Commit Graph

684 Commits

Author SHA1 Message Date
Carsten "Tomcat" Book
679210723b merge mozilla-inbound to mozilla-central a=merge 2017-07-25 14:27:17 +02:00
Gian-Carlo Pascutto
7ee246522d Bug 1308400 - Report failures in file processes too. r=jld
MozReview-Commit-ID: 549WuWKaJeM

--HG--
extra : rebase_source : 22d6348e602f2ceae546502fa0050ab0960ec075
2017-07-10 20:20:49 +02:00
Gian-Carlo Pascutto
d791c78487 Bug 1308400 - Symlink handling for read brokering. r=jld
MozReview-Commit-ID: BP1gFdDbqXD

--HG--
extra : rebase_source : 5db26ad21e40ab19228ac8a978215b97cf8b3b28
2017-07-06 15:31:13 +02:00
Gian-Carlo Pascutto
8bc55108f2 Bug 1308400 - Support file process, whitelist path prefs. r=jld
MozReview-Commit-ID: 3eX06AioPZL

--HG--
extra : rebase_source : 56bcfaad3360fe92ce605a0413bb3a9cacb4446d
2017-07-24 16:32:22 +02:00
Sylvestre Ledru
6202d4908b Bug 1383007 - Move the declaration in the #ifdef declaration to silent a warning r=jld
Otherwise, a warning is triggered because the statement will never be executed [-

Found with -Wswitch-unreachable with gcc 7

MozReview-Commit-ID: FVStzyFlhJp

--HG--
extra : rebase_source : 1db87153c3e7dcde8d5a9e0f1f0ff607307c9ca2
2017-07-21 23:28:47 +02:00
Nicholas Nethercote
ff8375cf2e Bug 1382099 - Remove MOZ_WIDGET_GONK from security/. r=jld.
--HG--
extra : rebase_source : 8027baf7a24e5e0d91a175ab38614594c143767b
2017-07-21 10:45:42 +10:00
Bob Owen
b4239707cf Bug 1366694 Part 2: Don't run sandbox file system test in DEBUG on Windows. r=jimm
This is because in DEBUG mode we currently give full access to TEMP dir
for logging purposes and the temporary profile is created in the TEMP dir.
2017-07-20 07:50:48 +01:00
Bob Owen
dc46549cd6 Bug 1366694 Part 1: Allow user handles in the content process job in DEBUG builds. r=jimm 2017-07-07 15:51:17 +01:00
Jed Davis
4634e2a332 Bug 1376910 - Unshare the SysV IPC namespace in content processes. r=gcp
MozReview-Commit-ID: 1Uajj68rEuC

--HG--
extra : rebase_source : 5a6c86a104911146cfb56243dec8016fca536dc3
2017-06-28 07:11:55 -07:00
Jed Davis
99611dd25e Bug 1376910 - Block syscalls for SysV IPC in content processes. r=gcp
MozReview-Commit-ID: 9XCYBU07T29

--HG--
extra : rebase_source : 2390164a217a71f1ac0a9102e8a023c07b15eee7
2017-06-28 06:33:53 -07:00
Haik Aftandilian
ef16b0fcf8 Bug 1380690 - Part 2 - Whitelist repo and object dirs using paths from the Info.plist files. r=Alex_Gaynor,spohl
On Mac developer builds, read the repo path and object dir path from the
Info.plist files in the application bundle instead of the
MOZ_DEVELOPER_REPO_DIR and MOZ_DEVELOPER_OBJ_DIR environment variables.

MozReview-Commit-ID: 8UtjkNPGUM1

--HG--
extra : rebase_source : 3e4ce32f2e2c40f8d899bc9190e48298081458d9
2017-07-19 09:16:09 -07:00
Alex Gaynor
2e4ea0b3cd Bug 1383818 - Disallow content processes for using the com.apple.ocspd mach service; r=haik
It is not used, so this is an attack surface reduction.

MozReview-Commit-ID: mrW9hi0SAh

--HG--
extra : rebase_source : 889b937cfd20680bbb62391fa7932b5cd2e1fd6a
2017-07-24 09:50:32 -04:00
Jed Davis
0de50c4f7c Bug 1376653 - Fix handling of architecture differences for getdents. r=gcp
MozReview-Commit-ID: ArGStWwkJAg

--HG--
extra : rebase_source : 27f97df93bff744607e60bf61c8b71431861b025
2017-07-11 17:03:06 -06:00
Jed Davis
bbcc5a0f24 Bug 1376653 - Unconditionalize the tkill() polyfill. r=gcp
MozReview-Commit-ID: JzLWCRQ9Keg

--HG--
extra : rebase_source : ff038fd9e1a4ec8047c3a00619a97464778d7c2a
2017-07-11 16:59:48 -06:00
Jed Davis
89b65b175e Bug 1376653 - Loosen restrictions on clone flags for musl. r=gcp
I've made this non-ifdef'ed, and removed currently unused ifdef'ed cases
for old Android versions, because I'd rather have less code that we're
not even compile-testing than save a few cycles on a non-critical path.

MozReview-Commit-ID: B4Wn1elyK4f

--HG--
extra : rebase_source : f12ef40b325432a6aafe961095e5af64fc5a1a9a
2017-07-11 14:23:27 -06:00
Jim Mathies
6fa192cf93 Bug 1381326 - Enable MITIGATION_EXTENSION_POINT_DISABLE feature for Windows content. r=bobowen
MozReview-Commit-ID: 34MNqN5ln7J

--HG--
extra : rebase_source : 3b5565d5b387f70c562cf1b8e306dd2df8d57233
2017-07-16 12:08:18 -05:00
Haik Aftandilian
88b1e4c7ca Bug 1380132 - Part 3 - Use env variable MOZ_DEVELOPER_OBJ_DIR to whitelist object dir in content sandbox. r=Alex_Gaynor
On developer builds, use $MOZ_DEVELOPER_OBJ_DIR to whitelist the object dir in the content sandbox so that symlinks to the object dir from .app/ files can be loaded.

MozReview-Commit-ID: J4YdpxgbD8i

--HG--
extra : rebase_source : 19e369fe9ae29418d9d79e1fb83246474d858f34
2017-07-14 16:32:53 -07:00
Carsten "Tomcat" Book
260b5f956f merge mozilla-inbound to mozilla-central a=merge 2017-07-13 16:35:22 +02:00
Alex Gaynor
f76801e348 Bug 1379803 - on macOS, only allow the creation of regular files and directories in writable directories; r=haik
This specifically disallows the creation of ttys and symlinks. Writable
directories are needed for plugins, which lazily create the plugintmp directory.
If/when the plugin API surface is reduced we can restrict down to just regular
files.

MozReview-Commit-ID: Ec6qeaiHSsB

--HG--
extra : rebase_source : 252a3cbf7954b9c09092b896ef8af45310438a86
2017-07-11 09:51:04 -04:00
Carsten "Tomcat" Book
038afacb9f Backed out changeset 2ae22a66e02d (bug 1366694) for memory leaks 2017-07-11 13:14:55 +02:00
Carsten "Tomcat" Book
05734fd002 Backed out changeset 88b71119fbf8 (bug 1366694) 2017-07-11 13:14:38 +02:00
Carsten "Tomcat" Book
7e0d52f50e Merge mozilla-central to inbound 2017-07-11 13:00:28 +02:00
Bob Owen
db58bdb9ca Bug 1377555 Part 3: Don't use restricting SIDs when running from a network drive. r=jimm 2017-07-11 09:44:21 +01:00
Bob Owen
bbf27f0cae Bug 1377555 Part 2: Add option to Windows chromium sandbox policy to not use restricting SIDs. r=jimm 2017-07-11 09:44:20 +01:00
Bob Owen
01f2685a30 Bug 1377555 Part 1: Back out changesets 04edb03fb817 and d17ac655cc51. r=jimm
This backouts the previous change to detect and change the sandbox policy
when running from a network drive.
2017-07-11 09:44:20 +01:00
Alex Gaynor
f514ff97b3 Bug 1379182 - Remove some unnecessary file-write permissions types from the content process on macOS; r=haik
On macOS, the file-write* permission type contains numerous sub-permissions (see
bug for full listing). Restrict the ones we allow to only the two we need:
file-write-create and file-write-data. This primarily reduces kernel attack
surface, I'm not aware of any bad things that could be done directly with the
removed permissions.

MozReview-Commit-ID: 3VvjFesy2qx

--HG--
extra : rebase_source : 934ec17c44c9ef3d7fab29919d66cf1a55d57697
2017-07-07 11:05:01 -04:00
Wes Kocher
5dd57ee395 Merge m-c to inbound, a=merge
MozReview-Commit-ID: IVwrN2VivZT
2017-07-07 17:30:32 -07:00
Wes Kocher
fd4857585c Merge autoland to central, a=merge
MozReview-Commit-ID: Lf7ROINgvql
2017-07-07 17:22:00 -07:00
Alex Gaynor
d40ad40466 Bug 1376976 - Restrict sysctl access in the content process to a whitelist of sysctl names. r=jld, r=haik
MozReview-Commit-ID: 14yoiP1gskM
2017-06-29 13:55:15 -07:00
Haik Aftandilian
c610a4c66b Bug 1376163 - [10.13] No audio playback on YouTube, no audio/video on Netflix (macOS High Sierra 10.13 Beta). r=Alex_Gaynor
Allow access to the "com.apple.audio.AudioComponentRegistrar" API on 10.13+ systems.

MozReview-Commit-ID: 8gWXvuXTNKi

--HG--
extra : rebase_source : 8abf9a2548d915a89adfa82580d46c1bc00726d8
2017-07-06 14:09:11 -07:00
Sylvestre Ledru
4e9cf83ee8 Bug 1378712 - Remove all trailing whitespaces r=Ehsan
MozReview-Commit-ID: Kdz2xtTF9EG

--HG--
extra : rebase_source : 7235b3802f25bab29a8c6ba40a181a722f3df0ce
2017-07-06 14:00:35 +02:00
Jed Davis
1a4ac1cd36 Bug 1372428 - Extend file pre-opening for sandboxed media plugins. r=gcp
MozReview-Commit-ID: JoyYocxnk94
2017-07-07 08:58:50 -06:00
Jed Davis
1bc1050e9e Bug 1372428 - Deal with fcntl() in media plugins. r=gcp
MozReview-Commit-ID: 9kBowGtSPYO
2017-07-07 08:58:45 -06:00
Jed Davis
b2df5f5afd Bug 1372428 - Deal with uname() in media plugins. r=gcp
MozReview-Commit-ID: JVzjs80Yuex
2017-07-07 08:58:33 -06:00
Carsten "Tomcat" Book
7857fa0a5e merge mozilla-inbound to mozilla-central a=merge 2017-07-06 11:18:05 +02:00
Gian-Carlo Pascutto
84f7ba492b Bug 1377614 - Part 1 - Move IsDevelopmentBuild() to common code. r=Alex_Gaynor
MozReview-Commit-ID: AcO0XaMS4Gp

--HG--
extra : rebase_source : ec40a94545fa78ce0210a0614db82b7bcb7e8a97
2017-07-03 11:17:04 -07:00
Sebastian Hengst
8b1992d948 Backed out changeset 9137ed21a66f (bug 1377614) for bustage: not finding mozilla/SandboxSettings.h at netwerk/protocol/res/ExtensionProtocolHandler.cpp:46. r=backout 2017-07-05 22:51:58 +02:00
Gian-Carlo Pascutto
2032eb5262 Bug 1377614 - Part 1 - Move IsDevelopmentBuild() to common code. r=Alex_Gaynor
MozReview-Commit-ID: AcO0XaMS4Gp

--HG--
extra : rebase_source : 2fa012f693ad7855c2c6e7b8399edf3c0e734299
2017-07-03 11:17:04 -07:00
Alex Gaynor
53f0246cfd Bug 1377164 - Improve the readability of the macOS plugin sandbox policy; r=haik
MozReview-Commit-ID: 9R8qT98ESQJ

--HG--
extra : rebase_source : 537f0dc3c46bee9b8e295689fbcbc8c63415c5d1
2017-06-29 10:53:04 -07:00
Phil Ringnalda
22cb9f77bb Merge m-c to m-i
MozReview-Commit-ID: H6zGgEm7oOM
2017-07-04 20:32:07 -07:00
Jan Keromnes
09971ac7d3 Bug 1376643 - Use 'override' and '= default' on applicable methods in security/sandbox/. r=gcp 2017-06-27 17:57:00 +02:00
Jan Keromnes
df076300b1 Bug 1376643 - Use 'nullptr' where applicable in security/sandbox/. r=gcp 2017-06-27 17:56:00 +02:00
Bob Owen
25e5ff4cde Bug 1366694 Part 2: Don't run sandbox file system test in DEBUG on Windows. r=jimm
This is because in DEBUG mode we currently give full access to TEMP dir
for logging purposes and the temporary profile is created in the TEMP dir.
2017-07-11 09:44:20 +01:00
Bob Owen
ecbd6ca808 Bug 1366694 Part 1: Allow user handles in the content process job in DEBUG builds. r=jimm 2017-07-07 15:51:17 +01:00
Alex Gaynor
b636380391 Bug 1374557 - Part 1 - Add the ability to specify a list of paths to whitelist read access to in the macOS content sandbox; r=haik
MozReview-Commit-ID: HXBkyR7Tts2

--HG--
extra : rebase_source : 6daf50a4d7a4ff2ff85dfac43891149353e813aa
2017-06-21 10:19:28 -04:00
Alex Gaynor
bb1ea70f5f Bug 1357758 - Replace the file-read blacklist in the macOS sandbox policy with a whitelist of the allowed paths; r=haik
This makes the policy easier to audit, harder to regress, and easier to further prune the content processes's permissions.

MozReview-Commit-ID: 6VqEoGsWSGH

--HG--
extra : rebase_source : 58a9d35dd6e58624779294b49df5cc7e34cb4320
2017-04-18 15:57:54 -04:00
Wes Kocher
bfc45b98b9 Merge m-c to inbound, a=merge
MozReview-Commit-ID: 9XdoB5MuVz6
2017-07-05 17:17:41 -07:00
Bob Owen
1eb1c9091d Bug 1378061: Only set user's SID in USER_LIMITED as deny only when not using restricting SIDs. r=jimm 2017-07-05 21:00:55 +01:00
Carsten "Tomcat" Book
7918eeee02 merge mozilla-inbound to mozilla-central a=merge 2017-06-28 13:23:29 +02:00
Jed Davis
8e5d5bda0f Bug 1362537 - Re-disallow accept4 in Linux content processes. r=gcp
MozReview-Commit-ID: Gml8lR1Heu1

--HG--
extra : rebase_source : 6b466f887bd1802277a506295a9c6cc575196385
2017-06-27 14:52:25 -07:00