed to Dragana
Valentin
Bug 1547704 - Investigate if CaptiveDetect.jsm requires LOAD_BYPASS_URL_ClASSIFIER flag
Bug 1560703 - regression: No longer possible to disable FTP (network.ftp.enabled;false is without effect)
Bug 1560554 - Disable warning prompt from about:networking
Bug 1559340 - Make sure NetworkConnectivityService::Init() only gets called once
Bug 1395914 - Network id: attempt to identify IPv6 network
Bug 1561005 - Network ID: add nsINetworkLinkService.networkID
Bug 1561089 - Fission: http://twitter.com/ does not redirect to https if you are not logged in - We weren't setting the resultPrincipalURI when redirecting. Thanks Honza!
Bug 1561712 - Test downloads with COOP enabled
Kershaw
-
Bug 1512478 Have IPC for picking client certificate for authentication wip
-
Bug 1555927 Cacheable Http 204 (No Content) responses to GET request not cached r?
Michal
- reviews
- 1556487 Replace HttpChannelParentListener with a more generic class
Junior
triage
[whatwg/fetch] Let Origin header honor referrer policy for non CORS request (#908) (merged)
[web-platform-tests/wpt] Origin outside of CORS and interaction with the Referrer Policy (#14260) (merged)
Bug 1424076 - Enable network.http.sendOriginHeader by default - r+ (annevk, dveditz), r?(ckerschb)
Bug 1559707 - Not using heuristic expiration time for non-cacheable requests - r?
Andy
- upcoming dates: virtual interop day july 10, IETF Montreal July 22, Aug 1 integration milestone
- f2f at whistler: triaged open issues
DoH Global Canary
- Coming up with a standard to detect dns content filtering. Next steps: discussing with potential partners, and proposing to IETF in parallel.
mayhemer
- h2 proxy hangs (in-progress) 1463729 - Fast h2 rx may block the socket thread from processing messages
- h2 proxy crash (fixed) 1556491 - Crash in [@ ssl3_SendClientHello | ssl_BeginClientHandshake | ssl_SecureRecv | ssl_Recv | PSMRecv]
Dragana
Necko-neqo: rebase to new neqo and sync my changes to neqo for the integration... working on nsNSSSocketInfo
Socket process:
1560354 Improve CertVerifier::VerifySSLServerCert
1560353 Cert verification cache
Nhi
- contractor interview
- necko recurring coffee break
Meeting 2019-06-13
Round table: bug 1556347
Next on triage duty: Michal
mayhemer
1463729 - Fast h2 rx may block the socket thread from processing messages
Dragana
Necko-neqo integration.
Honza's log
Andy
QUIC/Neqo
- PR merged: Converted to Instant/Duration from u64 nanos
- spawned 7 new issues :frowning:
- pre-review: Refactored timer code
- pre-review: neqo-h3-server: support for timers in event loop
- pre-review: Fix a connection close bug
- next: Review mt's massive 0-RTT PR
- next: Read Dragana's doc
DoH/TRR Mitigation
- Global Canary
Junior
Bug 1504085 - Origin header honors ReferrerPolicy: r+, fixing treeherder
fetch spec: Fix referrer-policy setup for fetch
Bug 1513865 - [socket-process] nsIPrefService.resetPrefs does not work - finding out why IOService can't recognize pref change in js test
Michal
- 1547266 - secure bug
- 1528481 - secure bug
- 1478950 - Fix parsing filename in OS/2 FTP listing
- 1557893 - Diskcache size in about:cache does not fit to about:preferences and even not to real size on disk
Valentin
landed
Bug 1459573 - Support Cross Origin Resource Policy (CORP)
working on
Bug 1527314 - Expand Cross-Origin-Opener-Policy tests
- Intermittent timeouts in verify runs.
- Logging makes it not reproduce. Reason unclear.
Bug 1551601 - Perform cross-process switch before processing cached redirect
- Caused by several bugs:
- After process switch the loadInfo points to the wrong browsingContext
- Call to wg.changeFrameRemoteness in SessionStore.jsm fails because GetEmbedderElement returns null
- BrowserParent::RecvFireFrameLoadEvent is called after the actor is destroyed.
Bug 1395914 - Figure out network id for IPv6 too
Bug 1555036 - COOP: check browsing context's popup sandboxing flag
Bug 1558495 - force retry after a TRR server was down intermittently (in mode 3 only)
Bug 1558858 - Add XPCOM API for inspecting DNS requests/responses
- needed for TRR experiment 7
Network-ID: It seems there is a Windows API that provides a network ID link
Nhi
- performance review
- contractor interviewing
- Fission
- all-hands
Meeting 2019-06-06
Round table:
-
Bug 1478950
-
deleting
mozilla-necko/gecko
repo -
1547997 - Increase network.http.max-connections on android (currently 20) ; asked to help to figure few things
- Moto G5 perf tests are timing out more with this change
- help with figuring out why we have big gains with this change elsewhere (backtracking?)
Next on triage duty: Honza
Kershaw
Socket process
-
Bug 1543698 - Refactor PBackground WIP
-
Bug 1497249 - [socket-proc] Connection stickiness handling for upgrade observers Fix review comments
Others:
-
Bug 1555322 - WebSocketImpl::Dispatch
-
Bug 1556019 - Banned port pref doesn't seem to work working
Triage
mayhemer
- DocumentChannel doc/discussions
- 1556005 - Connections hang when using HTTP/2 proxy + 1463729 - Fast h2 rx may block the socket thread from processing messages
- integrating BT into logan (one log to have them all)
- Update nodejs for testharness to at least 8.4 to support newer http2 APIs · Issue #2150 · mozilla/release-services
- sched for all hands, meeting perf people to explain necko
Junior
Oriign header spec work: under review
rebase larch base on June 4, file Bug 1557184, Bug 1557178, Bug 1557180
Bug 1424076 - Enable network.http.sendOriginHeader by default: fix test failures
Michal
- 1547266 - secure bug
- 1528481 - secure bug
- 1556987 - Invalid assertion in nsHttpChannel::OnPush
- 1555322 - Crash in [@ mozilla::dom::WebSocketImpl::Dispatch]
- 1554466 - Cache folder in custom location disappears on startup. about:cache shows non-existent location
Nhi
- AH meetings
- first party cache isolation?
- product manager
- Fission milestones
- Contractor hiring
- performance review
Andy
QUIC/Neqo
- (Prev) IETF interim. Interop progress, but we're still catching up with other implementations.
- (This week) Fixing bugs and refactoring code. Using Instant and Duration instead of u64 nanoseconds
- (Future) Time at all-hands to talk about QUIC protocol, and Neqo our implementation
DoH
- Nailing down heuristics for parental control and split horizon detection
Load prioritization
- "rejiggering load prioritization in Gecko" possibly involving nsISupportsPriority and nsIClassOfService
- First meeting with bz & mt this afternnoon, will do a summary for team afterwards.
Dragana
Bug 1485652 - Make nsNSSSocketInfo::IsAcceptableForHost work asynchronously on the socket process
Bug 1484751 - [meta] IPC PSM API for network process isolation
Bug 1537761 - Make AlternateServices work when socket process is enabled
Bug 1540574 - XMLHttpRequest state must not be LOADING or DONE is sometimes triggered when HTTP2 is used
neqo + necko - docs and development.
Valentin
landed
Bug 1552886 - Modernize test_trr.js (part 2)
Bug 1554680 - COOP 'unsafe-allow-outgoing' doesn't allow interacting with popups
Bug 1556911 - Don't instantiate NetworkConnectivityService off-main-thread
Bug 1533877 - Write WPT tests for Cross-Origin header
Bug 1548306 - Do not allow the ^ character to appear in the hostname
Bug 1555302 - Ensure that nsStandardURL::Resolve() doesn't parse URLs with a different scheme as relative[]
Bug 1556259 - Make sure CaptiveDetect.jsm interprets any redirect as a locked captive portal
Bug 1555359 - Treat the ExtensionProtocolHandler as threadsafe
Bug 1542561 - TRR: Don't return NS_ERROR_UNKNOWN_HOST when a AAAA response comes back first, but the second A response is NXDOMAIN
Bug 1518730 - Wait for both A and AAAA responses to come back before notifying the listeners
working on
Bug 1527314 - Expand Cross-Origin-Opener-Policy tests
Bug 1459573 - Support Cross Origin Resource Policy (CORP)
Bug 1551601 - Perform cross-process switch before processing cached redirect
Meeting 2019-05-29
Round table:
- Bug 1554079 - Maybe add some MOZ_ASSERTS after the changes to ipc lifecycle
- 1309358 [CORS] Add wildcard to Access-Control-Expose-Headers, Access-Control-Allow-Methods, and Access-Control-Allow-Headers
- Telemetry alerts on Nightly
- bugs 1513519, 1502428, 1549398
- DocumentChannel architecture and prototype
Next on triage duty: Kershaw
Valentin
Bug 1551601 - Perform cross-process switch before processing cached redirect [landed]
Bug 1553582 - Intermittent resource_reparenting.html [landed]
Bug 1536744 - Remove nsIProtocolHandler.newURI [landed] WHOO-HOO!
working on
Bug 1554680 - unsafe-outgoing
Bug 1533877 - Write WPT tests for Cross-Origin header
Bug 1548306 - Do not allow the ^ character to appear in the hostname
Bug 1527314 - Expand Cross-Origin-Opener-Policy tests
Bug 1555302 - Ensure that nsStandardURL::Resolve() doesn't parse URLs with a different scheme as relative[]
blocked
Bug 1552886 - Modernize test_trr.js (part 2) r=dragana
mayhemer
- 1553927 - DoS attack on http2 proxy when secure connection fails (e.g. certificate mismatch)
- looking into 1554093 - Intermittent netwerk/test/unit/test_proxyconnect.js | application crashed [@ mozilla::net::nsHttpConnection::OnOutputStreamReady(nsIAsyncOutputStream*)]
- 1545421 - Propagate useful proxy errors to WebExtensions
- BT rebase
- proxy for testing: mayhemer/node_http2_proxy: A simple HTTP/2 proxy with CONNECT method support based on Node.js
Kershaw
Bug 1550426 - [socket process] Consider using ChannelEventQueue in HttpTransactionParent
- r?
Bug 1545523 - [socket process] Assertion failure: mConcurrentCacheAccess, at /netwerk/protocol/http/nsHttpChannel.cpp:1723
- wip
Bug 1549398
- investigating
Junior
Back on Tuesday
Spec Change on Origin header
Plan to do next:
Bug 1504085 - Origin header honors ReferrerPolicy
rebasing larch (waiting fore drafting patches)
remove mIPCOpen for HttpTransactionParent/Child
Dragana
Firefox+neqo working
needinfos and reviews
Bug 1540574 - XMLHttpRequest state must not be LOADING or DONE is sometimes triggered when HTTP2 is used
Nhi
- Core:General triage
- contractor job posting
- sec bug review
next:
- goal review
- contractor hiring
Meeting 2019-05-23
Round table:
- alt-data changes requested by baku
- https://bugzilla.mozilla.org/show_bug.cgi?id=1553601 Bug 1553601 - Check how we want to isolate h2 proxy tunneling sessions
- 1549807
- double-keyed HTTP cache
Next on triage duty: Dragana
mayhemer
done:
- looked at logs from https://bugzilla.mozilla.org/show_bug.cgi?id=1545909 Bug 1545909 - Hitting Back sometimes shows old cached content
- creating h2 proxy for tests, https://bugzilla.mozilla.org/show_bug.cgi?id=1553222 Bug 1553222 - Disallow authentication processing when 407 is returned by our secure proxy
- https://nodejs.org/docs/latest-v8.x/api/http2.html#http2_supporting_the_connect_method
- analyzes of (esr68 candidate) https://bugzilla.mozilla.org/show_bug.cgi?id=1534190 Bug 1534190 - Authentication required popup because of connection closing in the middle of NTLM/Negotiate negotiation
- logan allows multiple queries for one search
- analyzed https://bugzilla.mozilla.org/show_bug.cgi?id=1547977 Bug 1547977 - Frequent "Unable to connect" when using automatic proxy configuration URL
- BT: started prerequisites for landing instrumentation parts
- abandoned few bugs assigned to me for no activity
question:
- do we need to do the proxy error inter-op field testing?
next week:
- the h2 testing proxy
- https://bugzilla.mozilla.org/show_bug.cgi?id=1545421 Bug 1545421 - Propagate useful proxy errors to WebExtensions
- DNS prefetches check to prevent leaks
- BT: data analyzes discussions
- BT: possible GP integration discussions
- possibly few crash bugs (
1542153,1523202, 1532323, 1536772)
Michal
- 1553166 - Android browser.cache.disk.max_entry_size is too restrictive
- 1549398 - Crash in [@ nsRefPtrHashtable
::Get - 1547266 - Intermittent AddressSanitizer
- cache telemetry
Meeting 2019-05-16
Round table:
- libjar peers
- Necko-replay for network simulation
- Need status of
preload
implementation and plan - DNS prefetch leaking when sec-proxy is configured: address bar and HTMLDNSPrefetch called at 1 2 3
- bug 1550815 - Crash in [@ xtolong]
Next on triage duty:
- need someone to switch with Junior - Valentin
- Nhi pairing with Junior for next turn
Using zoom starting next week - Meeting ID: 777 096 484
Michal
- triage
- [landed] 1546975 - Cache SSL resumption tokens in necko
- [landed] 1550834 - Don't use TLS session ticket if the channel is isolated by anti-tracking checks
- [landed] 1550874 - Don't call SSL_SetResumptionToken if SSL_NO_CACHE option was set on the socket
- 1550460 - Doesnt respect Cache Control && Expires on favicon/x-icon
- 1546044 - Timeout When Reloading Files: LiteSpeed, HTTP Authentication, 304
- 1549398 - Crash in [@ nsRefPtrHashtable
::Get
Valentin
Bug 1551601 - Perform cross-process switch before processing cached redirect
Bug 1540656 - Modernize test_trr.js
Bug 1533877 - Write WPT tests for Cross-Origin header
Bug 1536744 - Make NS_NewURI work off main thread and remove nsIProtocolHandler.newURI
Bug 1552176 - TRR: Make it possible to selectively enable TRR for pbmode/container/window/etc FEEDBACK WANTED
Nhi
- unassigned P2
- roadmap
next:
- more unassigned P2
- upcoming web platform standards work
Meeting 2019-05-09
Round table:
- unassigned P1:
- 1547266 (P2?)
- 1550341 = 1548822, with a patch, sec-approval pending
- 1548804
- 1549398
- 1532323
mayhemer
Bug 1545420 - Allow proxy.onRequest to set Proxy-Authorization header and connection isolation token, handle this in Necko
Bug 1549368 - Limit proxy.onRequest to set proxyAuthorization and connectionIsolation to apply only to https proxies
Bug 1548822
Bug 1540759
Bug 1550498
Bug 1514413 - Opening http://datakitchen.tumblr.com completely hangs system, causes high disk I/O (WONTFIX)
Outline of what to do for Bug 1546924 - Send only ip address to the proxy if trr was used
reviews, usual stuff
Valentin
[TRIAGE]
Bug 1547882 - Some characters are incorrectly escaped in the query part of web-extension URLs
Bug 1536744 - Make NS_NewURI work off main thread and remove nsIProtocolHandler.newURI
Bug 1548994 - Release nsCompleteUpgradeData.mUpgradeListener on the main thread as it is not always threadsafe r=dragana
Bug 1547524 - Crash with service-worker when doing a cross-process redirect for a cached load
Reviewed and helped diagnose failing unit tests for Bug 1545159 implement captivePortal webextension api
Kershaw
Bug 1497249 - [socket-proc] Connection stickiness handling for upgrade observers
P1: r?
P2: almost ready for review
pass all tests under dom/websocket/tests/
Bug 1550426 - [socket process] reuse the state machine from nsInputStreamPump in HttpTransactionParent
Investigating
Bug 1545226 - Some gtests in netwerk/test/gtest are not run on Android
landed
reviews
Junior
-
Socket Process Performance Test document -- need manually test for concurrent tests and throughput test, and ensure we cover the pBg cases, and cover multiple connections case (for security IPCs) -- may issue a request for WebPageTest with preference on/off
-
Treeherder with pref-off looks much better -- Bug 1548944 [socket process] dom/performance/tests/test_worker_performance_entries.html | We have a duration -- Bug 1548726 [socket process] Prevent sync sending activity event
-
larch is non-publish and upcoming pushes will be draft
-
Origin Header Spec Modification
Michal
- 1546975 - Cache SSL resumption tokens in necko
- 1547625 - Private Window does not trigger Websocket's CloseEvent upon closing a tab.
- 1544655 - WPT on Geckoview frequently crashes in some websockets tests
Nhi
- unassigned P1 bugs
Next:
- unassigned P2
- roadmap
Meeting 2019-05-01
RT:
- mayhemer: https://bugzilla.mozilla.org/show_bug.cgi?id=1547556; should we implement this?
- mayhemer: https://bugzilla.mozilla.org/show_bug.cgi?id=1544102; anyone can think of what could cause this?
- mayhemer: https://bugzilla.mozilla.org/show_bug.cgi?id=1540731; pretty awesome changes to how IPC actors are refcounted, behold! or see my conversation with nika
mayhemer
BT: talked to JS people to use it to examine off-main-thread parsing effect on page load, result: more work on BT is needed, but it is definitely worth
BT: actively looking for help to instrument more layout code
BT: more ideas on analytical approach to BT data
logan: added full support for zip loading, even when the zip is hosted on web (allow-origin:* needed!)
Bug 1536511 - Implement stale-while-revalidate c-c response directive handling in HTTP cache validation code; finally landed and sticks
Bug 1542322 - Stale-while-revalidate background requests is made even after closing/canceling the load of the page that requested the resource: decide on priority, this release or later? IMHO, not feasible for this release cycle, but also not easily upliftable
Bug 1546780 - Investigate necko priorities for speculative loads: watching this one closely!
reviews, discussions
Became peer of two modules: cookies and permissions
Was on triage: we have unassigned P1s:
1540759
1528481
1547266
Michal
- 1546975 - Cache SSL resumption tokens in necko
- 1548472 - Collect telemetry about how is the cache split by the content type
- 1544655 - WPT on Geckoview frequently crashes in some websockets tests
- 1547797 - Entry size limits should be different for different content-types
Andy
- Neqo (QUIC)
- More flow control message work - don't queue duplicate flow control frames for sending. (Different frames have different scopes -- connection, stream, or stream type -- to be unique within)
- DoH
- Mitigating parental controls: nobody likes resolving explicit origins. Selena found an alternative that involves resolving google, which gets redirected to safesearch google. Going to try this myself, fingers crossed.
- Mitigating split horizon: turning off TRR for non-eTLDs to start. Sounds like this needs per-channel TRR-disable capability --> Necko changes? (new load flag?) Need to meet with Valentin + others to figure out next steps, try to sched. for tomorrow.
- Looking to do another study to get an idea of just how often we will be turning off TRR if we adopt these or other heuristics. Hopefully we can get an answer quickly. Will be trying to get this underway today.
Valentin
PTO
Bug 1525640 - Let consumers of nsIHttpChannel know if resolving the name was done via TRR (relanded)
resumimg work on:
Bug 1536744 - Make NS_NewURI work off main thread and remove nsIProtocolHandler.newURI
Bug 1527314 - Expand Cross-Origin-Opener-Policy tests
Bug 1533877 - Write WPT tests for Cross-Origin header
Bug 1518730 - TRR: Firefox prefers IPv4 no matter what
Junior
Rebase larch
Bug 1547389 - support HttpTrafficAnalyzer for socket process
Bug 1547025 [socket process] prevent creating Child-to-Socket IPC when socket process is disabled
FATAL /home/roc/rr/rr/src/replay_syscall.cc:1144:handle_opened_files()
Kershaw
Bug 1547705 - [socket process] Race between canceling the channel and send ODA to child process
r?
Bug 1509823 - [socket process] Fix HTTP cache data writing
Cache should be already working
Bug 1497249 - [socket-proc] Connection stickiness handling for upgrade observers
wip
Bug 1545226 - Some gtests in netwerk/test/gtest are not run on Android
Our test harness on Android doesn’t support to load external files yet.
Bug 1542593 - PNeckoChild::SendPUDPSocketConstructor called off main thread
r?
Dragana
neqo
The secure proxy project
The socket process project
Meeting 2019-04-25
RT:
- please be more specific about the status of our prefetch/preload work in the bug
- https://bugzilla.mozilla.org/show_bug.cgi?id=1544102#c5, please check if we have made any changes in our code for those dates that could cause this old (january '19) spike
- work sessions at AH?
- look at unassigned P2 bugs at AH
Michal
- 1545909 - Hitting Back sometimes shows old cached content
- 1546975 - Cache SSL resumption tokens in necko
- 1506534 - Collect telemetry to measure how much penalty we will experience with first-party cache isolation
mayhemer
BT:
regular rebase in progress
chasing JS background compilation timing diagnoses for the JS team
done:
https://bugzilla.mozilla.org/show_bug.cgi?id=1536511
https://bugzilla.mozilla.org/show_bug.cgi?id=1493599
diagnosed:
https://bugzilla.mozilla.org/show_bug.cgi?id=1403546
https://bugzilla.mozilla.org/show_bug.cgi?id=1545909
https://bugzilla.mozilla.org/show_bug.cgi?id=1544089
interesting:
https://bugzilla.mozilla.org/show_bug.cgi?id=1544753
will attend (excluding the sec proxy work):
3 older asan crashes, 2 mt io janks, 1 ntlm bug, all are P2 only!
Kershaw
Bug 1546428 - [socket process] Handle canceling network request properly
WIP
Bug 1546830 - [socket process] netmonitor fails to show network event
r?
Bug 1546537 - [socket process] Assertion failure: NS_IsMainThread(), at netwerk/protocol/http/Http2PushStreamManager.cpp:19
r?
Bug 1546420 - [socket process] use new IPC message to update network addresses
r?
Bug 1546355 - [socket process] Try to launch socket process until we really need it
r?
Bug 1545226 - Some gtests in netwerk/test/gtest are not run on Android
Investigating
Bug 1544619 - HEAD request return contents that was cached from a previous GET request
Working
Andy
- Neqo/QUIC: fixing bugs and cleaning up code for review. Still some important things missing before upcoming virtual interop.
- Figuring out heuristics for TRR disable for DNS-based filtering and split horizon
- More time reading
netwerk/
code
Junior
Socket Process Performance Test Plan
Fix socket process issues:
Bug 1545253 - allow to call OnStatus/OnProgress the listener in child process before OnStartRequest arrives
Bug 1497245 - Enable ContentSniffer for socket process
Bug 1527384 - allow speculative connect without socket process
bug 1497249 - let Proxy/Websocket upgrade works again in parent process
Dragana
Bug 1531344 - Youtube stream fails due to "Invalid Top-Level Box"
The socket process - security part round 3
secure proxy
Meeting 2019-04-18
Round table:
- cookie related bugs
- Secure Proxy project
Michal
- reviews
- 1506534 - Collect telemetry to measure how much penalty we will experience with first-party cache isolation
- 1428901
Dragana
The socket process - some new bugs now that larch can be used for browsing
Quic
Triage
Secure Proxy
Kershaw
Bug 1543168 - [socket process] Fix failed tests
- Working
Bug 1544777 - [socket process] Assertion failure: mOnStartRequestCalled (OnStartRequest should be called before OnStopRequest)
- Done
Bug 154479 - Socket process needs to support NeckoChild
- ni
- WIP
Security Bug 1544526
Junior
test POST navigation with Referrer-Policy #15937: merge to anne's branch
[socket process] fix netwerk/test/unit/ with pref-off
under review:
- Bug 1523916 - Allow Parent-Child bp flow control
- Bug 1527384 - allow speculative connect without socket process
- bug 1497249 - let Proxy/Websocket upgrade works again in parent process
- Bug 1497245 - Enable ContentSniffer for socket process
need to fix:
- Bug 1545253 - allow to call OnStatus/OnProgress the listener in child process before
- some tests hits an assertion in Bug 1497241 - Make H2 push work in socket process
Andy
- QUIC/Neqo:
- Tidying code in prep for peer code review & virtual interop event May 1
- Hooking streams & flow control frames into loss detection framework
- DoH/TRR
- Heuristic: how to detect default DNS is doing badware/explicit content blocking?
- Getting TRR included in Fx Protection Report/Project Trailhead
Meeting 2019-04-10
Round table:
-
(valentin) on PTO until May 1st - can someone switch with me on Triage?
-
Bug 1536772 - Intermittent netwerk/test/crashtests/785753-1.html | application crashed [...]
-
set up some time to discuss network ID / partitioning cache https://bugzilla.mozilla.org/show_bug.cgi?id=968273
-
bug 1395914 - ipv6 network ID
-
IETF interim meeting London, andy going;
-
IETF virtual interop ; dragana planning to attend
mayhemer
- BT: rebased the patch and having working build again
- BT: valentin given builds to check the slow upload issue https://bugzilla.mozilla.org/show_bug.cgi?id=1531123
- [Bug 1541911] WebSocket does not connect when user is behind a proxy requiring authentication old ntlm proxy/filter from MS involved, still unconfirmed, ni? pending
- Bug 1534190 Authentication required popup ntlm server involved, probably INVALID, first client (Firefox) prefs were not correctly set up, now server rejects default credentials
- Bug 1536511 Implement stale-while-revalidate c-c response directive handling in HTTP cache validation code final tweaks of tests
- Bug 1536548 air.mozilla.com real-time stream playback blips when backgrounded new BT use case
- [Bug 1509827] Document different classes of nsIClassOfService need some help from dragana or someone familiar with h2 flags
Michal
- 1506534 Collect telemetry to measure how much penalty we will experience with first-party cache isolation
- 1542835 Expose SSLChannelInfo.resumed on nsISSLSocketControl
- 1500533 Ensure that TLS session tickets are only consumed if storage checks on the channel pass
- 1536843 Websocket "was interrupted while the page was loading"
- start thinking about a session caching ticket for QUIC
Kershaw
Bug 1541894 - [socket process] Fix build errors
- done
Bug 1543168 - [socket process] Fix failed tests
- Working
Valentin
Bug 1540656 - Modernize test_trr.js
- Bug 1543624 - Unit tests are run with very old version of node
Bug 1525640 - Let consumers of nsIHttpChannel know if resolving the name was done via TRR
Bug 1530303 - New window doesn't have the correct COOP (landed)
Junior
triage => Bug 1542989 Page is blank due to early HTTP negotiation
e10s back pressure is completed (hope so!)
https://bugzilla.mozilla.org/show_bug.cgi?id=1539766
https://bugzilla.mozilla.org/show_bug.cgi?id=1524154
bikeshedding Origin vs Referral-Policy
Bug 1405307 - After connecting to VPN Firefox is unable to navigate to sites inside the VPN but Chrome can - some investigation
Bug 1542384 - Hangs on close when opening URL that cannot be resolved
Andy
- quic: completed max_streams impl
- opened some bugs to push for better TRR use visibility https://bugzilla.mozilla.org/show_bug.cgi?id=1542350 https://bugzilla.mozilla.org/show_bug.cgi?id=1542331 mini-mtg after this mtg if people want to stick around
Dragana
The socket process - security - first 2 patches will be ready for feedback today/tomorrow
We had a meeting with the performance team to talk about testing.
Last week I was on HttpWorkshop.
Selena
Any perf improvements from Necko to report for Q1?
Nhi
just started, mostly orientation this week. Would like some training on necko architecture and code.
Meeting 2019-04-04
Round table:
Nhi starts on Monday!
- https://docs.google.com/document/d/1OtZNSaeldjqWpB0aYy2n1vvUSwT5F0LVDHWwXY0Vrm4/edit
mayhemer
BT: michal and me meet f2f, pushing BT builds to tp6 for rcwn analyzes
BT: official builds are coming!
BT: discussions with my friend, an expert for graph theories and NP problems, suggested more statistical and mathematical approach, in progress
FIXED Bug 1538737
Firefox asks for proxy password when typing into the address bar
UNDERSTANDING OF Bug 1536787
Whatsapp web doesn't work behind an NTLM proxy accessible with default credentials, ws downgrade reauthenticates to the proxy, channel treats it as an auth failure
LAST BITS TO FINISH Bug 1536511
Implement stale-while-revalidate c-c response directive handling in HTTP cache validation
ANALYZING Bug 1534190
Authentication required popup
Kershaw
Bug 1537764 - [socket process] Don't access http channel in http transaction
- r?
Bug 1541894 - [socket process] Fix build errors
- wip
Bug 1541114 - Crash in [@ mozilla::ipc::LogicError | mozilla::net::PTCPSocketParent::SendUpdateBufferedAmount]
- r?
Bug 1540289 - 62,500 instances of "'!parent'" emitted from netwerk/ipc/NeckoParent.cpp during linux64 debug testing
- r?
Michal
- triage
- 1506534 - Collect telemetry to measure how much penalty we will experience with first-party cache isolation
Junior
Rabasing larch to Apri 1
Bug 1405307 - After connecting to VPN Firefox is unable to navigate to sites inside the VPN but Chrome can
Bug 1540000 - explicitly launch socket process in xpcshell-test
Bug 1539766 - e10s flow control could cause the canceled channel suspended forever
Valentin
TRR experiment is live
1530303 - New window doesn't have the correct COOP (finally cracked the bug)
1540656 - Modernize test_trr.js (one patch has issues. landed other two)
1456005 - TRR deadlock when captive portal detection fails r=dragana (waiting on review)
1451890 - TRR: set wait-for-portal false by default r=dragana (waiting on review)
1536744 - Make NS_NewURI work off main thread and remove nsIProtocolHandler.newURI (still needs work)
reviewing bug 1532318 - Use ReferrerInfo class in nsIHttpChannel
Andy
- quic: stream send ack/sent range tracking
- quic: reset_stream and stop_sending
- quic: event API
- quic: working on max_streams
Selena
launching the experiment!
meetings to explain our TRR policies, plans
prep'ing for nhi
Meeting 2019-03-28
Round table:
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539094 Exception list for dns over https (duped to bug 1450893)
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538978 another h2 conn reset case
- Bug 1523986 Add more tests for Process-Switching POST loads
Valentin
[done]
1527316 - Setup MOZ_NODE_PATH as part of bootstrapping
1532395 - Intermittent netwerk/test/unit/test_trr.js
1450893 - TRR: feature request, add domains exclusion list
1518208 - localhost is resolved by trr (dns-over-https) in mode 3
[working on]
TRR experiment
1536744 - Make NS_NewURI work off main thread and remove nsIProtocolHandler.newURI
1530303 - New window doesn't have the correct COOP
1456005 - TRR deadlock when captive portal detection fails
Kershaw
Bug 1537764 - Don't access http channel in http transaction
- Working on P3 (nsIInputChannelThrottleQueue)
Bug 1497243 - [socket-proc] Make TransactionObserver work again
- Done.
Bug 1539539 - Add main thread assertion in the callback of NS_ShouldSecureUpgrade
- Done.
Bug 1539148 - Intermittent
- Done.
Bug 1539766 - e10s flow control could cause the channel suspended forever
- Found this issue and asked Junior to fix.
Junior
Origin Header: test fetch (cors/no-cors) with referrer-policy (#15937)
Bug 1497245 [socket-proc] Enable ContentSniffer for socket process
Michal
- 1533369 - Add content type to cache index
- 1506534 - Collect telemetry to measure how much penalty we will experience with first-party cache isolation
Andy
- neqo repo now public
- quic: stream flow control
- quic: range tracking (acked, sent) for SendStream
Dragana
PBackground for Parent-Socket process bridge.
CertValidation
quic loss recovery, also looking into http-clien/server for testing
Meeting 2019-03-21
Triage: https://mozilla-necko.github.io/necko-triage/
- This week: Kershaw
Round table: https://bugzilla.mozilla.org/show_bug.cgi?id=1536772
Valentin
1532253 - NewURI on any thread (landed)
1420677 - Convert nsHostResolver.addr_info to a RefPtr (landed)
1536744 - Make NS_NewURI work off main thread and remove nsIProtocolHandler.newURI
1450893 - TRR: feature request, add domains exclusion list
adds way to clear cache (including TRR) 1527316 - Setup MOZ_NODE_PATH as part of bootstrapping
1532395 - Intermittent netwerk/test/unit/test_trr.js
Dragana
Quic
security part of the socket process.
Kershaw
- Triage
- Bug 1497241 [socket-proc] Make HTTP/2 push work again r?
- Bug 1497243 [socket-proc] Make TransactionObserver work again wip
- Bug 1505493 Retarget nsHttpChannel handled by HttpChannelParent to a background thread, avoid main thread loop on critical path time to get help about failed tests
Junior
- Sec: Bug 1535795
- Origin Header: test POST navigation with Referrer-Policy (#15937)
- Bug 1524154 Re-enable flow control for wpt that bug 1280629 disabled two media tests left: one is caused by blocking video autoplay
Michal
- 1537750 - CacheDelayedRace in NETWORK_RACE_CACHE_WITH_NETWORK_USAGE_2 probe should be split into 2 enums
- 1425268 - Tune RCWN racing parameters (and make them pref-able)
- 1533369 - Add content type to cache index
- 1536843 - Websocket "was interrupted while the page was loading"
Andy
- More Quic hacking. Adding flow control but also refactoring code.
- https://github.com/mozilla/neqo/issues/1 (Deciding on final name) no consensus, no clear way to reach one atm 😞
mayhemer
fixed https://bugzilla.mozilla.org/show_bug.cgi?id=1527712 nsFileChannel (called e.g. by fetch) shouldn't do main thread I/O for local files (part moved to a different bug https://bugzilla.mozilla.org/show_bug.cgi?id=1527712)
fixed https://bugzilla.mozilla.org/show_bug.cgi?id=1493599 Expose blocked resource reason on nsILoadInfo
fixed https://bugzilla.mozilla.org/show_bug.cgi?id=1535361 Increase the limit of idle threads in stream transport service
fixed https://bugzilla.mozilla.org/show_bug.cgi?id=1536129 BlockingResourceBase::Acquire() broken w/o MOZ_CALLSTACK_DISABLED
fixed/backed out https://bugzilla.mozilla.org/show_bug.cgi?id=1536387 HTTP cache storage service can't parse storage keys for memory storages
took https://bugzilla.mozilla.org/show_bug.cgi?id=1536511 Implement stale-while-revalidate c-c response directive handling in HTTP cache validation code
took https://bugzilla.mozilla.org/show_bug.cgi?id=1533134 Handling the clear-origin-attributes-data notification in appcache takes a while and does main thread I/O during shutdown
interesting https://bugzilla.mozilla.org/show_bug.cgi?id=1536058 Websites removing resources from the cache predictably creates a sidechannel
have a consensus on how we keep our triage calendar
Selena
Orientation for Nhi: https://docs.google.com/document/d/1OtZNSaeldjqWpB0aYy2n1vvUSwT5F0LVDHWwXY0Vrm4/edit
Book travel for the All Hands!
Mozilla Build Pain Points for Windows Devs - https://docs.google.com/document/d/1S24F4xKNNOZGs9iDVnVC1IGo71fBeWhSm2yt2YzCnyQ/edit?ts=5c8b34c6#heading=h.lyq25pambo08
Meeting 2019-03-14
Round table:
- https://github.com/mozilla/standards-positions/issues/144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1533509#c2
Michal
- RCWN and tp6
- 1533369 - Add content type to cache index
- 1506534 - Collect telemetry to measure how much penalty we will experience with first-party cache isolation
Kershaw
Bug 1521793 - [socket process] not access http connection in http channel
r?
Bug 1497247 - [socket-proc] Connection stickiness for conn-based auths.
r?
Bug 1497241 - [socket-proc] Make HTTP/2 push work again
WIP
Bug 1505493 - Retarget nsHttpChannel handled by HttpChannelParent to a background thread, avoid main thread loop on critical path
Still investigating test timeout
mayhemer
-
1493599 Expose blocked resource reason on nsILoadInfo stub for devtools people to play with, new child only notification "failed-open"
-
1527712 nsFileChannel (called e.g. by fetch) shouldn't do main thread I/O for local files nsBaseChannel derived may create a promise to block onstartrequest (suspend the pump) and resolve it async; blocked on badly written test; some parts separated to different bug and component to handle by someone else
-
1535361 Increase the limit of idle threads in stream transport service blocker for 1527712 and probably a good change
-
1515425 http://www.speedtest.net/ doesn't perform upload test when the tab is in background not a networking issue, probably a on-site issue with observing the tab visibility (if it is active)
-
1510262 nsIncrementalDownload causes a lot of jank with main thread I/O while downloading updates in the background deps on 1528285
Andy
- quic: breaking up send streams into correctly-sized frames, and multiple datagrams
- if you're curious see https://github.com/mozilla/neqo some have access some don't.
Valentin
1525036 - Implement Cross-Origin header (landed)
1435141 - Main thread IO in the parent process in nsNSSComponent::HasUserCertsInstalled (landed)
1532253 - NewURI on any thread (will land after merge day)
1420677 - Convert nsHostResolver.addr_info to a UniquePtr (will try again after merge)
1512472 - nsHttpConnectionInfo leak
Junior
Origin header
Bug 1531583 - [socket process] cherry-pick and rebase non-mc patches - finished, wait for review the way i did
Bug 1534745 - cookies.sqlite is read on the main thread before first paint
Bug 1444278 - CORS fetches redirected across origins fail because the Origin header contains the wrong value
Dragana
Bug 1512598 - Provide baseline for starting PSM in an "isolated" mode on the Socket Process
Bug 1512471 - Proxy certificate validation from Socket Process/Socket Thread to Parent Process
Bug 1497270 - [socket-proc] HttpTransactionParent must have its own suspend counter and queue messages
qpack
needinfos, review
Meeting 2019-03-07
Triage: https://mozilla-necko.github.io/necko-triage/
- This week: Valentin
- Next week: Dragana (March 8-14) Triage Arrow
Round table items:
Bug 1528873 - When proxy.onRequest returns a bogus ProxyInfo, Firefox connects directly instead of failing Bug 1528756 - More crashes on @ poll Bug 1531344 - Youtube stream fails due to "Invalid Top-Level Box"
Michal
- 1151815 - Remove expiration time from the cache index
- 1533369 - Add content type to cache index
- 1506534 - Collect telemetry to measure how much penalty we will experience with first-party cache isolation
- RCWN tp6 regression
Andy
- 1533439 - investigate MozPromise usage in nsHttpChannel
- moz-quic - implemented initial stream send/recv support
mayhemer
- BT: improved the offline tool to easily share results, started a thread on reddit.com repaint findings, getting some tips
- decoder: helped with a hang and few details
- reviews
- a P1 in jeopardy: bug 1527749
Junior
Bug 1531583 [socket process] cherry-pick and rebase non-mc patches
- almost finish rebasing patches written in last year (one patch left, aka the last patch before clang-format)
Valentin
Triage
1532253 - Create NS_NewURIOnAnyThread
- can be called on any thread & works for most protocols
- what's left moz-gio, view-source, resource, moz, jar, about - will handle them in a follow-up, and remove nsIProtocolHandler.newURI
1525036 - Implement Cross-Origin header (requiring CORS for subresources)
- all patches reviewed
1435141 - Main thread IO in the parent process in nsNSSComponent::HasUserCertsInstalled
- patch up for review
1530691 - We should not call OnStopRequest twice
- patch up for review
1437661 - Use fallible AppendUTF16toUTF8 to avoid OOM crash in NS_NewURI
Kershaw
-
Bug 1505493 - Retarget nsHttpChannel handled by HttpChannelParent to a background thread, avoid main thread loop on critical path
- WIP, need some feedback
-
Bug 1430050 - IPC to the socket process for DNS resolution
- Done.
-
Bug 1532231 - DNSRequestChild is not released when the request is done
- Done.
Dragana
Quic - Huffman encoder/decoder
Socket-process - Work on security part for the socket process.
Bug 1528317 - Increase in "Network Protocol Error" reports in Firefox 65
Meeting 2019-02-28
Triage: https://mozilla-necko.github.io/necko-triage/
- This week: Junior
- Next week: Valentin (March 1-7) Triage Arrow
Round table items:
- windows/aarch64 permafail: bug 1530871 serverTiming, bug 1530870 trr, bug 1530752 esni
- unassigned P1 feature: Bug 1527749 PAC script privacy support for extensions
mayhemer
- BT: cover delays previously untracked (before-/after-process-event thread callbacks)
documentation of the API written
offline tool enhanced to share found critical path snippets only (and not 1GB+ logs)
emailing (wip) to some experts on layout with result of my reddit repaint findings
- fuzzing helping :decoder with non-determinism and understanding sockets and necko
some small bugs fixed/reviews/usual stuff
Valentin
- 1525036 - Implement Cross-Origin header (requiring CORS for subresources)
- up for review
- reviewed 1525319 - removing context from onStart/Stop/DataAvailable
- 1520062 - HTTPChannel seems to incorrectly keep references to its mListener.
- landed
- 1529911 - Add more tests for cancelling HTTP channels
Kershaw
- Bug 1430050 - IPC to the socket process for DNS resolution wip
- Bug 1529759 - Crash in [@ mozilla::net::nsHttpChannel::DoConnect] investigating
Michal
- 1529498 - null pointer writes in mozilla::net::Predictor::LearnNative
- 1527293 - Loading a large script transferred with Content-Range from cache returns empty file
- 1506534 - Collect telemetry to measure how much penalty we will experience with first-party cache isolation
Dragana
Quic
Work on security part for the socket process.
Bug 1528317 - Increase in "Network Protocol Error" reports in Firefox 65
Selena
- Moving DoH forward --> analysis from dragana: https://docs.google.com/document/d/1LO6eW0ZXK2VqzeO27N8EBOA11r04OOIq7e77WcAp0Lg/edit?usp=sharing
- Analysis from tdsmith: https://metrics.mozilla.com/protected/tdsmith/trr_v5_demo.html
- Table of results: https://docs.google.com/spreadsheets/d/18PCIaCgvNCko_Q9hu39UNnt6DTiyfIbEupPB7OpgvlQ/edit#gid=1178024002
Junior
- triage
- rebasing larch: try to cherry-pick our patches to m-c in larch
- uplift sec 1503393
- Bug 1530230 - Content-type header lingers after redirecting from 302 response to POST while using Fetch API ==> need spec change
Andy
QUIC stream reassembly unit tests
Putting multiple QUIC packets in udp datagram
Reviewing code
Meeting 2019-02-21
Triage: https://mozilla-necko.github.io/necko-triage/
- This week: Michal
- Next week: Junior (21-28 feb) Triage Arrow
Round table items:
- Crash [@ StrChrIA ] - https://bugzilla.mozilla.org/show_bug.cgi?id=530074
- SSL proxies - https://bugzilla.mozilla.org/show_bug.cgi?id=1522781
Valentin
- landed bug 1521808 (Cross Origin Opener Policy)
- landed 1528188 - Crash in TriggerCrossProcessRedirect
- looked into whether TRR ECS pref works correctly
- 1520062 - HTTPChannel seems to incorrectly keep references to its mListener.
- patch that fixes leak
- patch that adds more tests for calling nsIChannel.cancel
- TODO maybe? patch that closes the tab early so we call ActorDestroy
- 1525036 - Implement Cross-Origin header (requiring CORS for subresources)
Michal
- triage
- 1525527 Crash in OOM | large | NS_ABORT_OOM | mozilla::dom::WebSocket::CreateAndDispatchMessage [landed]
- 1499825 intermittent server not found
- 1529498 null pointer writes in mozilla::net::Predictor::LearnNative
- 1527293 Loading a large script transferred with Content-Range from cache returns empty file
Kershaw
- Socket process
- Bug 1527256 - [socket process] make about:networking work
- Merge mc to larch
- Bug 1521729 - Make nsHttpChannel::AsyncOpen wait (async) for HSTS data to be available before connecting to non-https URLs
Junior
- land sec bug 1507110
- uplift Bug 1505844 Crash in mozilla::dom::FetchDriver::HttpFetch to esr 60.5.2 since reuters used
fetch data://
Valentin
Christian Holler (:decoder):
- better necko fuzzing
- no systematic approach for doing necko fuzzing from outside of the browser
- create generic fuzzing layer to provide networking data in a buffer
- prototyped by kershaw
- integrated with libfuzzer - observes code coverage while testing.
- gtest is fuzzing target
- websocket as fuzzing target (a little more complicated) - doubles code coverage compared with our current tests
- async is a problem for libfuzzer but that is mostly fixed
- non-determinism in the fuzzer - some use cases aren't always reproducible
- DNS should be disabled (network.dns.native-is-localhost can be used?)
- needs another ENV variable to enable/disable?
- not landing fuzzing target until most bugs are found
- Honza to help with non-determinism
- Fuzzing TLS is difficult
- We could disable TLS for HTTP2
- compression is already fuzzed - so we may want to disable compression
- identity compression for websocket?
- buildflags for libfuzzer. WS keychecking is disabled
- goal is to cover all files in http/ folder
- http2 is also undertested
- TLS is another layer, like the fuzzer, we can fake it. maybe needs necko help
- it scales
- is run like a gtest
- is very fast because is does no networking
Meeting 2019-02-14
Triage: https://mozilla-necko.github.io/necko-triage/
- This week: ** Honza ** p1s: https://bugzilla.mozilla.org/show_bug.cgi?id=1525527 (michal, easy to fix content induced websocket crash) https://bugzilla.mozilla.org/show_bug.cgi?id=1527712 (unass, MT IO at startup, P1 to discuss, possible complicated to fix) possible p1/major: https://bugzilla.mozilla.org/show_bug.cgi?id=1527594 (a log where we bypass a socks proxy, reproducible on 59, this may strongly affect tor!)
Round table items:
- mgmt bot and triage (auto ni? triage owner ruins await-ni? bug list)
- https://bugzilla.mozilla.org/show_bug.cgi?id=1527334 (force link rel="prefetch" responses to be cached?)
- triage list. Should we find a place to maintain the ascii arrow? Honza [:mayhemer] Michal [:michal]<======= Junior [juhsu] Valentin [:valentin] Dragana [:dragana] Kershaw [:kershaw] Selena / Junior
- asyncOpen2 is now asyncOpen. Keep in mind when writing tests bug 1520868
Junior
Security bug: 1507110
Bug 1524264 - Move "No Proxy for" outside the radio button and change the case for design guildline
mayhemer
https://bugzilla.mozilla.org/show_bug.cgi?id=1518774 needed rebase + some test fiddling, landing today
https://bugzilla.mozilla.org/show_bug.cgi?id=1505861 I will re-write my SingleThreadRefPtr class for this one use case and let it live in necko to have an eternal automated audit
https://bugzilla.mozilla.org/show_bug.cgi?id=1522093 403 from proxy + hang handling, esr nomination
BT: digging into layers and repaint to diagnose the reddit scroll repaint bug
Michal
- 1525900 Remove unused code from old cache [landed]
- 1527005 WebSocketChannel hangs waiting for OnTransportAvailable when server responds to upgrade request with HTTP/1.0 [landed]
- 1527890 WebSocketChannel can hang waiting for OnTransportAvailable when HTTP request isn't upgraded [landed]
- 1506534 Collect telemetry to measure how much penalty we will experience with first-party cache isolation
Kershaw
- Bug 1521729 - Make nsHttpChannel::AsyncOpen wait (async) for HSTS data to be available before connecting to non-https URLs Need to clean up patch before review.
- Bug 1509822 - [socket process] Stop using HTTP connection manager on the parent process Only p2 patch needs to change. Others are r+.
- Bug 469228 - Support keep-alive connections in httpd.js Need rebasing. Fix test failures.
Valentin
- looked into GeckoView/necko on Android
- 1517025 - Do not allow percent symbol in URL hostnames landed
- 1521808 - Implement Cross-Origin-Opener-Policy got backed out. test is intermittent. working to fix it.
- DoH experiment 6
Meeting 2019-02-07
Triage: https://mozilla-necko.github.io/necko-triage/
- This week: ** Honza **
Round table items:
-
TRR shouldn't fallback to DNS on DNSSEC error: https://bugzilla.mozilla.org/show_bug.cgi?id=1525854
-
A standardised mechanism for GDPR opt-outs: https://bugzilla.mozilla.org/show_bug.cgi?id=1524511
-
Zero width 200C Unicode characters: https://bugzilla.mozilla.org/show_bug.cgi?id=1525449
-
https://trello.com/b/MisNJiSr/dns-over-https-v5-shield-study-retro
-
QUIC hackathon in 2 weeks in Mountain View
-
Andy Grover starts February 11 in Portland
Junior
Bug 1524264 - "Use system proxy settings" also applies "No proxy for" settings in Firefox 65
Bug 1524552 - Extend telemetry probes for RCWN and e10s back pressure
mayhemer
- BT: label span marker, milestone markers, more experiments with diffing based on that
- BT: trying to apply to a use case where network was wrongfully accused of page not rendering during fast scroll on reddit.com (https://bugzilla.mozilla.org/show_bug.cgi?id=1502334)
- reviews and usual stuff
Michal
- 1499825 intermittent server not found
- 1358038 Add "Race Cache With Network" status to netmonitor
- 1525900 Remove unused code from old cache
- 1506532 Collect telemetry about resource sharing between origins
Kershaw
- Bug 1523253 - online.aussie.com.au - non-stop loading because server doesn't set END_STREAM flag We add "te: trailers" in our h2 requests and this causes some h2 server not sending END_STREAM flag.
- Bug 1509822 - [socket process] Stop using HTTP connection manager on the parent process P1: r?
- Bug 1522786 - Unused class member: nsHttpChannel::mHasQueryString Landed.
Valentin
- Bug 1495513 - Windows infinite looping when loading file:///
- turns out to only happen in e10s
tracked down issue to WebNavigationChild.jsm - loadURI doesn't forward exceptions - Bug 1521808 - Implement Cross-Origin-Opener-Policy
- submitted final patch for review
- Bug 1525036 - Implement Cross-Origin header (requiring CORS for subresources)
- started looking into implementation details
Meeting 2019-01-31
Triage: https://mozilla-necko.github.io/necko-triage/
- This week: Junior/Selena
Round table items:
- gtest/bogo
- current test environment needs a re-look - mayhemer is going to make a gdoc for everyone to contribute their thoughts on what needs to be manually tested
- NSPR logging layer? dump the logs at log level 6 to get the payload and use for unit tests
- Triage proposal: https://docs.google.com/document/d/1EHuWa-uR-7Sq63X1ZiDN1mvJ9gQtWiqYrCifkySJyW0/edit?disco=AAAACeBcKiA&ts=5c52c135&usp_dm=false
- Will need to move P3 -> P4, P2->P3; come up with a decision matrix for next meeting where we will go through the bug backlog a bit
mayhemer
not very productive this week for various issues
- BT goes on (proving concept of runnable groups using my local work, some more discussion with Luke Wagner)
- SPI PSM work (giving to dd)
- Bug 1512598 - Provide baseline for starting PSM in an "isolated" mode on the Socket Process
- Bug 1512471 - Proxy certificate validation from Socket Process/Socket Thread to Parent Process
- Bug 1493599 - Expose blocked resource reason on nsILoadInfo
Michal
- reviews
- 1520153 FailDelayManager treats different websocket endpoints as one
- 1455723 Firefox59 does not properly honor cache size set in autoconfig files [landed]
- 1519126 Assertion failure: !chunk->IsReady(), at /builds/worker/workspace/build/src/netwerk/cache2/CacheFile.cpp:2251
- 1506534 Collect telemetry to measure how much penalty we will experience with first-party cache isolation
- 1499825 intermittent server not found
Kershaw
-
Bug 1523253 - Cant connect to website investigating
-
Bug 1505834 - Crash in mozilla::net::nsHttpConnection::OnInputStreamReady investigating
-
Bug 1500710 - JAR protocol handler doesn't set WASM mimetype, breaks WebAssembly.instantiateStreaming
r?
-
Bug 1497237 - [socket-proc] Serialize response trailers ready to land
-
Bug 1521817 - [socket-propcess] serialize the whole proxy info to socket process ready to land
Valentin
Bug 1510691 - [socket process] Send data directly from the socket process to a content process (landed)
Bug 1521808 - [fission][renable SharedArrayBuffer] Implement Cross-Origin-Opener-Policy
(implemented algorithm, wrote some xpcshell-tests, currently implementing process-switching code)
Dragana
Bug 1523427 - Web socket over h2cause us to loop CONNECT request to a proxy
Bug 1521639, 1520483
Junior
Fix larch build break
Bug 1497245 - [socket-proc] Enable ContentSniffer for socket process
(WIP - Will fix another larch linux build break)
Meeting 2019-01-23
Triage: https://mozilla-necko.github.io/necko-triage/
- This week: Kershaw
Round table items:
- Bug 650091 Multiple Proxy-Authenticate headers order-dependency bug causes login popup with NTLM + Basic Sohuld we fix it? If not, can we put the reason on that bug?
- https://bugzilla.mozilla.org/show_bug.cgi?id=1520153 help?
- network manager interviews
- [honza] - from BT data: h2 responses are granular, lots of overhead
Junior
Bug 1497238 - [socket-proc] Send SetDNSWasRefreshed to the socket process
Bug 1497245 - [socket-proc] Enable PeekStream on HttpTransactionParent (nsAHttpTransactionShell)
- Plan to let the content sniffers do their job in socket process
Bug 1504085 - Origin header honors ReferrerPolicy
- spec is likely concluded
Michal
- 1506532 Collect telemetry about resource sharing between origins
- 1499825 intermittent server not found
Kershaw
- Triage
- Bug 1451293 - Crash in mozilla::net::nsHttpConnection::DontReuse revise the patch
- Bug 1497235 [socket-process] Pass class-of-service and request-context to http trans child wait for review
Valentin
Working on:
Bug 1520062 - HTTPChannel seems to incorrectly keep references to its mListener. [backed out]
Bug 1510691 - [socket process] Send data directly from the socket process to a content process [ready for review]
Bug 1521808 - [fission][renable SharedArrayBuffer] Implement Cross-Origin-Opener-Policy
Done:
mayhemer
https://bugzilla.mozilla.org/show_bug.cgi?id=1520125 Firefox ask for proxy every time when write to adress bar: P1 - fixed
PSM baseline https://bugzilla.mozilla.org/show_bug.cgi?id=1512598
BT discussions
reviews
Dragana
looking at DOH shield study data
- When clusters are crashing -- tell #fx-metrics
bug 1516325, 1521639
1513865 - [socket-process] nsIPrefService.resetPrefs does not work
Meeting 2019-01-17
Triage: https://mozilla-necko.github.io/necko-triage/
- This week: Dragana
Round table items:
- https://bugzilla.mozilla.org/show_bug.cgi?id=1520125 - proxy issue; can anyone else take this?
- https://bugzilla.mozilla.org/show_bug.cgi?id=1467223 - fission blocker, honza
- telemetry question: 30% of probes are by default on in release, but the telemetry dashboard isn't obvious how to get this. there's an analyze function and dragana will provide some guidance. ask in #fx-metrics for details
- seems you need to be logged in to see the release metrics
Junior
wpt - test POST navigation with Referrer-Policy
Bug 1514065 - Enable flow control of HTTP e10s back pressure
Bug 1520657 - [socket process] dispatching open-channel using CallOrWaitForSocketProcess
Bug 1497238 - [socket-proc] Send SetDNSWasRefreshed to the socket process
Valentin
1513458 - MOZ_DIAGNOSTIC_ASSERT(NS_DeserializeObject(securityInfoSerialization)) fails
1510691 - [socket-proc] Send data directly from the socket process to a content process
1520062 - HTTPChannel seems to incorrectly keep references to its mListener causing leak
1495513 - Perma TEST-UNEXPECTED-TIMEOUT | /webdriver/tests/get_current_url/get.py | expected OK ( loading file:/// doesn't fail on windows as it should )
1517025 - Parsing /\b%9ª in the hostname should fail ( I think we can finally reject % in the hostname )
Michal
1455723 - Firefox59 does not properly honor cache size set in autoconfig files
1495336 - High limit of NETWORK_CACHE_METADATA_SIZE and NETWORK_CACHE_METADATA_FIRST_READ_SIZE probes is too low
1519126 - Assertion failure: !chunk->IsReady()
1506532 - Collect telemetry about resource sharing between origins
Kershaw
- Bug 1520830 - [socket-proc] Enable necessary XPCOM modules in socket process
- merge m-c to larch.
- Support fuzzing necko. Examples for how to attach a NSPR layer and how to use http channel.
- Bug 1407384 - Make notifications respect channel.suspend
Dragana
Security bugs: 1515459, 1520483, 1513519
The socket process:
1515390 [socket-process] Make memory-reporter tests work with the socket process
1513872 [socket-process] sending ipc messages to the socket process before it is created
1513542 Fix nsStandardURL leak debugging
1513059 [Socket-process] Do not init the complete XPCOM
Other
1514688 Websocket unable to connect through Cloudflare
1520260 Collect *_KBREAD_PER_CONN on release as well
Meeting 2019-01-10
Triage: https://mozilla-necko.github.io/necko-triage/
- This week: Valentin
Round table item:
- [honza] https://bugzilla.mozilla.org/show_bug.cgi?id=1503960#c16 (the idea is to not send cookies - use the anonymous flag by default? - when the requesting principal is system; this should be easy to do on our side, but potential breakage of stuff like sync,telemetry,etc is not up to us, I hope) -- michal is taking this as a P2 for 67
- [junior] dogfooding proxy
- [valentin] If anyone can take a look at bug 1513458 - it's unclear how the assertion is triggered.
- [selena] https://github.com/mozilla-necko/meeting-notes/issues/3#issuecomment-451219488
Michal
- 1479357 Specific values for browser.cache.disk.capacity do break the cache
- 1513676 Twice-reported memory allocations in CacheStorageService code
- 1495336 High limit of NETWORK_CACHE_METADATA_SIZE and NETWORK_CACHE_METADATA_FIRST_READ_SIZE probes is too low
- 1455723 Firefox59 does not properly honor cache size set in autoconfig files
Valentin
- [triage]
- [triaged bugs still assigned Nick and Jason]
- meeting notes archive
- 1513458 MOZ_DIAGNOSTIC_ASSERT(NS_DeserializeObject(securityInfoSerialization)) fails
- reviewing 1467223 for fission work and helping Nika fix an issue
- 1517542 - more strict nsStandardURL deserialization
- 1518730 - TRR: Firefox prefers IPv4 no matter what
- 1510691 - Send data directly from the socket process to a content process
Kershaw
- Bug 1513057 - [socket-proc] Land socket process without http part Dragana's min xpcom patch is reviewed.
Plan to land all patches tomorrow.
- Bug 1451293 - Crash in mozilla::net::nsHttpConnection::DontReuse Working.
Not to access HttpConnection from main thread.
- Bug 1407384 - Make notifications respect channel.suspend P1 got r+ again from Honza.
Working on P3.
Junior
- Bug 1504085 - Origin header honors ReferrerPolicy work on wpt test and spec
- Bug 1444278 - CORS fetches redirected across origins fail because the Origin header contains the wrong value
mayhemer
- BT
- 1420885 Google PageLoad snippet 4sec page load delay caused by tailing -> WONTFIXed
- Bug 1505861 Audit nsHttpTransaction::mConnection full access for proper locking
Selena
TRR prelim results:
- https://dbc-caf9527b-e073.cloud.databricks.com/#notebook/61459/command/63985
- https://gist.github.com/ilanasegall/bfb1ac76c21cce461cf663c36bacf959
Meeting 2019-01-03
Round table:
Triage
Honza <=======<< Jan 3-4
Michal
Junior
Valentin
Dragana
Kershaw
Selena / Junior
Kershaw
Work on:
Bug 1513057 - [socket-proc] Land socket process without http part
- Prepare patch for landing to mc
- Work with bcampen to make Webrtc work
Bug 1451293 - Crash in mozilla::net::nsHttpConnection::DontReuse
- investigating
mayhemer
Helping rjesup diagnose a facebook load perf use case with BT (Bug 1516121)
Selena
https://github.com/mozilla/bug-handling/blob/master/policy/triage-bugzilla.md#how-do-you-triage
- Get the number of bugs the necko team resolved in Q4 - make that our budget for P1 and P2; share those numbers with the team
- For bugs coming in that are interesting, but not an immediate priority, we'll make those bugs P3
- request for a bot to change the P2->P1 priority on uplift day
- Networking Roadmap: https://docs.google.com/document/d/1NhuuBRkokNoXucp6wPDA1KAvhfoh5IliAVjVnYy0OQg/edit
Michal
- triage
- 1366222 Basic authentication 401 message flood
- 1516750 Firefox always requests cached file when redirected to it
- 1513676 Twice-reported memory allocations in CacheStorageService code
- 1511969 Intermittent LeakSanitizer
- 1506532 Collect telemetry about resource sharing between origins
- 1506534 Collect telemetry to measure how much penalty we will experience with first-party cache isolation
Junior
[socket process]
auto test for telemetry
serialize timings
[other]
disable e10s backpressure (try to enable in Bug 1514065)
uplift bug 1494364 to ESR
Meeting 2018-12-18
Roundtable:
- Triage https://mozilla-necko.github.io/necko-triage/ :
- This week: Selena / Junior (Dec 17 - Dec 21)
- Next week: Michal (Dec 24 - Dec 28)
Valentin
Worked on:
- Bug 1513574 - Remove UserAgentOverrides.jsm Turns out it's barely used, and not worth rewriting in C++ (happily I found that out before doing a complete rewrite :smile: ) Changed some of the android browser.js to use nsIDocShell.customUserAgent instead of UAOverride for desktopMode. And I debugged the tests with the x86 emulator, and android artifact builds.
- Bug 1510691 - [socket process] Send data directly from the socket process to a content process.
PTO 19 Dec - 7 Jan Merry Christmas to everyone :christmas_tree: :santa:
Meeting 2018-12-13
Announcements:
- You can now use https://mozilla-necko.github.io/necko-triage/ for triage
- Triage:
- This week: Dragana (Dec 10 - Dec 14)
- Next week: Selena / Junior (Dec 17 - Dec 21)
Roundtable: Reasons to keep our meeting notes in GitHub
- Searchable - just as much as a Google doc, but it is way easier to parse (either by looking at it, or with the GH API).
- Structured - it's easy to see what happened and when. Everybody gets to post their own comment, and edit it at any time.
- Static - after we're done with the meeting, there's no chance the notes will accidentally be deleted
- Public and transparent - other teams and contributors may want to know what we're up to. A Google doc isn't the most accessible resource.
Valentin
Working on:
- Bug 1513574 - Rewrite UserAgentOverrides.jsm as a C++ service
- Bug 1510691 - [socket process] Send data directly from the socket process to a content process
Done:
- Bug 1355207 - Intermittent netwerk/test/httpserver/test/test_host.js pushed diagnostic patch
- Bug 1507357 - Implement nsSimpleURI::SetFilePath
-
Bug 1380148 - HttpChannelChild will happily produce bogus null security info
- added assertions when deserializing. 2 failures on nightly (bug 1513458)
- we need to decide how we handle changes to TransportSecurityInfo serialization
-
Bug 1502025 - Use captive portal service to perform connectivity checks
- Note that now you can use httpd.js to test IPv6 see link
httpserverv6._start(-1, "[::1]");
Other: Bug 1511987 - Intermittent failures on https://wpt.fyi/ for data-urls/processing.any.html
=> turns out it's harness issue - interleaves nightly and release runs
mayhemer
-
bug 1484751 IPC PSM: split, worked on the base patch, r- from dkeeler (want's a bit different approach), cert validation needs another PBcg pathway (separate bug filed)
-
bug 1513470 redirect to data:
shows the redir content - r?dd -
bug 1506821 redirect to foo.com:
shows the redir content -> me -
bug 1509472 socket proc webrtc leadership -> dd
-
bug 1510262 nsIncrementalDownload causes a lot of jank -> me + have a plan
-
bug 1366772 Proxy Auto Config file not checked when network is changed https://bugzilla.mozilla.org/show_bug.cgi?id=1366772 -> me, but no time to try to repro
-
Backtrack: comparing two profiles! applying to real cases. instrumenting more code: refresh driver, plan for rust based code ; break down: https://docs.google.com/document/d/1tIWisdes0VayCI4LsvoW5qn7t3jhfcrHp-Ph77ahEy4/edit#
Junior
port necko-triage app to mozilla-necko github
Bug 1513135 - Downloads show as incomplete but network trace indicates data has arrived r?
Bug 1496257 - Enable xpcshell-test for socket process isolation r+
Bug 1504085 - Origin header honors ReferrerPolicy - have a plan (Comment 11)
Bug 669675 - failure to skip unknown HTTP authentication schemes in WWW-Authenticate - reproducible
Michal
- 1510386 switching between Firefox Nightly/Beta and Release Firefox causes network protocol errors on Release Firefox
- 1506534 Collect telemetry to measure how much penalty we will experience with first-party cache isolation
- 1507467 Make sure mAfterOnStartRequestBegun is true for channels loaded with LOAD_ONLY_IF_MODIFIED
- 1366222 Basic authentication 401 message flood
Selena
- Selena is interviewing people still! No decisions yet
- Priority order for Necko 2019 plan
December 5, 2018 - All Hands
Round Table
-
Necko 2019 Roadmap https://docs.google.com/document/d/1NhuuBRkokNoXucp6wPDA1KAvhfoh5IliAVjVnYy0OQg/edit
-
Daniel’s Note https://docs.google.com/document/d/19csJQFdybnfQTTCOnf6CuMsiNtCreJteVM5DPIVp_Jw/edit
Dragana
-
necko and mobile
-
what is pocket doing?
-
nalexander - consult for details on what network stacks other than necko we are using for:
-
Firefox for Android
-
Focus for Android
-
FirefoxLite for Android
-
November 28 2018
Round Table
-
CORS header issue: https://bugzilla.mozilla.org/show_bug.cgi?id=1345788
Honza
Michal
-
1508740 Crash in OOM | large | NS_ABORT_OOM | nsTSubstring
::SetLength -
1506532 Collect telemetry about resource sharing between origins
Junior
Valentin [offline]
Bug 1493630 - Crash in std::panicking::rust_panic_with_hook RustURL
Bug 1507357 - DOM URL object doesn't allow setting pathname when underlying implementation is SimpleURI
Bug 1502097 - Figure out a better way of defining the network.IDN.blacklist_chars pref
Bug 1349316 - Include dotted forms from Latin Extended Additional unicode block for IDNA
Bug 1502025 - Use captive portal service to perform connectivity checks
Bug 1260527 - Change HttpChannelChild to open IPDL as part of construction (i.e. earlier than AsyncOpen)
Bug 1507157 - application crashed GetValidatedOriginAttributes - SerializedLoadContext is null
Dragana
-
necko and mobile
-
what is pocket doing?
Kershaw
-
Bug 1478280 samesite=strict prevents reading the cookie after a xhr request
- Find root cause and change component to DOM:security
-
Bug 1486033 - Add plumbing for Telemetry for new network process
- Landed
-
Bug 1407384 Make notifications respect channel.suspend
-
P1 and P2 r+
-
P3 r?
-
Junior
Nov 15 2018
Honza
-
BT
-
P1 - Bug 1506965 - Data race between HttpChannelChild's NeedToReportBytesRead() and Release()
-
1482084 (buffer of)
-
Bug 1457768 - miss redirect request after 302 with range header
Michal
-
1358038 Add "Race Cache With Network" status to netmonitor
-
1507467 Make sure mAfterOnStartRequestBegun is true for channels loaded with LOAD_ONLY_IF_MODIFIED
-
1500533 Ensure that TLS session tickets are only consumed if storage checks on the channel pass
-
1455723 Firefox59 does not properly honor cache size set in autoconfig files
-
1506534 Collect telemetry to measure how much penalty we will experience with first-party cache isolation
Kershaw
-
- r+
-
Bug 1407384 Make notifications respect channel.suspend
- r?
-
Bug 1494585 Create IPC between ContentProcess and SocketProcess
- r+
-
Bug 1387355 EventSource: ignore IDs with U+0000
- r?
-
Bug 1478280 samesite=strict prevents reading the cookie after a xhr request
- Working
-
Bug 1492843 TCP connection reset by F5
- This is actually a media bug
Junior
-
Bug 1503736 - Origin header honors network.http.referer.hideOnionSource
-
r+
-
land
-
Bug 1504085 - HTTPS to HTTP loads should get an Origin header with "null"
-
After discussion, we will make Origin: to honor RefererPolicy
-
Can reproduce. Investigate.
Thurs Nov 8 2018
Round Table:
-
Sync and debugging: https://bugzilla.mozilla.org/show_bug.cgi?id=1409570#c28
-
related idea: we’re dumping lots of information wrt H2, stop dumping the table for every compression operation (nick to file a bug)
-
sync -- by default in about networking, so that we get the data with crashes
-
Future work: think about our logging situation and propose a way forward... someday -- or ask for 6 aka "turn it up to 11"
-
-
Unassigned p1: https://bugzilla.mozilla.org/show_bug.cgi?id=1418134
- moved to overholt
-
Unassigned p2s - selena is working through it (see below)
-
[selena] First party isolation for cache
-
dragana / ehsan discussing
-
step 1: telemetry on penalty for doing it; nick to pick it up in a few weeks
- bug? next step: open a bug -- dragana please :)
-
-
triage issues:
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1505366 - assigned to daniel
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1358043 - reproducing crashes on Android?
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1451293
- honza - open a bug for the audit
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1321466#c27 how much work is this?
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1340200
- Chrome implementation https://bugs.chromium.org/p/chromium/issues/detail?id=435547
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1342484 - service workers
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1356686 - brotli decompression, can we devise a test / maybe with facebook?
- honza close these out if they are fixed :)
-
-
[honza] many P2 -> P3 for inactivity (by Sylvester)
-
surprised! 1 year of inactivity
-
selena: get a list from sylvestre of what changes; schedule a q3 triage pass
-
-
[honza] stricter tracker annotation list on Nightly -> affects tailing
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1501461
-
Fonts!
-
need tests to show that tailing is helping / not helping -- ran a study on beta; pref flip - zero difference
-
-
The flip pref bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1434379
-
Some graphs not linked in the bug:
-
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1503393 - proxy conf + UI, how to proceed with the UI patch while the bug is a sec bug?
-
Target landing 67 ? dolske
-
selena to figure out how to get UX support
-
-
Meeting invites
Nick
-
1502678 - Referer not sent with rel="noopener” (not us - docshell doesn’t even get referrer)
-
1503578 - Check h2 logs for why ctrl+f5 not reloading all resources (seems 0rtt related)
-
1312057 - Prefetch use telemetry (in prep for re-enabling on prerelease channels)
-
Intermittent Raptor slowness (server related?)
-
1504337 - Consider using http/1.1 on cell connections (interesting paper linked)
-
1501357 - Funky protocol field in devtools
-
Landed h2ws
-
1505388 - h2 proxy crash (fallout from h2ws)
-
1498661 - Conn racing - need to fix dns lookup on secondary conn
Michal
-
1503578 Ctrl + F5 doesn't load all the resources of the web
-
1455723 Firefox59 does not properly honor cache size set in autoconfig files
-
1500533 Ensure that TLS session tickets are only consumed if storage checks on the channel pass
Honza
BT,
1418134 - sec bug (nav spoof?),
1482084 - sec bug (stream data crash),
Bug 1482599 - Landsend online purchase payment error (let users easily run logging locally)
Bug 1303314 - network.automatic-ntlm-auth.allow-non-fqdn does not work (need to look into the code)
Daniel
(can’t attend today)
TRR study #5 work. Will measure transfer times using Akamai servers
Bug 1504109 - archive.is doesn’t work when DoH is used
Bug 1503517 - whitespace cleaning for X-Content-Type-Options
Bug 1505033 - DoH with VPN
Bug 1503393 - prevent "localhost" from going to any proxy
Bug 1505366 - a DOM:Networking lastModified test fail
Valentin
Bug 1487964 - resource timing
R+d… backporting
Bug 1502025 - Use captive portal service to perform connectivity checks
Bug 1495313 - Allow password without username in URL
Bug 1500863 - Use GetAddrInfoEx to resolve hosts on windows
Dragana
IETF - will share a writeup
DoH
Bug 1502641 Crash in _purecall | nsHostRecord::~nsHostRecord
Fission
TFO disabled because of tracking, also fix TFO bug with SOCKS
Kershaw
-
- r?
-
Bug 1407384 Make notifications respect channel.suspend
- r?
-
Bug 1494585 Create IPC between ContentProcess and SocketProcess
- r?
-
Bug 1387355 EventSource: ignore IDs with U+0000
- Handle the case when there is \0 in the data
Junior
-
Bug 1277496 - Attribute 'origin' is should be uppercase 'Origin' in firefox request header
-
land
-
Bug 1503736 - Origin header honors network.http.referer.hideOnionSource
-
r? (ckerschb)
-
P1 autochange - r? (dragana)
-
P2 manual change- r+
-
Bug 1494364 - don't prune proxy if all non-direct proxies are disabled
-
Land
-
Bug 1504085 - HTTPS to HTTP loads should get an Origin header with "null"
-
Daniel Veditz doubts this in Comment 3
Thurs Nov 1, 2018
Round Table:
- Selena: the only update i have is that i'm reworking the job title for mcmanus 2.0 because "network engineer" just got me a bunch of CCNAs :
Thurs Oct 25, 2018
Round Table:
- shutdown hang - got review for a new shutdown timeout, will probably land today, will uplift to beta
Nick
-
Started work on racing connections (actual race, not the 250ms backup conn)
-
Did some research on alt-svc in the wild (see https://bugzilla.mozilla.org/show_bug.cgi?id=1498663#c1)
-
Updated h2ws patch
-
WeChat’s h2 bugs (https://bugzilla.mozilla.org/show_bug.cgi?id=1500743)
-
Reviews, etc (the usual miscellaney)
Michal
-
1479356 browser.cache.disk.capacity allows values over 2097152 but the cache gets capped at 2 GiB
-
1479357 Specific values for browser.cache.disk.capacity do break the cache
-
1421342 Edit and Resend "Request headers" not working as expected
-
1500533 Ensure that TLS session tickets are only consumed if storage checks on the channel pass
Kershaw
-
Bug 1484947 - SSL errors completely freeze any requests in all tabs
- working
-
Bug 1219935 - Startup very slow when set to use auto proxy configuration using pac file
- landed
Junior
-
Bug 1494364 - Frequent "Unable to connect" when using automatic proxy configuration URL
-
Bug 1424076 - Enable network.http.sendOriginHeader by default
Honza
-
working on backtrack, instrumented a ton of queues
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1500346
- selena’s wondering about private data sharing
Thurs Oct 18, 2018
Round Table:
- Bug 1499356 - Incorrect header combining (flattening?)
Thurs Oct 11, 2018
Triage: Junior
Round Table:
-
What is our state of the art for storing data? (AltSvc currently uses PSM DataStorage, may not be what we need for full fix to 1493724)
Nick
-
H2ws submitted for review (yaaaaay!)
-
Bunches of h2 error case handling (1496611, 1050329, 1355858)
-
AltSvc funkiness (1493724) (see also round table)
Honza
-
picked up work on backtrack
-
socket process isolation project - setting up meetings?
-
nika? please CC selena on email
-
documentation on fission? sandboxing and how processes will be structured
-
Michal
-
1487101 We might be leaking images that reload many times over a long period
-
1478157 A WebSocket connection over a proxy periodically disconnects with 1006
Daniel
-
TRR crash due to originSuffix mistake
-
TRR study #5
Valentin
[TRIAGE]
Bug 1500861 - Add shutdownWithTimeout method to nsIThread and nsIThreadPool
Bug 1349316 - Include dotted forms from Latin Extended Additional unicode block for IDNA
Connectivity checker [landed]
Resource timing bug
Hunting down WPT leaks
Dragana
quic
Junior
-
Bug 1498434 - add new telemetry probe to know the delay caused by e10s back pressure
-
Bug 1487559 - add new telemetry probe for the content policy causing suspension for back pressure
Kershaw
-
Bug 1486033 - Add plumbing for Telemetry for new network process
-
Study PBackground code
-
bug regarding proxy pac? 1219935
Thurs Oct 4, 2018
Triage: Daniel
Round Table:
- Stop revalidating? How did it go for Chrome? (bug 1267474)
Nick
-
1493204 - h2 pushes in priority tree - landed
-
1409570 - racy hang with h2 push - landed, will request uplift to beta today
-
1496224 - follow-on to 1409570 (clang-tidy complaint) - landed
-
1050329 - telemetry & better behaviour (re-dispatch as h1) with really busted h2 servers
-
h2ws - re-breakthrough - connection sharing not quite right
Honza
-
Researching sandboxing, etc for necko socket process
- Parent not going to get locked down
-
Luke Wagner shared JS libs project
Michal
-
1484149 Cache racing breaks NTLM authentication - Load / NTLM Auth / cache issue in Firefox and Sharepoint on premises
-
1493278 ChildDNSService::GetDNSRecordHashKey is doing unnecessary work
-
1495336 High limit of NETWORK_CACHE_METADATA_SIZE and NETWORK_CACHE_METADATA_FIRST_READ_SIZE probes is too low
-
1495337 Increase size of the first read when reading metadata
Daniel
Valentin
-
Bug 1489229 - Crash in mozilla::net::nsPACMan::ConfigureWPAD
-
Bug 1460537 - Unified connectivity checker
-
Bug 1495867 - Make sure we support view-source for cross-process-redirecting channels
Dragana
- Quic
Junior
-
Bug 1485355 Add methods on nsHttpConnectionMgr to accept PHttpTransactionParent
-
Bug 1496257 Enable xpcshell-test for socket process isolation - SyncLaunch version
Kershaw
-
Try to stop polling socket on parent process
- Only thing broken is nsIServerSocket
-
Try to make mochitest work with socket process
-
Bug 1496464 - Handle the result of OnStartRequest correctly in HttpTransactionParent::RecvOnStartRequest
-
HTTPS is not working
-
Thurs Sept 27, 2018
Triage: Michal
Round Table:
-
Who’s coming to All-hands?
-
Need owner: 1418134 Navigation Cancels XHR Requests and Calls Onerror
-
Security bug access and triage
-
Update URL to "meeting notes" (to this document) in the triage web-app!
-
Per-domain HTTP caching?
-
Stop revalidating? How did it go for Chrome? (bug 1267474)
-
https://stackoverflow.com/questions/34761700/does-chrome-violate-the-standards-in-caching
Nick
-
Sec bug in h2 decompressor (patch waiting review)
-
1440462 - stop sending httponly cookie values to child processes (landed)
-
1492484 - tab switching can cause illegal h2 PRIORITY frame (fixed, in beta, requested esr)
-
1493204 - fuller fix for 1492484 (put pushes in the priority tree appropriately) in progress
-
1409570 - hang in (racy) corner case with h2 pushes
-
H2ws - big breakthrough - data flows all the way through, just a little disconnect between ws close and h2 stream close, after that should be ready for review
Honza
Michal
Daniel
-
quic libraries
-
Octal IP numbers
-
Grace period to cached TTLable DNS entries
-
HSTS firefox.com ? captive portal...
Valentin
Dragana
ESNI
Some sec bug, Honza took
DoH,
Quic meeting, mozquic
Junior
-
nsAHttpTransactionShell ← nsHttpTransaction ← HttpTransactionParent
-
Back pressure telemetry: we’re going to see if localhost tests matters in the telemetry
Kershaw
-
Bug 1494585 Create IPC between HttpChannelChild and SocketProcess
- Create an empty top level IPC protocol
-
Bug 1490235 Crash in OOM | large | NS_ABORT_OOM | mozilla::net::AltDataOutputStreamChild::Write
- Fixed
Thurs Sept 19, 2018
Triage: Honza (forgot to get to it last week, so staying on this week)
Round Table:
-
Who’s coming to All-hands?
-
Rcwn and writting a new content
Nick
Honza
Michal
- 1428901 Persist TLS session tickets across browsing sessions
Daniel
Valentin
Dragana
Junior
-
nsHttpTransaction splitting
-
WIP - able to load nsHttpTransaction in one or two processes
-
Back Pressure
- 3% of the suspension candidate in beta (4-5% in nightly)
Kershaw
-
Socket process
-
Implement PHttpTransaction.ipdl
-
I can load a simple web page now.
-
2018-09-13
NECKO WEEKLY MEETING NOTES
Thurs Sept 13, 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick <<<<<===== September 7 to September 14
Honza
Michal
Daniel
Valentin
Junior
Dragana
Kershaw
Round Table:
- Necko meeting POSTPONED
- Valentin on PTO until Sept 27
- who knows WPAD? https://bugzilla.mozilla.org/show_bug.cgi?id=1489229
- how do we handle wpt-bot filed bugs?
- MsMpg and our cache, https://bugzilla.mozilla.org/show_bug.cgi?id=1441918
- ether pad?
Nick
- h2ws still progressing, have on* firing (finally), still no data flowing
- a few minor h2 issues
- avoiding httponly cookie values in child processes (wpt failures)
Honza
Michal
- 1489624 Hitting Back sometimes shows old cached content
- 1428901 Persist TLS session tickets across browsing sessions
- 1489945 PR_Assert at sslnonce.c:1216 when SSL_SetResumptionTokenCallback is used
- 1489817 I set to automatically delete history and cookies when closing firefox. When closing firefox, the cache2 folder automatically generates these 3 files, manually deletes these files, and Firefox is automatically generated next time.
Daniel
- TRR - study 4 is pending, telemetry probe fix, possibly devtools disable
- online/offline
- the PAC bug that isn't a bug
- disable DNS/prefetch requests from content
Valentin
bug 1476996 - cross process redirect impl [landed]
bug 908413 - mime type parsing in data URIs
Dragana
Quic
Junior
Bug 1485353 - Create PHttpTransaction IPC protocol
- HttpTransactionParent/Child is split. Fixing the testing failure.
- TODO: (a) Implement HttpTransactionParent::Cancel/Suspend/Resume
(b) env variable off to opt-out
Kershaw
Bug 1487085 - AddressSanitizer: SEGV /builds/worker/workspace/build/src/netwerk/cookie/CookieServiceChild.cpp in mozilla::net::CookieServiceChild::SetCookieStringInternal(nsIURI*, nsIChannel*, char const*, char const*, bool)
- landed
Bug 1490963 - ID of start / stop / redirect Network Tracing Markers do not match
- Working
Socket Process
- Setup memory reporter
- Update offline/online status
2018-09-10
NECKO WEEKLY MEETING NOTES
Thurs Aug 30, 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick <<<<<===== September 7 to September 14
Honza
Michal
Daniel
Valentin
Junior
Dragana
Kershaw
Round Table:
- how should we triage bugs filed by wpt-sync bot? [nwgh, 10 Sept]
- sec-high bugs
Nick
- h2ws still progressing, have on* firing (finally), still no data flowing
- a few minor h2 issues
- avoiding httponly cookie values in child processes (wpt failures)
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- 1428901 Persist TLS session tickets across browsing sessions
Daniel
- TRR - disable in devtools
- ECS mistake
- URI "template"
Valentin
bug 1476996 - cross process redirect impl [landed]
bug 908413 - mime type parsing in data URIs
Dragana
hq - http for quic
Junior
Bug 1485353 - Create PHttpTransaction IPC protocol
- HttpTransactionParent/Child is split. Fixing the testing failure.
- TODO: (a) Implement HttpTransactionParent::Cancel/Suspend/Resume
(b) env variable off to opt-out
Kershaw
Bug 1357676 - Increase cookie count limits to match Chrome's
- landed
Socket Process
- Address Honza's comment
- Use full XPCOM in socket process
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-09-06
NECKO WEEKLY MEETING NOTES
Thurs Aug 30, 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza
Michal
Daniel
Valentin
Junior
Dragana
Kershaw <<<<<===== August 31 to September 6
Round Table:
- sec-high bugs
Nick
- h2ws still progressing, have on* firing (finally), still no data flowing
- a few minor h2 issues
- avoiding httponly cookie values in child processes (wpt failures)
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- 1428901 Persist TLS session tickets across browsing sessions
Daniel
- TRR - disable in devtools
- ECS mistake
- URI "template"
Valentin
bug 1476996 - cross process redirect impl [landed]
bug 908413 - mime type parsing in data URIs
Dragana
hq - http for quic
Junior
Bug 1485353 - Create PHttpTransaction IPC protocol
- HttpTransactionParent/Child is split. Fixing the testing failure.
- TODO: (a) Implement HttpTransactionParent::Cancel/Suspend/Resume
(b) env variable off to opt-out
Kershaw
Bug 1357676 - Increase cookie count limits to match Chrome's
- landed
Socket Process
- Address Honza's comment
- Use full XPCOM in socket process
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-08-30
NECKO WEEKLY MEETING NOTES
Thurs Aug 30, 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza
Michal
Daniel
Valentin
Junior
Dragana
Kershaw <<<<<===== August 31 to September 6
Round Table:
- necko post-Patrick
- sec-high bugs
Nick
- h2ws still progressing, undoing some mess-ups i made while fixing other issues
- not on PTO next week (hurricane lane is ruining my vacation plans), may take a day or two off though (still deciding)
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- 1428901 Persist TLS session tickets across browsing sessions
Daniel
- TRR - disable in devtools
- ECS mistake
- URI "template"
Valentin
bug 1476996 - cross process redirect impl
bug 1487100 - add alt-data API to support wasm machine code
bug 1484997 - websocket limit is reached
*- because of LastPass ? bug 1486228 - race in nsDNSService::mLocalDomains
Dragana
hq - http for quic
Junior
telemetry of back pressure, >4% trigger suspend, but 0.01% responses are considered possible to trigger back pressure
Bug 1485353 - Create PHttpTransaction IPC protocol
Kershaw
Bug 1357676 - Increase cookie count limits to match Chrome's
- landed
Socket Process
- Address Honza's comment
- Use full XPCOM in socket process
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-08-23
NECKO WEEKLY MEETING NOTES
Thurs Aug 23, 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza
Michal
Daniel
Valentin
Junior
Dragana <<<<<===== August 24 to 30
Kershaw
Round Table:
- pref bugs
Nick
- h2ws still progressing, undoing some mess-ups i made while fixing other issues
- not on PTO next week (hurricane lane is ruining my vacation plans), may take a day or two off though (still deciding)
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- 1428901 Persist TLS session tickets across browsing sessions
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR - telemetry counter TRR-per-connection
- TRR - disable in devtools
Valentin
bug 1476996 - cross process redirect impl
bug 1478732 - resolver thread dispatch tasks instead of locking [backed out]
Dragana
hq - http for quic
Junior
triage
To discuss: Allow tg:// scheme for telegram? (Chrome support, Safari doesn't)
Socket Process: catching up
Kershaw
Bug 1344090 - Firefox's cookie limitations does not allow to store 150 cookies per-domain , but only for the root domain, it is confusing.
Bug 1357676 - Increase cookie count limits to match Chrome's
- jdm f?
Socket Process
- Address Honza's comment
- Make preference notification work
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-08-20
NECKO WEEKLY MEETING NOTES
Thurs Aug 16th 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza
Michal
Daniel
Valentin
Junior <<<<<===== August 17 to 23
Dragana
Kershaw
Round Table:
- DOM : Networking
- who wants to start taking these and learning some DOM?
- Mobile networking stacks
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- landed 1466577 Crash in arena_dalloc | Allocator
::free | MOZ_Z_inflateEnd - 1477684 rcwn blocking some xmlHttpRequests
- 1475701 Save Page As doesn't begin MP3 download while tab is open
- 1428901 Persist TLS session tickets across browsing sessions
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR - telemetry counter TRR-per-connection
- TRR - disable in devtools
Valentin
bug 1478732 - resolver thread dispatch tasks instead of locking [backed out]
bug 1476996 - cross process redirect impl
Dragana
Bug 1481251 - ESNI
hq - http for quic
Junior
To discuss: Allow tg:// scheme for telegram? (Chrome support, Safari doesn't)
Kershaw
Bug 1344090 - Firefox's cookie limitations does not allow to store 150 cookies per-domain , but only for the root domain, it is confusing.
Bug 1357676 - Increase cookie count limits to match Chrome's
- jdm f?
Socket Process
- Try to catch up
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-08-17
NECKO WEEKLY MEETING NOTES
Thurs Aug 16th 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza
Michal
Daniel
Valentin
Junior <<<<<===== August 17 to 23
Dragana
Kershaw
Round Table:
- DOM : Networking
- who wants to start taking these and learning some DOM?
- Mobile networking stacks
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- landed 1466577 Crash in arena_dalloc | Allocator
::free | MOZ_Z_inflateEnd - 1477684 rcwn blocking some xmlHttpRequests
- 1475701 Save Page As doesn't begin MP3 download while tab is open
- 1428901 Persist TLS session tickets across browsing sessions
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR - telemetry counter TRR-per-connection
- TRR - disable in devtools
Valentin
bug 1478732 - resolver thread dispatch tasks instead of locking [backed out]
bug 1476996 - cross process redirect impl
Dragana
Bug 1481251 - ESNI
hq - http for quic
Junior
land e10s backpressure
Kershaw
Bug 1344090 - Firefox's cookie limitations does not allow to store 150 cookies per-domain , but only for the root domain, it is confusing.
Bug 1357676 - Increase cookie count limits to match Chrome's
- jdm f?
Socket Process
- Try to catch up
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-08-16
NECKO WEEKLY MEETING NOTES
Thurs Aug 16th 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza
Michal
Daniel
Valentin <<<<<===== August 9 to 16
Junior
Dragana
Kershaw
Round Table:
- DOM : Networking
- who wants to start taking these and learning some DOM?
- Mobile networking stacks
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- landed 1466577 Crash in arena_dalloc | Allocator
::free | MOZ_Z_inflateEnd - 1477684 rcwn blocking some xmlHttpRequests
- 1475701 Save Page As doesn't begin MP3 download while tab is open
- 1428901 Persist TLS session tickets across browsing sessions
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR - telemetry counter TRR-per-connection
- TRR - disable in devtools
Valentin
bug 1478732 - resolver thread dispatch tasks instead of locking [backed out]
bug 1476996 - cross process redirect impl
Dragana
Bug 1481251 - ESNI
hq - http for quic
Junior
land e10s backpressure
Kershaw
Bug 1344090 - Firefox's cookie limitations does not allow to store 150 cookies per-domain , but only for the root domain, it is confusing.
Bug 1357676 - Increase cookie count limits to match Chrome's
- jdm f?
Socket Process
- Try to catch up
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-08-13
NECKO WEEKLY MEETING NOTES
Thurs Aug 9th 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza
Michal
Daniel
Valentin <<<<<===== August 9 to 16
Junior
Dragana
Kershaw
Round Table:
- DOM : Networking
- who wants to start taking these and learning some DOM?
- Mobile networking stacks
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- landed 1466577 Crash in arena_dalloc | Allocator
::free | MOZ_Z_inflateEnd - 1477684 rcwn blocking some xmlHttpRequests
- 1475701 Save Page As doesn't begin MP3 download while tab is open
- 1428901 Persist TLS session tickets across browsing sessions
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
Valentin
bug 1478732 - resolver thread dispatch tasks instead of locking
bug 1476996 - cross process redirect impl
Dragana
Bug 1473736 ang Bug 1481251 - ESNI
Bug 1480704 - PSM bug to detect MITM
Junior
e10s backpressure - r?
Bug 1481609 - Remove MOZ_SQLITE_COOKIES_OLD_SCHEMA telemetry probe
Kershaw
Landed some small bugs.
Next:
Bug 1344090 - Firefox's cookie limitations does not allow to store 150 cookies per-domain , but only for the root domain, it is confusing.
Bug 1357676 - Increase cookie count limits to match Chrome's
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-08-09
NECKO WEEKLY MEETING NOTES
Thurs Aug 9th 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza
Michal
Daniel
Valentin <<<<<===== August 9 to 16
Junior
Dragana
Kershaw
Round Table:
- DOM : Networking
- XHR, Fetch, Websockets, EventSource, Beacon
- Necko will triage, and start to fix bugs here (or hand off to existing DOM experts)
- Mobile networking stacks
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- landed 1466577 Crash in arena_dalloc | Allocator
::free | MOZ_Z_inflateEnd - 1477684 rcwn blocking some xmlHttpRequests
- 1475701 Save Page As doesn't begin MP3 download while tab is open
- 1428901 Persist TLS session tickets across browsing sessions
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
Valentin
bug 1478732 - resolver thread dispatch tasks instead of locking
bug 1476996 - cross process redirect impl
Dragana
Bug 1473736 ang Bug 1481251 - ESNI
Bug 1480704 - PSM bug to detect MITM
Junior
e10s backpressure - r?
Bug 1481609 - Remove MOZ_SQLITE_COOKIES_OLD_SCHEMA telemetry probe
Kershaw
Landed some small bugs.
Next:
Bug 1344090 - Firefox's cookie limitations does not allow to store 150 cookies per-domain , but only for the root domain, it is confusing.
Bug 1357676 - Increase cookie count limits to match Chrome's
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-07-26
NECKO WEEKLY MEETING NOTES
Thurs July 19th 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza
Michal <<<<<===== July 27 to August 2
Daniel
Valentin
Junior
// (skip Dragana till she's back full-time)
Round Table:
- Kershaw (Berlin, August 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- landed 1466577 Crash in arena_dalloc | Allocator
::free | MOZ_Z_inflateEnd - 1477684 rcwn blocking some xmlHttpRequests
- 1475701 Save Page As doesn't begin MP3 download while tab is open
- 1428901 Persist TLS session tickets across browsing sessions
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
- fastblock
Valentin
bug 1478732 - resolver thread dispatch tasks instead of locking
Bug 1476928 - Remove nsIURI.CloneIgnoringRef and nsIURI.CloneWithNewRef [landed]
bug 1476996 - cross process redirect impl
bug 1416623 - socket process WIP
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Junior
e10s backpressure
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-07-20
NECKO WEEKLY MEETING NOTES
Thurs July 19th 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick <<<<<===== July 20 to July 26
Honza
Michal
Daniel
Valentin
Junior
// (skip Dragana till she's back full-time)
Round Table:
- Kershaw (Berlin, August 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- 1475701 Save Page As doesn't begin MP3 download while tab is open
- 1466577 Crash in arena_dalloc | Allocator
::free | MOZ_Z_inflateEnd - 1428901 Persist TLS session tickets across browsing sessions
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
- fastblock
Valentin
resolver thread dispatch tasks instead of locking
bug 1416623 - socket process WIP
- lots of warnings
- can do IPDL calls
- crashes on shutdown cross process redirect meetings
Bug 1476928 - Remove nsIURI.CloneIgnoringRef and nsIURI.CloneWithNewRef
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Junior
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-07-13
NECKO WEEKLY MEETING NOTES
Thurs July 5th 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick <<<<<===== June 15 to June 21
Honza
Michal
Daniel
Valentin
// (skip Dragana till she's back full-time)
Round Table:
- Kershaw (Berlin, August 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- 1466577 Crash in arena_dalloc | Allocator
::free | MOZ_Z_inflateEnd - 1454702 xmlHttpRequest not connecting to the server
- detecting problem when video evicts whole cache
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
- fastblock
Valentin
debug bug 1473718 with rr
resolver thread dispatch tasks instead of locking
socket process WIP
- lots of warnings
- can do IPDL calls
- crashes on shutdown
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-07-12
NECKO WEEKLY MEETING NOTES
Thurs July 5th 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick <<<<<===== June 15 to June 21
Honza
Michal
Daniel
Valentin
// (skip Dragana till she's back full-time)
Round Table:
- Kershaw (Berlin, July 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- 1466577 Crash in arena_dalloc | Allocator
::free | MOZ_Z_inflateEnd - 1454702 xmlHttpRequest not connecting to the server
- detecting problem when video evicts whole cache
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
- fastblock
Valentin
debug bug 1473718 with rr
resolver thread dispatch tasks instead of locking
socket process WIP
- lots of warnings
- can do IPDL calls
- crashes on shutdown
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-07-05
NECKO WEEKLY MEETING NOTES
Thurs July 5th 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick <<<<<===== June 15 to June 21
Honza
Michal
Daniel
Valentin
// (skip Dragana till she's back full-time)
Round Table:
- Kershaw (Berlin, July 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- 1466577
- 1460879 Non-secure WebSocket through proxy that does not support Upgrade fails
- 756165 Return close code 1015 to JS when TLS setup fails
- detecting problem when video evicts whole cache
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
- bug 1452436 TRR resolved addresses and websockets timeouts
Valentin
Bug 1412081 - tor & file://
*- leak was in plugin process *- about to land bug 1460537 - connectivity checker
Bug 1471280 - Do not start/stop nsHostResolver threads
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-06-28
- NECKO WEEKLY MEETING NOTES
Thurs April 26 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick <<<<<===== June 15 to June 21
Honza
Michal
Daniel
Valentin
// (skip Dragana till she's back full-time)
Round Table:
- Kershaw (Berlin, July 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- 1466577
- 1460879 Non-secure WebSocket through proxy that does not support Upgrade fails
- 756165 Return close code 1015 to JS when TLS setup fails
- detecting problem when video evicts whole cache
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
- bug 1452436 TRR resolved addresses and websockets timeouts
Valentin
Bug 1412081 - tor & file://
bug 1460537 - connectivity checker
bug 1471628 - captive portal tests
bug 1468923 - characters in custom protocols are unescaped
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-06-18
- NECKO WEEKLY MEETING NOTES
Thurs April 26 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick <<<<<===== June 15 to June 21
Honza
Michal
Daniel
Valentin
// (skip Dragana till she's back full-time)
Round Table:
- Kershaw (Berlin, July 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- 1466577
- 1342899 websocket failed connections are stacked up?
- 1460879 Non-secure WebSocket through proxy that does not support Upgrade fails
- 756165 Return close code 1015 to JS when TLS setup fails
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
- bug 1452436 TRR resolved addresses and websockets timeouts
Valentin
Bug 1454100 - Cookies like to move around [waiting for data-review]
Bug 1450199 - Cookie is not synced across tabs [landed & uplifted]
Bug 1423495 - Implement PerformanceServerTiming interface [landed]
Bug 1412081 - tor & file://
threadsafe URI followups (remove unneeded code)
reviews for bug 1447931 - IO activity tracker
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-06-17
- NECKO WEEKLY MEETING NOTES
Thurs April 26 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick <<<<<===== June 15 to June 21
Honza
Michal
Daniel
Valentin
// (skip Dragana till she's back full-time)
Round Table:
- Kershaw (Berlin, July 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- 1466577
- 1342899 websocket failed connections are stacked up?
- 1460879 Non-secure WebSocket through proxy that does not support Upgrade fails
- 756165 Return close code 1015 to JS when TLS setup fails
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
- bug 1452436 TRR resolved addresses and websockets timeouts
Valentin
Bug 1454100 - Cookies like to move around [waiting for data-review]
Bug 1450199 - Cookie is not synced across tabs [landed & uplifted]
Bug 1423495 - Implement PerformanceServerTiming interface [landed]
Bug 1412081 - tor & file://
threadsafe URI followups (remove unneeded code)
reviews for bug 1447931 - IO activity tracker
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-06-08
- NECKO WEEKLY MEETING NOTES
Thurs April 26 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza
Michal
Daniel
Valentin <<<<<===== June 8 to June 15
// (skip Dragana till she's back full-time)
Round Table:
- Kershaw (Berlin, July 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- 1466577
- 1342899 websocket failed connections are stacked up?
- 1460879 Non-secure WebSocket through proxy that does not support Upgrade fails
- 756165 Return close code 1015 to JS when TLS setup fails
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
- bug 1452436 TRR resolved addresses and websockets timeouts
Valentin
Bug 1454100 - Cookies like to move around [waiting for data-review]
Bug 1450199 - Cookie is not synced across tabs [landed & uplifted]
Bug 1423495 - Implement PerformanceServerTiming interface [landed]
Bug 1412081 - tor & file://
threadsafe URI followups (remove unneeded code)
reviews for bug 1447931 - IO activity tracker
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-06-07
- NECKO WEEKLY MEETING NOTES
Thurs April 26 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza <<<<<===== May 18 -> May 25
Michal
Daniel
Valentin
// (skip Dragana till she's back full-time)
Round Table:
- Kershaw (Berlin, July 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- 1466577
- 1342899 websocket failed connections are stacked up?
- 1460879 Non-secure WebSocket through proxy that does not support Upgrade fails
- 756165 Return close code 1015 to JS when TLS setup fails
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
- bug 1452436 TRR resolved addresses and websockets timeouts
Valentin
Bug 1454100 - Cookies like to move around [waiting for data-review]
Bug 1450199 - Cookie is not synced across tabs [landed & uplifted]
Bug 1423495 - Implement PerformanceServerTiming interface [landed]
Bug 1412081 - tor & file://
threadsafe URI followups (remove unneeded code)
reviews for bug 1447931 - IO activity tracker
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-05-31
- NECKO WEEKLY MEETING NOTES
Thurs April 26 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza <<<<<===== May 18 -> May 25
Michal
Daniel
Valentin
// (skip Dragana till she's back full-time)
Round Table:
- Kershaw (Berlin, July 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
ni? 1463729 (fast net, slow logging IO -> hang socket thread in an endless loop, h2)
smb proxy bypass - ni? valentin
Michal
- triage
- [landed] 1456871 Consider increasing disk cache size
- [landed] 1457084 Increase max chunk memory usage limit
- [landed] 1452245 The parent side isn't closed if the child dies unexpectedly
- [landed] 1377570 Enable RCWN on mobile
- 1342899 websocket failed connections are stacked up?
- 1460879 Non-secure WebSocket through proxy that does not support Upgrade fails
- 756165 Return close code 1015 to JS when TLS setup fails
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
- bug 1452436 TRR resolved addresses and websockets timeouts
Valentin
Bug 1454100 - Cookies like to move around [waiting for data-review]
Bug 1450199 - Cookie is not synced across tabs [landed & uplifted]
Bug 1423495 - Implement PerformanceServerTiming interface [landed]
Bug 1412081 - tor & file://
threadsafe URI followups (remove unneeded code)
reviews for bug 1447931 - IO activity tracker
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-05-24
- NECKO WEEKLY MEETING NOTES
Thurs April 26 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza <<<<<===== May 18 -> May 25
Michal
Daniel
Valentin
// (skip Dragana till she's back full-time)
Round Table:
- Kershaw (Berlin, July 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
proxy bypass windows
Michal
- 1456871 Consider increasing disk cache size
- 1457084 Increase max chunk memory usage limit
- 1452245 The parent side isn't closed if the child dies unexpectedly
- 1377570 Enable RCWN on mobile
- 1342899 websocket failed connections are stacked up?
- 1460879 Non-secure WebSocket through proxy that does not support Upgrade fails
- 756165 Return close code 1015 to JS when TLS setup fails
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
- bug 1452436 TRR resolved addresses and websockets timeouts
Valentin
Bug 1454100 - Cookies like to move around [waiting for data-review]
Bug 1450199 - Cookie is not synced across tabs [landed & uplifted]
Bug 1423495 - Implement PerformanceServerTiming interface [landed]
Bug 1412081 - tor & file://
threadsafe URI followups (remove unneeded code)
reviews for bug 1447931 - IO activity tracker
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-05-17
- NECKO WEEKLY MEETING NOTES
Thurs April 26 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza <<<<<===== May 18 -> May 25
Michal
Daniel
Valentin
// (skip Dragana till she's back full-time)
Round Table:
- Kershaw (Berlin, July 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
proxy bypass windows
Michal
- triage
- 1448476 Cache entry corruption after writing the alternate data
- 1456871 Consider increasing disk cache size
- 1457084 Increase max chunk memory usage limit
- 1457188 Update expiration of RCWN related telemetry probes
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
- bug 1452436 TRR resolved addresses and websockets timeouts
Valentin
Bug 1454100 - Cookies like to move around [waiting for data-review]
Bug 1450199 - Cookie is not synced across tabs [landed & uplifted]
Bug 1423495 - Implement PerformanceServerTiming interface [landed]
Bug 1412081 - tor & file://
threadsafe URI followups (remove unneeded code)
reviews for bug 1447931 - IO activity tracker
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-05-12
- NECKO WEEKLY MEETING NOTES
Thurs April 26 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick <<<<<===== May 11 -> May 17
Honza
Michal
Daniel
Valentin
// (skip Dragana till she's back full-time)
Round Table:
- Kershaw (Berlin, July 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
proxy bypass windows
Michal
- triage
- 1448476 Cache entry corruption after writing the alternate data
- 1456871 Consider increasing disk cache size
- 1457084 Increase max chunk memory usage limit
- 1457188 Update expiration of RCWN related telemetry probes
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
- bug 1452436 TRR resolved addresses and websockets timeouts
Valentin
Bug 1454100 - Cookies like to move around [waiting for data-review]
Bug 1450199 - Cookie is not synced across tabs [landed & uplifted]
Bug 1423495 - Implement PerformanceServerTiming interface [landed]
Bug 1412081 - tor & file://
threadsafe URI followups (remove unneeded code)
reviews for bug 1447931 - IO activity tracker
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-05-06
- NECKO WEEKLY MEETING NOTES
Thurs April 26 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza
Michal
Daniel
Valentin <<<<<===== May 7-> May 11
// (skip Dragana till she's back full-time)
Round Table:
- Kershaw (Berlin, July 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
proxy bypass windows
Michal
- triage
- 1448476 Cache entry corruption after writing the alternate data
- 1456871 Consider increasing disk cache size
- 1457084 Increase max chunk memory usage limit
- 1457188 Update expiration of RCWN related telemetry probes
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
- bug 1452436 TRR resolved addresses and websockets timeouts
Valentin
Bug 1454100 - Cookies like to move around [waiting for data-review]
Bug 1450199 - Cookie is not synced across tabs [landed & uplifted]
Bug 1423495 - Implement PerformanceServerTiming interface [landed]
Bug 1412081 - tor & file://
threadsafe URI followups (remove unneeded code)
reviews for bug 1447931 - IO activity tracker
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-04-26
- NECKO WEEKLY MEETING NOTES
Thurs April 26 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza
Michal <<<<<===== Apr 20-> Apr 26
Daniel
Valentin
// (skip Dragana till she's back full-time)
Round Table:
- Kershaw (Berlin, July 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
proxy bypass windows
Michal
- triage
- 1448476 Cache entry corruption after writing the alternate data
- 1456871 Consider increasing disk cache size
- 1457084 Increase max chunk memory usage limit
- 1457188 Update expiration of RCWN related telemetry probes
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR stuff
- bug 1452436 TRR resolved addresses and websockets timeouts
Valentin
Bug 1454100 - Cookies like to move around [waiting for data-review]
Bug 1450199 - Cookie is not synced across tabs [landed & uplifted]
Bug 1423495 - Implement PerformanceServerTiming interface [landed]
Bug 1412081 - tor & file://
threadsafe URI followups (remove unneeded code)
reviews for bug 1447931 - IO activity tracker
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-04-20
- NECKO WEEKLY MEETING NOTES
Thurs April 5 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza
Michal <<<<<===== Apr 20-> Apr 26
Daniel
Valentin
// (skip Dragana till she's back full-time)
Round Table:
Network "leak" bugs that suck but need to be fixed:
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1412081
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1413868
-
Kershaw (Berlin, July 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
Michal
- 1448476 Cache entry corruption after writing the alternate data
- 1448783 Firefox launcher is blocked in slow DNS queries for local hostname
- 1438505 Ajax calls aborted when loading same domain in another tab
- 1452245 The parent side isn't closed if the child dies unexpectedly.
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (shield study, not restarting the DNSService anymore)
Valentin
cookie isolation
Bug 1450199 - Cookie is not synced across tabs
Bug 1389251 - data: URIs with spaces around MIME type
server timing
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-04-14
- NECKO WEEKLY MEETING NOTES
Thurs April 5 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza <<<<<===== Apr 13 -> Apr 19
Michal
Daniel
Valentin
// (skip Dragana till she's back full-time)
Round Table:
Network "leak" bugs that suck but need to be fixed:
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1412081
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1413868
-
Kershaw (Berlin, July 1st), Junior (Portland, July 15th)
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
Michal
- 1444278 Fetch un-prefighted CORS Requests stop on second 302/303 redirect with Cross-Origin Request Blocked
- 1448476 Cache entry corruption after writing the alternate data
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (shield study, not restarting the DNSService anymore)
Valentin
cookie isolation
cookie reviews
Bug 1453633 - Make nsHostObjectURI hold its principal wrapped in a nsMainThreadPtrHandle
Bug 1450199 - Cookie is not synced across tabs
server timing
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-04-05
- NECKO WEEKLY MEETING NOTES
Thurs April 5 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick <<<<<===== Apr 6 -> Apr 12
Honza
Michal
Daniel
Valentin
// (skip Dragana while she's on leave)
Round Table:
- TRR Shield study
- fun with site isolation
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
Michal
- 1439780 .local (avahi) domains result in "Hmm, we're having trouble finding that site."
- 1436809 Sending websocket message with text and binary data corrupts binary data
- 1448476 Cache entry corruption after writing the alternate data
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (shield study, not restarting the DNSService anymore)
Valentin
server timing
cookie isolation
Bug 1450199 - Cookie is not synced across tabs
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-03-29
- NECKO WEEKLY MEETING NOTES
Thurs March 22nd 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza
Michal
Daniel
Valentin <<<<<===== Mar 29 -> Apr 5
// (skip Dragana while she's on leave)
Round Table:
Interpreting study data?
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
Michal
- 1373708 Convert Jar channels to stop using main thread I/O
- 1439780 .local (avahi) domains result in "Hmm, we're having trouble finding that site."
- 1436809 Sending websocket message with text and binary data corrupts binary data
- 1435300 about:cache does not show all entries in caches
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (shield study, not restarting the DNSService anymore)
Valentin
server timing
cookie isolation
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-03-22
- tNECKO WEEKLY MEETING NOTES
Thurs March 22nd 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza
Michal
Daniel <<<<<===== Mar 23 -> Mar 29
Valentin
// (skip Dragana while she's on leave)
Round Table:
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
- socket timeout code fixed
- new throttling enabled
- no benefits from delaying TP URIs
- view-source refactoring sec checks
Michal
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
- logging prefs crash
- TTL in windows bug
Valentin
Threadsafe URIs - mostly done
Bug 1426353 - don't use alt-data generated in the content process in the main process
Bug 1433609 - nsStandardURL::Deserialize IPC fuzzing
Bug 1399325 - URL length may exceed max limit
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-03-01
- tNECKO WEEKLY MEETING NOTES
Thurs Feb 8th 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza <<<<<===== Mar 02 -> Mar 09
Michal
Daniel
Valentin
// (skip Dragana while she's on leave)
Round Table:
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
Michal
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
- logging prefs crash
- TTL in windows bug
Valentin
Bug 1334465 - [e10s] Crash in IPCError-browser | PHttpChannel::Msg_SetPriority Route error: message sent to unknown actor ID
Bug 1433958 - Change code that uses nsIURI setters to use nsIURIMutator
Bug 1433500 - detectportal.firefox.com should return something informative for "real" user agents.
Bug 1433609 - nsStandardURL IPC fuzzing
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-02-23
- tNECKO WEEKLY MEETING NOTES
Thurs Feb 8th 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick <<<<<===== Feb 23 -> Mar 01
Honza
Michal
Daniel
Valentin
// (skip Dragana while she's on leave)
Round Table:
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
Michal
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
- logging prefs crash
- TTL in windows bug
Valentin
Bug 1334465 - [e10s] Crash in IPCError-browser | PHttpChannel::Msg_SetPriority Route error: message sent to unknown actor ID
Bug 1433958 - Change code that uses nsIURI setters to use nsIURIMutator
Bug 1433500 - detectportal.firefox.com should return something informative for "real" user agents.
Bug 1433609 - nsStandardURL IPC fuzzing
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-02-21
NECKO WEEKLY MEETING NOTES
Thurs Feb 8th 2018
TRIAGE: see https://public.etherpad-mozilla.org/p/necko-triage-guide for how-to
Nick
Honza
Michal
Daniel
Valentin <<<<<===== Feb 15 -> Feb 22
// (skip Dragana while she's on leave)
Round Table:
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
Michal
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
- logging prefs crash
- TTL in windows bug
Valentin
Bug 1334465 - [e10s] Crash in IPCError-browser | PHttpChannel::Msg_SetPriority Route error: message sent to unknown actor ID
Bug 1433958 - Change code that uses nsIURI setters to use nsIURIMutator
Bug 1433500 - detectportal.firefox.com should return something informative for "real" user agents.
Bug 1433609 - nsStandardURL IPC fuzzing
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-02-19
NECKO WEEKLY MEETING NOTES
Thurs Feb 8th 2018
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Honza
Michal
Daniel
Valentin <<<<<===== Feb 15 -> Feb 22
// (skip Dragana while she's on leave)
Round Table:
- Q1 SCHEDULING: http://tinyurl.com/y7cqzzd9
- Personal quarterly goals are now H1/H2 goals. Need them by Feb 7th
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
Michal
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
- logging prefs crash
- TTL in windows bug
Valentin
Bug 1334465 - [e10s] Crash in IPCError-browser | PHttpChannel::Msg_SetPriority Route error: message sent to unknown actor ID
Bug 1433958 - Change code that uses nsIURI setters to use nsIURIMutator
Bug 1433500 - detectportal.firefox.com should return something informative for "real" user agents.
Bug 1433609 - nsStandardURL IPC fuzzing
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-02-12
NECKO WEEKLY MEETING NOTES
Thurs Feb 8th 2018
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Honza
Michal
Daniel <<<<<===== Feb 8 -> Feb 15
Valentin
// (skip Dragana while she's on leave)
Round Table:
- Q1 SCHEDULING: http://tinyurl.com/y7cqzzd9
- Personal quarterly goals are now H1/H2 goals. Need them by Feb 7th
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
Michal
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
- logging prefs crash
- TTL in windows bug
Valentin
Bug 1334465 - [e10s] Crash in IPCError-browser | PHttpChannel::Msg_SetPriority Route error: message sent to unknown actor ID
Bug 1433958 - Change code that uses nsIURI setters to use nsIURIMutator
Bug 1433500 - detectportal.firefox.com should return something informative for "real" user agents.
Bug 1433609 - nsStandardURL IPC fuzzing
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-02-08
NECKO WEEKLY MEETING NOTES
Thurs Feb 8th 2018
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick <<<<<===== Jan 18 -> Jan 25
Honza
Michal
Daniel
Valentin
// (skip Dragana while she's on leave)
Round Table:
- Q1 SCHEDULING: http://tinyurl.com/y7cqzzd9
- Personal quarterly goals are now H1/H2 goals. Need them by Feb 7th
Nick
- h2 crash 1 - r+, awaiting sec-approbal
- h2 crash 2 - seems to be enterprisey (good number during week, not so much on weekend), waiting/hoping for input from outside
- h2 trailers - patch first round written, waiting for third-party endpoint to test against
- server-timing - made it https-only
- cookie limiting & batch eviction - in progress
- h2 websockets - starting soon
- predictor prefetch - waiting on yoathrizon
Honza
Michal
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
- logging prefs crash
- TTL in windows bug
Valentin
Bug 1334465 - [e10s] Crash in IPCError-browser | PHttpChannel::Msg_SetPriority Route error: message sent to unknown actor ID
Bug 1433958 - Change code that uses nsIURI setters to use nsIURIMutator
Bug 1433500 - detectportal.firefox.com should return something informative for "real" user agents.
Bug 1433609 - nsStandardURL IPC fuzzing
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-01-25
NECKO WEEKLY MEETING NOTES
Thurs Jan 25 2018
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick <<<<<===== Jan 18 -> Jan 25
Honza
Michal
Daniel
Valentin
// (skip Dragana while she's on leave)
Round Table:
- Q1 SCHEDULING: http://tinyurl.com/y7cqzzd9
- Personal quarterly goals are now H1/H2 goals. Need them by Feb 7th
Nick
- h2 crashes (raw pointers the culprit? MAYBE - in progress)
- h2 goaway error handling (in progress)
- h2 throttling (landed)
- prefetch telemetry (landed)
Honza
Michal
- landed 1412320 CacheIndex::~CacheIndex is called outside CacheIndex::sLock
- landed 1418028 UBSan: null pointer passed as argument declared to never be null [@ mozilla::net::CacheFileMetadata::WriteMetadata]
- 1428169 Firefox 57, Fedora Linux, freeze on opening tabs
- 1403817 Split out cache stats by whether user has SSD or not
- 1372930 Intermittent websocket test failures
- 1426353 alt-data
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
Valentin
Bug 1431204 - Make nsIURI.spec readonly
Bug 1426019 - Use nsIThread in nsHostResolver
Bug 1414091 - Massive leak while loading psarips.com
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-01-23
NECKO WEEKLY MEETING NOTES
Thurs Jan 22nd 2018
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick <<<<<===== Jan 18 -> Jan 25
Honza
Michal
Daniel
Valentin
// (skip Dragana while she's on leave)
Round Table:
- Personal quarterly goals are now H1/H2 goals. Need them by Feb 7th
Nick
- h2 crashes (raw pointers the culprit? MAYBE - in progress)
- h2 goaway error handling (in progress)
- h2 throttling (landed)
- prefetch telemetry (landed)
Honza
Michal
- 1430239 Intermittent TEST-UNEXPECTED-TIMEOUT | netwerk/test/unit/test_bug482601.js | Test timed out
- 1412320 CacheIndex::~CacheIndex is called outside CacheIndex::sLock,
- 1418028 UBSan: null pointer passed as argument declared to never be null [@ mozilla::net::CacheFileMetadata::WriteMetadata]
- 1403817 Split out cache stats by whether user has SSD or not
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
Valentin
Bug 1431204 - Make nsIURI.spec readonly
Bug 1426019 - Use nsIThread in nsHostResolver
Bug 1414091 - Massive leak while loading psarips.com
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-01-18
NECKO WEEKLY MEETING NOTES
Thurs Jan 11th 2018
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick <<<<<===== Jan 18 -> Jan 25
Honza
Junior
Michal
Amy
Daniel
Kershaw
Valentin
SC
// (skip Dragana while she's on leave)
Round Table:
- Quarterly goals are now H1/H2 goals. Need them by Feb 7th
Nick
- h2 crashes (raw pointers the culprit? MAYBE - in progress)
- h2 goaway error handling (in progress)
- h2 throttling (landed)
- prefetch telemetry (landed)
Honza
Michal
- 1430239 Intermittent TEST-UNEXPECTED-TIMEOUT | netwerk/test/unit/test_bug482601.js | Test timed out
- 1412320 CacheIndex::~CacheIndex is called outside CacheIndex::sLock,
- 1418028 UBSan: null pointer passed as argument declared to never be null [@ mozilla::net::CacheFileMetadata::WriteMetadata]
- 1403817 Split out cache stats by whether user has SSD or not
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
Valentin
Bug 1431204 - Make nsIURI.spec readonly
Bug 1426019 - Use nsIThread in nsHostResolver
Bug 1414091 - Massive leak while loading psarips.com
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-01-16
NECKO WEEKLY MEETING NOTES
Thurs Jan 11th 2018
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Honza
Junior
Michal
Amy
Daniel
Kershaw
Valentin
SC <<<<<===== Jan 12 -> Jan 18
Dragana
Round Table:
- dns resolver rewrite vs incremental fixes?
- Fx56 statcounter drop 5% -> anything network and tracking protection related?
- Bug 1420872 - Uploading images hangs whole network stack
- 1409634 Firefox using 35-45% cpu for no apparent reason
Nick
- h2 crashes (raw pointers the culprit? MAYBE - in progress)
- h2 goaway error handling (in progress)
- h2 throttling (landed)
- prefetch telemetry (landed)
Honza
Michal
- 1425324 Websocket connections drops each 15 minutes
- 1052467 Intermittent talos "TalosError: timeout"
- 1425830 Crash in _platform_memmove$VARIANT$Haswell |
| mozilla::net::CacheFileInputStream::ReadSegments - 1412320 Intermittent toolkit/components/places/tests/browser/browser_visituri_privatebrowsing_perwindowpb.js | application crashed [@ mozilla::OffTheBooksMutex::AssertCurrentThreadOwns()]
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
Valentin
Bug 1426501 - Replace .spec setters with nsIURIMutator
Bug 1427373 - Convert nsHostResolver.mDB from PLDHashTable to nsRefPtrHashtable
Bug 1414091 - Massive leak while loading psarips.com
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-01-12
NECKO WEEKLY MEETING NOTES
Thurs Jan 11th 2018
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Honza
Junior
Michal
Amy
Daniel
Kershaw
Valentin
SC <<<<<===== Jan 12 -> Jan 18
Dragana
Round Table:
- dns resolver rewrite vs incremental fixes?
- Fx56 statcounter drop 5% -> anything network and tracking protection related?
- Bug 1420872 - Uploading images hangs whole network stack
- 1409634 Firefox using 35-45% cpu for no apparent reason
Nick
Honza
Michal
- 1425324 Websocket connections drops each 15 minutes
- 1052467 Intermittent talos "TalosError: timeout"
- 1425830 Crash in _platform_memmove$VARIANT$Haswell |
| mozilla::net::CacheFileInputStream::ReadSegments - 1412320 Intermittent toolkit/components/places/tests/browser/browser_visituri_privatebrowsing_perwindowpb.js | application crashed [@ mozilla::OffTheBooksMutex::AssertCurrentThreadOwns()]
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
Valentin
Bug 1426501 - Replace .spec setters with nsIURIMutator
Bug 1427373 - Convert nsHostResolver.mDB from PLDHashTable to nsRefPtrHashtable
Bug 1414091 - Massive leak while loading psarips.com
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-01-11
NECKO WEEKLY MEETING NOTES
Thurs Jan 11th 2018
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Honza
Junior
Michal
Amy
Daniel
Kershaw
Valentin <<<<<===== Jan 5 -> Jan 11
SC
Dragana
Round Table:
- dns resolver rewrite vs incremental fixes?
- Fx56 statcounter drop 5% -> anything network and tracking protection related?
- Bug 1420872 - Uploading images hangs whole network stack
- 1409634 Firefox using 35-45% cpu for no apparent reason
Nick
Honza
Michal
- 1425324 Websocket connections drops each 15 minutes
- 1052467 Intermittent talos "TalosError: timeout"
- 1425830 Crash in _platform_memmove$VARIANT$Haswell |
| mozilla::net::CacheFileInputStream::ReadSegments - 1412320 Intermittent toolkit/components/places/tests/browser/browser_visituri_privatebrowsing_perwindowpb.js | application crashed [@ mozilla::OffTheBooksMutex::AssertCurrentThreadOwns()]
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
Valentin
Bug 1426501 - Replace .spec setters with nsIURIMutator
Bug 1427373 - Convert nsHostResolver.mDB from PLDHashTable to nsRefPtrHashtable
Bug 1414091 - Massive leak while loading psarips.com
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- landed to mozilla-inbound
Junior
Bug 1363284 - Allow some sharing of connections with different anonymous attributes
- has a simple test, handling ntlm
Amy
Batch Eviction
-
Had confirmed the algorithm with Josh and Martin.
-
Martin had sent the mail to discuss the algorithm with Mike West. Bug 1425031 - Firefox Quantum blocks cookies when JavaScript updates them
-
Found the root cause.
-
Started to create a mochitest for this bug. Bug 1426471 - Cookies set via JS during anonymous screenshoting override real cookies
-
Can't reproduce.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*-Landed Bug 1423495 - Implement PerformanceServerTiming interface
*- backed out due to WPT failure Bug 1428250 - Add an API to read HTTP trailers
*- Working
SC
[Socket Process]
-
no progress this week on my part [Others]
-
Bug 1426751 - Intermittent eventsource-close.htm | application crashed [@ mozilla::net::ChannelEventQueue::FlushQueue] (Assertion failure: !mFlushing, at netwerk/ipc/ChannelEventQueue.cpp:46)
-
multiple threads trying to flush ChannelEventQueue at the same time
-
need to check and set flag at single critical section
-
r+’ed and landed on m-c
-
security bug
-
discussing my proposal with @mayhemer on bugzilla
-
trying @mayhemer's suggestion and upload my WIP, debugging test failure while running mochitest
Will Wang [Back Pressure]
Bug 1280629 - e10s breaks necko back pressure
*- discussion, tracing code *- going to discuss the experiment for min/max queue size
Cervantes
[Socket Process]
- patch rebase and breakage fixes
- working on pref system
2018-01-05
NECKO WEEKLY MEETING NOTES
Thurs December 7th, 2017
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Gary
Honza
Junior
Michal
Amy
Daniel
Kershaw
Valentin <<<<<===== Jan 5 -> Jan 11
SC
Dragana
Round Table:
- dns resolver rewrite vs incremental fixes?
- Fx56 statcounter drop 5% -> anything network and tracking protection related?
- Bug 1420872 - Uploading images hangs whole network stack
- 1409634 Firefox using 35-45% cpu for no apparent reason
Nick
Honza
Michal
- triage
- [landed] 1418854 Intermittent SUMMARY: AddressSanitizer: heap-use-after-free
- [landed] 1394564 Version 55 breaks sending large amounts of data over web sockets.
- Bug 1412022 Intermittent dom/base/test/test_websocket1.html | the ws connection in test 6 should be closed cleanly
- Bug 1052467 Intermittent talos "TalosError: timeout"
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
Valentin
Bug 1414425 - Appropriate principal must be set for meta refresh
Bug 1422518 - Meta refresh principal with about:blank
Bug 1415536 - Extend NotifyNetworkActivity [lots of reviews]
Bug 1422173 - Crash in nsDNSRecord::GetNextAddr
- filed Bug 1423945 - Refactor DNS code Bug 1420954 - Make nsIURIMutator setters return nsIURIMutator so we can chain setters
Bug 908413 - data: URI with bogus type is content-sniffed instead of being treated as text/plain
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1415115 - PERMA-FAIL | accessible/tests/mochitest/events/docload/test_docload_root.html | Test timed out.
Junior
Bug 1420334 - Intermittent any test PROCESS-CRASH | application crashed [@ mozilla::TimeStamp::operator-(mozilla::TimeStamp const &)] after Assertion failure: !aOther.IsNull() (Cannot compute with aOther null value)
-
r+, regression of 55 but exposed by enabling rcwn, root cause is race condition between onCacheEntryCheck(not limited to main thread) and HttpChannel::OnStartRequest (main thread) Bug 1419658 - Basic (probably digest?) authentication broken with non ASCII chars
-
WIP, cannot find a Base64 encoding for wide chars Triage
-
problem: priority of Bug 1420872 - Uploading images hangs whole network stack (only with McAFee)
-
problem: do we need to triage on sec bugs
Amy
Bug 1413512 - Get telemetry on how often we see HTTP(S) -> FTP redirects
-
Have to modify the patch from SC's suggestions. Bug 1421324 - Overwrite of existing cookie with HttpOnly flagged cookie results in HttpOnly being ignored by Firefox
-
Finished the implementation.
-
r? jdm
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*- All parches except the test case are waiting for review
SC
[Socket Process]
-
evaluating impact on PSM/NSS with @dkeeler
-
PSM/NSS access a lot of chrome-process-only data
-
preference, data file in profile folder, system file in /dev and /etc, load 3rd-party DLL
-
update requirements in https://wiki.mozilla.org/Necko:_Sandboxing_TCP/UDP_socket_in_a_separate_process#Requirements
-
thinking about moving cache to socket process as well for simplicity
-
Prototyping
-
implementing UDPSocket with Endpoint utility, ongoing [Others]
-
Bug 1417901 - Firefox is changing 301 HTTP redirects to HTTPS when done on an HTTPS server
-
for top-level navigation, we need to disable Upgrade-Insecure-Request if redirect to non-secure cross-origin URL
-
f+ for WIP
-
security bug
-
provide second WIP, f-'ed by @mayhemer
-
need to find some other solution that not play with refcount
2017-12-21
NECKO WEEKLY MEETING NOTES
Thurs December 7th, 2017
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Gary
Honza
Junior
Michal
Amy
Daniel
Kershaw <<<<<===== Dec 19 -> Jan 5
Valentin
SC
Dragana
Round Table:
- dns resolver rewrite vs incremental fixes?
- Fx56 statcounter drop 5% -> anything network and tracking protection related?
- Bug 1420872 - Uploading images hangs whole network stack
- 1409634 Firefox using 35-45% cpu for no apparent reason
Nick
Honza
Michal
- triage
- [landed] 1418854 Intermittent SUMMARY: AddressSanitizer: heap-use-after-free
- [landed] 1394564 Version 55 breaks sending large amounts of data over web sockets.
- Bug 1412022 Intermittent dom/base/test/test_websocket1.html | the ws connection in test 6 should be closed cleanly
- Bug 1052467 Intermittent talos "TalosError: timeout"
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
Valentin
Bug 1414425 - Appropriate principal must be set for meta refresh
Bug 1422518 - Meta refresh principal with about:blank
Bug 1415536 - Extend NotifyNetworkActivity [lots of reviews]
Bug 1422173 - Crash in nsDNSRecord::GetNextAddr
- filed Bug 1423945 - Refactor DNS code Bug 1420954 - Make nsIURIMutator setters return nsIURIMutator so we can chain setters
Bug 908413 - data: URI with bogus type is content-sniffed instead of being treated as text/plain
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1415115 - PERMA-FAIL | accessible/tests/mochitest/events/docload/test_docload_root.html | Test timed out.
Junior
Bug 1420334 - Intermittent any test PROCESS-CRASH | application crashed [@ mozilla::TimeStamp::operator-(mozilla::TimeStamp const &)] after Assertion failure: !aOther.IsNull() (Cannot compute with aOther null value)
-
r+, regression of 55 but exposed by enabling rcwn, root cause is race condition between onCacheEntryCheck(not limited to main thread) and HttpChannel::OnStartRequest (main thread) Bug 1419658 - Basic (probably digest?) authentication broken with non ASCII chars
-
WIP, cannot find a Base64 encoding for wide chars Triage
-
problem: priority of Bug 1420872 - Uploading images hangs whole network stack (only with McAFee)
-
problem: do we need to triage on sec bugs
Amy
Bug 1413512 - Get telemetry on how often we see HTTP(S) -> FTP redirects
-
Have to modify the patch from SC's suggestions. Bug 1421324 - Overwrite of existing cookie with HttpOnly flagged cookie results in HttpOnly being ignored by Firefox
-
Finished the implementation.
-
r? jdm
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*- All parches except the test case are waiting for review
SC
[Socket Process]
-
evaluating impact on PSM/NSS with @dkeeler
-
PSM/NSS access a lot of chrome-process-only data
-
preference, data file in profile folder, system file in /dev and /etc, load 3rd-party DLL
-
update requirements in https://wiki.mozilla.org/Necko:_Sandboxing_TCP/UDP_socket_in_a_separate_process#Requirements
-
thinking about moving cache to socket process as well for simplicity
-
Prototyping
-
implementing UDPSocket with Endpoint utility, ongoing [Others]
-
Bug 1417901 - Firefox is changing 301 HTTP redirects to HTTPS when done on an HTTPS server
-
for top-level navigation, we need to disable Upgrade-Insecure-Request if redirect to non-secure cross-origin URL
-
f+ for WIP
-
security bug
-
provide second WIP, f-'ed by @mayhemer
-
need to find some other solution that not play with refcount
2017-12-08
NECKO WEEKLY MEETING NOTES
Thurs December 7th, 2017
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Gary
Honza
Junior
Michal
Amy <<<<<===== Dec 8 -> 14
Daniel
Kershaw
Valentin
SC
Dragana
Round Table:
- dns resolver rewrite vs incremental fixes?
- Fx56 statcounter drop 5% -> anything network and tracking protection related?
- Bug 1420872 - Uploading images hangs whole network stack
- 1409634 Firefox using 35-45% cpu for no apparent reason
Nick
Honza
Michal
- triage
- [landed] 1418854 Intermittent SUMMARY: AddressSanitizer: heap-use-after-free
- [landed] 1394564 Version 55 breaks sending large amounts of data over web sockets.
- Bug 1412022 Intermittent dom/base/test/test_websocket1.html | the ws connection in test 6 should be closed cleanly
- Bug 1052467 Intermittent talos "TalosError: timeout"
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
Valentin
Bug 1414425 - Appropriate principal must be set for meta refresh
Bug 1422518 - Meta refresh principal with about:blank
Bug 1415536 - Extend NotifyNetworkActivity [lots of reviews]
Bug 1422173 - Crash in nsDNSRecord::GetNextAddr
- filed Bug 1423945 - Refactor DNS code Bug 1420954 - Make nsIURIMutator setters return nsIURIMutator so we can chain setters
Bug 908413 - data: URI with bogus type is content-sniffed instead of being treated as text/plain
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1415115 - PERMA-FAIL | accessible/tests/mochitest/events/docload/test_docload_root.html | Test timed out.
Junior
Bug 1420334 - Intermittent any test PROCESS-CRASH | application crashed [@ mozilla::TimeStamp::operator-(mozilla::TimeStamp const &)] after Assertion failure: !aOther.IsNull() (Cannot compute with aOther null value)
-
r+, regression of 55 but exposed by enabling rcwn, root cause is race condition between onCacheEntryCheck(not limited to main thread) and HttpChannel::OnStartRequest (main thread) Bug 1419658 - Basic (probably digest?) authentication broken with non ASCII chars
-
WIP, cannot find a Base64 encoding for wide chars Triage
-
problem: priority of Bug 1420872 - Uploading images hangs whole network stack (only with McAFee)
-
problem: do we need to triage on sec bugs
Amy
Bug 1413512 - Get telemetry on how often we see HTTP(S) -> FTP redirects
-
Have to modify the patch from SC's suggestions. Bug 1421324 - Overwrite of existing cookie with HttpOnly flagged cookie results in HttpOnly being ignored by Firefox
-
Finished the implementation.
-
r? jdm
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*- All parches except the test case are waiting for review
SC
[Socket Process]
-
evaluating impact on PSM/NSS with @dkeeler
-
PSM/NSS access a lot of chrome-process-only data
-
preference, data file in profile folder, system file in /dev and /etc, load 3rd-party DLL
-
update requirements in https://wiki.mozilla.org/Necko:_Sandboxing_TCP/UDP_socket_in_a_separate_process#Requirements
-
thinking about moving cache to socket process as well for simplicity
-
Prototyping
-
implementing UDPSocket with Endpoint utility, ongoing [Others]
-
Bug 1417901 - Firefox is changing 301 HTTP redirects to HTTPS when done on an HTTPS server
-
for top-level navigation, we need to disable Upgrade-Insecure-Request if redirect to non-secure cross-origin URL
-
f+ for WIP
-
security bug
-
provide second WIP, f-'ed by @mayhemer
-
need to find some other solution that not play with refcount
2017-12-07
NECKO WEEKLY MEETING NOTES
Thurs December 7th, 2017
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Gary
Honza
Junior
Michal <<<<<===== Dec 1 -> 7
Amy
Daniel
Kershaw
Valentin
SC
Dragana
Round Table:
- dns resolver rewrite vs incremental fixes?
- Fx56 statcounter drop 5% -> anything network and tracking protection related?
- Bug 1420872 - Uploading images hangs whole network stack
- 1409634 Firefox using 35-45% cpu for no apparent reason
Nick
Honza
Michal
- triage
- [landed] 1418854 Intermittent SUMMARY: AddressSanitizer: heap-use-after-free
- [landed] 1394564 Version 55 breaks sending large amounts of data over web sockets.
- Bug 1412022 Intermittent dom/base/test/test_websocket1.html | the ws connection in test 6 should be closed cleanly
- Bug 1052467 Intermittent talos "TalosError: timeout"
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
Valentin
Bug 1414425 - Appropriate principal must be set for meta refresh
Bug 1422518 - Meta refresh principal with about:blank
Bug 1415536 - Extend NotifyNetworkActivity [lots of reviews]
Bug 1422173 - Crash in nsDNSRecord::GetNextAddr
- filed Bug 1423945 - Refactor DNS code Bug 1420954 - Make nsIURIMutator setters return nsIURIMutator so we can chain setters
Bug 908413 - data: URI with bogus type is content-sniffed instead of being treated as text/plain
Dragana
http-auth dialog
UnknownDecoder crash
TFO
QUIC
NEAT
Gary
Bug 1415115 - PERMA-FAIL | accessible/tests/mochitest/events/docload/test_docload_root.html | Test timed out.
Junior
Bug 1420334 - Intermittent any test PROCESS-CRASH | application crashed [@ mozilla::TimeStamp::operator-(mozilla::TimeStamp const &)] after Assertion failure: !aOther.IsNull() (Cannot compute with aOther null value)
-
r+, regression of 55 but exposed by enabling rcwn, root cause is race condition between onCacheEntryCheck(not limited to main thread) and HttpChannel::OnStartRequest (main thread) Bug 1419658 - Basic (probably digest?) authentication broken with non ASCII chars
-
WIP, cannot find a Base64 encoding for wide chars Triage
-
problem: priority of Bug 1420872 - Uploading images hangs whole network stack (only with McAFee)
-
problem: do we need to triage on sec bugs
Amy
Bug 1413512 - Get telemetry on how often we see HTTP(S) -> FTP redirects
-
Have to modify the patch from SC's suggestions. Bug 1421324 - Overwrite of existing cookie with HttpOnly flagged cookie results in HttpOnly being ignored by Firefox
-
Finished the implementation.
-
r? jdm
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*- All parches except the test case are waiting for review
SC
[Socket Process]
-
evaluating impact on PSM/NSS with @dkeeler
-
PSM/NSS access a lot of chrome-process-only data
-
preference, data file in profile folder, system file in /dev and /etc, load 3rd-party DLL
-
update requirements in https://wiki.mozilla.org/Necko:_Sandboxing_TCP/UDP_socket_in_a_separate_process#Requirements
-
thinking about moving cache to socket process as well for simplicity
-
Prototyping
-
implementing UDPSocket with Endpoint utility, ongoing [Others]
-
Bug 1417901 - Firefox is changing 301 HTTP redirects to HTTPS when done on an HTTPS server
-
for top-level navigation, we need to disable Upgrade-Insecure-Request if redirect to non-secure cross-origin URL
-
f+ for WIP
-
security bug
-
provide second WIP, f-'ed by @mayhemer
-
need to find some other solution that not play with refcount
G
M
T
Detect languageAfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
AfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
Text-to-speech function is limited to 200 characters
Options : History : Feedback : DonateClose
G
M
T
Detect languageAfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
AfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
Text-to-speech function is limited to 200 characters
Options : History : Feedback : DonateClose
G
M
T
Detect languageAfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
AfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
Text-to-speech function is limited to 200 characters
Options : History : Feedback : DonateClose
G
M
T
Detect languageAfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
AfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
Text-to-speech function is limited to 200 characters
Options : History : Feedback : DonateClose
G
M
T
Detect languageAfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
AfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
Text-to-speech function is limited to 200 characters
Options : History : Feedback : DonateClose
G
M
T
Detect languageAfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
AfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
Text-to-speech function is limited to 200 characters
Options : History : Feedback : DonateClose
G
M
T
Detect languageAfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
AfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
Text-to-speech function is limited to 200 characters
Options : History : Feedback : DonateClose
G
M
T
Detect languageAfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
AfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
Text-to-speech function is limited to 200 characters
Options : History : Feedback : DonateClose
G
M
T
Detect languageAfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
AfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
Text-to-speech function is limited to 200 characters
Options : History : Feedback : DonateClose
G
M
T
Detect languageAfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
AfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
Text-to-speech function is limited to 200 characters
Options : History : Feedback : DonateClose
G
M
T
Detect languageAfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
AfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBengaliBosnianBulgarianCatalanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEsperantoEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekGujaratiHaitian CreoleHausaHebrewHindiHmongHungarianIcelandicIgboIndonesianIrishItalianJapaneseJavaneseKannadaKazakhKhmerKoreanLaoLatinLatvianLithuanianMacedonianMalagasyMalayMalayalamMalteseMaoriMarathiMongolianMyanmar (Burmese)NepaliNorwegianPersianPolishPortuguesePunjabiRomanianRussianSerbianSesothoSinhalaSlovakSlovenianSomaliSpanishSundaneseSwahiliSwedishTajikTamilTeluguThaiTurkishUkrainianUrduUzbekVietnameseWelshYiddishYorubaZulu
Text-to-speech function is limited to 200 characters
Options : History : Feedback : DonateClose
2017-12-05
NECKO WEEKLY MEETING NOTES
Thurs November 29th, 2017
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Gary
Honza
Junior
Michal <<<<<===== Dec 1 -> 7
Amy
Daniel
Kershaw
Valentin
SC
Dragana
Round Table:
- dns resolver rewrite vs incremental fixes?
- Fx56 statcounter drop 5% -> anything network and tracking protection related?
Nick
Honza
Michal
- Bug 1418752 - Firefox instahang on start after landing patch from bug #1392841
- Bug 1418854 - Intermittent SUMMARY: AddressSanitizer: heap-use-after-free
- Bug 1412022 - Intermittent dom/base/test/test_websocket1.html | the ws connection in test 6 should be closed cleanly
- Bug 1052467 - Intermittent talos "TalosError: timeout"
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
Valentin
Threadsafe URI project - https://docs.google.com/document/d/1wzbVcxZ2X_3ab6_VRUgE18KBcnZMekVm1gwKS3zIw0M/edit#
Overview of URI classes and interfaces - https://gist.github.com/valenting/1f1550d756c01c9e732d8fcdfe9240b8
Bug 1416791 - Reduce the mutability of nsHostObjectURI
Bug 1415205 - Add add mutate() to nsIURI
Found bugs in URI implementations: 1416193
Bug 1416343 - Mark nsIURI and interfaces extending it as [builtinclass]
Dragana
103 Early Hint
security bug
NEAT
TFO
Gary
Bug 1415115 - PERMA-FAIL | accessible/tests/mochitest/events/docload/test_docload_root.html | Test timed out.
Junior
Bug 1420334 - Intermittent any test PROCESS-CRASH | application crashed [@ mozilla::TimeStamp::operator-(mozilla::TimeStamp const &)] after Assertion failure: !aOther.IsNull() (Cannot compute with aOther null value)
-
r+, regression of 55 but exposed by enabling rcwn, root cause is race condition between onCacheEntryCheck(not limited to main thread) and HttpChannel::OnStartRequest (main thread) Bug 1419658 - Basic (probably digest?) authentication broken with non ASCII chars
-
WIP, cannot find a Base64 encoding for wide chars Triage
-
problem: priority of Bug 1420872 - Uploading images hangs whole network stack (only with McAFee)
-
problem: do we need to triage on sec bugs
Amy
Bug 1413512 - Get telemetry on how often we see HTTP(S) -> FTP redirects
-
Have to modify the patch from SC's suggestions. Bug 1421324 - Overwrite of existing cookie with HttpOnly flagged cookie results in HttpOnly being ignored by Firefox
-
Finished the implementation.
-
r? jdm
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*- All parches except the test case are waiting for review
SC
[Socket Process]
-
evaluating impact on PSM/NSS with @dkeeler
-
PSM/NSS access a lot of chrome-process-only data
-
preference, data file in profile folder, system file in /dev and /etc, load 3rd-party DLL
-
update requirements in https://wiki.mozilla.org/Necko:_Sandboxing_TCP/UDP_socket_in_a_separate_process#Requirements
-
thinking about moving cache to socket process as well for simplicity
-
Prototyping
-
implementing UDPSocket with Endpoint utility, ongoing [Others]
-
Bug 1417901 - Firefox is changing 301 HTTP redirects to HTTPS when done on an HTTPS server
-
for top-level navigation, we need to disable Upgrade-Insecure-Request if redirect to non-secure cross-origin URL
-
f+ for WIP
-
security bug
-
provide second WIP, f-'ed by @mayhemer
-
need to find some other solution that not play with refcount
2017-12-04
NECKO WEEKLY MEETING NOTES
Thurs November 29th, 2017
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Gary
Honza
Junior
Michal <<<<<===== Dec 1 -> 7
Amy
Daniel
Kershaw
Valentin
SC
Dragana
Round Table:
- dns resolver rewrite vs incremental fixes?
Nick
Honza
Michal
- Bug 1418752 - Firefox instahang on start after landing patch from bug #1392841
- Bug 1418854 - Intermittent SUMMARY: AddressSanitizer: heap-use-after-free
- Bug 1412022 - Intermittent dom/base/test/test_websocket1.html | the ws connection in test 6 should be closed cleanly
- Bug 1052467 - Intermittent talos "TalosError: timeout"
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
Valentin
Threadsafe URI project - https://docs.google.com/document/d/1wzbVcxZ2X_3ab6_VRUgE18KBcnZMekVm1gwKS3zIw0M/edit#
Overview of URI classes and interfaces - https://gist.github.com/valenting/1f1550d756c01c9e732d8fcdfe9240b8
Bug 1416791 - Reduce the mutability of nsHostObjectURI
Bug 1415205 - Add add mutate() to nsIURI
Found bugs in URI implementations: 1416193
Bug 1416343 - Mark nsIURI and interfaces extending it as [builtinclass]
Dragana
103 Early Hint
security bug
NEAT
TFO
Gary
Bug 1415115 - PERMA-FAIL | accessible/tests/mochitest/events/docload/test_docload_root.html | Test timed out.
Junior
Bug 1420334 - Intermittent any test PROCESS-CRASH | application crashed [@ mozilla::TimeStamp::operator-(mozilla::TimeStamp const &)] after Assertion failure: !aOther.IsNull() (Cannot compute with aOther null value)
-
r+, regression of 55 but exposed by enabling rcwn, root cause is race condition between onCacheEntryCheck(not limited to main thread) and HttpChannel::OnStartRequest (main thread) Bug 1419658 - Basic (probably digest?) authentication broken with non ASCII chars
-
WIP, cannot find a Base64 encoding for wide chars Triage
-
problem: priority of Bug 1420872 - Uploading images hangs whole network stack (only with McAFee)
-
problem: do we need to triage on sec bugs
Amy
Bug 1413512 - Get telemetry on how often we see HTTP(S) -> FTP redirects
-
Have to modify the patch from SC's suggestions. Bug 1421324 - Overwrite of existing cookie with HttpOnly flagged cookie results in HttpOnly being ignored by Firefox
-
Finished the implementation.
-
r? jdm
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*- All parches except the test case are waiting for review
SC
[Socket Process]
-
evaluating impact on PSM/NSS with @dkeeler
-
PSM/NSS access a lot of chrome-process-only data
-
preference, data file in profile folder, system file in /dev and /etc, load 3rd-party DLL
-
update requirements in https://wiki.mozilla.org/Necko:_Sandboxing_TCP/UDP_socket_in_a_separate_process#Requirements
-
thinking about moving cache to socket process as well for simplicity
-
Prototyping
-
implementing UDPSocket with Endpoint utility, ongoing [Others]
-
Bug 1417901 - Firefox is changing 301 HTTP redirects to HTTPS when done on an HTTPS server
-
for top-level navigation, we need to disable Upgrade-Insecure-Request if redirect to non-secure cross-origin URL
-
f+ for WIP
-
security bug
-
provide second WIP, f-'ed by @mayhemer
-
need to find some other solution that not play with refcount
2017-11-30
NECKO WEEKLY MEETING NOTES
Thurs November 29th, 2017
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Gary
Honza
Junior
Michal <<<<<===== Dec 1 -> 7
Amy
Daniel
Kershaw
Valentin
SC
Dragana
Round Table:
Nick
Honza
Michal
- Bug 1418752 - Firefox instahang on start after landing patch from bug #1392841
- Bug 1418854 - Intermittent SUMMARY: AddressSanitizer: heap-use-after-free
- Bug 1412022 - Intermittent dom/base/test/test_websocket1.html | the ws connection in test 6 should be closed cleanly
- Bug 1052467 - Intermittent talos "TalosError: timeout"
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
Valentin
Threadsafe URI project - https://docs.google.com/document/d/1wzbVcxZ2X_3ab6_VRUgE18KBcnZMekVm1gwKS3zIw0M/edit#
Overview of URI classes and interfaces - https://gist.github.com/valenting/1f1550d756c01c9e732d8fcdfe9240b8
Bug 1416791 - Reduce the mutability of nsHostObjectURI
Bug 1415205 - Add add mutate() to nsIURI
Found bugs in URI implementations: 1416193
Bug 1416343 - Mark nsIURI and interfaces extending it as [builtinclass]
Dragana
103 Early Hint
security bug
NEAT
TFO
Gary
Bug 1415115 - PERMA-FAIL | accessible/tests/mochitest/events/docload/test_docload_root.html | Test timed out.
Junior
Bug 1420334 - Intermittent any test PROCESS-CRASH | application crashed [@ mozilla::TimeStamp::operator-(mozilla::TimeStamp const &)] after Assertion failure: !aOther.IsNull() (Cannot compute with aOther null value)
-
r+, regression of 55 but exposed by enabling rcwn, root cause is race condition between onCacheEntryCheck(not limited to main thread) and HttpChannel::OnStartRequest (main thread) Bug 1419658 - Basic (probably digest?) authentication broken with non ASCII chars
-
WIP, cannot find a Base64 encoding for wide chars Triage
-
problem: priority of Bug 1420872 - Uploading images hangs whole network stack (only with McAFee)
-
problem: do we need to triage on sec bugs
Amy
Bug 1413512 - Get telemetry on how often we see HTTP(S) -> FTP redirects
-
Have to modify the patch from SC's suggestions. Bug 1421324 - Overwrite of existing cookie with HttpOnly flagged cookie results in HttpOnly being ignored by Firefox
-
Finished the implementation.
-
r? jdm
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*- All parches except the test case are waiting for review
SC
[Socket Process]
-
evaluating impact on PSM/NSS with @dkeeler
-
PSM/NSS access a lot of chrome-process-only data
-
preference, data file in profile folder, system file in /dev and /etc, load 3rd-party DLL
-
update requirements in https://wiki.mozilla.org/Necko:_Sandboxing_TCP/UDP_socket_in_a_separate_process#Requirements
-
thinking about moving cache to socket process as well for simplicity
-
Prototyping
-
implementing UDPSocket with Endpoint utility, ongoing [Others]
-
Bug 1417901 - Firefox is changing 301 HTTP redirects to HTTPS when done on an HTTPS server
-
for top-level navigation, we need to disable Upgrade-Insecure-Request if redirect to non-secure cross-origin URL
-
f+ for WIP
-
security bug
-
provide second WIP, f-'ed by @mayhemer
-
need to find some other solution that not play with refcount
2017-11-27
NECKO WEEKLY MEETING NOTES
Thurs November 15th, 2017
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Gary
Honza
Junior <<<<<===== Nov 24 -> 30
Michal
Amy
Daniel
Kershaw
Valentin
SC
Dragana
Round Table:
Nick
Honza
Michal
- RCWN
- Bug 1313934 - Intermittent PROCESS-CRASH
- Bug 1394564 - Version 55 breaks sending large amounts of data over web sockets.
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
- bug 1416048 use a 32 bit field for TTL data
Valentin
Threadsafe URI project - https://docs.google.com/document/d/1wzbVcxZ2X_3ab6_VRUgE18KBcnZMekVm1gwKS3zIw0M/edit#
Overview of URI classes and interfaces - https://gist.github.com/valenting/1f1550d756c01c9e732d8fcdfe9240b8
Bug 1416791 - Reduce the mutability of nsHostObjectURI
Bug 1415205 - Add add mutate() to nsIURI
Found bugs in URI implementations: 1416193
Bug 1416343 - Mark nsIURI and interfaces extending it as [builtinclass]
Dragana
103 Early Hint
security bug
NEAT
TFO
Gary
Bug 1415115 - PERMA-FAIL | accessible/tests/mochitest/events/docload/test_docload_root.html | Test timed out.
Junior
Bug 1415120 - Crash in mozilla::detail::RunnableFunction<nsCookieService::RebuildCorruptDB(DBState*)::<lambda()>::<lambda()> >::Run
-
r?
-
Root cause: cookie requests during rebuilding and we close the all the connections. The request is trying to connect a db which is renamed and not loaded.
-
solution: access the cookies from hashtable. drop all the db operations because we will backport them to new db anyway. Bug 1413839 - Add telemetry to probe how close we’re going to block main thread
-
r? Bug 1416985 - MOZ_SQLITE_COOKIES_OLD_SCHEMA seems bogus for unreasonable many people using cookies.txt
-
WIP
Amy
Bug 1357676 - Increase cookie count limits to match Chrome’s
-
Got r- from Josh
-
Have to discuss the new batch eviction algorithm to Josh and Martin. Bug 1413512 - Get telemetry on how often we see HTTP(S) -> FTP redirects
-
Start to implement this bug. Bug 1414206 - doesnt logout properly in firefox57
-
Reporter used the wrong setting.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*- Almost finish the parser and test case
Bug 1416623 - Skeletal code for socket process
*- WIP uploaded *- Basic setup for new process, such as new process type, init XPCOM, etc. *- TODO:
- Try to create UDPSocket in socket process
- sandboxing
SC
[Socket Process]
-
study "Endpoint" mechanism for IPC between child process (reference: bug wwwwww)
-
Prototyping
-
design interface and flow for UDPSocket
-
https://docs.google.com/presentation/d/12Jg2eXT7nne2G8MtS3E2p7yRGaQJrvXg8iiQOhYggFU/edit#slide=id.g286761667d_0_0
-
create project wiki page https://wiki.mozilla.org/Necko:_Sandboxing_TCP/UDP_socket_in_a_separate_process
-
discuss sandboxing design with @pauljt
-
put protocol code in separate process is better
-
try not have plain TCP/UDP IPC interface, to have better control on the network usage [Others]
-
Bug 1390708 - .hqx files are all corrupted when downloaded with FF unless going through SAVE AS...
-
remove BinHex stream converter support, landed on m-c (firefox 59)
-
Bug 1416879 - Crash in mozilla::net::HttpChannelParentListener::OnDataAvailable
-
parent ODA called during channel suspension for diversion, might be timing issue caused by intercept stream listener
2017-11-16
NECKO WEEKLY MEETING NOTES
Thurs November 15th, 2017
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Gary
Honza <<<<<===== Nov 16 -> 23
Junior
Michal
Amy
Daniel
Kershaw
Valentin
SC
Dragana
Round Table:
Nick
Honza
Michal
- RCWN
- Bug 1313934 - Intermittent PROCESS-CRASH
- Bug 1394564 - Version 55 breaks sending large amounts of data over web sockets.
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TRR (Trusted Recursive Resolver over DOH)
- bug 1416048 use a 32 bit field for TTL data
Valentin
Threadsafe URI project - https://docs.google.com/document/d/1wzbVcxZ2X_3ab6_VRUgE18KBcnZMekVm1gwKS3zIw0M/edit#
Overview of URI classes and interfaces - https://gist.github.com/valenting/1f1550d756c01c9e732d8fcdfe9240b8
Bug 1416791 - Reduce the mutability of nsHostObjectURI
Bug 1415205 - Add add mutate() to nsIURI
Found bugs in URI implementations: 1416193
Bug 1416343 - Mark nsIURI and interfaces extending it as [builtinclass]
Dragana
103 Early Hint
security bug
NEAT
TFO
Gary
Bug 1415115 - PERMA-FAIL | accessible/tests/mochitest/events/docload/test_docload_root.html | Test timed out.
Junior
Bug 1415120 - Crash in mozilla::detail::RunnableFunction<nsCookieService::RebuildCorruptDB(DBState*)::<lambda()>::<lambda()> >::Run
-
r?
-
Root cause: cookie requests during rebuilding and we close the all the connections. The request is trying to connect a db which is renamed and not loaded.
-
solution: access the cookies from hashtable. drop all the db operations because we will backport them to new db anyway. Bug 1413839 - Add telemetry to probe how close we’re going to block main thread
-
r? Bug 1416985 - MOZ_SQLITE_COOKIES_OLD_SCHEMA seems bogus for unreasonable many people using cookies.txt
-
WIP
Amy
Bug 1357676 - Increase cookie count limits to match Chrome’s
-
Got r- from Josh
-
Have to discuss the new batch eviction algorithm to Josh and Martin. Bug 1413512 - Get telemetry on how often we see HTTP(S) -> FTP redirects
-
Start to implement this bug. Bug 1414206 - doesnt logout properly in firefox57
-
Reporter used the wrong setting.
Kershaw
Bug 1413999 - Add support for Server-Timing HTTP trailing header
*- Almost finish the parser and test case
Bug 1416623 - Skeletal code for socket process
*- WIP uploaded *- Basic setup for new process, such as new process type, init XPCOM, etc. *- TODO:
- Try to create UDPSocket in socket process
- sandboxing
SC
[Socket Process]
-
study "Endpoint" mechanism for IPC between child process (reference: bug wwwwww)
-
Prototyping
-
design interface and flow for UDPSocket
-
https://docs.google.com/presentation/d/12Jg2eXT7nne2G8MtS3E2p7yRGaQJrvXg8iiQOhYggFU/edit#slide=id.g286761667d_0_0
-
create project wiki page https://wiki.mozilla.org/Necko:_Sandboxing_TCP/UDP_socket_in_a_separate_process
-
discuss sandboxing design with @pauljt
-
put protocol code in separate process is better
-
try not have plain TCP/UDP IPC interface, to have better control on the network usage [Others]
-
Bug 1390708 - .hqx files are all corrupted when downloaded with FF unless going through SAVE AS...
-
remove BinHex stream converter support, landed on m-c (firefox 59)
-
Bug 1416879 - Crash in mozilla::net::HttpChannelParentListener::OnDataAvailable
-
parent ODA called during channel suspension for diversion, might be timing issue caused by intercept stream listener
2017-11-09
NECKO WEEKLY MEETING NOTES
Thurs October 19th, 2017
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Gary <<<<<===== Nov 09 -> 16
Honza
Junior
Michal
Amy
Daniel
Kershaw
Valentin
SC
Dragana
Round Table:
Nick
Honza
Michal
- profiling RCWN
- 1395760 Page gets cached only partially (possibly generating a corrupted cache entry?)
- 1397709 Force refresh not propogated into data
- 1395403 Receiving large binary websocket messages consumes too much CPU
- 1399822 WebSocket onopen event is fired when unexpected Sec-WebSocket-Protocol is received
- 1352916 Crash in mozilla::net::CacheFileMetadata::GetElement
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TLS 1.3-checking (to be system-) add-on (help from Kershaw)
- TRR (Trusted Recursive Resolver) - DNS-over-HTTPS
Valentin
Bug 1405961 - Assertion failure: !aStamp.IsNull() PerformanceNavigationTiming
Bug 1394906 - Implement immutable, threadsafe MozURL
Bug 1407540 - MozURL should support base url in the CTOR
reviews
MozURL wrapper implementing nsIURI
RCWN debugging
Dragana
103 Early Hint
security bug
NEAT
TFO
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
-
blocked by Bug 1407547 - FAIL | browser/base/content/test/urlbar/browser_urlbarAboutHomeLoading.js | Uncaught exception
- see if it has been fixed by latest m-c Bug 1399520 - Intermittent AddressSanitizer: heap-use-after-free
-
sec-approval? Bug 1391356 - Convert JAR channel clients that use Open to use AsyncOpen
-
open sub-bugs, see if they are necessary to be fixed.
Junior
Bug 870460 - Lazy load of cookie service blocks main thread while cookie database loads
- backout: xperf startup io whitelist(r+), also worried by perf team, and BaseAppShell leakage(r?) Bug 1401883 - Intermittent leakcheck | default process: 176 bytes leaked (Mutex, nsBaseAppShell)
Bug 1400655 - json view serviceworker
- LOAD_CALL_CONTENT_SNIFFERS is gone in Child with InterceptedChannel
Amy
Bug 1344090 - Firefox's cookie limitations does not allow to store 150 cookies per-domain , but only for the root domain, it is confusing.
-
Conclusion:
-
Stop to implement the cookie priorities.
-
Start to implement the batch deletion.
-
Increase the limitation of cookie from per-host. Bug 1328163 - support protocol-agnostic cookie whitelisting
-
Rebased. Bug 1409102 - 57beta: Accept 3rd-party cookies from visited doesn't seem to work with embedded dailymotion videos..
-
Can't reproduce.
Kershaw
Bug 1404804 - Tracking black list is checked twice when TP is enabled
- landed
Bug 1390223 - Experiment: Don't mark dynamically added
css (aka elements) as Leaders- WIP for determining if a CSS link element is created from parser or script
- Need to create some fake pages for analyzing
TLS-1.3 addon
- Make the popup window work
SC
[PBg-Http]
-
video/audio loading is now OMT as well (thanks to Taipei Media team!)
-
https://mzl.la/2kQBQvz
-
https://mzl.la/2kRVxD7
-
debugging for regressions
-
Bug 1405818 - Crash in mozilla::net::HttpChannelChild::Release
-
guessing and discussing possible scenario that causes multi-thread refcount issue
-
Bug 1409553 - Assertion failure: redirectParentChannel, at netwerk/protocol/http/HttpChannelParent.cpp:1035
-
yet another ServiceWorker + HTTP redirection bug.
-
reproduce with RR with moz log, still analyzing the root cause [Socket Process]
-
study Google Chrome approach
-
preparing system design and rollout plan
-
[under construction] https://docs.google.com/presentation/d/12Jg2eXT7nne2G8MtS3E2p7yRGaQJrvXg8iiQOhYggFU/edit#slide=id.g28b523e674_0_82 [Others]
-
Bug 1407683 - Crash after failed nsIXMLHttpRequest instance
-
use XPCOM singleton factory method and StaticRefPtr to replace static raw pointer. landed on m-c
-
Bug 1390708 - .hqx files are all corrupted when downloaded with FF unless going through SAVE AS...
-
BinHex format will be decompressed by stream converter when opening the URL, and save the decoded content with .hqx filename
-
intend to remove BinHex stream converter support from m-c, under discussion
2017-11-02
NECKO WEEKLY MEETING NOTES
Thurs October 19th, 2017
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs https://mzl.la/2he1C85
-
P2 bugs https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick <<<<<===== Nov 02 -> 09
Gary
Honza
Junior
Michal
Amy
Daniel
Kershaw
Valentin
SC
Dragana
Round Table:
Nick
Honza
Michal
- profiling RCWN
- 1395760 Page gets cached only partially (possibly generating a corrupted cache entry?)
- 1397709 Force refresh not propogated into data
- 1395403 Receiving large binary websocket messages consumes too much CPU
- 1399822 WebSocket onopen event is fired when unexpected Sec-WebSocket-Protocol is received
- 1352916 Crash in mozilla::net::CacheFileMetadata::GetElement
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TLS 1.3-checking (to be system-) add-on (help from Kershaw)
- TRR (Trusted Recursive Resolver) - DNS-over-HTTPS
Valentin
Bug 1405961 - Assertion failure: !aStamp.IsNull() PerformanceNavigationTiming
Bug 1394906 - Implement immutable, threadsafe MozURL
Bug 1407540 - MozURL should support base url in the CTOR
reviews
MozURL wrapper implementing nsIURI
RCWN debugging
Dragana
103 Early Hint
security bug
NEAT
TFO
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
-
blocked by Bug 1407547 - FAIL | browser/base/content/test/urlbar/browser_urlbarAboutHomeLoading.js | Uncaught exception
- see if it has been fixed by latest m-c Bug 1399520 - Intermittent AddressSanitizer: heap-use-after-free
-
sec-approval? Bug 1391356 - Convert JAR channel clients that use Open to use AsyncOpen
-
open sub-bugs, see if they are necessary to be fixed.
Junior
Bug 870460 - Lazy load of cookie service blocks main thread while cookie database loads
- backout: xperf startup io whitelist(r+), also worried by perf team, and BaseAppShell leakage(r?) Bug 1401883 - Intermittent leakcheck | default process: 176 bytes leaked (Mutex, nsBaseAppShell)
Bug 1400655 - json view serviceworker
- LOAD_CALL_CONTENT_SNIFFERS is gone in Child with InterceptedChannel
Amy
Bug 1344090 - Firefox's cookie limitations does not allow to store 150 cookies per-domain , but only for the root domain, it is confusing.
-
Conclusion:
-
Stop to implement the cookie priorities.
-
Start to implement the batch deletion.
-
Increase the limitation of cookie from per-host. Bug 1328163 - support protocol-agnostic cookie whitelisting
-
Rebased. Bug 1409102 - 57beta: Accept 3rd-party cookies from visited doesn't seem to work with embedded dailymotion videos..
-
Can't reproduce.
Kershaw
Bug 1404804 - Tracking black list is checked twice when TP is enabled
- landed
Bug 1390223 - Experiment: Don't mark dynamically added
css (aka elements) as Leaders- WIP for determining if a CSS link element is created from parser or script
- Need to create some fake pages for analyzing
TLS-1.3 addon
- Make the popup window work
SC
[PBg-Http]
-
video/audio loading is now OMT as well (thanks to Taipei Media team!)
-
https://mzl.la/2kQBQvz
-
https://mzl.la/2kRVxD7
-
debugging for regressions
-
Bug 1405818 - Crash in mozilla::net::HttpChannelChild::Release
-
guessing and discussing possible scenario that causes multi-thread refcount issue
-
Bug 1409553 - Assertion failure: redirectParentChannel, at netwerk/protocol/http/HttpChannelParent.cpp:1035
-
yet another ServiceWorker + HTTP redirection bug.
-
reproduce with RR with moz log, still analyzing the root cause [Socket Process]
-
study Google Chrome approach
-
preparing system design and rollout plan
-
[under construction] https://docs.google.com/presentation/d/12Jg2eXT7nne2G8MtS3E2p7yRGaQJrvXg8iiQOhYggFU/edit#slide=id.g28b523e674_0_82 [Others]
-
Bug 1407683 - Crash after failed nsIXMLHttpRequest instance
-
use XPCOM singleton factory method and StaticRefPtr to replace static raw pointer. landed on m-c
-
Bug 1390708 - .hqx files are all corrupted when downloaded with FF unless going through SAVE AS...
-
BinHex format will be decompressed by stream converter when opening the URL, and save the decoded content with .hqx filename
-
intend to remove BinHex stream converter support from m-c, under discussion
2017-10-31
NECKO WEEKLY MEETING NOTES
Thurs October 19th, 2017
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs (active): https://mzl.la/2he1C85
-
P2 bugs (next) https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Gary
Honza
Junior
Michal
Amy
Daniel
Kershaw
Valentin
SC
Dragana <<<<<===== Oct 26->Nov 02
Round Table:
Nick
Honza
Michal
- profiling RCWN
- 1395760 Page gets cached only partially (possibly generating a corrupted cache entry?)
- 1397709 Force refresh not propogated into data
- 1395403 Receiving large binary websocket messages consumes too much CPU
- 1399822 WebSocket onopen event is fired when unexpected Sec-WebSocket-Protocol is received
- 1352916 Crash in mozilla::net::CacheFileMetadata::GetElement
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TLS 1.3-checking (to be system-) add-on (help from Kershaw)
- TRR (Trusted Recursive Resolver) - DNS-over-HTTPS
Valentin
Bug 1405961 - Assertion failure: !aStamp.IsNull() PerformanceNavigationTiming
Bug 1394906 - Implement immutable, threadsafe MozURL
Bug 1407540 - MozURL should support base url in the CTOR
reviews
MozURL wrapper implementing nsIURI
RCWN debugging
Dragana
103 Early Hint
security bug
NEAT
TFO
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
-
blocked by Bug 1407547 - FAIL | browser/base/content/test/urlbar/browser_urlbarAboutHomeLoading.js | Uncaught exception
- see if it has been fixed by latest m-c Bug 1399520 - Intermittent AddressSanitizer: heap-use-after-free
-
sec-approval? Bug 1391356 - Convert JAR channel clients that use Open to use AsyncOpen
-
open sub-bugs, see if they are necessary to be fixed.
Junior
Bug 870460 - Lazy load of cookie service blocks main thread while cookie database loads
- backout: xperf startup io whitelist(r+), also worried by perf team, and BaseAppShell leakage(r?) Bug 1401883 - Intermittent leakcheck | default process: 176 bytes leaked (Mutex, nsBaseAppShell)
Bug 1400655 - json view serviceworker
- LOAD_CALL_CONTENT_SNIFFERS is gone in Child with InterceptedChannel
Amy
Bug 1344090 - Firefox's cookie limitations does not allow to store 150 cookies per-domain , but only for the root domain, it is confusing.
-
Conclusion:
-
Stop to implement the cookie priorities.
-
Start to implement the batch deletion.
-
Increase the limitation of cookie from per-host. Bug 1328163 - support protocol-agnostic cookie whitelisting
-
Rebased. Bug 1409102 - 57beta: Accept 3rd-party cookies from visited doesn't seem to work with embedded dailymotion videos..
-
Can't reproduce.
Kershaw
Bug 1404804 - Tracking black list is checked twice when TP is enabled
- landed
Bug 1390223 - Experiment: Don't mark dynamically added
css (aka elements) as Leaders- WIP for determining if a CSS link element is created from parser or script
- Need to create some fake pages for analyzing
TLS-1.3 addon
- Make the popup window work
SC
[PBg-Http]
-
video/audio loading is now OMT as well (thanks to Taipei Media team!)
-
https://mzl.la/2kQBQvz
-
https://mzl.la/2kRVxD7
-
debugging for regressions
-
Bug 1405818 - Crash in mozilla::net::HttpChannelChild::Release
-
guessing and discussing possible scenario that causes multi-thread refcount issue
-
Bug 1409553 - Assertion failure: redirectParentChannel, at netwerk/protocol/http/HttpChannelParent.cpp:1035
-
yet another ServiceWorker + HTTP redirection bug.
-
reproduce with RR with moz log, still analyzing the root cause [Socket Process]
-
study Google Chrome approach
-
preparing system design and rollout plan
-
[under construction] https://docs.google.com/presentation/d/12Jg2eXT7nne2G8MtS3E2p7yRGaQJrvXg8iiQOhYggFU/edit#slide=id.g28b523e674_0_82 [Others]
-
Bug 1407683 - Crash after failed nsIXMLHttpRequest instance
-
use XPCOM singleton factory method and StaticRefPtr to replace static raw pointer. landed on m-c
-
Bug 1390708 - .hqx files are all corrupted when downloaded with FF unless going through SAVE AS...
-
BinHex format will be decompressed by stream converter when opening the URL, and save the decoded content with .hqx filename
-
intend to remove BinHex stream converter support from m-c, under discussion
2017-10-26
NECKO WEEKLY MEETING NOTES
Thurs October 19th, 2017
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs (active): https://mzl.la/2he1C85
-
P2 bugs (next) https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Gary
Honza
Junior
Michal
Amy
Daniel
Kershaw
Valentin
SC
Dragana <<<<<===== Oct 19->26
Round Table:
Nick
Honza
Michal
- profiling RCWN
- 1395760 Page gets cached only partially (possibly generating a corrupted cache entry?)
- 1397709 Force refresh not propogated into data
- 1395403 Receiving large binary websocket messages consumes too much CPU
- 1399822 WebSocket onopen event is fired when unexpected Sec-WebSocket-Protocol is received
- 1352916 Crash in mozilla::net::CacheFileMetadata::GetElement
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TLS 1.3-checking (to be system-) add-on (help from Kershaw)
- TRR (Trusted Recursive Resolver) - DNS-over-HTTPS
Valentin
Bug 1405961 - Assertion failure: !aStamp.IsNull() PerformanceNavigationTiming
Bug 1394906 - Implement immutable, threadsafe MozURL
Bug 1407540 - MozURL should support base url in the CTOR
reviews
MozURL wrapper implementing nsIURI
RCWN debugging
Dragana
103 Early Hint
security bug
NEAT
TFO
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
-
blocked by Bug 1407547 - FAIL | browser/base/content/test/urlbar/browser_urlbarAboutHomeLoading.js | Uncaught exception
- see if it has been fixed by latest m-c Bug 1399520 - Intermittent AddressSanitizer: heap-use-after-free
-
sec-approval? Bug 1391356 - Convert JAR channel clients that use Open to use AsyncOpen
-
open sub-bugs, see if they are necessary to be fixed.
Junior
Bug 870460 - Lazy load of cookie service blocks main thread while cookie database loads
- backout: xperf startup io whitelist(r+), also worried by perf team, and BaseAppShell leakage(r?) Bug 1401883 - Intermittent leakcheck | default process: 176 bytes leaked (Mutex, nsBaseAppShell)
Bug 1400655 - json view serviceworker
- LOAD_CALL_CONTENT_SNIFFERS is gone in Child with InterceptedChannel
Amy
Bug 1344090 - Firefox's cookie limitations does not allow to store 150 cookies per-domain , but only for the root domain, it is confusing.
-
Conclusion:
-
Stop to implement the cookie priorities.
-
Start to implement the batch deletion.
-
Increase the limitation of cookie from per-host. Bug 1328163 - support protocol-agnostic cookie whitelisting
-
Rebased. Bug 1409102 - 57beta: Accept 3rd-party cookies from visited doesn't seem to work with embedded dailymotion videos..
-
Can't reproduce.
Kershaw
Bug 1404804 - Tracking black list is checked twice when TP is enabled
- landed
Bug 1390223 - Experiment: Don't mark dynamically added
css (aka elements) as Leaders- WIP for determining if a CSS link element is created from parser or script
- Need to create some fake pages for analyzing
TLS-1.3 addon
- Make the popup window work
SC
[PBg-Http]
-
video/audio loading is now OMT as well (thanks to Taipei Media team!)
-
https://mzl.la/2kQBQvz
-
https://mzl.la/2kRVxD7
-
debugging for regressions
-
Bug 1405818 - Crash in mozilla::net::HttpChannelChild::Release
-
guessing and discussing possible scenario that causes multi-thread refcount issue
-
Bug 1409553 - Assertion failure: redirectParentChannel, at netwerk/protocol/http/HttpChannelParent.cpp:1035
-
yet another ServiceWorker + HTTP redirection bug.
-
reproduce with RR with moz log, still analyzing the root cause [Socket Process]
-
study Google Chrome approach
-
preparing system design and rollout plan
-
[under construction] https://docs.google.com/presentation/d/12Jg2eXT7nne2G8MtS3E2p7yRGaQJrvXg8iiQOhYggFU/edit#slide=id.g28b523e674_0_82 [Others]
-
Bug 1407683 - Crash after failed nsIXMLHttpRequest instance
-
use XPCOM singleton factory method and StaticRefPtr to replace static raw pointer. landed on m-c
-
Bug 1390708 - .hqx files are all corrupted when downloaded with FF unless going through SAVE AS...
-
BinHex format will be decompressed by stream converter when opening the URL, and save the decoded content with .hqx filename
-
intend to remove BinHex stream converter support from m-c, under discussion
2017-10-25
NECKO WEEKLY MEETING NOTES
Thurs October 19th, 2017
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs (active): https://mzl.la/2he1C85
-
P2 bugs (next) https://mzl.la/2yaD1aO
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Gary
Honza
Junior
Michal
Amy
Daniel
Kershaw
Valentin
SC <<<<<===== Oct 19->26
Dragana
Round Table:
Nick
Honza
Michal
- profiling RCWN
- 1395760 Page gets cached only partially (possibly generating a corrupted cache entry?)
- 1397709 Force refresh not propogated into data
- 1395403 Receiving large binary websocket messages consumes too much CPU
- 1399822 WebSocket onopen event is fired when unexpected Sec-WebSocket-Protocol is received
- 1352916 Crash in mozilla::net::CacheFileMetadata::GetElement
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TLS 1.3-checking (to be system-) add-on (help from Kershaw)
- TRR (Trusted Recursive Resolver) - DNS-over-HTTPS
Valentin
Bug 1405961 - Assertion failure: !aStamp.IsNull() PerformanceNavigationTiming
Bug 1394906 - Implement immutable, threadsafe MozURL
Bug 1407540 - MozURL should support base url in the CTOR
reviews
MozURL wrapper implementing nsIURI
RCWN debugging
Dragana
103 Early Hint
security bug
NEAT
TFO
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
-
blocked by Bug 1407547 - FAIL | browser/base/content/test/urlbar/browser_urlbarAboutHomeLoading.js | Uncaught exception
- see if it has been fixed by latest m-c Bug 1399520 - Intermittent AddressSanitizer: heap-use-after-free
-
sec-approval? Bug 1391356 - Convert JAR channel clients that use Open to use AsyncOpen
-
open sub-bugs, see if they are necessary to be fixed.
Junior
Bug 870460 - Lazy load of cookie service blocks main thread while cookie database loads
- backout: xperf startup io whitelist(r+), also worried by perf team, and BaseAppShell leakage(r?) Bug 1401883 - Intermittent leakcheck | default process: 176 bytes leaked (Mutex, nsBaseAppShell)
Bug 1400655 - json view serviceworker
- LOAD_CALL_CONTENT_SNIFFERS is gone in Child with InterceptedChannel
Amy
Bug 1344090 - Firefox's cookie limitations does not allow to store 150 cookies per-domain , but only for the root domain, it is confusing.
-
Conclusion:
-
Stop to implement the cookie priorities.
-
Start to implement the batch deletion.
-
Increase the limitation of cookie from per-host. Bug 1328163 - support protocol-agnostic cookie whitelisting
-
Rebased. Bug 1409102 - 57beta: Accept 3rd-party cookies from visited doesn't seem to work with embedded dailymotion videos..
-
Can't reproduce.
Kershaw
Bug 1404804 - Tracking black list is checked twice when TP is enabled
- landed
Bug 1390223 - Experiment: Don't mark dynamically added
css (aka elements) as Leaders- WIP for determining if a CSS link element is created from parser or script
- Need to create some fake pages for analyzing
TLS-1.3 addon
- Make the popup window work
SC
[PBg-Http]
-
video/audio loading is now OMT as well (thanks to Taipei Media team!)
-
https://mzl.la/2kQBQvz
-
https://mzl.la/2kRVxD7
-
debugging for regressions
-
Bug 1405818 - Crash in mozilla::net::HttpChannelChild::Release
-
guessing and discussing possible scenario that causes multi-thread refcount issue
-
Bug 1409553 - Assertion failure: redirectParentChannel, at netwerk/protocol/http/HttpChannelParent.cpp:1035
-
yet another ServiceWorker + HTTP redirection bug.
-
reproduce with RR with moz log, still analyzing the root cause [Socket Process]
-
study Google Chrome approach
-
preparing system design and rollout plan
-
[under construction] https://docs.google.com/presentation/d/12Jg2eXT7nne2G8MtS3E2p7yRGaQJrvXg8iiQOhYggFU/edit#slide=id.g28b523e674_0_82 [Others]
-
Bug 1407683 - Crash after failed nsIXMLHttpRequest instance
-
use XPCOM singleton factory method and StaticRefPtr to replace static raw pointer. landed on m-c
-
Bug 1390708 - .hqx files are all corrupted when downloaded with FF unless going through SAVE AS...
-
BinHex format will be decompressed by stream converter when opening the URL, and save the decoded content with .hqx filename
-
intend to remove BinHex stream converter support from m-c, under discussion
2017-10-19
NECKO WEEKLY MEETING NOTES
Thurs October 19th, 2017
TRIAGE
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs (active): https://mzl.la/2he1C85
-
P2 bugs (next) https://mzl.la/2yaD1aO)
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Nick
Gary
Honza
Junior
Michal
Amy
Daniel
Kershaw
Valentin
SC <<<<<===== Oct 19->26
Dragana
Round Table:
Nick
Honza
Michal
- profiling RCWN
- 1395760 Page gets cached only partially (possibly generating a corrupted cache entry?)
- 1397709 Force refresh not propogated into data
- 1395403 Receiving large binary websocket messages consumes too much CPU
- 1399822 WebSocket onopen event is fired when unexpected Sec-WebSocket-Protocol is received
- 1352916 Crash in mozilla::net::CacheFileMetadata::GetElement
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TLS 1.3-checking (to be system-) add-on (help from Kershaw)
- TRR (Trusted Recursive Resolver) - DNS-over-HTTPS
Valentin
Bug 1405961 - Assertion failure: !aStamp.IsNull() PerformanceNavigationTiming
Bug 1394906 - Implement immutable, threadsafe MozURL
Bug 1407540 - MozURL should support base url in the CTOR
reviews
MozURL wrapper implementing nsIURI
RCWN debugging
Dragana
103 Early Hint
security bug
NEAT
TFO
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
-
blocked by Bug 1407547 - FAIL | browser/base/content/test/urlbar/browser_urlbarAboutHomeLoading.js | Uncaught exception
- see if it has been fixed by latest m-c Bug 1399520 - Intermittent AddressSanitizer: heap-use-after-free
-
sec-approval? Bug 1391356 - Convert JAR channel clients that use Open to use AsyncOpen
-
open sub-bugs, see if they are necessary to be fixed.
Junior
Bug 870460 - Lazy load of cookie service blocks main thread while cookie database loads
- backout: xperf startup io whitelist(r+), also worried by perf team, and BaseAppShell leakage(r?) Bug 1401883 - Intermittent leakcheck | default process: 176 bytes leaked (Mutex, nsBaseAppShell)
Bug 1400655 - json view serviceworker
- LOAD_CALL_CONTENT_SNIFFERS is gone in Child with InterceptedChannel
Amy
Bug 1344090 - Firefox's cookie limitations does not allow to store 150 cookies per-domain , but only for the root domain, it is confusing.
-
Conclusion:
-
Stop to implement the cookie priorities.
-
Start to implement the batch deletion.
-
Increase the limitation of cookie from per-host. Bug 1328163 - support protocol-agnostic cookie whitelisting
-
Rebased. Bug 1409102 - 57beta: Accept 3rd-party cookies from visited doesn't seem to work with embedded dailymotion videos..
-
Can't reproduce.
Kershaw
Bug 1404804 - Tracking black list is checked twice when TP is enabled
- landed
Bug 1390223 - Experiment: Don't mark dynamically added
css (aka elements) as Leaders- WIP for determining if a CSS link element is created from parser or script
- Need to create some fake pages for analyzing
TLS-1.3 addon
- Make the popup window work
SC
[PBg-Http]
-
video/audio loading is now OMT as well (thanks to Taipei Media team!)
-
https://mzl.la/2kQBQvz
-
https://mzl.la/2kRVxD7
-
debugging for regressions
-
Bug 1405818 - Crash in mozilla::net::HttpChannelChild::Release
-
guessing and discussing possible scenario that causes multi-thread refcount issue
-
Bug 1409553 - Assertion failure: redirectParentChannel, at netwerk/protocol/http/HttpChannelParent.cpp:1035
-
yet another ServiceWorker + HTTP redirection bug.
-
reproduce with RR with moz log, still analyzing the root cause [Socket Process]
-
study Google Chrome approach
-
preparing system design and rollout plan
-
[under construction] https://docs.google.com/presentation/d/12Jg2eXT7nne2G8MtS3E2p7yRGaQJrvXg8iiQOhYggFU/edit#slide=id.g28b523e674_0_82 [Others]
-
Bug 1407683 - Crash after failed nsIXMLHttpRequest instance
-
use XPCOM singleton factory method and StaticRefPtr to replace static raw pointer. landed on m-c
-
Bug 1390708 - .hqx files are all corrupted when downloaded with FF unless going through SAVE AS...
-
BinHex format will be decompressed by stream converter when opening the URL, and save the decoded content with .hqx filename
-
intend to remove BinHex stream converter support from m-c, under discussion
2017-10-13
NECKO WEEKLY MEETING NOTES
Thurs October 12th, 2017
TRIAGE
-
Triage duty: Valentin
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs (active): https://mzl.la/2he1C85
-
P2 bugs (next) https://mzl.la/2yaD1aO)
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Round Table:
- Triage
- Interleave Taipei and the res
- 32 unprioritized bugs
- Collapsing all necko-XXX tags into a single "necko-triaged"
- Hold off on using P1 for non 57 bugs for now
- Register for Austin
Nick
Honza
Michal
- profiling RCWN
- 1401224 Assertion failure: aLength > 0 (Writing a zero-sized chunk), at image/SourceBuffer.cpp:348
- 1403010 Crash due to race condition in CacheFileMetadata::SizeOfExcludingThis when reading or writing metadata
- 1405306 Remove unused code in CacheFile::OnFileDoomed
- 1394564 Version 55 breaks sending large amounts of data over web sockets.
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TLS 1.3-checking (to be system-) add-on
- fixed two "copy as cURL" bugs
- QUIC interim in Seattle October 4-5 from remote
- Bug 1395914 - IPv6 network identification (Linux OK, mac version to be fixed, Windows pending)
Valentin
Bug 1405961 - Assertion failure: !aStamp.IsNull() PerformanceNavigationTiming
Bug 1394906 - Implement immutable, threadsafe MozURL
Bug 1407540 - MozURL should support base url in the CTOR
reviews
MozURL wrapper implementing nsIURI
RCWN debugging
Dragana
425 Too Early
103 Early Hint
security bug, crash
NEAT
TFO
rel=preload
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
-
all tests fix are landed
-
measuring performance Bug 1391356 - Convert JAR channel clients that use Open to use AsyncOpen
-
investigating
Junior
Bug 870460 - Lazy load of cookie service blocks main thread while cookie database loads
- r+(nick), r?(jdm) frame issue webrtc
Amy
Bug 1399590 - Intermittent PROCESS-CRASH | Main app process exited normally | application crashed [@ nsPermissionManager::CommonTestPermissionInternal(nsIPrincipal *,nsIURI *,char const *,unsigned int *,bool,bool)] after Assertion: PermissionAvaliable(prin, aType)
-
landed Bug 1360603 - Mark Save as... channels used for download as throttleable
-
landed Bug 1286858 - Modify nsCookie*, interfaces and storage to include the SameSite attribute
-
Rebased and landed. Bug 1403737 - On upgrade from 56 Beta to 57 Beta all sessions were invalidated
-
Can't reproduce.
Kershaw
Bug 1404804 - Tracking black list is checked twice when TP is enabled
- WIP
Bug 1389037 - Getting connection timeouts after downloading some Blobs and switching tab
- HTTP log needed
SC
[PBg-Http]
-
Bug 1381434 - use HTTP OMT data delivery while loading fontface
-
landed on firefox 58
-
99% is OMT now
-
telemetry: https://mzl.la/2yruvIZ [Socket Process]
-
broad review on all the usage of Socket Transport Thread
-
HTTP/FTP/NSS
-
WebRTC
-
TCPSocket/UDPSocket
-
other things use STS to poll fd (e.g. mDNS on mac)
-
other things use STS as an EventTarget [Others]
-
Bug 1396395 - Firefox crashes when submitting form
-
suspend/resume during async open + sync XHR, causing resume stream reading again before OnStartRequest is finished along the listener chain
-
landed on firefox 58 and try uplifting to 57.
-
Bug 1402417 - Intermittent LeakSanitizer | leak at mozilla::net::RequestContextService::GetRequestContext, mozilla::net::NeckoParent::RecvRequestContextLoadBegin, mozilla::net::PNeckoParent::OnMessageReceived
-
try bisecting test cases
-
Bug 1372065 - fix cppcheck linter error in Necko
-
minor fix landed on firefox 58
-
log analysis
-
Bug 1405173 - Big delay for making the initial connection to Google Docs (using cached IPv6 address for backup connection stream)
-
Bug 1337783 - Assertion failure: !mTrackingScripts.Contains(aURL), at nsDocument.cpp:3035
2017-10-12
NECKO WEEKLY MEETING NOTES
Thurs October 12th, 2017
TRIAGE
-
Triage duty: Valentin
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs (active): https://mzl.la/2he1C85
-
P2 bugs (next) https://mzl.la/2yaD1aO)
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Round Table:
- Triage
- 32 unprioritized bugs
- Collapsing all necko-XXX tags into a single "necko-triaged"
- Hold off on using P1 for non 57 bugs for now
- Register for Austin
Nick
Honza
Michal
- profiling RCWN
- 1401224 Assertion failure: aLength > 0 (Writing a zero-sized chunk), at image/SourceBuffer.cpp:348
- 1403010 Crash due to race condition in CacheFileMetadata::SizeOfExcludingThis when reading or writing metadata
- 1405306 Remove unused code in CacheFile::OnFileDoomed
- 1394564 Version 55 breaks sending large amounts of data over web sockets.
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TLS 1.3-checking (to be system-) add-on
- fixed two "copy as cURL" bugs
- QUIC interim in Seattle October 4-5 from remote
- Bug 1395914 - IPv6 network identification (Linux OK, mac version to be fixed, Windows pending)
Valentin
Bug 1405961 - Assertion failure: !aStamp.IsNull() PerformanceNavigationTiming
Bug 1394906 - Implement immutable, threadsafe MozURL
Bug 1407540 - MozURL should support base url in the CTOR
reviews
MozURL wrapper implementing nsIURI
RCWN debugging
Dragana
425 Too Early
103 Early Hint
security bug, crash
NEAT
TFO
rel=preload
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
-
all tests fix are landed
-
measuring performance Bug 1391356 - Convert JAR channel clients that use Open to use AsyncOpen
-
investigating
Junior
Bug 870460 - Lazy load of cookie service blocks main thread while cookie database loads
- r+(nick), r?(jdm) frame issue webrtc
Amy
Bug 1399590 - Intermittent PROCESS-CRASH | Main app process exited normally | application crashed [@ nsPermissionManager::CommonTestPermissionInternal(nsIPrincipal *,nsIURI *,char const *,unsigned int *,bool,bool)] after Assertion: PermissionAvaliable(prin, aType)
-
landed Bug 1360603 - Mark Save as... channels used for download as throttleable
-
landed Bug 1286858 - Modify nsCookie*, interfaces and storage to include the SameSite attribute
-
Rebased and landed. Bug 1403737 - On upgrade from 56 Beta to 57 Beta all sessions were invalidated
-
Can't reproduce.
Kershaw
Bug 1404804 - Tracking black list is checked twice when TP is enabled
- WIP
Bug 1389037 - Getting connection timeouts after downloading some Blobs and switching tab
- HTTP log needed
SC
[PBg-Http]
-
Bug 1381434 - use HTTP OMT data delivery while loading fontface
-
landed on firefox 58
-
99% is OMT now
-
telemetry: https://mzl.la/2yruvIZ [Socket Process]
-
broad review on all the usage of Socket Transport Thread
-
HTTP/FTP/NSS
-
WebRTC
-
TCPSocket/UDPSocket
-
other things use STS to poll fd (e.g. mDNS on mac)
-
other things use STS as an EventTarget [Others]
-
Bug 1396395 - Firefox crashes when submitting form
-
suspend/resume during async open + sync XHR, causing resume stream reading again before OnStartRequest is finished along the listener chain
-
landed on firefox 58 and try uplifting to 57.
-
Bug 1402417 - Intermittent LeakSanitizer | leak at mozilla::net::RequestContextService::GetRequestContext, mozilla::net::NeckoParent::RecvRequestContextLoadBegin, mozilla::net::PNeckoParent::OnMessageReceived
-
try bisecting test cases
-
Bug 1372065 - fix cppcheck linter error in Necko
-
minor fix landed on firefox 58
-
log analysis
-
Bug 1405173 - Big delay for making the initial connection to Google Docs (using cached IPv6 address for backup connection stream)
-
Bug 1337783 - Assertion failure: !mTrackingScripts.Contains(aURL), at nsDocument.cpp:3035
2017-10-06
NECKO WEEKLY MEETING NOTES
Thurs October 4th, 2017
TRIAGE
-
Triage duty: Daniel
-
Note: use these 2 queries when you're on triage duty: all bugs should be [necko-triaged] and have a priority
- UNTRIAGED bugs: https://mzl.la/2wAv7XZ
- MALFORMED bugs (have necko-triaged but no priority): https://mzl.la/2xXf2jc
-
P1 bugs (active): https://mzl.la/2he1C85
-
P2 bugs (next) https://mzl.la/2yaD1aO)
-
P3 bugs (backlog) https://mzl.la/2xcYzEL
-
P5 bugs (would take): https://mzl.la/2hdnQXy
-
Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Round Table:
- Weird *.url bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1405199
- Triage
- Who's on triage? 32 unprioritized bugs
- Collapsing all necko-XXX tags into a single "necko-triaged"
- ftp sec bugs disclosure
- https://bugzilla.mozilla.org/show_bug.cgi?id=1361848
- https://bugzilla.mozilla.org/show_bug.cgi?id=1362050
Nick
Honza
Michal
- profiling RCWN
- 1401224 Assertion failure: aLength > 0 (Writing a zero-sized chunk), at image/SourceBuffer.cpp:348
- 1403010 Crash due to race condition in CacheFileMetadata::SizeOfExcludingThis when reading or writing metadata
- 1405306 Remove unused code in CacheFile::OnFileDoomed
- 1394564 Version 55 breaks sending large amounts of data over web sockets.
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- TLS 1.3-checking (to be system-) add-on
- fixed two "copy as cURL" bugs
- QUIC interim in Seattle October 4-5 from remote
- Bug 1395914 - IPv6 network identification (Linux OK, mac version to be fixed, Windows pending)
Valentin
Bug 1403154 - Crash in mozilla::dom::PerformanceNavigationTiming::Type
Bug 1403926 - PerformanceNavigationTiming fields are not correct
Bug 1392739 - IPC: unknown address crash [@CharAt] - IPC fuzzing with errors
Bug 1403137 - Crash in ContinueProcessResponse2 - null mTransactionPump
Dragana
TFO
rel=preload and no-cache
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
-
all tests fix are landed
-
measuring performance Bug 1391356 - Convert JAR channel clients that use Open to use AsyncOpen
-
investigating
Junior
Bug 870460 - Lazy load of cookie service blocks main thread while cookie database loads
- r+(nick), r?(jdm) frame issue webrtc
Amy
Bug 1399590 - Intermittent PROCESS-CRASH | Main app process exited normally | application crashed [@ nsPermissionManager::CommonTestPermissionInternal(nsIPrincipal *,nsIURI *,char const *,unsigned int *,bool,bool)] after Assertion: PermissionAvaliable(prin, aType)
-
landed Bug 1360603 - Mark Save as... channels used for download as throttleable
-
landed Bug 1286858 - Modify nsCookie*, interfaces and storage to include the SameSite attribute
-
Rebased and landed. Bug 1403737 - On upgrade from 56 Beta to 57 Beta all sessions were invalidated
-
Can't reproduce.
Kershaw
Bug 1404804 - Tracking black list is checked twice when TP is enabled
- WIP
Bug 1389037 - Getting connection timeouts after downloading some Blobs and switching tab
- HTTP log needed
SC
[PBg-Http]
-
Bug 1381434 - use HTTP OMT data delivery while loading fontface
-
landed on firefox 58
-
99% is OMT now
-
telemetry: https://mzl.la/2yruvIZ [Socket Process]
-
broad review on all the usage of Socket Transport Thread
-
HTTP/FTP/NSS
-
WebRTC
-
TCPSocket/UDPSocket
-
other things use STS to poll fd (e.g. mDNS on mac)
-
other things use STS as an EventTarget [Others]
-
Bug 1396395 - Firefox crashes when submitting form
-
suspend/resume during async open + sync XHR, causing resume stream reading again before OnStartRequest is finished along the listener chain
-
landed on firefox 58 and try uplifting to 57.
-
Bug 1402417 - Intermittent LeakSanitizer | leak at mozilla::net::RequestContextService::GetRequestContext, mozilla::net::NeckoParent::RecvRequestContextLoadBegin, mozilla::net::PNeckoParent::OnMessageReceived
-
try bisecting test cases
-
Bug 1372065 - fix cppcheck linter error in Necko
-
minor fix landed on firefox 58
-
log analysis
-
Bug 1405173 - Big delay for making the initial connection to Google Docs (using cached IPv6 address for backup connection stream)
-
Bug 1337783 - Assertion failure: !mTrackingScripts.Contains(aURL), at nsDocument.cpp:3035
2017-09-28
NECKO WEEKLY MEETING NOTES
Thurs Sept 28th, 2017
STICKY
- Triage duty: nwgh
- new untriaged bugs: https://tinyurl.com/zhk9yjf (https://mzl.la/2ylkidL)
- NECKO-ACTIVE bugs: https://tinyurl.com/j8pj35u (https://mzl.la/2he1C85)
- NECKO NEXT bugs: https://tinyurl.com/zjwjfee (https://mzl.la/2yaD1aO)
- NECKO-BACKLOG bugs: https://tinyurl.com/hpkcxx3 (https://mzl.la/2xcYzEL)
- NECKO-WOULD-TAKE bugs: https://mzl.la/2hdnQXy
- Triage Notes
- Android crashes on infra are currently not symbolicated: https://bugzilla.mozilla.org/show_bug.cgi?id=1389805 (makes triaging/diagnosing android crash bugs hard/impossible)
Round Table:
- (15:48:00) annevk: if y'all have meetings, could you bring up fixing https://bugzilla.mozilla.org/show_bug.cgi?id=1363284 as part of some Quantum effort
- (15:48:28) annevk: we even have Google devrel volunteering to draw up graphics how it makes Firefox faster than Chrome
- (15:49:05) annevk: https://twitter.com/annevk/status/901493567855710208
Nick
Honza
Michal
- reviews
- RCWN
- 1403010 Intermittent toolkit/components/aboutmemory/tests/test_memoryReporters.xul | application crashed [@ arena_salloc]
- 1401224 Assertion failure: aLength > 0 (Writing a zero-sized chunk), at image/SourceBuffer.cpp:348
- 1394564 Version 55 breaks sending large amounts of data over web sockets.
Patrick
last week: mpendingq, 256fd telemetry, 0.9 telemetry, namespaces, neat tls, alt-svc, immutable bug, some non-necko stuff this week: neat tls, alt-svc, immutable bug, some non-necko stuff. more reviews.
Daniel
- NEAT project work
- Bug 1395914 - IPv6 network identification (Linux version reviewed OK, mac version coming)
Valentin
Bug 1403154 - Crash in mozilla::dom::PerformanceNavigationTiming::Type
Bug 1403926 - PerformanceNavigationTiming fields are not correct
Bug 1392739 - IPC: unknown address crash [@CharAt] - IPC fuzzing with errors
Bug 1403137 - Crash in ContinueProcessResponse2 - null mTransactionPump
Dragana
TFO
rel=preload and no-cache
Gary
Bug 1373708 - Convert Jar channels to stop using main thread I/O
- fixing tests, some patches are submitted.
Junior
Bug 870460 - Lazy load of cookie service blocks main thread while cookie database loads
- r? intend to implement: remove legacy upgrade: cookie.txt, DELETE null base basedomain
Amy
Bug 1376009 - Crash in mozalloc_abort | NS_DebugBreak | mozilla::ipc::LogicError | mozilla::net::PCookieServiceChild::SendGetCookieString
-
uplift to beta Bug 1360603 - Mark Save as... channels used for download as throttleable
-
f+
-
Have to ask dom peer to review this patch Bug 1386746 - HTTP response throttling: experiment with limiting the amount of data we read during the short don't-block-read period
-
Started to work on this bug.
Kershaw
Bug 1377208 - Move background transactions over h2 to the background group
- landed
Bug 1395472 - Kill switch for moving background transactions over h2 to the background group
- landed
Bug 1247843 - All s are downloaded during the critical path
- WIP
- Fix test failures
SC
[PBg-Http]
- performance analysis
- First Paint time for visible elements in HTML document is improved because HTML parser will start to create DOM element earlier. The difference can be observed from TALOS tp6 amazon/youtube. The average first paint time is improved around 50ms.
- However for facebook no improvement is observed because there is no visible element in the HTML document. In the HTML document there is only for loading CSS/JS scripts and executing