Граф коммитов

15391 Коммитов

Автор SHA1 Сообщение Дата
Toshihito Kikuchi 2810e91249 Bug 1639030 - Part 3: Roll-up patch to apply remaining mozilla changes to chromium sandbox. r=bobowen
This commit applies patches under security/sandbox/chromium-shim/patches/after_update/.

Differential Revision: https://phabricator.services.mozilla.com/D79561
2020-07-08 12:54:35 +00:00
Toshihito Kikuchi 0e041b91bd Bug 1639030 - Part 2: Roll-up of chromium sandbox update and patches to get a running browser. r=bobowen
This commit does:
- Sync files under security/sandbox/chromium/ with Chromium 81.0.4044.138
- Update files under security/sandbox/chromium-shim/
- Apply patches under security/sandbox/chromium-shim/patches/with_update/
- Add mozilla::AddWin32kLockdownPolicy to apply MITIGATION_WIN32K_DISABLE before SUBSYS_WIN32K_LOCKDOWN

Differential Revision: https://phabricator.services.mozilla.com/D79560
2020-07-08 12:54:33 +00:00
Toshihito Kikuchi b7f3f014fe Bug 1639030 - Part 1: Update with_update and after_update patches. r=bobowen
This commit updates files under security/sandbox/chromium-shim/patches/
to prepare our codebase for Chromium sandbox update.  See patch files for
the details of each patch.

This also removes the following patches from with_update no longer needed.

1) update_chromium_linux_x86_syscalls.patch is included in
   b4f3df4e77
2) ifdef_out_ApplyMitigationsToCurrentThread.patch cannot be used because
   we use ApplyMitigationsToCurrentThread since the following commit.
   4bed2eb502
3) mingw_base_win_get_caller.patch is included in
   d8b73eb8f0
4) fix_incorrect_int_use_in_Kernel32BaseVersion.patch is fixed by
   https://hg.mozilla.org/mozilla-central/rev/dc9d71fb3bac807a37dbfba35d609ac4ffff1980
5) revert_removal_of_AlterEnvironment_on_Windows.patch is altered by adding
   environment_internal.h/cc as a different commit.
6) mingw_undefine_MemoryBarrier.patch is no longer needed as
   base::subtle::MemoryBarrier was removed by
   bdbaaf4e7e
7) public_siginfo_fields.patch is included in
   6bd491daaf

Differential Revision: https://phabricator.services.mozilla.com/D79558
2020-07-08 12:54:18 +00:00
Manish Giri 6e3170ab3d Bug 1650306 - Address the defects found by the pylint/no-else-return rule. r=sylvestre
Differential Revision: https://phabricator.services.mozilla.com/D82508
2020-07-08 09:24:49 +00:00
Narcis Beleuzu 8359f16846 Backed out 7 changesets (bug 1650163, bug 1649477) for bustages on JSActor.cpp . CLOSED TREE
Backed out changeset 4a21afb65254 (bug 1650163)
Backed out changeset c41753a56f5a (bug 1650163)
Backed out changeset 5fb444c35764 (bug 1650163)
Backed out changeset 830aa93d2b0c (bug 1649477)
Backed out changeset eca6e9dce450 (bug 1649477)
Backed out changeset 5b217aa88289 (bug 1649477)
Backed out changeset 8959d02b840f (bug 1649477)
2020-07-08 04:09:27 +03:00
Nika Layzell df351180c3 Bug 1650163 - Part 1: Switch native remoteType values to nsCString, r=farre
Differential Revision: https://phabricator.services.mozilla.com/D82104
2020-07-06 20:30:58 +00:00
R. Martinho Fernandes 821813e242 Bug 1574259 - Improve resource management in ReauthenticateUserWindows r=dmajor,mhowell
Differential Revision: https://phabricator.services.mozilla.com/D82393
2020-07-07 14:46:41 +00:00
Doug Thayer f9aaa02d04 Bug 1623943 - Exit from IdleSaveIntermediateCerts if shutting down r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D81612
2020-07-06 17:57:03 +00:00
Doug Thayer c4aa10a200 Bug 1623943 - Early exit from healer task if app is shutting down r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D81611
2020-07-06 17:56:51 +00:00
Dana Keeler 8b5037b2d1 Bug 1649518 - 3/3: enable osclientcerts by default in nightly r=jcj,johannh
Differential Revision: https://phabricator.services.mozilla.com/D81890
2020-07-06 19:29:17 +00:00
ffxbld b1db909e2e No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D82375
2020-07-06 14:28:26 +00:00
Dorel Luca feebf13084 Backed out 3 changesets (bug 1639030) for MDA failures in dom/media/test/test_eme_autoplay.html. CLOSED TREE
Backed out changeset e614d160ab92 (bug 1639030)
Backed out changeset e93c2e3b1e62 (bug 1639030)
Backed out changeset c40a82e96834 (bug 1639030)
2020-07-06 16:16:42 +03:00
Toshihito Kikuchi 1f41e7ebe4 Bug 1639030 - Part 3: Roll-up patch to apply remaining mozilla changes to chromium sandbox. r=bobowen
This commit applies patches under security/sandbox/chromium-shim/patches/after_update/.

Differential Revision: https://phabricator.services.mozilla.com/D79561
2020-07-06 04:04:19 +00:00
Toshihito Kikuchi 0cbcab5ebb Bug 1639030 - Part 2: Roll-up of chromium sandbox update and patches to get a running browser. r=bobowen
This commit does:
- Sync files under security/sandbox/chromium/ with Chromium 81.0.4044.138
- Update files under security/sandbox/chromium-shim/
- Apply patches under security/sandbox/chromium-shim/patches/with_update/
- Apply a workaround for Clang's bug to compile *_interception.cc
- Add mozilla::AddWin32kLockdownPolicy to apply MITIGATION_WIN32K_DISABLE before SUBSYS_WIN32K_LOCKDOWN

Differential Revision: https://phabricator.services.mozilla.com/D79560
2020-07-06 04:04:12 +00:00
Toshihito Kikuchi 8e7730db34 Bug 1639030 - Part 1: Update with_update and after_update patches. r=bobowen
This commit updates files under security/sandbox/chromium-shim/patches/
to prepare our codebase for Chromium sandbox update.  See patch files for
the details of each patch.

This also removes the following patches from with_update no longer needed.

1) update_chromium_linux_x86_syscalls.patch is included in
   b4f3df4e77
2) ifdef_out_ApplyMitigationsToCurrentThread.patch cannot be used because
   we use ApplyMitigationsToCurrentThread since the following commit.
   4bed2eb502
3) mingw_base_win_get_caller.patch is included in
   d8b73eb8f0
4) fix_incorrect_int_use_in_Kernel32BaseVersion.patch is fixed by
   https://hg.mozilla.org/mozilla-central/rev/dc9d71fb3bac807a37dbfba35d609ac4ffff1980
5) revert_removal_of_AlterEnvironment_on_Windows.patch is altered by adding
   environment_internal.h/cc as a different commit.
6) mingw_undefine_MemoryBarrier.patch is no longer needed as
   base::subtle::MemoryBarrier was removed by
   bdbaaf4e7e
7) public_siginfo_fields.patch is included in
   6bd491daaf

Differential Revision: https://phabricator.services.mozilla.com/D79558
2020-07-06 04:03:59 +00:00
Sylvestre Ledru caf785c695 Bug 1519636 - Reformat recent changes to the Google coding style r=andi
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D82178
2020-07-04 09:38:43 +00:00
Dorel Luca 751ff32a41 Backed out 3 changesets (bug 1639030) for build bustage. CLOSED TREE
Backed out changeset d7bd92ae8de6 (bug 1639030)
Backed out changeset dc961d2004fd (bug 1639030)
Backed out changeset 2c6cfddbc1af (bug 1639030)
2020-07-03 23:26:12 +03:00
Toshihito Kikuchi e77485c628 Bug 1639030 - Part 3: Roll-up patch to apply remaining mozilla changes to chromium sandbox. r=bobowen
This commit applies patches under security/sandbox/chromium-shim/patches/after_update/.

Differential Revision: https://phabricator.services.mozilla.com/D79561
2020-07-03 19:15:53 +00:00
Toshihito Kikuchi 617828f9d5 Bug 1639030 - Part 2: Roll-up of chromium sandbox update and patches to get a running browser. r=bobowen
This commit does:
- Sync files under security/sandbox/chromium/ with Chromium 81.0.4044.138
- Update files under security/sandbox/chromium-shim/
- Apply patches under security/sandbox/chromium-shim/patches/with_update/
- Apply a workaround for Clang's bug to compile *_interception.cc
- Add mozilla::AddWin32kLockdownPolicy to apply MITIGATION_WIN32K_DISABLE before SUBSYS_WIN32K_LOCKDOWN

Differential Revision: https://phabricator.services.mozilla.com/D79560
2020-07-03 19:15:30 +00:00
Toshihito Kikuchi 197278374e Bug 1639030 - Part 1: Update with_update and after_update patches. r=bobowen
This commit updates files under security/sandbox/chromium-shim/patches/
to prepare our codebase for Chromium sandbox update.  See patch files for
the details of each patch.

This also removes the following patches from with_update no longer needed.

1) update_chromium_linux_x86_syscalls.patch is included in
   b4f3df4e77
2) ifdef_out_ApplyMitigationsToCurrentThread.patch cannot be used because
   we use ApplyMitigationsToCurrentThread since the following commit.
   4bed2eb502
3) mingw_base_win_get_caller.patch is included in
   d8b73eb8f0
4) fix_incorrect_int_use_in_Kernel32BaseVersion.patch is fixed by
   https://hg.mozilla.org/mozilla-central/rev/dc9d71fb3bac807a37dbfba35d609ac4ffff1980
5) revert_removal_of_AlterEnvironment_on_Windows.patch is altered by adding
   environment_internal.h/cc as a different commit.
6) mingw_undefine_MemoryBarrier.patch is no longer needed as
   base::subtle::MemoryBarrier was removed by
   bdbaaf4e7e
7) public_siginfo_fields.patch is included in
   6bd491daaf

Differential Revision: https://phabricator.services.mozilla.com/D79558
2020-07-03 19:15:17 +00:00
Kershaw Chang b615d8681a Bug 1640612 - Allow socket process to read /etc, r=gcp
Differential Revision: https://phabricator.services.mozilla.com/D80718
2020-06-26 08:32:46 +00:00
Kershaw Chang af6512b101 Bug 1640612 - Allow FIONREAD ioctl for socket process, r=jld
Differential Revision: https://phabricator.services.mozilla.com/D79071
2020-06-26 08:32:48 +00:00
Kershaw Chang f700a7ee35 Bug 1640612 - Deal with uname() for socket process, r=jld
Differential Revision: https://phabricator.services.mozilla.com/D78148
2020-06-26 08:32:50 +00:00
ffxbld 079e757071 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D82025
2020-07-02 14:34:09 +00:00
Haik Aftandilian 3547934f67 Bug 1648838 - Remove OS-specific sandboxing code for unsupported macOS versions (up to 10.11 inclusive) r=spohl
Remove macOS 10.11 (and earlier) specific rules from the content and Flash sandbox profiles.

Differential Revision: https://phabricator.services.mozilla.com/D81813
2020-07-01 14:27:13 +00:00
Jon Bauman a415128250 Bug 1649312 - No derogatory language: Remove references to grandfather in comments r=njn,zbraniecki,keeler,jgraham
Differential Revision: https://phabricator.services.mozilla.com/D81628
2020-07-01 15:23:26 +00:00
Simon Giesecke 9364b353d4 Bug 1648010 - Remove NS_NAMED_LITERAL_CSTRING and NS_NAMED_LITERAL_STRING macros. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D80631
2020-07-01 08:42:31 +00:00
Simon Giesecke e3c223da3e Bug 1648010 - Fix uses of NS_LITERAL_STRING with C string literals. r=geckoview-reviewers,agi,froydnj
Differential Revision: https://phabricator.services.mozilla.com/D80861
2020-07-01 08:34:12 +00:00
Simon Giesecke cd8b8939b9 Bug 1648010 - Replace uses of NS_LITERAL_STRING/NS_LITERAL_CSTRING macros by _ns literals. r=geckoview-reviewers,jgilbert,agi,hsivonen,froydnj
Differential Revision: https://phabricator.services.mozilla.com/D80860
2020-07-01 08:29:29 +00:00
Jean-Yves Avenard 488ccd8244 Bug 1648326 - Don't dispatch runnable on the running taskqueue. r=bobowen,jld
The current taskqueue is blocked until the current function has finished; Running the event loop would only process events on the running thread.

Additionally, we make mIPCLaunchThread an nsISerialEventTarget to guarantee that at shutdown the tasks are run in order regardless of the IPC Launch Thread type.

Differential Revision: https://phabricator.services.mozilla.com/D81511
2020-07-01 06:46:59 +00:00
Dana Keeler 01d493c65b Bug 1647505 - update the list of Google roots in PreloadedHPKPins.json DONTBUILD NPOTB r=jcj,kjacobs
Differential Revision: https://phabricator.services.mozilla.com/D81626
2020-06-30 16:15:35 +00:00
Noemi Erli 9c9875dead Backed out 4 changesets (bug 1644917, bug 1640345) for causing failures in browser_preferences_usage.js CLOSED TREE
Backed out changeset 0f8b6494d3eb (bug 1640345)
Backed out changeset 4da77f0a0687 (bug 1644917)
Backed out changeset 54904fe41df8 (bug 1644917)
Backed out changeset ef0321787c8f (bug 1644917)
2020-06-30 05:27:44 +03:00
Dana Keeler 5269943007 Bug 1648855 - osclientcerts: re-scan OS storage only when NSS is searching for all certificates/keys r=kjacobs
Differential Revision: https://phabricator.services.mozilla.com/D81411
2020-06-30 00:07:14 +00:00
Jed Davis 0940e5ba82 Bug 1640345 - Add a hidden pref to prevent sandboxed content processes from connecting to the X server. r=gcp
This adds the boolean pref security.sandbox.content.headless (on Linux
only) which does two things:

1. Sets the MOZ_HEADLESS env var for content processes, so that they
don't initialize GTK and don't connect to the X server.

2. Disallows brokered access to parts of the filesystem used only for
graphics -- most critically connecting to the X11 socket itself, but
also opening GPU device nodes and the parts of sysfs used by Mesa, for
example.

This is experimental; use at your own risk.

Setting this pref will break native widgets, so it's also necessary to
set widget.disable-native-theme-for-content

Additionally, it breaks Flash and WebGL; see bug 1638466 for the latter.

Differential Revision: https://phabricator.services.mozilla.com/D81425
2020-06-29 22:32:10 +00:00
Jed Davis 172a1b1ced Bug 1644917 - Part 2: Cache as much of the content sandbox file policy as possible. r=gcp
Now that filesystem broker policy entries that depend on prefs can be
cached in the "common" policy object, let's do this wherever possible.
Should also fix bug 1621231.

Differential Revision: https://phabricator.services.mozilla.com/D81424
2020-06-29 22:32:07 +00:00
Jed Davis 771b8498b1 Bug 1644917 - Part 1: Construct content sandbox "common" policy lazily. r=gcp
When the SandboxBrokerPolicyFactory is constructed, prefs aren't
available, which constrains the cached subset of the content process
policy to entries that don't depend on prefs.  Delaying the computation
until a content process is started removes that restriction.

Differential Revision: https://phabricator.services.mozilla.com/D81423
2020-06-29 22:32:05 +00:00
Jed Davis 0808445a13 Bug 1644917 - Part 0: Make AddDynamicPathList a static non-member function. r=gcp
Not strictly necessary, but I noticed this while I was making changes:
AddDynamicPathList can be a simple static function instead of a private
static method, and doesn't need to be in the header.

Differential Revision: https://phabricator.services.mozilla.com/D81422
2020-06-29 22:32:03 +00:00
Nihanth Subramanya 359cdd5536 Bug 1555557 - Do cert override file writes off the main thread. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D35375
2020-06-29 17:00:58 +00:00
Kershaw Chang 7588e2e7ca Bug 1645083 - Remove probes: SESSION_RESUMPTION_WITH_*, r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D80006
2020-06-29 07:50:29 +00:00
lougeniac64 499048fe86 (Bug 1635487) Wired up sync logging for extension pref storage r=lina,markh
Differential Revision: https://phabricator.services.mozilla.com/D80975
2020-06-27 19:15:17 +00:00
Csoregi Natalia 5bb8a015e6 Backed out changeset 8cd7fabbe270 (bug 1635487) for multiple leaks. CLOSED TREE 2020-06-27 10:43:15 +03:00
lougeniac64 bce2c33963 (Bug 1635487) Wired up sync logging for extension pref storage r=lina,markh
Differential Revision: https://phabricator.services.mozilla.com/D80975
2020-06-27 06:26:22 +00:00
Haik Aftandilian 6a9d502918 Bug 1647816 - Make sandboxing OS version checks aware of major version r=spohl
Fix the content and Flash sandbox policies to use the major and minor number for OS version checks allowing video playback to work properly on macOS 11 Big Sur.

Pass the macOS major and minor version to sandbox policies as a combined string.

Remove unused OSXVersion methods and members and more minor cleanup in Sandbox.mm.

Leave in the checks for unsupported versions (macOS 10.9 - 10.11) for now in case this fix needs to be uplifted.

Differential Revision: https://phabricator.services.mozilla.com/D81385
2020-06-26 19:12:39 +00:00
Kevin Jacobs 5871df542a Bug 1642687 - land NSS NSS_3_54_RTM UPGRADE_NSS_RELEASE, r=jcj
Differential Revision: https://phabricator.services.mozilla.com/D81357
2020-06-26 17:46:43 +00:00
Coroiu Cristina a2dd6e3165 Backed out changeset 7e9307a4a744 (bug 1555557) for talos failures on a CLOSED TREE 2020-06-26 17:32:28 +03:00
Nihanth Subramanya 376f7d3883 Bug 1555557 - Do cert override file writes off the main thread. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D35375
2020-06-26 10:48:42 +00:00
Dorel Luca 03ea5569f1 Backed out 3 changesets (bug 1640612) on dev's request for regressing Bug 1648624
Backed out changeset c2d1a0de6874 (bug 1640612)
Backed out changeset 188dc24e864a (bug 1640612)
Backed out changeset 2fe263339790 (bug 1640612)
2020-06-26 11:28:14 +03:00
R. Martinho Fernandes b4bf6419e0 Bug 1645192 - Enable EV Treatment for "certSIGN Root CA G2" root certificate r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D81052
2020-06-26 07:15:41 +00:00
Butkovits Atila 305a24de4b Backed out changeset 6a93e7a5e237 (bug 1555557) for causing build bustage on nsCertOverrideService.cpp. CLOSED TREE 2020-06-26 02:54:59 +03:00
Nihanth Subramanya 7c0a2f07b9 Bug 1555557 - Do cert override file writes off the main thread. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D35375
2020-06-25 17:15:36 +00:00