Carsten "Tomcat" Book
679210723b
merge mozilla-inbound to mozilla-central a=merge
2017-07-25 14:27:17 +02:00
Gian-Carlo Pascutto
7ee246522d
Bug 1308400 - Report failures in file processes too. r=jld
...
MozReview-Commit-ID: 549WuWKaJeM
--HG--
extra : rebase_source : 22d6348e602f2ceae546502fa0050ab0960ec075
2017-07-10 20:20:49 +02:00
Gian-Carlo Pascutto
d791c78487
Bug 1308400 - Symlink handling for read brokering. r=jld
...
MozReview-Commit-ID: BP1gFdDbqXD
--HG--
extra : rebase_source : 5db26ad21e40ab19228ac8a978215b97cf8b3b28
2017-07-06 15:31:13 +02:00
Gian-Carlo Pascutto
8bc55108f2
Bug 1308400 - Support file process, whitelist path prefs. r=jld
...
MozReview-Commit-ID: 3eX06AioPZL
--HG--
extra : rebase_source : 56bcfaad3360fe92ce605a0413bb3a9cacb4446d
2017-07-24 16:32:22 +02:00
Sylvestre Ledru
6202d4908b
Bug 1383007 - Move the declaration in the #ifdef declaration to silent a warning r=jld
...
Otherwise, a warning is triggered because the statement will never be executed [-
Found with -Wswitch-unreachable with gcc 7
MozReview-Commit-ID: FVStzyFlhJp
--HG--
extra : rebase_source : 1db87153c3e7dcde8d5a9e0f1f0ff607307c9ca2
2017-07-21 23:28:47 +02:00
Nicholas Nethercote
ff8375cf2e
Bug 1382099 - Remove MOZ_WIDGET_GONK from security/. r=jld.
...
--HG--
extra : rebase_source : 8027baf7a24e5e0d91a175ab38614594c143767b
2017-07-21 10:45:42 +10:00
Bob Owen
b4239707cf
Bug 1366694 Part 2: Don't run sandbox file system test in DEBUG on Windows. r=jimm
...
This is because in DEBUG mode we currently give full access to TEMP dir
for logging purposes and the temporary profile is created in the TEMP dir.
2017-07-20 07:50:48 +01:00
Bob Owen
dc46549cd6
Bug 1366694 Part 1: Allow user handles in the content process job in DEBUG builds. r=jimm
2017-07-07 15:51:17 +01:00
Jed Davis
4634e2a332
Bug 1376910 - Unshare the SysV IPC namespace in content processes. r=gcp
...
MozReview-Commit-ID: 1Uajj68rEuC
--HG--
extra : rebase_source : 5a6c86a104911146cfb56243dec8016fca536dc3
2017-06-28 07:11:55 -07:00
Jed Davis
99611dd25e
Bug 1376910 - Block syscalls for SysV IPC in content processes. r=gcp
...
MozReview-Commit-ID: 9XCYBU07T29
--HG--
extra : rebase_source : 2390164a217a71f1ac0a9102e8a023c07b15eee7
2017-06-28 06:33:53 -07:00
Haik Aftandilian
ef16b0fcf8
Bug 1380690 - Part 2 - Whitelist repo and object dirs using paths from the Info.plist files. r=Alex_Gaynor,spohl
...
On Mac developer builds, read the repo path and object dir path from the
Info.plist files in the application bundle instead of the
MOZ_DEVELOPER_REPO_DIR and MOZ_DEVELOPER_OBJ_DIR environment variables.
MozReview-Commit-ID: 8UtjkNPGUM1
--HG--
extra : rebase_source : 3e4ce32f2e2c40f8d899bc9190e48298081458d9
2017-07-19 09:16:09 -07:00
Alex Gaynor
2e4ea0b3cd
Bug 1383818 - Disallow content processes for using the com.apple.ocspd mach service; r=haik
...
It is not used, so this is an attack surface reduction.
MozReview-Commit-ID: mrW9hi0SAh
--HG--
extra : rebase_source : 889b937cfd20680bbb62391fa7932b5cd2e1fd6a
2017-07-24 09:50:32 -04:00
Jed Davis
0de50c4f7c
Bug 1376653 - Fix handling of architecture differences for getdents. r=gcp
...
MozReview-Commit-ID: ArGStWwkJAg
--HG--
extra : rebase_source : 27f97df93bff744607e60bf61c8b71431861b025
2017-07-11 17:03:06 -06:00
Jed Davis
bbcc5a0f24
Bug 1376653 - Unconditionalize the tkill() polyfill. r=gcp
...
MozReview-Commit-ID: JzLWCRQ9Keg
--HG--
extra : rebase_source : ff038fd9e1a4ec8047c3a00619a97464778d7c2a
2017-07-11 16:59:48 -06:00
Jed Davis
89b65b175e
Bug 1376653 - Loosen restrictions on clone flags for musl. r=gcp
...
I've made this non-ifdef'ed, and removed currently unused ifdef'ed cases
for old Android versions, because I'd rather have less code that we're
not even compile-testing than save a few cycles on a non-critical path.
MozReview-Commit-ID: B4Wn1elyK4f
--HG--
extra : rebase_source : f12ef40b325432a6aafe961095e5af64fc5a1a9a
2017-07-11 14:23:27 -06:00
Jim Mathies
6fa192cf93
Bug 1381326 - Enable MITIGATION_EXTENSION_POINT_DISABLE feature for Windows content. r=bobowen
...
MozReview-Commit-ID: 34MNqN5ln7J
--HG--
extra : rebase_source : 3b5565d5b387f70c562cf1b8e306dd2df8d57233
2017-07-16 12:08:18 -05:00
Haik Aftandilian
88b1e4c7ca
Bug 1380132 - Part 3 - Use env variable MOZ_DEVELOPER_OBJ_DIR to whitelist object dir in content sandbox. r=Alex_Gaynor
...
On developer builds, use $MOZ_DEVELOPER_OBJ_DIR to whitelist the object dir in the content sandbox so that symlinks to the object dir from .app/ files can be loaded.
MozReview-Commit-ID: J4YdpxgbD8i
--HG--
extra : rebase_source : 19e369fe9ae29418d9d79e1fb83246474d858f34
2017-07-14 16:32:53 -07:00
Carsten "Tomcat" Book
260b5f956f
merge mozilla-inbound to mozilla-central a=merge
2017-07-13 16:35:22 +02:00
Alex Gaynor
f76801e348
Bug 1379803 - on macOS, only allow the creation of regular files and directories in writable directories; r=haik
...
This specifically disallows the creation of ttys and symlinks. Writable
directories are needed for plugins, which lazily create the plugintmp directory.
If/when the plugin API surface is reduced we can restrict down to just regular
files.
MozReview-Commit-ID: Ec6qeaiHSsB
--HG--
extra : rebase_source : 252a3cbf7954b9c09092b896ef8af45310438a86
2017-07-11 09:51:04 -04:00
Carsten "Tomcat" Book
038afacb9f
Backed out changeset 2ae22a66e02d (bug 1366694) for memory leaks
2017-07-11 13:14:55 +02:00
Carsten "Tomcat" Book
05734fd002
Backed out changeset 88b71119fbf8 (bug 1366694)
2017-07-11 13:14:38 +02:00
Carsten "Tomcat" Book
7e0d52f50e
Merge mozilla-central to inbound
2017-07-11 13:00:28 +02:00
Bob Owen
db58bdb9ca
Bug 1377555 Part 3: Don't use restricting SIDs when running from a network drive. r=jimm
2017-07-11 09:44:21 +01:00
Bob Owen
bbf27f0cae
Bug 1377555 Part 2: Add option to Windows chromium sandbox policy to not use restricting SIDs. r=jimm
2017-07-11 09:44:20 +01:00
Bob Owen
01f2685a30
Bug 1377555 Part 1: Back out changesets 04edb03fb817 and d17ac655cc51. r=jimm
...
This backouts the previous change to detect and change the sandbox policy
when running from a network drive.
2017-07-11 09:44:20 +01:00
Alex Gaynor
f514ff97b3
Bug 1379182 - Remove some unnecessary file-write permissions types from the content process on macOS; r=haik
...
On macOS, the file-write* permission type contains numerous sub-permissions (see
bug for full listing). Restrict the ones we allow to only the two we need:
file-write-create and file-write-data. This primarily reduces kernel attack
surface, I'm not aware of any bad things that could be done directly with the
removed permissions.
MozReview-Commit-ID: 3VvjFesy2qx
--HG--
extra : rebase_source : 934ec17c44c9ef3d7fab29919d66cf1a55d57697
2017-07-07 11:05:01 -04:00
Wes Kocher
5dd57ee395
Merge m-c to inbound, a=merge
...
MozReview-Commit-ID: IVwrN2VivZT
2017-07-07 17:30:32 -07:00
Wes Kocher
fd4857585c
Merge autoland to central, a=merge
...
MozReview-Commit-ID: Lf7ROINgvql
2017-07-07 17:22:00 -07:00
Alex Gaynor
d40ad40466
Bug 1376976 - Restrict sysctl access in the content process to a whitelist of sysctl names. r=jld, r=haik
...
MozReview-Commit-ID: 14yoiP1gskM
2017-06-29 13:55:15 -07:00
Haik Aftandilian
c610a4c66b
Bug 1376163 - [10.13] No audio playback on YouTube, no audio/video on Netflix (macOS High Sierra 10.13 Beta). r=Alex_Gaynor
...
Allow access to the "com.apple.audio.AudioComponentRegistrar" API on 10.13+ systems.
MozReview-Commit-ID: 8gWXvuXTNKi
--HG--
extra : rebase_source : 8abf9a2548d915a89adfa82580d46c1bc00726d8
2017-07-06 14:09:11 -07:00
Sylvestre Ledru
4e9cf83ee8
Bug 1378712 - Remove all trailing whitespaces r=Ehsan
...
MozReview-Commit-ID: Kdz2xtTF9EG
--HG--
extra : rebase_source : 7235b3802f25bab29a8c6ba40a181a722f3df0ce
2017-07-06 14:00:35 +02:00
Jed Davis
1a4ac1cd36
Bug 1372428 - Extend file pre-opening for sandboxed media plugins. r=gcp
...
MozReview-Commit-ID: JoyYocxnk94
2017-07-07 08:58:50 -06:00
Jed Davis
1bc1050e9e
Bug 1372428 - Deal with fcntl() in media plugins. r=gcp
...
MozReview-Commit-ID: 9kBowGtSPYO
2017-07-07 08:58:45 -06:00
Jed Davis
b2df5f5afd
Bug 1372428 - Deal with uname() in media plugins. r=gcp
...
MozReview-Commit-ID: JVzjs80Yuex
2017-07-07 08:58:33 -06:00
Carsten "Tomcat" Book
7857fa0a5e
merge mozilla-inbound to mozilla-central a=merge
2017-07-06 11:18:05 +02:00
Gian-Carlo Pascutto
84f7ba492b
Bug 1377614 - Part 1 - Move IsDevelopmentBuild() to common code. r=Alex_Gaynor
...
MozReview-Commit-ID: AcO0XaMS4Gp
--HG--
extra : rebase_source : ec40a94545fa78ce0210a0614db82b7bcb7e8a97
2017-07-03 11:17:04 -07:00
Sebastian Hengst
8b1992d948
Backed out changeset 9137ed21a66f (bug 1377614) for bustage: not finding mozilla/SandboxSettings.h at netwerk/protocol/res/ExtensionProtocolHandler.cpp:46. r=backout
2017-07-05 22:51:58 +02:00
Gian-Carlo Pascutto
2032eb5262
Bug 1377614 - Part 1 - Move IsDevelopmentBuild() to common code. r=Alex_Gaynor
...
MozReview-Commit-ID: AcO0XaMS4Gp
--HG--
extra : rebase_source : 2fa012f693ad7855c2c6e7b8399edf3c0e734299
2017-07-03 11:17:04 -07:00
Alex Gaynor
53f0246cfd
Bug 1377164 - Improve the readability of the macOS plugin sandbox policy; r=haik
...
MozReview-Commit-ID: 9R8qT98ESQJ
--HG--
extra : rebase_source : 537f0dc3c46bee9b8e295689fbcbc8c63415c5d1
2017-06-29 10:53:04 -07:00
Phil Ringnalda
22cb9f77bb
Merge m-c to m-i
...
MozReview-Commit-ID: H6zGgEm7oOM
2017-07-04 20:32:07 -07:00
Jan Keromnes
09971ac7d3
Bug 1376643 - Use 'override' and '= default' on applicable methods in security/sandbox/. r=gcp
2017-06-27 17:57:00 +02:00
Jan Keromnes
df076300b1
Bug 1376643 - Use 'nullptr' where applicable in security/sandbox/. r=gcp
2017-06-27 17:56:00 +02:00
Bob Owen
25e5ff4cde
Bug 1366694 Part 2: Don't run sandbox file system test in DEBUG on Windows. r=jimm
...
This is because in DEBUG mode we currently give full access to TEMP dir
for logging purposes and the temporary profile is created in the TEMP dir.
2017-07-11 09:44:20 +01:00
Bob Owen
ecbd6ca808
Bug 1366694 Part 1: Allow user handles in the content process job in DEBUG builds. r=jimm
2017-07-07 15:51:17 +01:00
Alex Gaynor
b636380391
Bug 1374557
- Part 1 - Add the ability to specify a list of paths to whitelist read access to in the macOS content sandbox; r=haik
...
MozReview-Commit-ID: HXBkyR7Tts2
--HG--
extra : rebase_source : 6daf50a4d7a4ff2ff85dfac43891149353e813aa
2017-06-21 10:19:28 -04:00
Alex Gaynor
bb1ea70f5f
Bug 1357758 - Replace the file-read blacklist in the macOS sandbox policy with a whitelist of the allowed paths; r=haik
...
This makes the policy easier to audit, harder to regress, and easier to further prune the content processes's permissions.
MozReview-Commit-ID: 6VqEoGsWSGH
--HG--
extra : rebase_source : 58a9d35dd6e58624779294b49df5cc7e34cb4320
2017-04-18 15:57:54 -04:00
Wes Kocher
bfc45b98b9
Merge m-c to inbound, a=merge
...
MozReview-Commit-ID: 9XdoB5MuVz6
2017-07-05 17:17:41 -07:00
Bob Owen
1eb1c9091d
Bug 1378061: Only set user's SID in USER_LIMITED as deny only when not using restricting SIDs. r=jimm
2017-07-05 21:00:55 +01:00
Carsten "Tomcat" Book
7918eeee02
merge mozilla-inbound to mozilla-central a=merge
2017-06-28 13:23:29 +02:00
Jed Davis
8e5d5bda0f
Bug 1362537 - Re-disallow accept4 in Linux content processes. r=gcp
...
MozReview-Commit-ID: Gml8lR1Heu1
--HG--
extra : rebase_source : 6b466f887bd1802277a506295a9c6cc575196385
2017-06-27 14:52:25 -07:00