Граф коммитов

762 Коммитов

Автор SHA1 Сообщение Дата
Sebastian Hengst ecf716b8bb merge mozilla-inbound to mozilla-central. r=merge a=merge
MozReview-Commit-ID: CmMBcpJapLy
2017-09-12 11:35:15 +02:00
Bob Owen 6b4635da55 Bug 1395952: Enhance telemetry for failed launch of Windows sandboxed process by process type/error code key. r=jimm, data-r=rweiss
Only one telemetry accumlation will occur for each key per session.
2017-09-12 07:53:52 +01:00
Chris Manchester c0a229d4c3 Bug 1386876 - Replace all uses of DISABLE_STL_WRAPPING with a template, remove DISABLE_STL_WRAPPING. r=glandium
MozReview-Commit-ID: FMEtb5PY7iP

--HG--
extra : rebase_source : 3cdee7528846462c758e623d6bcd2e6e17dbabff
2017-09-11 11:33:26 -07:00
Eric Rahm 0617c21c24 Bug 1393230 - Part 2: Fix more improper string usages. r=njn
This fixes improper usages of Find where an offset was actually being use for
the boolean ignore case flag. It also fixes a few instances of passing in a
literal wchar_t to our functions where a NS_LITERAL_STRING or char16_t should
be used instead.

--HG--
extra : rebase_source : 5de1e9335895d65e6db06c510e8887d27be3390f
extra : source : f762f605dd83fc6331161a33e1ef5d54cafbd08d
2017-08-31 15:52:30 -07:00
Alex Gaynor f7ab109d5e Bug 1229829 - Part 2 - Use an alternate desktop on the local winstation for content processes; r=bobowen
MozReview-Commit-ID: ES52FwM5oFZ

--HG--
extra : rebase_source : 3893d3022f203eb0962f3bcc3490b35514285781
2017-08-16 09:55:19 -04:00
Alex Gaynor dc31e19e84 Bug 1229829 - Part 1 - Apply chromium sandbox patches from upstream which improves alternate desktop support; r=bobowen
This is 0cb5dadc2b1f84fbbd9c6f75056e38d05a5b07d3 and
db4c64b63d6098294ed255e962700fd2d465575e in the chromium repository.

This allows a single process to create sandboxed children with alternate
desktops on both an alternate winstation and the local winstation.

MozReview-Commit-ID: 8sS7LjoveOk

--HG--
extra : rebase_source : 6915af73743f87ed74ddefe04210dbdd95bb56ed
2017-08-16 09:54:31 -04:00
Jed Davis d7992cb0de Bug 1383888 - Restrict sandboxed readlinkat() the same as readlink(). r=gcp
MozReview-Commit-ID: 3VLXp7AJePQ

--HG--
extra : rebase_source : f0116599e133d3f7cc079ecdbf0dfaee7168be2d
2017-07-27 17:22:23 -06:00
Bob Owen 60cdfbd0a2 Bug 1392570: On Windows 7 don't attempt to use a job object for the sandbox when it will fail. r=jimm, data-r=rweiss
This patch also adds telemetry for when this occurs, breaking it down for local and remote sessions.
2017-09-01 14:05:49 +01:00
Gian-Carlo Pascutto 180dfb1325 Bug 1391494 - Enforce use of our own copy of strlcpy. r=jld
MozReview-Commit-ID: GQgGJBj1Hjc

--HG--
extra : rebase_source : ac110f76f199e8739b6eebaf123c7e6b58f77135
2017-08-24 19:12:14 +02:00
Haik Aftandilian 2cce1be1b0 Bug 1392988 - Firefox 55.02 on macOS High Sierra cannot play AES encrypted video. r=Alex_Gaynor
Adds access to video encoding/decoding services when running on macOS 10.13 High Sierra.

MozReview-Commit-ID: 6h4dZ6gkFtp

--HG--
extra : rebase_source : 8c5078b336631e3254fcaaf6727dff281c840159
2017-08-28 19:06:07 -07:00
James Forshaw 0b3b189961 Bug 1385928: Take new implementation of GetProcessBaseAddress from chromium commit f398005bc4ca0cc2dab2198faa99d4ee8f4da60d. r=jimm
This should fix issues we have seen with running Firefox from short name paths or moved binaries.
2017-08-15 09:29:46 +00:00
Jed Davis 11d8d1c88e Backed out 3 changesets (bug 1380701, bug 1384804)
Backed out changeset afdd35ed8902 (bug 1384804)
Backed out changeset 9fb892c41a9e (bug 1380701)
Backed out changeset 0d56979a6efa (bug 1380701)
2017-08-24 15:02:48 -06:00
Haik Aftandilian 3fbdb1b349 Bug 1382260 - Patch 2 - [Mac] Allow reading of font files from the content sandbox. r=Alex_Gaynor
MozReview-Commit-ID: 9W5aqQweFmd

--HG--
extra : rebase_source : 9aa778bc08bee206e7f3340eac32ca2f46a4f81b
2017-08-18 16:12:07 -07:00
Haik Aftandilian c90d8c6594 Bug 1382260 - Patch 1 - Fix file access test bug. r=Alex_Gaynor
Fix the file access check by adding missing parentheses to isDirectory method call.

Don't run the cookies file check on Linux because the test profile is read accessible due to being in /tmp.

MozReview-Commit-ID: lps2hk8f5U

--HG--
extra : rebase_source : 5fba75d65081e56df5a0d171c41689c489a3aace
2017-08-22 10:11:01 -07:00
Jed Davis a2bdc51dd8 Bug 1384986 - Adjust sandbox policy for dconf's `mkdir -p` behavior. r=gcp
MozReview-Commit-ID: HNvOXNJTc1W

--HG--
extra : rebase_source : 76edd1008731838fc89a5581fee818328d5847e1
2017-08-10 19:02:22 -06:00
Jed Davis 3460ce99ac Bug 1384986 - Prevent sandbox file broker rules from removing rights granted by more general rules. r=gcp
Generally, the intent for the Add* methods is that they always grant
rights in addition to what's already in the policy, not remove them;
this makes subtree rules that overlap single-file rules follow that
principle.

This requires a global analysis because the conflicting rules can be
added in any order.  It does not currently attempt to handle prefix
rules that aren't at a path component boundary, because that's not a
problem we currently have.

MozReview-Commit-ID: 4kv6QoGCBTV

--HG--
extra : rebase_source : 9e41263bbb1c07b8cde40ec2e72d746f17278fcb
2017-08-10 21:38:25 -06:00
Phil Ringnalda 366675feaa Merge m-c to autoland
MozReview-Commit-ID: GCxEZcmHL2w
2017-08-19 15:34:44 -07:00
Phil Ringnalda 9359f5bf39 Merge inbound to m-c, a=merge
MozReview-Commit-ID: LCCoXUsCtmv
2017-08-19 15:29:10 -07:00
Sebastian Hengst 4a4349b10c Backed out changeset 10660affe7a3 (bug 1387569) 2017-08-19 20:21:55 +02:00
Chris Peterson 9ce1ea9579 Bug 1389851 - sandbox: Suppress -Wunreachable-code-return warning in third-party Chromium sandbox code. r=jld
security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc:277:12: warning: 'return' will never be executed [-Wunreachable-code-return]

This return statement is unreachable because SANDBOX_DIE() is a noreturn function:

https://searchfox.org/mozilla-central/rev/a887f0edbd9f6b176b64111455ba62bb0cf356a6/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc#270-274

MozReview-Commit-ID: HDxBJe2ZtPN

--HG--
extra : rebase_source : 07f6cbcf901a54901cc5ea85b84030ea27a668ba
extra : source : f39f78b1a9851d97c6fd7dcbbd1d7ba93e933e08
2017-08-09 18:45:16 -07:00
Sylvestre Ledru 7b612087c3 Bug 1387569 - Also enable -Wno-implicit-fallthrough for gcc for a chromium file (exists from gcc 7) r=gcp
MozReview-Commit-ID: cuQuFcAnWL

--HG--
extra : rebase_source : d67074f94feabc1b32f64e6e988fa2222db626d7
2017-08-06 19:06:36 +02:00
Sylvestre Ledru e15bcf0f43 Bug 1387569 - Also enable -Wno-implicit-fallthrough for gcc for a chromium file (exists from gcc 7) r=gcp
MozReview-Commit-ID: cuQuFcAnWL

--HG--
extra : rebase_source : 37dec684e14b1d02dab04729c718b5da1fcb25a4
2017-08-06 19:06:36 +02:00
Phil Ringnalda 1ca83fd296 Backed out 5 changesets (bug 1387569) for Windows static build bustage
Backed out changeset eeda521ba0ad (bug 1387569)
Backed out changeset 8d23caf2ccc7 (bug 1387569)
Backed out changeset b5f969313f81 (bug 1387569)
Backed out changeset f642bc883aa5 (bug 1387569)
Backed out changeset 20151eabffea (bug 1387569)

MozReview-Commit-ID: IH0XXePvhiL
2017-08-19 12:20:26 -07:00
Sylvestre Ledru deeb6caa20 Bug 1387569 - Also enable -Wno-implicit-fallthrough for gcc for a chromium file (exists from gcc 7) r=gcp
MozReview-Commit-ID: cuQuFcAnWL

--HG--
extra : rebase_source : 28b30810aa4cf45d1d393bd94815b39ca81f43da
2017-08-06 19:06:36 +02:00
Haik Aftandilian 74e07cd141 Bug 1388580 - [Mac] Remove miscellaneous iokit open permissions r=Alex_Gaynor
MozReview-Commit-ID: 3StDmeSwZUG

--HG--
extra : rebase_source : 66d73d82f54a9bdd0ebbc35abf0badc2657e5750
2017-08-08 15:57:21 -07:00
Gian-Carlo Pascutto 2254f82025 Bug 1387742 - Whitelist default dynamic linker paths, including /lib64. r=jld
MozReview-Commit-ID: B4HpKZQL8Y0

--HG--
extra : rebase_source : 8303bcc547d5802280c1a1b18fd98c632cc4d387
2017-08-17 17:53:11 +02:00
Gian-Carlo Pascutto 137d2bb87a Bug 1384804 - Allow libnuma to read /proc/self/status, block get_mempolicy. r=jld
MozReview-Commit-ID: EHPVoFQ6jVZ

--HG--
extra : rebase_source : 7945f44a8b95a9e0d9d4dfaabc934aab6e6fd5be
extra : source : 76935696a618b2b6243988595bdd913b5209c200
2017-08-17 16:59:41 +02:00
Jed Davis 898bd21752 Bug 1380701 - Remove the file broker protocol support for two-path operations. r=gcp
Now that all of the operations that took two paths are removed, we can
have less string manipulation running on untrusted inputs in a trusted
context.

Note that the path isn't null-terminated in transit, because we know
the message length and there's no longer any need to delimit anything.
(This is how the protocol worked before the two-path operations were
added.)

MozReview-Commit-ID: 5VHkMoPlWmU

--HG--
extra : rebase_source : 2108a4f7c7bf5098f2ef63786c3675367bd56e19
2017-08-16 15:09:56 -06:00
Jed Davis a7d1fe2b5f Bug 1380701 - Remove brokering for link, unlink, and rename. r=gcp
In testing (local and CI) these seem to no longer be used.

MozReview-Commit-ID: 2D3C8eWoIsB

--HG--
extra : rebase_source : dde2015af1d036c32631d185703f1149285b253e
2017-07-20 13:43:59 -06:00
Wes Kocher 9a955fd0b3 Backed out 2 changesets (bug 1380701) for bustage in SandboxBroker a=backout
Backed out changeset 6cef83dd4d11 (bug 1380701)
Backed out changeset 4456ebfe5657 (bug 1380701)

MozReview-Commit-ID: Cnfj7TZvCbv
2017-08-16 09:46:48 -07:00
Jed Davis bcab11446f Bug 1380701 - Remove the file broker protocol support for two-path operations. r=gcp
Now that all of the operations that took two paths are removed, we can
have less string manipulation running on untrusted inputs in a trusted
context.

Note that the path isn't null-terminated in transit, because we know
the message length and there's no longer any need to delimit anything.
(This is how the protocol worked before the two-path operations were
added.)

MozReview-Commit-ID: 5VHkMoPlWmU

--HG--
extra : rebase_source : 74fd595c4aea6c9e073ae704b8e59599770300b4
2017-08-11 20:58:35 -06:00
Jed Davis 0bd7dbd987 Bug 1380701 - Remove brokering for link, unlink, and rename. r=gcp
In testing (local and CI) these seem to no longer be used.

MozReview-Commit-ID: 2D3C8eWoIsB

--HG--
extra : rebase_source : 20d986e1430a70ddb534fdd73d1d06e12510292f
2017-07-20 13:43:59 -06:00
Alex Gaynor c6b10e5ba8 Bug 1389535 - remove access to com.apple.coreservices.launchservicesd from content processes; r=haik
MozReview-Commit-ID: 8uOZmYGxJDK

--HG--
extra : rebase_source : c51b8d314de39d3262706c2cf3c383e234a1342f
2017-08-09 11:29:53 -04:00
Gian-Carlo Pascutto 5577125b26 Bug 1389078 - Remove (unneeded) usage of internal libc header. r=jld
MozReview-Commit-ID: E7oppAtGRfD

--HG--
extra : rebase_source : 8c31af5b1275a6036ff09f062f2b87f3c1e2b300
2017-08-10 16:55:01 +02:00
Alex Gaynor 2cc89c3380 Bug 1388454 - remove access to the com.apple.pasteboard.1 mach service from content processes; r=haik
MozReview-Commit-ID: EXb6UDYohZT

--HG--
extra : rebase_source : 321ebf0ce810b4fde9ce99acb56b15ca7acfbd8e
2017-08-08 13:51:48 -04:00
Alex Gaynor b4ba668be6 Bug 1388360 - remove access to the com.apple.iconservices mach service from content processes; r=haik
MozReview-Commit-ID: D20alO2PKR0

--HG--
extra : rebase_source : 2bc809d161eb373220f1de174abc8032207b5dac
2017-08-08 10:15:16 -04:00
Haik Aftandilian f73b286d2a Bug 1386832 - Part 1 - Move non-sandbox-specific routines out of SandboxSettings. r=jimm
Moves IsDevelopmentBuild(), GetRepoDir(), and GetObjectDir() out of
SandboxSettings because they also need to be used by ExtensionProtocolHandler
to do security checks on developer builds as a result of how developer builds
rely on symlinks to the repo dir from system extension directories.

Remove the Linux-implementation of GetRepoDir() and GetObjectDir()
because the Linux content sandbox implementation and the
ExtensionProtocolHandler checks don't need them.

MozReview-Commit-ID: KwBFUnh6Cml

--HG--
extra : rebase_source : 3529a18ea802699ff968b798a7c560613469809b
2017-08-09 16:09:55 -07:00
Jed Davis 677499eb59 Bug 1386279 - Renovate Linux sandbox file broker handling of access(). r=gcp
1. X_OK is now allowed, and is limited only by the MAY_ACCESS permission.

2. The actual access() syscall is now used, if access is granted by the
broker policy.  This fixed bug 1382246, which explains the background.

MozReview-Commit-ID: 926429PlBnL

--HG--
extra : rebase_source : 6ae54c4c25e1389fa3af75b0bdf727323448294a
2017-08-08 18:02:31 -06:00
Alex Gaynor 0132ad567f Bug 1386363 - remove access to the com.apple.SystemConfiguration.configd mach service from content processes; r=haik
MozReview-Commit-ID: 3hFEx67JkdO

--HG--
extra : rebase_source : f3671c7d7682aeb5ff4b89d2409670fcadc2341a
2017-08-07 10:09:32 -04:00
Carsten "Tomcat" Book c329d562fb merge mozilla-inbound to mozilla-central a=merge 2017-08-09 11:37:08 +02:00
Jed Davis 2a133d756a Bug 1388545 - Fix PulseAudio breakage caused by read restrictions. r=gcp
MozReview-Commit-ID: 518mslh9xy
2017-08-08 16:17:52 -06:00
Haik Aftandilian ef291aef27 Bug 1388172 - [Mac] Remove access to "com.apple.window_proxies" from the content sandbox. r=Alex_Gaynor
MozReview-Commit-ID: 2EtLWOvPtyK

--HG--
extra : rebase_source : 3be19fbee8c0989cdfd82283ec2fb8acc5795989
2017-08-07 14:44:33 -07:00
Alex Gaynor d407d2ad13 Bug 1387570 - remove access to the com.apple.cache_delete mach service from content processes; r=haik
MozReview-Commit-ID: LoB1rx5DoV5

--HG--
extra : rebase_source : 7721399376e8ae7e6f41581681b61e92e20f2b21
2017-08-07 10:11:37 -04:00
Haik Aftandilian 9d03f37706 Bug 1322024 - [Mac] Remove com.apple.windowserver.active access from the content sandbox. r=Alex_Gaynor
MozReview-Commit-ID: CY99fseWrQX

--HG--
extra : rebase_source : a7219e91ca415c6f058337251ebecc8e9e5006be
2017-07-24 15:22:58 -07:00
Alex Gaynor 90d2a77496 Bug 1387233 - restrict access to ipc-posix-shm APIs in the content process; r=haik
This removes /tmp/com.apple.csseed access entirely, ipc-posix-shm-read-metadata
from CFPBS:, and ipc-posix-shm-write-{create,unlink} from AudioIO and CFPBS:.

MozReview-Commit-ID: Eahx6guqGos

--HG--
extra : rebase_source : 621e81eb00411ae39882504db7d10a50eef30b27
2017-08-03 17:03:47 -04:00
Alex Gaynor d1db7f92fc Bug 1385332 - remove access to the com.apple.pluginkit.pkd mach service from the content process; r=haik
MozReview-Commit-ID: 2KYaScrgnll

--HG--
extra : rebase_source : 4c39abdba18490f2fb12f1691f6fd5a4722cd542
2017-08-03 10:20:07 -04:00
Gian-Carlo Pascutto 60d25346d1 Bug 1386558 - Check sandboxing level 2 after permissions are available. r=jld
MozReview-Commit-ID: 9Pqwk45pJbe

--HG--
extra : rebase_source : 1c21f21d04cddd6c00e5f495c6686c671aa9cac1
2017-08-03 12:31:37 +02:00
Gian-Carlo Pascutto 36784f22aa Bug 1385891 - Whitelist things in the extension dir, not just the dir itself. r=jld
MozReview-Commit-ID: 3DryT8mm1F3

--HG--
extra : rebase_source : 23a8bda22307687884aa73d454221a78a4922791
2017-08-04 09:48:32 +02:00
Masatoshi Kimura 8b713b2b0f Bug 1375125 - Stop using nsILocalFile in the tree. r=froydnj
This mechanically replaces nsILocalFile with nsIFile in
*.js, *.jsm, *.sjs, *.html, *.xul, *.xml, and *.py.

MozReview-Commit-ID: 4ecl3RZhOwC

--HG--
extra : rebase_source : 412880ea27766118c38498d021331a3df6bccc70
2017-08-04 17:49:22 +09:00
Haik Aftandilian d3e4a052d9 Bug 1386075 - [Mac] Remove (iokit-user-client-class "RootDomainUserClient"). r=Alex_Gaynor
MozReview-Commit-ID: 2bM5KVIbdru

--HG--
extra : rebase_source : f406551fb0986aaa77dd814cba17d399602093fb
2017-08-03 13:29:55 -07:00