Граф коммитов

458 Коммитов

Автор SHA1 Сообщение Дата
Jed Davis e31f20875c Bug 1215734 - Expand GeckoMediaPlugin sandbox policy for Clang 3.7 ASan. r=kang 2015-10-22 11:19:37 -07:00
Bob Owen 2233e7518a Bug 1187031: Move back to using USER_LOCKDOWN for the GMP sandbox policy on Windows. r=aklotz
This also removes turning off optimization for the Load function. That was an
attempt to fix the side-by-side loading. It may also have helped with ensuring
that the memsets were not optimized, but that has been fixed by Bug 1208892.
2015-10-21 08:46:57 +01:00
Jed Davis faf361396a Bug 1201935 - Allow reading from TmpD in OS X content processes. r=smichaud
--HG--
extra : rebase_source : 68565c447e3731e9c562514e8355044cfd8c28b9
2015-10-07 13:41:00 +02:00
Jed Davis 1ae9d0519b Bug 930258 - Part 3: a file broker policy for the B2G emulator. r=kang 2015-10-07 22:13:08 -07:00
Jed Davis 562c4e7b57 Bug 930258 - Part 2: seccomp-bpf integration. r=kang 2015-10-07 22:13:08 -07:00
Jed Davis bd859174ac Bug 930258 - Part 1: The file broker, and unit tests for it. r=kang f=froydnj 2015-10-07 22:13:08 -07:00
Jed Davis 0db519c66f Bug 1207401 - Send B2G sandbox logging to both stderr and logcat. r=kang 2015-10-05 09:21:39 -07:00
Bob Owen 96010550f8 Bug 1207972: Move to using USER_INTERACTIVE and JOB_INTERACTIVE by default for the Windows content sandbox. r=tabraldes 2015-10-05 11:10:46 +01:00
Steven Michaud 218db8d580 Bug 1190032 - Sandbox failure in nsPluginHost::GetPluginTempDir, tighten earlier patch. r=areinald 2015-09-10 15:32:42 -05:00
Bob Owen 4b37ff400c Bug 1200336: Apply fix for Chromium issue 482784 for sandbox bug when built with VS2015. r=tabraldes 2015-09-10 08:25:20 +01:00
Jed Davis 52cee33b7e Bug 1199481 - Complain more when entering sandboxing code as root. r=kang 2015-08-28 13:37:00 +02:00
Jed Davis 7c8e037b3f Bug 1199413 - Fix MOZ_DISABLE_GMP_SANDBOX so it disables all the sandboxing. r=kang
Bonus fix: don't start the chroot helper unless we're going to use
it.  For this to matter, you'd need a system with unprivileged user
namespaces but no seccomp-bpf (or fake it with env vars) *and* to set
media.gmp.insecure.allow, so this is more to set a good example for
future changes to this code than for functional reasons.
2015-08-28 12:18:00 +02:00
Bob Owen 866768c43e Bug 1197943: Turn off MITIGATION_STRICT_HANDLE_CHECKS for NPAPI process sandbox for causing hangs. r=aklotz 2015-09-09 08:45:25 +01:00
Bob Owen cd5643f4d3 Bug 1201438: Add non-sandboxed Windows content processes as target peers for handle duplication. r=bbondy 2015-09-08 11:18:12 +01:00
Steven Michaud 6dbfc47ad8 Bug 1190032 - Sandbox failure in nsPluginHost::GetPluginTempDir. r=areinald 2015-09-03 19:28:30 -05:00
Nicholas Nethercote f44287005f Bug 1198334 (part 1) - Replace the opt-in FAIL_ON_WARNINGS with the opt-out ALLOW_COMPILER_WARNINGS. r=glandium.
The patch removes 455 occurrences of FAIL_ON_WARNINGS from moz.build files, and
adds 78 instances of ALLOW_COMPILER_WARNINGS. About half of those 78 are in
code we control and which should be removable with a little effort.

--HG--
extra : rebase_source : 82e3387abfbd5f1471e953961d301d3d97ed2973
2015-08-27 20:44:53 -07:00
Makoto Kato 7073895edf Bug 1196403 - Apply crbug/522201 to support Windows 10 build 10525. r=bobowen 2015-08-25 19:21:08 +09:00
Jed Davis b7a032eb04 Bug 1004011 - Support SECCOMP_FILTER_FLAG_TSYNC if available. r=kang
--HG--
extra : rebase_source : 32be610d889fedb518e062a4a416331be21378d3
2015-08-11 16:30:00 -04:00
Makoto Kato 50e851b877 Bug 830801 - Part 2. Remove NOMINMAX define from moz.build. r=mshal 2015-08-03 10:07:09 +09:00
Bob Owen 77826e3c4a Bug 1171796: Add sandbox rule for child process NSPR log file on Windows. r=bbondy
This also moves the initialization of the sandbox TargetServices to earlier in
plugin-container.cpp content_process_main, because it needs to happen before
xul.dll loads.
2015-07-30 10:04:42 +01:00
Steven Michaud 265ad075b1 Bug 1175881 - about:sync-log can't read files on OS X with e10s on and content process sandbox enabled. r=areinald 2015-07-28 12:09:34 -05:00
Jed Davis 315c4ad9c2 Bug 1186709 - Remove MOZ_IMPLICIT from security/sandbox/chromium. r=bobowen 2015-07-23 08:28:00 -04:00
Jed Davis 39f6ab2a28 Bug 1157864 - Record chromium patch applied in previous commit. r=me 2015-07-22 15:48:49 -07:00
Felix Janda acfe5cf4cf Bug 1157864 - chromium sandbox: Fix compilation for systems without <sys/cdefs.h>. r=jld 2015-02-05 22:41:38 +01:00
Jed Davis fc9b22c883 Bug 1181704 - Use chromium SafeSPrintf for sandbox logging. r=gdestuynder r=glandium
This gives us a logging macro that's safe to use in async signal context
(cf. bug 1046210, where we needed this and didn't have it).

This patch also changes one of the format strings to work with
SafeSPrintf's format string dialect; upstream would probably take a
patch to handle those letters, but this is easier.
2015-07-09 12:09:00 +02:00
Jed Davis 06bdcaaa33 Bug 1181704 - Import chromium SafeSPrintf. r=bobowen
This also imports the unit tests but doesn't arrange to run them.
Including the tests in our xul-gtest is possible but not trivial: there
are logging dependencies, and they use a different #include path for
gtest.h (which we'd need to patch).

Upstream revision: df7cc6c04725630dd4460f29d858a77507343b24.
2015-07-09 12:04:00 +02:00
Wes Kocher c00da5ced5 Backed out 2 changesets (bug 1181704) for static build bustage CLOSED TREE
Backed out changeset fbf7aca43c3a (bug 1181704)
Backed out changeset 8864c0587ced (bug 1181704)
2015-07-13 16:51:17 -07:00
Jed Davis 60984b0ab1 Bug 1181704 - Use chromium SafeSPrintf for sandbox logging. r=kang r=glandium
This gives us a logging macro that's safe to use in async signal context
(cf. bug 1046210, where we needed this and didn't have it).

This patch also changes one of the format strings to work with
SafeSPrintf's format string dialect; upstream would probably take a
patch to handle those letters, but this is easier.
2015-07-13 16:17:58 -07:00
Jed Davis c5ffe92d42 Bug 1181704 - Import chromium SafeSPrintf. r=bobowen
This does not include the upstream unit tests.  Including the tests
in our xul-gtest is possible but not trivial: there are logging
dependencies, and they use a different #include path for gtest.h (which
we'd need to patch).

Upstream revision: df7cc6c04725630dd4460f29d858a77507343b24.
2015-07-13 16:17:58 -07:00
Juan Gomez 258ad59e3f Bug 1171931 - Refactor duplicated code using XRE_IsParent/ContentProcess. r=froydnj 2015-07-03 18:29:00 -07:00
Bob Owen 2e341f2ff1 Bug 1177594: Use a USER_RESTRICTED token level on GMP process when integrity levels are available. r=cpearce 2015-06-26 14:19:12 +01:00
Ryan VanderMeulen 5f5c327690 Backed out changeset 8b4e4083639e (bug 1171931) for B2G debug emulator bustage. 2015-06-25 19:48:42 -04:00
Juan Gomez 702a59d135 Bug 1171931 - Refactor duplicated code using XRE_IsParent/ContentProcess. r=froydnj
--HG--
extra : rebase_source : 2ecbe6c1dd8a7ad8dc529b53349ad431cf1116c9
2015-06-24 14:11:00 -04:00
Bob Owen cc27f74877 Bug 1172388: Use a USER_RESTRICTED access level token on Windows 10. r=cpearce 2015-06-19 23:35:43 +01:00
Jed Davis 1fb9a20a64 Bug 1176085 - Fix second/nanosecond confusion in Linux sandbox start error case. r=kang
--HG--
extra : amend_source : e546416d9c058305f4cb00d1c015daaec8ab1362
2015-06-19 14:26:44 -07:00
Benoit Girard 8d6a67f6d3 Bug 1172216 - Move nsStackwalk to mozglue. r=glandium
--HG--
rename : xpcom/base/nsStackWalk.cpp => mozglue/misc/StackWalk.cpp
rename : xpcom/base/nsStackWalk.h => mozglue/misc/StackWalk.h
extra : commitid : EMbWGfjKvdq
extra : rebase_source : b7308eb569cc1a019d3b7a92aaff0de7a49b5682
2015-06-10 16:32:45 -04:00
Bob Owen bef4807107 Bug 1165895: Add NPAPI sandbox rule for the crash server pipe and x64 Temp dir write access. r=bbondy 2015-06-18 12:01:38 +01:00
Jed Davis 8ac1db457e Bug 1168555 - Work around Nuwa not always being single-threaded when a normal content process is. r=kang 2015-06-10 13:38:00 -04:00
Jed Davis 9db695d73b Bug 1055310 - Step 3: Move syscall interceptions into SandboxFilter.cpp. r=kang
We can now keep the part of the policy implemented by upcalls to
userspace in the same place as the part of the policy that's handled
entirely in the kernel.  This will become more useful in the future
(e.g., bug 930258).
2015-06-05 15:17:40 -07:00
Jed Davis 5e4e0f9184 Bug 1055310 - Step 2: Move SIGSYS handling to Chromium TrapRegistry. r=kang
This is more complicated than I'd like it to be, because we don't have
a good way to combine a specific trap function's knowledge that we want
to get a crash dump with the SIGSYS handler's copy of the unprocessed
signal info (which breakpad wants).  The bpf_dsl interface requires a
specific trap function type (via the TrapRegistry superclass), so even
if we implement our own registry we can't change what's passed to it.
Normally we could use thread-local storage to get around that, but it's
not async signal safe.

As a result there is an imperfect compromise: the trap function returns
a failure with ENOSYS, Chromium's SIGSYS handler writes it into the
context, our SIGSYS handler reads it back out and uses a copy of
the original signal context for the crash dump.  Other error codes
(and returning ENOSYS via the seccomp-bpf policy itself) are handled
normally.
2015-06-05 15:17:35 -07:00
Jed Davis 3bd337c32c Bug 1055310 - Step 1: Convert seccomp-bpf policies to Chromium PolicyCompiler. r=kang
This completely rewrites SandboxFilter.cpp and removes SandboxAssembler.
System calls are now loosely grouped by what they do, now that order
doesn't matter, and most of the intersection the content and media
plugin whitelists is moved into a common superclass.  Hopefully this
improves the readability and comprehensibility of the syscall policies.

Also, the macros that take the syscall name are gone, because a plain
case label usually suffices now (the CASES_FOR_thing macros are a little
unsightly, but they're relatively simple), and at one point we saw
strange macro expansion issues with system header files that #define'd
some syscall names.

The signal handling is not migrated yet, so Trap() actions can't be used
yet; the next patch will take care of that, and to keep the intermediate
state working there's a minimal shim.

Bonus fix: non-const global variables use the "g" prefix; "s" is for
static class members and static variables in a function (where the
default is to allocate a separate copy per instance/activation).
2015-06-05 15:17:32 -07:00
Bob Owen 07490a1951 Bug 1166669: Enable process-level mitigations for the Windows content process sandbox. r=tabraldes 2015-06-03 09:13:00 +01:00
Bob Owen 51a5fe52f3 Bug 1123759: Set low integrity on NPAPI processes for Windows sandboxing policy level >= 2. r=bbondy, r=bsmedberg 2015-05-22 17:05:45 +01:00
Mike Hommey ea7750bcb1 Bug 991983 - Define SOURCES as SourcePath. r=gps 2015-05-28 07:34:15 +09:00
Jed Davis 06998bb825 Bug 1162965 - Use /dev/shm instead of /tmp for sandbox chroot if possible. r=kang 2015-05-14 16:19:08 -07:00
David Major 8cac570831 Bug 1149718: Fix wow_helper lib path for VS2015. r=glandium
--HG--
extra : rebase_source : 91893548992b2c0929abaa4e81bce60e473247ff
2015-05-12 18:20:28 -04:00
Bob Owen 94925de358 Bug 1146874 Part 1: Check that Windows sandboxed process starts correctly. r=tabraldes 2015-05-11 08:24:39 +01:00
Bob Owen d65b604e3b Bug 1158773: Use the same initial and delayed integrity level for Windows content sandbox level 0. r=tabraldes 2015-05-06 10:11:56 +01:00
Bob Owen 2343aee19b Bug 1150515: Set the subsystem to WINDOWS,5.02 for wow_helper so that it runs on WinXP 64-bit. r=glandium 2015-04-30 09:48:03 +01:00
Jed Davis 89c80effa2 Bug 1154184 - Don't use Linux sandbox gtest dir if not building tests. r=gps 2015-04-24 17:36:08 -07:00
Steven Michaud acb448f5f9 Bug 1153809 - Loosen Mac content process sandbox rules for NVidia and Intel HD 3000 graphics hardware. r=areinald 2015-04-22 14:56:09 -05:00
Ehsan Akhgari 399276d5fc Bug 1153348 - Add an analysis to prohibit operator bools which aren't marked as either explicit or MOZ_IMPLICIT; r=jrmuizel
This is the counterpart to the existing analysis to catch
constructors which aren't marked as either explicit or
MOZ_IMPLICIT.
2015-04-21 21:40:49 -04:00
André Reinald ec1aede15a Bug 1150765 - Add sandbox rules to allow hardware rendering of OpenGL on Mac. r=smichaud
--HG--
extra : rebase_source : 1fa38a01840f24b63f27254d434c9e0bc3382309
2015-04-21 11:17:16 +02:00
Jed Davis ba1cc023b7 Bug 1151607 - Step 2: Apply net/ipc namespace separation and chroot to media plugins. r=kang
This needs more unit tests for the various pieces of what's going on
here (LinuxCapabilities, SandboxChroot, UnshareUserNamespace()) but
that's nontrivial due to needing a single-threaded process -- and
currently they can't be run on Mozilla's CI anyway due to needing user
namespaces, and local testing can just try using GMP and manually
inspecting the child process.  So that will be a followup.
2015-04-10 18:05:19 -07:00
Jed Davis 6bf3d102d8 Bug 1151607 - Step 1.5: Avoid unlikely false positives in Linux SandboxInfo feature detection. r=kang
Using the equivalent of release assertions in the patch after this one
is easier to justify if I can't come up with vaguely legitimate reasons
why they might fail; this detects the ones I thought of.
2015-04-10 18:05:19 -07:00
Jed Davis 32cb9ee32d Bug 1151607 - Step 1: Add Linux sandboxing hook for when child processes are still single-threaded. r=kang r=bent
This means that B2G plugin-container must (dynamically) link against
libmozsandbox in order to call into it before initializing Binder.
(Desktop Linux plugin-container already contains the sandbox code.)
2015-04-10 18:05:19 -07:00
Jed Davis cf24e12150 Bug 1151607 - Step 0: sort includes to make the following patches cleaner. r=kang 2015-04-10 18:05:19 -07:00
Bob Owen 077c2e64f4 Bug 1149483: Change content sandbox level 1 to a working low integrity sandbox. r=tabraldes, r=billm 2015-04-05 14:01:38 +01:00
Steven Michaud 33228918ed Bug 1110911 - Move Mac sandboxing code into plugin-container. r=cpearce,areinald,jld 2015-04-03 11:51:41 -05:00
Bob Owen e4f543bb58 Bug 1119878 Part 2: Change IPC code to hold ProcessID instead of ProcessHandle. r=billm, r=dvander, r=aklotz, r=cpearce 2015-04-01 09:40:35 +01:00
Bob Owen eef3ca5f6e Bug 1119878 Part 1: Change SandboxTarget to hold sandbox target services to provide functions. r=aklotz, r=glandium, r=cpearce 2015-04-01 09:40:35 +01:00
Bob Owen e7768682a2 Bug 1147446: Chromium patch to fix memory leak in Windows sandbox sharedmem_ipc_server.cc. r=aklotz 2015-03-26 08:06:04 +00:00
Wes Kocher 8794504c9f Merge m-c to inbound a=merge CLOSED TREE 2015-03-23 16:51:22 -07:00
Edwin Flores fb38caf19c Bug 1146192 - Whitelist sched_yield syscall in GMP sandbox on Linux DONTBUILD CLOSED TREE - r=jld 2015-03-24 10:56:49 +13:00
Edwin Flores 75fa281404 Bug 1146192 - Backed out changeset d2918bcf0d90 for missing bug number - r=me 2015-03-24 10:53:10 +13:00
Jed Davis 1d7005b2a5 Bug 1144514 - Whitelist pread64 in content seccomp-bpf policy. r=kang
--HG--
extra : histedit_source : b16050ba3308df92df608cc6fc09069d21df6deb
2015-03-19 11:57:00 -04:00
Ehsan Akhgari 883849ee32 Bug 1145631 - Part 1: Replace MOZ_OVERRIDE and MOZ_FINAL with override and final in the tree; r=froydnj
This patch was automatically generated using the following script:

function convert() {
echo "Converting $1 to $2..."
find . \
       ! -wholename "*/.git*" \
       ! -wholename "obj-ff-dbg*" \
         -type f \
      \( -iname "*.cpp" \
         -o -iname "*.h" \
         -o -iname "*.c" \
         -o -iname "*.cc" \
         -o -iname "*.idl" \
         -o -iname "*.ipdl" \
         -o -iname "*.ipdlh" \
         -o -iname "*.mm" \) | \
    xargs -n 1 sed -i -e "s/\b$1\b/$2/g"
}

convert MOZ_OVERRIDE override
convert MOZ_FINAL final
2015-03-21 12:28:04 -04:00
Edwin Flores 3b412c43dd Bug 1XXXXXX - Whitelist sched_yield syscall in GMP sandbox on Linux - r=jld 2015-03-24 09:55:36 +13:00
Bob Owen f2a63bbdff Bug 1145432: Add the policy for the client side of the crash server pipe to the GMP Windows sandbox. r=aklotz 2015-03-20 07:53:37 +00:00
Jed Davis 09d9f7bb4a Bug 1144580 - Whitelist pselect6 in content seccomp-bpf policy. r=kang 2015-03-18 15:30:00 +01:00
Jed Davis f6d18ff6da Bug 1141906 - Adjust some assertions in Linux sandbox feature detection. r=kang
See bug, and comment at top of SandboxInfo.cpp, for rationale.

Bonus fix: reword comment about nested namespace limit; the exact limit
is 33 (not counting the root) but doesn't particularly matter.
2015-03-17 22:50:00 +01:00
Jed Davis d56d610ecf Bug 1141885 - Make readlink() fail instead of allowing it, for B2G content processes. r=kang
--HG--
extra : rebase_source : c9ceababcd741979058361e96161d575a70bd39f
2015-03-13 13:47:56 -07:00
André Reinald 66ca086aa3 Bug 1083344 - Tighten rules for Mac OS content process sandbox on 10.9 and 10.10. r=smichaud
Allow read to whole filesystem until chrome:// and file:// URLs are brokered through another process.
Except $HOME/Library in which we allow only access to profile add-ons subdir.
Add level 2, which allows read only from $HOME and /tmp (while still restricting $HOME/Library.
Change default back to 1.
2015-03-12 17:42:50 +01:00
Jed Davis 99b4a73239 Bug 1142263 - Specify all syscall parameters when doing CLONE_NEWUSER detection; f=bwc r=kang 2015-03-13 13:01:28 +01:00
Jed Davis 2d14f8d244 Bug 906996 - Remove unlink from B2G content process syscall whitelist. r=kang 2015-03-11 12:39:00 +01:00
Bob Owen 4fecdb4ceb Bug 1141169: Add moz.build BUG_COMPONENT metadata for security/sandbox/ r=jld 2015-03-10 08:03:12 +00:00
Bob Owen b08af57c17 Bug 1137166: Change the Content moreStrict sandbox pref to an integer to indicate the level of sandboxing. r=tabraldes 2015-03-10 08:03:12 +00:00
Jed Davis 19355a43d5 Bug 1137007 - Detect namespace and SECCOMP_FILTER_FLAG_TSYNC support in SandboxInfo. r=kang, r=Unfocused
Currently, only user namespace support is detected.  This is targeted at
desktop, where (1) user namespace creation is effectively a prerequisite
for unsharing any other namespace, and (2) any kernel with user
namespace support almost certainly has all the others.

Bonus fix: remove extra copy of sandbox flag key names in about:support;
if JS property iteration order ever ceases to follow creation order, the
table rows could be permuted, but this doesn't really matter.
2015-03-06 13:59:00 -05:00
Jed Davis 01e2b0e158 Bug 1140111 - Whitelist readlinkat along with readlink. r=kang 2015-03-07 10:44:23 -05:00
André Reinald fc8fe2bd7c Bug 1083344 - Add "allow" sandbox rules to fix mochitests on OSX 10.9 and 10.10. r=smichaud 2015-02-27 16:55:35 +01:00
Jed Davis c5b6b444f2 Bug 1134942 - Whitelist fstatat and unlinkat for B2G content processes. r=gdestuynder 2015-02-20 12:16:00 +01:00
André Reinald 256a142a70 Bug 1083344 - Tighten rules for Mac OS content process sandbox - "rules part". r=smichaud
--HG--
extra : histedit_source : f703a6a8abbf500cb882263426776fdb138b73a3
2015-02-21 13:06:34 +01:00
André Reinald 70a296a23b Bug 1083344 - Tighten rules for Mac OS content process sandbox - "core part". r=smichaud
--HG--
extra : histedit_source : 3c904474c57dbf086365cc6b26a55c34b2b449ae
2015-02-18 14:10:27 +01:00
Bob Owen 78f86d5dec Bug 1132021 - Add a new sandbox level for Windows NPAPI to use USER_LIMITED access token level. r=bsmedberg, r=bbondy 2015-02-11 16:25:43 +00:00
Brian Smith 7755422e90 Bug 1102195 Part 4: Re-apply - Change a non-conforming usage of a const value type to a non-const value type, which VS2015 rightly rejects, r=bobowen
Originally landed as changset:
https://hg.mozilla.org/mozilla-central/rev/c827c112df81
2015-01-07 23:28:51 -08:00
Bob Owen 931cf70b78 Bug 1102195 Part 3: Re-apply logging changes to the Chromium interception code. r=tabraldes
Originally landed as changset:
https://hg.mozilla.org/mozilla-central/rev/0f763c186855
2014-11-29 17:12:18 +00:00
Bob Owen 09607f7c35 Bug 1102195 Part 2: Re-apply pre-vista stdout/err process inheritance change to Chromium code after merge. r=tabraldes
Originally landed as changset:
https://hg.mozilla.org/mozilla-central/rev/f94a07671389
2014-11-18 15:11:47 +00:00
Bob Owen a887f0edbd Bug 1102195 Part 1: Update Chromium sandbox code to commit df7cc6c04725630dd4460f29d858a77507343b24. r=aklotz, r=jld 2015-02-11 08:22:02 +00:00
Bob Owen a6f34cc0d5 Bug 1129369 Part 3: Turn on MITIGATION_STRICT_HANDLE_CHECKS process-level mitigation for the GMP sandbox. r=tabraldes 2015-02-10 09:06:59 +00:00
Bob Owen 70afa43d6f Bug 1129369 Part 2: Turn on BOTTOM_UP_ASLR process-level mitigation for the GMP sandbox. r=tabraldes 2015-02-10 09:06:59 +00:00
Bob Owen 1a190016de Bug 1129369 Part 1: Turn on DEP_NO_ATL_THUNK process-level mitigation for the GMP sandbox. r=tabraldes 2015-02-10 09:06:59 +00:00
Bob Owen 1a4af9dc4c Bug 1127230: Change the NPAPI sandbox prefs to integers to indicate the level of sandboxing. r=bsmedberg 2015-01-30 17:48:15 +00:00
Bob Owen 183a6391ad Bug 1126402: Add a pref to enable a more strict version of the Windows NPAPI process sandbox. r=bsmedberg, r=bbondy 2015-01-29 08:13:07 +00:00
Bob Owen f82c430a64 Bug 1125865: Only log Windows sandbox violations to console when nsContentUtils is initialized. r=bbondy 2015-01-28 11:21:24 +00:00
Bob Owen 9bff5f0ad0 Bug 1094370: Use the USER_LOCKDOWN access token for GMP processes. r=aklotz 2015-01-26 10:14:39 +00:00
Bob Owen 2d09aed7ed Bug 1123245 Part 2: Use the USER_NON_ADMIN access token level for Windows NPAPI processes. r=tabraldes 2015-01-23 08:32:21 +00:00
Bob Owen f6a727b6c9 Bug 1123245 Part 1: Enable an open sandbox on Windows NPAPI processes. r=josh, r=tabraldes 2015-01-23 08:32:20 +00:00
Bob Owen f051144a55 Bug 1102213: Move security/sandbox/win/ into security/sandbox/chromium/sandbox/ r=ted
--HG--
rename : security/sandbox/win/src/Wow64.cc => security/sandbox/chromium/sandbox/win/src/Wow64.cc
rename : security/sandbox/win/src/Wow64.h => security/sandbox/chromium/sandbox/win/src/Wow64.h
rename : security/sandbox/win/src/Wow64_64.cc => security/sandbox/chromium/sandbox/win/src/Wow64_64.cc
rename : security/sandbox/win/src/acl.cc => security/sandbox/chromium/sandbox/win/src/acl.cc
rename : security/sandbox/win/src/acl.h => security/sandbox/chromium/sandbox/win/src/acl.h
rename : security/sandbox/win/src/app_container.cc => security/sandbox/chromium/sandbox/win/src/app_container.cc
rename : security/sandbox/win/src/app_container.h => security/sandbox/chromium/sandbox/win/src/app_container.h
rename : security/sandbox/win/src/app_container_test.cc => security/sandbox/chromium/sandbox/win/src/app_container_test.cc
rename : security/sandbox/win/src/app_container_unittest.cc => security/sandbox/chromium/sandbox/win/src/app_container_unittest.cc
rename : security/sandbox/win/src/broker_services.cc => security/sandbox/chromium/sandbox/win/src/broker_services.cc
rename : security/sandbox/win/src/broker_services.h => security/sandbox/chromium/sandbox/win/src/broker_services.h
rename : security/sandbox/win/src/crosscall_client.h => security/sandbox/chromium/sandbox/win/src/crosscall_client.h
rename : security/sandbox/win/src/crosscall_params.h => security/sandbox/chromium/sandbox/win/src/crosscall_params.h
rename : security/sandbox/win/src/crosscall_server.cc => security/sandbox/chromium/sandbox/win/src/crosscall_server.cc
rename : security/sandbox/win/src/crosscall_server.h => security/sandbox/chromium/sandbox/win/src/crosscall_server.h
rename : security/sandbox/win/src/eat_resolver.cc => security/sandbox/chromium/sandbox/win/src/eat_resolver.cc
rename : security/sandbox/win/src/eat_resolver.h => security/sandbox/chromium/sandbox/win/src/eat_resolver.h
rename : security/sandbox/win/src/file_policy_test.cc => security/sandbox/chromium/sandbox/win/src/file_policy_test.cc
rename : security/sandbox/win/src/filesystem_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/filesystem_dispatcher.cc
rename : security/sandbox/win/src/filesystem_dispatcher.h => security/sandbox/chromium/sandbox/win/src/filesystem_dispatcher.h
rename : security/sandbox/win/src/filesystem_interception.cc => security/sandbox/chromium/sandbox/win/src/filesystem_interception.cc
rename : security/sandbox/win/src/filesystem_interception.h => security/sandbox/chromium/sandbox/win/src/filesystem_interception.h
rename : security/sandbox/win/src/filesystem_policy.cc => security/sandbox/chromium/sandbox/win/src/filesystem_policy.cc
rename : security/sandbox/win/src/filesystem_policy.h => security/sandbox/chromium/sandbox/win/src/filesystem_policy.h
rename : security/sandbox/win/src/handle_closer.cc => security/sandbox/chromium/sandbox/win/src/handle_closer.cc
rename : security/sandbox/win/src/handle_closer.h => security/sandbox/chromium/sandbox/win/src/handle_closer.h
rename : security/sandbox/win/src/handle_closer_agent.cc => security/sandbox/chromium/sandbox/win/src/handle_closer_agent.cc
rename : security/sandbox/win/src/handle_closer_agent.h => security/sandbox/chromium/sandbox/win/src/handle_closer_agent.h
rename : security/sandbox/win/src/handle_closer_test.cc => security/sandbox/chromium/sandbox/win/src/handle_closer_test.cc
rename : security/sandbox/win/src/handle_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/handle_dispatcher.cc
rename : security/sandbox/win/src/handle_dispatcher.h => security/sandbox/chromium/sandbox/win/src/handle_dispatcher.h
rename : security/sandbox/win/src/handle_inheritance_test.cc => security/sandbox/chromium/sandbox/win/src/handle_inheritance_test.cc
rename : security/sandbox/win/src/handle_interception.cc => security/sandbox/chromium/sandbox/win/src/handle_interception.cc
rename : security/sandbox/win/src/handle_interception.h => security/sandbox/chromium/sandbox/win/src/handle_interception.h
rename : security/sandbox/win/src/handle_policy.cc => security/sandbox/chromium/sandbox/win/src/handle_policy.cc
rename : security/sandbox/win/src/handle_policy.h => security/sandbox/chromium/sandbox/win/src/handle_policy.h
rename : security/sandbox/win/src/handle_policy_test.cc => security/sandbox/chromium/sandbox/win/src/handle_policy_test.cc
rename : security/sandbox/win/src/handle_table.cc => security/sandbox/chromium/sandbox/win/src/handle_table.cc
rename : security/sandbox/win/src/handle_table.h => security/sandbox/chromium/sandbox/win/src/handle_table.h
rename : security/sandbox/win/src/integrity_level_test.cc => security/sandbox/chromium/sandbox/win/src/integrity_level_test.cc
rename : security/sandbox/win/src/interception.cc => security/sandbox/chromium/sandbox/win/src/interception.cc
rename : security/sandbox/win/src/interception.h => security/sandbox/chromium/sandbox/win/src/interception.h
rename : security/sandbox/win/src/interception_agent.cc => security/sandbox/chromium/sandbox/win/src/interception_agent.cc
rename : security/sandbox/win/src/interception_agent.h => security/sandbox/chromium/sandbox/win/src/interception_agent.h
rename : security/sandbox/win/src/interception_internal.h => security/sandbox/chromium/sandbox/win/src/interception_internal.h
rename : security/sandbox/win/src/interception_unittest.cc => security/sandbox/chromium/sandbox/win/src/interception_unittest.cc
rename : security/sandbox/win/src/interceptors.h => security/sandbox/chromium/sandbox/win/src/interceptors.h
rename : security/sandbox/win/src/interceptors_64.cc => security/sandbox/chromium/sandbox/win/src/interceptors_64.cc
rename : security/sandbox/win/src/interceptors_64.h => security/sandbox/chromium/sandbox/win/src/interceptors_64.h
rename : security/sandbox/win/src/internal_types.h => security/sandbox/chromium/sandbox/win/src/internal_types.h
rename : security/sandbox/win/src/ipc_ping_test.cc => security/sandbox/chromium/sandbox/win/src/ipc_ping_test.cc
rename : security/sandbox/win/src/ipc_tags.h => security/sandbox/chromium/sandbox/win/src/ipc_tags.h
rename : security/sandbox/win/src/ipc_unittest.cc => security/sandbox/chromium/sandbox/win/src/ipc_unittest.cc
rename : security/sandbox/win/src/job.cc => security/sandbox/chromium/sandbox/win/src/job.cc
rename : security/sandbox/win/src/job.h => security/sandbox/chromium/sandbox/win/src/job.h
rename : security/sandbox/win/src/job_unittest.cc => security/sandbox/chromium/sandbox/win/src/job_unittest.cc
rename : security/sandbox/win/src/named_pipe_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/named_pipe_dispatcher.cc
rename : security/sandbox/win/src/named_pipe_dispatcher.h => security/sandbox/chromium/sandbox/win/src/named_pipe_dispatcher.h
rename : security/sandbox/win/src/named_pipe_interception.cc => security/sandbox/chromium/sandbox/win/src/named_pipe_interception.cc
rename : security/sandbox/win/src/named_pipe_interception.h => security/sandbox/chromium/sandbox/win/src/named_pipe_interception.h
rename : security/sandbox/win/src/named_pipe_policy.cc => security/sandbox/chromium/sandbox/win/src/named_pipe_policy.cc
rename : security/sandbox/win/src/named_pipe_policy.h => security/sandbox/chromium/sandbox/win/src/named_pipe_policy.h
rename : security/sandbox/win/src/named_pipe_policy_test.cc => security/sandbox/chromium/sandbox/win/src/named_pipe_policy_test.cc
rename : security/sandbox/win/src/nt_internals.h => security/sandbox/chromium/sandbox/win/src/nt_internals.h
rename : security/sandbox/win/src/policy_broker.cc => security/sandbox/chromium/sandbox/win/src/policy_broker.cc
rename : security/sandbox/win/src/policy_broker.h => security/sandbox/chromium/sandbox/win/src/policy_broker.h
rename : security/sandbox/win/src/policy_engine_opcodes.cc => security/sandbox/chromium/sandbox/win/src/policy_engine_opcodes.cc
rename : security/sandbox/win/src/policy_engine_opcodes.h => security/sandbox/chromium/sandbox/win/src/policy_engine_opcodes.h
rename : security/sandbox/win/src/policy_engine_params.h => security/sandbox/chromium/sandbox/win/src/policy_engine_params.h
rename : security/sandbox/win/src/policy_engine_processor.cc => security/sandbox/chromium/sandbox/win/src/policy_engine_processor.cc
rename : security/sandbox/win/src/policy_engine_processor.h => security/sandbox/chromium/sandbox/win/src/policy_engine_processor.h
rename : security/sandbox/win/src/policy_engine_unittest.cc => security/sandbox/chromium/sandbox/win/src/policy_engine_unittest.cc
rename : security/sandbox/win/src/policy_low_level.cc => security/sandbox/chromium/sandbox/win/src/policy_low_level.cc
rename : security/sandbox/win/src/policy_low_level.h => security/sandbox/chromium/sandbox/win/src/policy_low_level.h
rename : security/sandbox/win/src/policy_low_level_unittest.cc => security/sandbox/chromium/sandbox/win/src/policy_low_level_unittest.cc
rename : security/sandbox/win/src/policy_opcodes_unittest.cc => security/sandbox/chromium/sandbox/win/src/policy_opcodes_unittest.cc
rename : security/sandbox/win/src/policy_params.h => security/sandbox/chromium/sandbox/win/src/policy_params.h
rename : security/sandbox/win/src/policy_target.cc => security/sandbox/chromium/sandbox/win/src/policy_target.cc
rename : security/sandbox/win/src/policy_target.h => security/sandbox/chromium/sandbox/win/src/policy_target.h
rename : security/sandbox/win/src/policy_target_test.cc => security/sandbox/chromium/sandbox/win/src/policy_target_test.cc
rename : security/sandbox/win/src/process_mitigations.cc => security/sandbox/chromium/sandbox/win/src/process_mitigations.cc
rename : security/sandbox/win/src/process_mitigations.h => security/sandbox/chromium/sandbox/win/src/process_mitigations.h
rename : security/sandbox/win/src/process_mitigations_test.cc => security/sandbox/chromium/sandbox/win/src/process_mitigations_test.cc
rename : security/sandbox/win/src/process_mitigations_win32k_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_dispatcher.cc
rename : security/sandbox/win/src/process_mitigations_win32k_dispatcher.h => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_dispatcher.h
rename : security/sandbox/win/src/process_mitigations_win32k_interception.cc => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_interception.cc
rename : security/sandbox/win/src/process_mitigations_win32k_interception.h => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_interception.h
rename : security/sandbox/win/src/process_mitigations_win32k_policy.cc => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_policy.cc
rename : security/sandbox/win/src/process_mitigations_win32k_policy.h => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_policy.h
rename : security/sandbox/win/src/process_policy_test.cc => security/sandbox/chromium/sandbox/win/src/process_policy_test.cc
rename : security/sandbox/win/src/process_thread_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/process_thread_dispatcher.cc
rename : security/sandbox/win/src/process_thread_dispatcher.h => security/sandbox/chromium/sandbox/win/src/process_thread_dispatcher.h
rename : security/sandbox/win/src/process_thread_interception.cc => security/sandbox/chromium/sandbox/win/src/process_thread_interception.cc
rename : security/sandbox/win/src/process_thread_interception.h => security/sandbox/chromium/sandbox/win/src/process_thread_interception.h
rename : security/sandbox/win/src/process_thread_policy.cc => security/sandbox/chromium/sandbox/win/src/process_thread_policy.cc
rename : security/sandbox/win/src/process_thread_policy.h => security/sandbox/chromium/sandbox/win/src/process_thread_policy.h
rename : security/sandbox/win/src/registry_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/registry_dispatcher.cc
rename : security/sandbox/win/src/registry_dispatcher.h => security/sandbox/chromium/sandbox/win/src/registry_dispatcher.h
rename : security/sandbox/win/src/registry_interception.cc => security/sandbox/chromium/sandbox/win/src/registry_interception.cc
rename : security/sandbox/win/src/registry_interception.h => security/sandbox/chromium/sandbox/win/src/registry_interception.h
rename : security/sandbox/win/src/registry_policy.cc => security/sandbox/chromium/sandbox/win/src/registry_policy.cc
rename : security/sandbox/win/src/registry_policy.h => security/sandbox/chromium/sandbox/win/src/registry_policy.h
rename : security/sandbox/win/src/registry_policy_test.cc => security/sandbox/chromium/sandbox/win/src/registry_policy_test.cc
rename : security/sandbox/win/src/resolver.cc => security/sandbox/chromium/sandbox/win/src/resolver.cc
rename : security/sandbox/win/src/resolver.h => security/sandbox/chromium/sandbox/win/src/resolver.h
rename : security/sandbox/win/src/resolver_32.cc => security/sandbox/chromium/sandbox/win/src/resolver_32.cc
rename : security/sandbox/win/src/resolver_64.cc => security/sandbox/chromium/sandbox/win/src/resolver_64.cc
rename : security/sandbox/win/src/restricted_token.cc => security/sandbox/chromium/sandbox/win/src/restricted_token.cc
rename : security/sandbox/win/src/restricted_token.h => security/sandbox/chromium/sandbox/win/src/restricted_token.h
rename : security/sandbox/win/src/restricted_token_unittest.cc => security/sandbox/chromium/sandbox/win/src/restricted_token_unittest.cc
rename : security/sandbox/win/src/restricted_token_utils.cc => security/sandbox/chromium/sandbox/win/src/restricted_token_utils.cc
rename : security/sandbox/win/src/restricted_token_utils.h => security/sandbox/chromium/sandbox/win/src/restricted_token_utils.h
rename : security/sandbox/win/src/sandbox.cc => security/sandbox/chromium/sandbox/win/src/sandbox.cc
rename : security/sandbox/win/src/sandbox.h => security/sandbox/chromium/sandbox/win/src/sandbox.h
rename : security/sandbox/win/src/sandbox.vcproj => security/sandbox/chromium/sandbox/win/src/sandbox.vcproj
rename : security/sandbox/win/src/sandbox_factory.h => security/sandbox/chromium/sandbox/win/src/sandbox_factory.h
rename : security/sandbox/win/src/sandbox_globals.cc => security/sandbox/chromium/sandbox/win/src/sandbox_globals.cc
rename : security/sandbox/win/src/sandbox_nt_types.h => security/sandbox/chromium/sandbox/win/src/sandbox_nt_types.h
rename : security/sandbox/win/src/sandbox_nt_util.cc => security/sandbox/chromium/sandbox/win/src/sandbox_nt_util.cc
rename : security/sandbox/win/src/sandbox_nt_util.h => security/sandbox/chromium/sandbox/win/src/sandbox_nt_util.h
rename : security/sandbox/win/src/sandbox_policy.h => security/sandbox/chromium/sandbox/win/src/sandbox_policy.h
rename : security/sandbox/win/src/sandbox_policy_base.cc => security/sandbox/chromium/sandbox/win/src/sandbox_policy_base.cc
rename : security/sandbox/win/src/sandbox_policy_base.h => security/sandbox/chromium/sandbox/win/src/sandbox_policy_base.h
rename : security/sandbox/win/src/sandbox_types.h => security/sandbox/chromium/sandbox/win/src/sandbox_types.h
rename : security/sandbox/win/src/sandbox_utils.cc => security/sandbox/chromium/sandbox/win/src/sandbox_utils.cc
rename : security/sandbox/win/src/sandbox_utils.h => security/sandbox/chromium/sandbox/win/src/sandbox_utils.h
rename : security/sandbox/win/src/security_level.h => security/sandbox/chromium/sandbox/win/src/security_level.h
rename : security/sandbox/win/src/service_resolver.cc => security/sandbox/chromium/sandbox/win/src/service_resolver.cc
rename : security/sandbox/win/src/service_resolver.h => security/sandbox/chromium/sandbox/win/src/service_resolver.h
rename : security/sandbox/win/src/service_resolver_32.cc => security/sandbox/chromium/sandbox/win/src/service_resolver_32.cc
rename : security/sandbox/win/src/service_resolver_64.cc => security/sandbox/chromium/sandbox/win/src/service_resolver_64.cc
rename : security/sandbox/win/src/service_resolver_unittest.cc => security/sandbox/chromium/sandbox/win/src/service_resolver_unittest.cc
rename : security/sandbox/win/src/shared_handles.cc => security/sandbox/chromium/sandbox/win/src/shared_handles.cc
rename : security/sandbox/win/src/shared_handles.h => security/sandbox/chromium/sandbox/win/src/shared_handles.h
rename : security/sandbox/win/src/sharedmem_ipc_client.cc => security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_client.cc
rename : security/sandbox/win/src/sharedmem_ipc_client.h => security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_client.h
rename : security/sandbox/win/src/sharedmem_ipc_server.cc => security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_server.cc
rename : security/sandbox/win/src/sharedmem_ipc_server.h => security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_server.h
rename : security/sandbox/win/src/sid.cc => security/sandbox/chromium/sandbox/win/src/sid.cc
rename : security/sandbox/win/src/sid.h => security/sandbox/chromium/sandbox/win/src/sid.h
rename : security/sandbox/win/src/sid_unittest.cc => security/sandbox/chromium/sandbox/win/src/sid_unittest.cc
rename : security/sandbox/win/src/sidestep/ia32_modrm_map.cpp => security/sandbox/chromium/sandbox/win/src/sidestep/ia32_modrm_map.cpp
rename : security/sandbox/win/src/sidestep/ia32_opcode_map.cpp => security/sandbox/chromium/sandbox/win/src/sidestep/ia32_opcode_map.cpp
rename : security/sandbox/win/src/sidestep/mini_disassembler.cpp => security/sandbox/chromium/sandbox/win/src/sidestep/mini_disassembler.cpp
rename : security/sandbox/win/src/sidestep/mini_disassembler.h => security/sandbox/chromium/sandbox/win/src/sidestep/mini_disassembler.h
rename : security/sandbox/win/src/sidestep/mini_disassembler_types.h => security/sandbox/chromium/sandbox/win/src/sidestep/mini_disassembler_types.h
rename : security/sandbox/win/src/sidestep/preamble_patcher.h => security/sandbox/chromium/sandbox/win/src/sidestep/preamble_patcher.h
rename : security/sandbox/win/src/sidestep/preamble_patcher_with_stub.cpp => security/sandbox/chromium/sandbox/win/src/sidestep/preamble_patcher_with_stub.cpp
rename : security/sandbox/win/src/sidestep_resolver.cc => security/sandbox/chromium/sandbox/win/src/sidestep_resolver.cc
rename : security/sandbox/win/src/sidestep_resolver.h => security/sandbox/chromium/sandbox/win/src/sidestep_resolver.h
rename : security/sandbox/win/src/sync_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/sync_dispatcher.cc
rename : security/sandbox/win/src/sync_dispatcher.h => security/sandbox/chromium/sandbox/win/src/sync_dispatcher.h
rename : security/sandbox/win/src/sync_interception.cc => security/sandbox/chromium/sandbox/win/src/sync_interception.cc
rename : security/sandbox/win/src/sync_interception.h => security/sandbox/chromium/sandbox/win/src/sync_interception.h
rename : security/sandbox/win/src/sync_policy.cc => security/sandbox/chromium/sandbox/win/src/sync_policy.cc
rename : security/sandbox/win/src/sync_policy.h => security/sandbox/chromium/sandbox/win/src/sync_policy.h
rename : security/sandbox/win/src/sync_policy_test.cc => security/sandbox/chromium/sandbox/win/src/sync_policy_test.cc
rename : security/sandbox/win/src/sync_policy_test.h => security/sandbox/chromium/sandbox/win/src/sync_policy_test.h
rename : security/sandbox/win/src/target_interceptions.cc => security/sandbox/chromium/sandbox/win/src/target_interceptions.cc
rename : security/sandbox/win/src/target_interceptions.h => security/sandbox/chromium/sandbox/win/src/target_interceptions.h
rename : security/sandbox/win/src/target_process.cc => security/sandbox/chromium/sandbox/win/src/target_process.cc
rename : security/sandbox/win/src/target_process.h => security/sandbox/chromium/sandbox/win/src/target_process.h
rename : security/sandbox/win/src/target_services.cc => security/sandbox/chromium/sandbox/win/src/target_services.cc
rename : security/sandbox/win/src/target_services.h => security/sandbox/chromium/sandbox/win/src/target_services.h
rename : security/sandbox/win/src/threadpool_unittest.cc => security/sandbox/chromium/sandbox/win/src/threadpool_unittest.cc
rename : security/sandbox/win/src/unload_dll_test.cc => security/sandbox/chromium/sandbox/win/src/unload_dll_test.cc
rename : security/sandbox/win/src/win2k_threadpool.cc => security/sandbox/chromium/sandbox/win/src/win2k_threadpool.cc
rename : security/sandbox/win/src/win2k_threadpool.h => security/sandbox/chromium/sandbox/win/src/win2k_threadpool.h
rename : security/sandbox/win/src/win_utils.cc => security/sandbox/chromium/sandbox/win/src/win_utils.cc
rename : security/sandbox/win/src/win_utils.h => security/sandbox/chromium/sandbox/win/src/win_utils.h
rename : security/sandbox/win/src/win_utils_unittest.cc => security/sandbox/chromium/sandbox/win/src/win_utils_unittest.cc
rename : security/sandbox/win/src/window.cc => security/sandbox/chromium/sandbox/win/src/window.cc
rename : security/sandbox/win/src/window.h => security/sandbox/chromium/sandbox/win/src/window.h
2015-01-22 08:37:31 +00:00
Bob Owen d1e58e9137 Bug 1102215: Move security/sandbox/chromium/base/shim/ to new directory security/sandbox/chromium-shim/ r=ted
--HG--
rename : security/sandbox/chromium/base/shim/base/gtest_prod_util.h => security/sandbox/chromium-shim/base/gtest_prod_util.h
rename : security/sandbox/chromium/base/shim/base/logging.cpp => security/sandbox/chromium-shim/base/logging.cpp
rename : security/sandbox/chromium/base/shim/base/strings/string_piece.h => security/sandbox/chromium-shim/base/strings/string_piece.h
rename : security/sandbox/chromium/base/shim/base/third_party/nspr/prtime.h => security/sandbox/chromium-shim/base/third_party/nspr/prtime.h
rename : security/sandbox/chromium/base/shim/base/third_party/nspr/prtypes.h => security/sandbox/chromium-shim/base/third_party/nspr/prtypes.h
rename : security/sandbox/chromium/base/shim/base/threading/thread_local_storage.h => security/sandbox/chromium-shim/base/threading/thread_local_storage.h
rename : security/sandbox/chromium/base/shim/base/tracked_objects.h => security/sandbox/chromium-shim/base/tracked_objects.h
rename : security/sandbox/chromium/base/shim/base/win/registry.h => security/sandbox/chromium-shim/base/win/registry.h
rename : security/sandbox/chromium/base/shim/sdkdecls.h => security/sandbox/chromium-shim/base/win/sdkdecls.h
rename : security/sandbox/win/src/logging/loggingCallbacks.h => security/sandbox/chromium-shim/sandbox/win/loggingCallbacks.h
rename : security/sandbox/win/src/logging/loggingTypes.h => security/sandbox/chromium-shim/sandbox/win/loggingTypes.h
rename : security/sandbox/win/src/logging/sandboxLogging.cpp => security/sandbox/chromium-shim/sandbox/win/sandboxLogging.cpp
rename : security/sandbox/win/src/logging/sandboxLogging.h => security/sandbox/chromium-shim/sandbox/win/sandboxLogging.h
2015-01-22 08:37:30 +00:00
Bob Owen a7e3f06626 Bug 1102211: Move security/sandbox/build/ into security/sandbox/chromium/ r=ted
--HG--
rename : security/sandbox/build/build_config.h => security/sandbox/chromium/build/build_config.h
rename : security/sandbox/chromium-commit-status.txt => security/sandbox/moz-chromium-commit-status.txt
2015-01-22 08:37:30 +00:00
Carsten "Tomcat" Book 0db90d7550 Backed out changeset 4ccaf5ae9ced (bug 1102211) for bustage on a CLOSED TREE
--HG--
rename : security/sandbox/chromium/build/build_config.h => security/sandbox/build/build_config.h
rename : security/sandbox/moz-chromium-commit-status.txt => security/sandbox/chromium-commit-status.txt
2015-01-22 10:25:39 +01:00
Carsten "Tomcat" Book 8347439402 Backed out changeset 43f1f9eef449 (bug 1102215)
--HG--
rename : security/sandbox/chromium-shim/base/gtest_prod_util.h => security/sandbox/chromium/base/shim/base/gtest_prod_util.h
rename : security/sandbox/chromium-shim/base/logging.cpp => security/sandbox/chromium/base/shim/base/logging.cpp
rename : security/sandbox/chromium-shim/base/strings/string_piece.h => security/sandbox/chromium/base/shim/base/strings/string_piece.h
rename : security/sandbox/chromium-shim/base/third_party/nspr/prtime.h => security/sandbox/chromium/base/shim/base/third_party/nspr/prtime.h
rename : security/sandbox/chromium-shim/base/third_party/nspr/prtypes.h => security/sandbox/chromium/base/shim/base/third_party/nspr/prtypes.h
rename : security/sandbox/chromium-shim/base/threading/thread_local_storage.h => security/sandbox/chromium/base/shim/base/threading/thread_local_storage.h
rename : security/sandbox/chromium-shim/base/tracked_objects.h => security/sandbox/chromium/base/shim/base/tracked_objects.h
rename : security/sandbox/chromium-shim/base/win/registry.h => security/sandbox/chromium/base/shim/base/win/registry.h
rename : security/sandbox/chromium-shim/base/win/sdkdecls.h => security/sandbox/chromium/base/shim/sdkdecls.h
rename : security/sandbox/chromium-shim/sandbox/win/loggingCallbacks.h => security/sandbox/win/src/logging/loggingCallbacks.h
rename : security/sandbox/chromium-shim/sandbox/win/loggingTypes.h => security/sandbox/win/src/logging/loggingTypes.h
rename : security/sandbox/chromium-shim/sandbox/win/sandboxLogging.cpp => security/sandbox/win/src/logging/sandboxLogging.cpp
rename : security/sandbox/chromium-shim/sandbox/win/sandboxLogging.h => security/sandbox/win/src/logging/sandboxLogging.h
2015-01-22 10:25:03 +01:00
Carsten "Tomcat" Book 3a65cb4567 Backed out changeset c607c8d4dacf (bug 1102213)
--HG--
rename : security/sandbox/chromium/sandbox/win/src/Wow64.cc => security/sandbox/win/src/Wow64.cc
rename : security/sandbox/chromium/sandbox/win/src/Wow64.h => security/sandbox/win/src/Wow64.h
rename : security/sandbox/chromium/sandbox/win/src/Wow64_64.cc => security/sandbox/win/src/Wow64_64.cc
rename : security/sandbox/chromium/sandbox/win/src/acl.cc => security/sandbox/win/src/acl.cc
rename : security/sandbox/chromium/sandbox/win/src/acl.h => security/sandbox/win/src/acl.h
rename : security/sandbox/chromium/sandbox/win/src/app_container.cc => security/sandbox/win/src/app_container.cc
rename : security/sandbox/chromium/sandbox/win/src/app_container.h => security/sandbox/win/src/app_container.h
rename : security/sandbox/chromium/sandbox/win/src/app_container_test.cc => security/sandbox/win/src/app_container_test.cc
rename : security/sandbox/chromium/sandbox/win/src/app_container_unittest.cc => security/sandbox/win/src/app_container_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/broker_services.cc => security/sandbox/win/src/broker_services.cc
rename : security/sandbox/chromium/sandbox/win/src/broker_services.h => security/sandbox/win/src/broker_services.h
rename : security/sandbox/chromium/sandbox/win/src/crosscall_client.h => security/sandbox/win/src/crosscall_client.h
rename : security/sandbox/chromium/sandbox/win/src/crosscall_params.h => security/sandbox/win/src/crosscall_params.h
rename : security/sandbox/chromium/sandbox/win/src/crosscall_server.cc => security/sandbox/win/src/crosscall_server.cc
rename : security/sandbox/chromium/sandbox/win/src/crosscall_server.h => security/sandbox/win/src/crosscall_server.h
rename : security/sandbox/chromium/sandbox/win/src/eat_resolver.cc => security/sandbox/win/src/eat_resolver.cc
rename : security/sandbox/chromium/sandbox/win/src/eat_resolver.h => security/sandbox/win/src/eat_resolver.h
rename : security/sandbox/chromium/sandbox/win/src/file_policy_test.cc => security/sandbox/win/src/file_policy_test.cc
rename : security/sandbox/chromium/sandbox/win/src/filesystem_dispatcher.cc => security/sandbox/win/src/filesystem_dispatcher.cc
rename : security/sandbox/chromium/sandbox/win/src/filesystem_dispatcher.h => security/sandbox/win/src/filesystem_dispatcher.h
rename : security/sandbox/chromium/sandbox/win/src/filesystem_interception.cc => security/sandbox/win/src/filesystem_interception.cc
rename : security/sandbox/chromium/sandbox/win/src/filesystem_interception.h => security/sandbox/win/src/filesystem_interception.h
rename : security/sandbox/chromium/sandbox/win/src/filesystem_policy.cc => security/sandbox/win/src/filesystem_policy.cc
rename : security/sandbox/chromium/sandbox/win/src/filesystem_policy.h => security/sandbox/win/src/filesystem_policy.h
rename : security/sandbox/chromium/sandbox/win/src/handle_closer.cc => security/sandbox/win/src/handle_closer.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_closer.h => security/sandbox/win/src/handle_closer.h
rename : security/sandbox/chromium/sandbox/win/src/handle_closer_agent.cc => security/sandbox/win/src/handle_closer_agent.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_closer_agent.h => security/sandbox/win/src/handle_closer_agent.h
rename : security/sandbox/chromium/sandbox/win/src/handle_closer_test.cc => security/sandbox/win/src/handle_closer_test.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_dispatcher.cc => security/sandbox/win/src/handle_dispatcher.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_dispatcher.h => security/sandbox/win/src/handle_dispatcher.h
rename : security/sandbox/chromium/sandbox/win/src/handle_inheritance_test.cc => security/sandbox/win/src/handle_inheritance_test.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_interception.cc => security/sandbox/win/src/handle_interception.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_interception.h => security/sandbox/win/src/handle_interception.h
rename : security/sandbox/chromium/sandbox/win/src/handle_policy.cc => security/sandbox/win/src/handle_policy.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_policy.h => security/sandbox/win/src/handle_policy.h
rename : security/sandbox/chromium/sandbox/win/src/handle_policy_test.cc => security/sandbox/win/src/handle_policy_test.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_table.cc => security/sandbox/win/src/handle_table.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_table.h => security/sandbox/win/src/handle_table.h
rename : security/sandbox/chromium/sandbox/win/src/integrity_level_test.cc => security/sandbox/win/src/integrity_level_test.cc
rename : security/sandbox/chromium/sandbox/win/src/interception.cc => security/sandbox/win/src/interception.cc
rename : security/sandbox/chromium/sandbox/win/src/interception.h => security/sandbox/win/src/interception.h
rename : security/sandbox/chromium/sandbox/win/src/interception_agent.cc => security/sandbox/win/src/interception_agent.cc
rename : security/sandbox/chromium/sandbox/win/src/interception_agent.h => security/sandbox/win/src/interception_agent.h
rename : security/sandbox/chromium/sandbox/win/src/interception_internal.h => security/sandbox/win/src/interception_internal.h
rename : security/sandbox/chromium/sandbox/win/src/interception_unittest.cc => security/sandbox/win/src/interception_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/interceptors.h => security/sandbox/win/src/interceptors.h
rename : security/sandbox/chromium/sandbox/win/src/interceptors_64.cc => security/sandbox/win/src/interceptors_64.cc
rename : security/sandbox/chromium/sandbox/win/src/interceptors_64.h => security/sandbox/win/src/interceptors_64.h
rename : security/sandbox/chromium/sandbox/win/src/internal_types.h => security/sandbox/win/src/internal_types.h
rename : security/sandbox/chromium/sandbox/win/src/ipc_ping_test.cc => security/sandbox/win/src/ipc_ping_test.cc
rename : security/sandbox/chromium/sandbox/win/src/ipc_tags.h => security/sandbox/win/src/ipc_tags.h
rename : security/sandbox/chromium/sandbox/win/src/ipc_unittest.cc => security/sandbox/win/src/ipc_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/job.cc => security/sandbox/win/src/job.cc
rename : security/sandbox/chromium/sandbox/win/src/job.h => security/sandbox/win/src/job.h
rename : security/sandbox/chromium/sandbox/win/src/job_unittest.cc => security/sandbox/win/src/job_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/named_pipe_dispatcher.cc => security/sandbox/win/src/named_pipe_dispatcher.cc
rename : security/sandbox/chromium/sandbox/win/src/named_pipe_dispatcher.h => security/sandbox/win/src/named_pipe_dispatcher.h
rename : security/sandbox/chromium/sandbox/win/src/named_pipe_interception.cc => security/sandbox/win/src/named_pipe_interception.cc
rename : security/sandbox/chromium/sandbox/win/src/named_pipe_interception.h => security/sandbox/win/src/named_pipe_interception.h
rename : security/sandbox/chromium/sandbox/win/src/named_pipe_policy.cc => security/sandbox/win/src/named_pipe_policy.cc
rename : security/sandbox/chromium/sandbox/win/src/named_pipe_policy.h => security/sandbox/win/src/named_pipe_policy.h
rename : security/sandbox/chromium/sandbox/win/src/named_pipe_policy_test.cc => security/sandbox/win/src/named_pipe_policy_test.cc
rename : security/sandbox/chromium/sandbox/win/src/nt_internals.h => security/sandbox/win/src/nt_internals.h
rename : security/sandbox/chromium/sandbox/win/src/policy_broker.cc => security/sandbox/win/src/policy_broker.cc
rename : security/sandbox/chromium/sandbox/win/src/policy_broker.h => security/sandbox/win/src/policy_broker.h
rename : security/sandbox/chromium/sandbox/win/src/policy_engine_opcodes.cc => security/sandbox/win/src/policy_engine_opcodes.cc
rename : security/sandbox/chromium/sandbox/win/src/policy_engine_opcodes.h => security/sandbox/win/src/policy_engine_opcodes.h
rename : security/sandbox/chromium/sandbox/win/src/policy_engine_params.h => security/sandbox/win/src/policy_engine_params.h
rename : security/sandbox/chromium/sandbox/win/src/policy_engine_processor.cc => security/sandbox/win/src/policy_engine_processor.cc
rename : security/sandbox/chromium/sandbox/win/src/policy_engine_processor.h => security/sandbox/win/src/policy_engine_processor.h
rename : security/sandbox/chromium/sandbox/win/src/policy_engine_unittest.cc => security/sandbox/win/src/policy_engine_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/policy_low_level.cc => security/sandbox/win/src/policy_low_level.cc
rename : security/sandbox/chromium/sandbox/win/src/policy_low_level.h => security/sandbox/win/src/policy_low_level.h
rename : security/sandbox/chromium/sandbox/win/src/policy_low_level_unittest.cc => security/sandbox/win/src/policy_low_level_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/policy_opcodes_unittest.cc => security/sandbox/win/src/policy_opcodes_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/policy_params.h => security/sandbox/win/src/policy_params.h
rename : security/sandbox/chromium/sandbox/win/src/policy_target.cc => security/sandbox/win/src/policy_target.cc
rename : security/sandbox/chromium/sandbox/win/src/policy_target.h => security/sandbox/win/src/policy_target.h
rename : security/sandbox/chromium/sandbox/win/src/policy_target_test.cc => security/sandbox/win/src/policy_target_test.cc
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations.cc => security/sandbox/win/src/process_mitigations.cc
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations.h => security/sandbox/win/src/process_mitigations.h
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations_test.cc => security/sandbox/win/src/process_mitigations_test.cc
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_dispatcher.cc => security/sandbox/win/src/process_mitigations_win32k_dispatcher.cc
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_dispatcher.h => security/sandbox/win/src/process_mitigations_win32k_dispatcher.h
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_interception.cc => security/sandbox/win/src/process_mitigations_win32k_interception.cc
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_interception.h => security/sandbox/win/src/process_mitigations_win32k_interception.h
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_policy.cc => security/sandbox/win/src/process_mitigations_win32k_policy.cc
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_policy.h => security/sandbox/win/src/process_mitigations_win32k_policy.h
rename : security/sandbox/chromium/sandbox/win/src/process_policy_test.cc => security/sandbox/win/src/process_policy_test.cc
rename : security/sandbox/chromium/sandbox/win/src/process_thread_dispatcher.cc => security/sandbox/win/src/process_thread_dispatcher.cc
rename : security/sandbox/chromium/sandbox/win/src/process_thread_dispatcher.h => security/sandbox/win/src/process_thread_dispatcher.h
rename : security/sandbox/chromium/sandbox/win/src/process_thread_interception.cc => security/sandbox/win/src/process_thread_interception.cc
rename : security/sandbox/chromium/sandbox/win/src/process_thread_interception.h => security/sandbox/win/src/process_thread_interception.h
rename : security/sandbox/chromium/sandbox/win/src/process_thread_policy.cc => security/sandbox/win/src/process_thread_policy.cc
rename : security/sandbox/chromium/sandbox/win/src/process_thread_policy.h => security/sandbox/win/src/process_thread_policy.h
rename : security/sandbox/chromium/sandbox/win/src/registry_dispatcher.cc => security/sandbox/win/src/registry_dispatcher.cc
rename : security/sandbox/chromium/sandbox/win/src/registry_dispatcher.h => security/sandbox/win/src/registry_dispatcher.h
rename : security/sandbox/chromium/sandbox/win/src/registry_interception.cc => security/sandbox/win/src/registry_interception.cc
rename : security/sandbox/chromium/sandbox/win/src/registry_interception.h => security/sandbox/win/src/registry_interception.h
rename : security/sandbox/chromium/sandbox/win/src/registry_policy.cc => security/sandbox/win/src/registry_policy.cc
rename : security/sandbox/chromium/sandbox/win/src/registry_policy.h => security/sandbox/win/src/registry_policy.h
rename : security/sandbox/chromium/sandbox/win/src/registry_policy_test.cc => security/sandbox/win/src/registry_policy_test.cc
rename : security/sandbox/chromium/sandbox/win/src/resolver.cc => security/sandbox/win/src/resolver.cc
rename : security/sandbox/chromium/sandbox/win/src/resolver.h => security/sandbox/win/src/resolver.h
rename : security/sandbox/chromium/sandbox/win/src/resolver_32.cc => security/sandbox/win/src/resolver_32.cc
rename : security/sandbox/chromium/sandbox/win/src/resolver_64.cc => security/sandbox/win/src/resolver_64.cc
rename : security/sandbox/chromium/sandbox/win/src/restricted_token.cc => security/sandbox/win/src/restricted_token.cc
rename : security/sandbox/chromium/sandbox/win/src/restricted_token.h => security/sandbox/win/src/restricted_token.h
rename : security/sandbox/chromium/sandbox/win/src/restricted_token_unittest.cc => security/sandbox/win/src/restricted_token_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/restricted_token_utils.cc => security/sandbox/win/src/restricted_token_utils.cc
rename : security/sandbox/chromium/sandbox/win/src/restricted_token_utils.h => security/sandbox/win/src/restricted_token_utils.h
rename : security/sandbox/chromium/sandbox/win/src/sandbox.cc => security/sandbox/win/src/sandbox.cc
rename : security/sandbox/chromium/sandbox/win/src/sandbox.h => security/sandbox/win/src/sandbox.h
rename : security/sandbox/chromium/sandbox/win/src/sandbox.vcproj => security/sandbox/win/src/sandbox.vcproj
rename : security/sandbox/chromium/sandbox/win/src/sandbox_factory.h => security/sandbox/win/src/sandbox_factory.h
rename : security/sandbox/chromium/sandbox/win/src/sandbox_globals.cc => security/sandbox/win/src/sandbox_globals.cc
rename : security/sandbox/chromium/sandbox/win/src/sandbox_nt_types.h => security/sandbox/win/src/sandbox_nt_types.h
rename : security/sandbox/chromium/sandbox/win/src/sandbox_nt_util.cc => security/sandbox/win/src/sandbox_nt_util.cc
rename : security/sandbox/chromium/sandbox/win/src/sandbox_nt_util.h => security/sandbox/win/src/sandbox_nt_util.h
rename : security/sandbox/chromium/sandbox/win/src/sandbox_policy.h => security/sandbox/win/src/sandbox_policy.h
rename : security/sandbox/chromium/sandbox/win/src/sandbox_policy_base.cc => security/sandbox/win/src/sandbox_policy_base.cc
rename : security/sandbox/chromium/sandbox/win/src/sandbox_policy_base.h => security/sandbox/win/src/sandbox_policy_base.h
rename : security/sandbox/chromium/sandbox/win/src/sandbox_types.h => security/sandbox/win/src/sandbox_types.h
rename : security/sandbox/chromium/sandbox/win/src/sandbox_utils.cc => security/sandbox/win/src/sandbox_utils.cc
rename : security/sandbox/chromium/sandbox/win/src/sandbox_utils.h => security/sandbox/win/src/sandbox_utils.h
rename : security/sandbox/chromium/sandbox/win/src/security_level.h => security/sandbox/win/src/security_level.h
rename : security/sandbox/chromium/sandbox/win/src/service_resolver.cc => security/sandbox/win/src/service_resolver.cc
rename : security/sandbox/chromium/sandbox/win/src/service_resolver.h => security/sandbox/win/src/service_resolver.h
rename : security/sandbox/chromium/sandbox/win/src/service_resolver_32.cc => security/sandbox/win/src/service_resolver_32.cc
rename : security/sandbox/chromium/sandbox/win/src/service_resolver_64.cc => security/sandbox/win/src/service_resolver_64.cc
rename : security/sandbox/chromium/sandbox/win/src/service_resolver_unittest.cc => security/sandbox/win/src/service_resolver_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/shared_handles.cc => security/sandbox/win/src/shared_handles.cc
rename : security/sandbox/chromium/sandbox/win/src/shared_handles.h => security/sandbox/win/src/shared_handles.h
rename : security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_client.cc => security/sandbox/win/src/sharedmem_ipc_client.cc
rename : security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_client.h => security/sandbox/win/src/sharedmem_ipc_client.h
rename : security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_server.cc => security/sandbox/win/src/sharedmem_ipc_server.cc
rename : security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_server.h => security/sandbox/win/src/sharedmem_ipc_server.h
rename : security/sandbox/chromium/sandbox/win/src/sid.cc => security/sandbox/win/src/sid.cc
rename : security/sandbox/chromium/sandbox/win/src/sid.h => security/sandbox/win/src/sid.h
rename : security/sandbox/chromium/sandbox/win/src/sid_unittest.cc => security/sandbox/win/src/sid_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/sidestep/ia32_modrm_map.cpp => security/sandbox/win/src/sidestep/ia32_modrm_map.cpp
rename : security/sandbox/chromium/sandbox/win/src/sidestep/ia32_opcode_map.cpp => security/sandbox/win/src/sidestep/ia32_opcode_map.cpp
rename : security/sandbox/chromium/sandbox/win/src/sidestep/mini_disassembler.cpp => security/sandbox/win/src/sidestep/mini_disassembler.cpp
rename : security/sandbox/chromium/sandbox/win/src/sidestep/mini_disassembler.h => security/sandbox/win/src/sidestep/mini_disassembler.h
rename : security/sandbox/chromium/sandbox/win/src/sidestep/mini_disassembler_types.h => security/sandbox/win/src/sidestep/mini_disassembler_types.h
rename : security/sandbox/chromium/sandbox/win/src/sidestep/preamble_patcher.h => security/sandbox/win/src/sidestep/preamble_patcher.h
rename : security/sandbox/chromium/sandbox/win/src/sidestep/preamble_patcher_with_stub.cpp => security/sandbox/win/src/sidestep/preamble_patcher_with_stub.cpp
rename : security/sandbox/chromium/sandbox/win/src/sidestep_resolver.cc => security/sandbox/win/src/sidestep_resolver.cc
rename : security/sandbox/chromium/sandbox/win/src/sidestep_resolver.h => security/sandbox/win/src/sidestep_resolver.h
rename : security/sandbox/chromium/sandbox/win/src/sync_dispatcher.cc => security/sandbox/win/src/sync_dispatcher.cc
rename : security/sandbox/chromium/sandbox/win/src/sync_dispatcher.h => security/sandbox/win/src/sync_dispatcher.h
rename : security/sandbox/chromium/sandbox/win/src/sync_interception.cc => security/sandbox/win/src/sync_interception.cc
rename : security/sandbox/chromium/sandbox/win/src/sync_interception.h => security/sandbox/win/src/sync_interception.h
rename : security/sandbox/chromium/sandbox/win/src/sync_policy.cc => security/sandbox/win/src/sync_policy.cc
rename : security/sandbox/chromium/sandbox/win/src/sync_policy.h => security/sandbox/win/src/sync_policy.h
rename : security/sandbox/chromium/sandbox/win/src/sync_policy_test.cc => security/sandbox/win/src/sync_policy_test.cc
rename : security/sandbox/chromium/sandbox/win/src/sync_policy_test.h => security/sandbox/win/src/sync_policy_test.h
rename : security/sandbox/chromium/sandbox/win/src/target_interceptions.cc => security/sandbox/win/src/target_interceptions.cc
rename : security/sandbox/chromium/sandbox/win/src/target_interceptions.h => security/sandbox/win/src/target_interceptions.h
rename : security/sandbox/chromium/sandbox/win/src/target_process.cc => security/sandbox/win/src/target_process.cc
rename : security/sandbox/chromium/sandbox/win/src/target_process.h => security/sandbox/win/src/target_process.h
rename : security/sandbox/chromium/sandbox/win/src/target_services.cc => security/sandbox/win/src/target_services.cc
rename : security/sandbox/chromium/sandbox/win/src/target_services.h => security/sandbox/win/src/target_services.h
rename : security/sandbox/chromium/sandbox/win/src/threadpool_unittest.cc => security/sandbox/win/src/threadpool_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/unload_dll_test.cc => security/sandbox/win/src/unload_dll_test.cc
rename : security/sandbox/chromium/sandbox/win/src/win2k_threadpool.cc => security/sandbox/win/src/win2k_threadpool.cc
rename : security/sandbox/chromium/sandbox/win/src/win2k_threadpool.h => security/sandbox/win/src/win2k_threadpool.h
rename : security/sandbox/chromium/sandbox/win/src/win_utils.cc => security/sandbox/win/src/win_utils.cc
rename : security/sandbox/chromium/sandbox/win/src/win_utils.h => security/sandbox/win/src/win_utils.h
rename : security/sandbox/chromium/sandbox/win/src/win_utils_unittest.cc => security/sandbox/win/src/win_utils_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/window.cc => security/sandbox/win/src/window.cc
rename : security/sandbox/chromium/sandbox/win/src/window.h => security/sandbox/win/src/window.h
2015-01-22 10:24:57 +01:00
Bob Owen 0399343229 Bug 1102213: Move security/sandbox/win/ into security/sandbox/chromium/sandbox/ r=ted
--HG--
rename : security/sandbox/win/src/Wow64.cc => security/sandbox/chromium/sandbox/win/src/Wow64.cc
rename : security/sandbox/win/src/Wow64.h => security/sandbox/chromium/sandbox/win/src/Wow64.h
rename : security/sandbox/win/src/Wow64_64.cc => security/sandbox/chromium/sandbox/win/src/Wow64_64.cc
rename : security/sandbox/win/src/acl.cc => security/sandbox/chromium/sandbox/win/src/acl.cc
rename : security/sandbox/win/src/acl.h => security/sandbox/chromium/sandbox/win/src/acl.h
rename : security/sandbox/win/src/app_container.cc => security/sandbox/chromium/sandbox/win/src/app_container.cc
rename : security/sandbox/win/src/app_container.h => security/sandbox/chromium/sandbox/win/src/app_container.h
rename : security/sandbox/win/src/app_container_test.cc => security/sandbox/chromium/sandbox/win/src/app_container_test.cc
rename : security/sandbox/win/src/app_container_unittest.cc => security/sandbox/chromium/sandbox/win/src/app_container_unittest.cc
rename : security/sandbox/win/src/broker_services.cc => security/sandbox/chromium/sandbox/win/src/broker_services.cc
rename : security/sandbox/win/src/broker_services.h => security/sandbox/chromium/sandbox/win/src/broker_services.h
rename : security/sandbox/win/src/crosscall_client.h => security/sandbox/chromium/sandbox/win/src/crosscall_client.h
rename : security/sandbox/win/src/crosscall_params.h => security/sandbox/chromium/sandbox/win/src/crosscall_params.h
rename : security/sandbox/win/src/crosscall_server.cc => security/sandbox/chromium/sandbox/win/src/crosscall_server.cc
rename : security/sandbox/win/src/crosscall_server.h => security/sandbox/chromium/sandbox/win/src/crosscall_server.h
rename : security/sandbox/win/src/eat_resolver.cc => security/sandbox/chromium/sandbox/win/src/eat_resolver.cc
rename : security/sandbox/win/src/eat_resolver.h => security/sandbox/chromium/sandbox/win/src/eat_resolver.h
rename : security/sandbox/win/src/file_policy_test.cc => security/sandbox/chromium/sandbox/win/src/file_policy_test.cc
rename : security/sandbox/win/src/filesystem_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/filesystem_dispatcher.cc
rename : security/sandbox/win/src/filesystem_dispatcher.h => security/sandbox/chromium/sandbox/win/src/filesystem_dispatcher.h
rename : security/sandbox/win/src/filesystem_interception.cc => security/sandbox/chromium/sandbox/win/src/filesystem_interception.cc
rename : security/sandbox/win/src/filesystem_interception.h => security/sandbox/chromium/sandbox/win/src/filesystem_interception.h
rename : security/sandbox/win/src/filesystem_policy.cc => security/sandbox/chromium/sandbox/win/src/filesystem_policy.cc
rename : security/sandbox/win/src/filesystem_policy.h => security/sandbox/chromium/sandbox/win/src/filesystem_policy.h
rename : security/sandbox/win/src/handle_closer.cc => security/sandbox/chromium/sandbox/win/src/handle_closer.cc
rename : security/sandbox/win/src/handle_closer.h => security/sandbox/chromium/sandbox/win/src/handle_closer.h
rename : security/sandbox/win/src/handle_closer_agent.cc => security/sandbox/chromium/sandbox/win/src/handle_closer_agent.cc
rename : security/sandbox/win/src/handle_closer_agent.h => security/sandbox/chromium/sandbox/win/src/handle_closer_agent.h
rename : security/sandbox/win/src/handle_closer_test.cc => security/sandbox/chromium/sandbox/win/src/handle_closer_test.cc
rename : security/sandbox/win/src/handle_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/handle_dispatcher.cc
rename : security/sandbox/win/src/handle_dispatcher.h => security/sandbox/chromium/sandbox/win/src/handle_dispatcher.h
rename : security/sandbox/win/src/handle_inheritance_test.cc => security/sandbox/chromium/sandbox/win/src/handle_inheritance_test.cc
rename : security/sandbox/win/src/handle_interception.cc => security/sandbox/chromium/sandbox/win/src/handle_interception.cc
rename : security/sandbox/win/src/handle_interception.h => security/sandbox/chromium/sandbox/win/src/handle_interception.h
rename : security/sandbox/win/src/handle_policy.cc => security/sandbox/chromium/sandbox/win/src/handle_policy.cc
rename : security/sandbox/win/src/handle_policy.h => security/sandbox/chromium/sandbox/win/src/handle_policy.h
rename : security/sandbox/win/src/handle_policy_test.cc => security/sandbox/chromium/sandbox/win/src/handle_policy_test.cc
rename : security/sandbox/win/src/handle_table.cc => security/sandbox/chromium/sandbox/win/src/handle_table.cc
rename : security/sandbox/win/src/handle_table.h => security/sandbox/chromium/sandbox/win/src/handle_table.h
rename : security/sandbox/win/src/integrity_level_test.cc => security/sandbox/chromium/sandbox/win/src/integrity_level_test.cc
rename : security/sandbox/win/src/interception.cc => security/sandbox/chromium/sandbox/win/src/interception.cc
rename : security/sandbox/win/src/interception.h => security/sandbox/chromium/sandbox/win/src/interception.h
rename : security/sandbox/win/src/interception_agent.cc => security/sandbox/chromium/sandbox/win/src/interception_agent.cc
rename : security/sandbox/win/src/interception_agent.h => security/sandbox/chromium/sandbox/win/src/interception_agent.h
rename : security/sandbox/win/src/interception_internal.h => security/sandbox/chromium/sandbox/win/src/interception_internal.h
rename : security/sandbox/win/src/interception_unittest.cc => security/sandbox/chromium/sandbox/win/src/interception_unittest.cc
rename : security/sandbox/win/src/interceptors.h => security/sandbox/chromium/sandbox/win/src/interceptors.h
rename : security/sandbox/win/src/interceptors_64.cc => security/sandbox/chromium/sandbox/win/src/interceptors_64.cc
rename : security/sandbox/win/src/interceptors_64.h => security/sandbox/chromium/sandbox/win/src/interceptors_64.h
rename : security/sandbox/win/src/internal_types.h => security/sandbox/chromium/sandbox/win/src/internal_types.h
rename : security/sandbox/win/src/ipc_ping_test.cc => security/sandbox/chromium/sandbox/win/src/ipc_ping_test.cc
rename : security/sandbox/win/src/ipc_tags.h => security/sandbox/chromium/sandbox/win/src/ipc_tags.h
rename : security/sandbox/win/src/ipc_unittest.cc => security/sandbox/chromium/sandbox/win/src/ipc_unittest.cc
rename : security/sandbox/win/src/job.cc => security/sandbox/chromium/sandbox/win/src/job.cc
rename : security/sandbox/win/src/job.h => security/sandbox/chromium/sandbox/win/src/job.h
rename : security/sandbox/win/src/job_unittest.cc => security/sandbox/chromium/sandbox/win/src/job_unittest.cc
rename : security/sandbox/win/src/named_pipe_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/named_pipe_dispatcher.cc
rename : security/sandbox/win/src/named_pipe_dispatcher.h => security/sandbox/chromium/sandbox/win/src/named_pipe_dispatcher.h
rename : security/sandbox/win/src/named_pipe_interception.cc => security/sandbox/chromium/sandbox/win/src/named_pipe_interception.cc
rename : security/sandbox/win/src/named_pipe_interception.h => security/sandbox/chromium/sandbox/win/src/named_pipe_interception.h
rename : security/sandbox/win/src/named_pipe_policy.cc => security/sandbox/chromium/sandbox/win/src/named_pipe_policy.cc
rename : security/sandbox/win/src/named_pipe_policy.h => security/sandbox/chromium/sandbox/win/src/named_pipe_policy.h
rename : security/sandbox/win/src/named_pipe_policy_test.cc => security/sandbox/chromium/sandbox/win/src/named_pipe_policy_test.cc
rename : security/sandbox/win/src/nt_internals.h => security/sandbox/chromium/sandbox/win/src/nt_internals.h
rename : security/sandbox/win/src/policy_broker.cc => security/sandbox/chromium/sandbox/win/src/policy_broker.cc
rename : security/sandbox/win/src/policy_broker.h => security/sandbox/chromium/sandbox/win/src/policy_broker.h
rename : security/sandbox/win/src/policy_engine_opcodes.cc => security/sandbox/chromium/sandbox/win/src/policy_engine_opcodes.cc
rename : security/sandbox/win/src/policy_engine_opcodes.h => security/sandbox/chromium/sandbox/win/src/policy_engine_opcodes.h
rename : security/sandbox/win/src/policy_engine_params.h => security/sandbox/chromium/sandbox/win/src/policy_engine_params.h
rename : security/sandbox/win/src/policy_engine_processor.cc => security/sandbox/chromium/sandbox/win/src/policy_engine_processor.cc
rename : security/sandbox/win/src/policy_engine_processor.h => security/sandbox/chromium/sandbox/win/src/policy_engine_processor.h
rename : security/sandbox/win/src/policy_engine_unittest.cc => security/sandbox/chromium/sandbox/win/src/policy_engine_unittest.cc
rename : security/sandbox/win/src/policy_low_level.cc => security/sandbox/chromium/sandbox/win/src/policy_low_level.cc
rename : security/sandbox/win/src/policy_low_level.h => security/sandbox/chromium/sandbox/win/src/policy_low_level.h
rename : security/sandbox/win/src/policy_low_level_unittest.cc => security/sandbox/chromium/sandbox/win/src/policy_low_level_unittest.cc
rename : security/sandbox/win/src/policy_opcodes_unittest.cc => security/sandbox/chromium/sandbox/win/src/policy_opcodes_unittest.cc
rename : security/sandbox/win/src/policy_params.h => security/sandbox/chromium/sandbox/win/src/policy_params.h
rename : security/sandbox/win/src/policy_target.cc => security/sandbox/chromium/sandbox/win/src/policy_target.cc
rename : security/sandbox/win/src/policy_target.h => security/sandbox/chromium/sandbox/win/src/policy_target.h
rename : security/sandbox/win/src/policy_target_test.cc => security/sandbox/chromium/sandbox/win/src/policy_target_test.cc
rename : security/sandbox/win/src/process_mitigations.cc => security/sandbox/chromium/sandbox/win/src/process_mitigations.cc
rename : security/sandbox/win/src/process_mitigations.h => security/sandbox/chromium/sandbox/win/src/process_mitigations.h
rename : security/sandbox/win/src/process_mitigations_test.cc => security/sandbox/chromium/sandbox/win/src/process_mitigations_test.cc
rename : security/sandbox/win/src/process_mitigations_win32k_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_dispatcher.cc
rename : security/sandbox/win/src/process_mitigations_win32k_dispatcher.h => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_dispatcher.h
rename : security/sandbox/win/src/process_mitigations_win32k_interception.cc => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_interception.cc
rename : security/sandbox/win/src/process_mitigations_win32k_interception.h => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_interception.h
rename : security/sandbox/win/src/process_mitigations_win32k_policy.cc => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_policy.cc
rename : security/sandbox/win/src/process_mitigations_win32k_policy.h => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_policy.h
rename : security/sandbox/win/src/process_policy_test.cc => security/sandbox/chromium/sandbox/win/src/process_policy_test.cc
rename : security/sandbox/win/src/process_thread_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/process_thread_dispatcher.cc
rename : security/sandbox/win/src/process_thread_dispatcher.h => security/sandbox/chromium/sandbox/win/src/process_thread_dispatcher.h
rename : security/sandbox/win/src/process_thread_interception.cc => security/sandbox/chromium/sandbox/win/src/process_thread_interception.cc
rename : security/sandbox/win/src/process_thread_interception.h => security/sandbox/chromium/sandbox/win/src/process_thread_interception.h
rename : security/sandbox/win/src/process_thread_policy.cc => security/sandbox/chromium/sandbox/win/src/process_thread_policy.cc
rename : security/sandbox/win/src/process_thread_policy.h => security/sandbox/chromium/sandbox/win/src/process_thread_policy.h
rename : security/sandbox/win/src/registry_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/registry_dispatcher.cc
rename : security/sandbox/win/src/registry_dispatcher.h => security/sandbox/chromium/sandbox/win/src/registry_dispatcher.h
rename : security/sandbox/win/src/registry_interception.cc => security/sandbox/chromium/sandbox/win/src/registry_interception.cc
rename : security/sandbox/win/src/registry_interception.h => security/sandbox/chromium/sandbox/win/src/registry_interception.h
rename : security/sandbox/win/src/registry_policy.cc => security/sandbox/chromium/sandbox/win/src/registry_policy.cc
rename : security/sandbox/win/src/registry_policy.h => security/sandbox/chromium/sandbox/win/src/registry_policy.h
rename : security/sandbox/win/src/registry_policy_test.cc => security/sandbox/chromium/sandbox/win/src/registry_policy_test.cc
rename : security/sandbox/win/src/resolver.cc => security/sandbox/chromium/sandbox/win/src/resolver.cc
rename : security/sandbox/win/src/resolver.h => security/sandbox/chromium/sandbox/win/src/resolver.h
rename : security/sandbox/win/src/resolver_32.cc => security/sandbox/chromium/sandbox/win/src/resolver_32.cc
rename : security/sandbox/win/src/resolver_64.cc => security/sandbox/chromium/sandbox/win/src/resolver_64.cc
rename : security/sandbox/win/src/restricted_token.cc => security/sandbox/chromium/sandbox/win/src/restricted_token.cc
rename : security/sandbox/win/src/restricted_token.h => security/sandbox/chromium/sandbox/win/src/restricted_token.h
rename : security/sandbox/win/src/restricted_token_unittest.cc => security/sandbox/chromium/sandbox/win/src/restricted_token_unittest.cc
rename : security/sandbox/win/src/restricted_token_utils.cc => security/sandbox/chromium/sandbox/win/src/restricted_token_utils.cc
rename : security/sandbox/win/src/restricted_token_utils.h => security/sandbox/chromium/sandbox/win/src/restricted_token_utils.h
rename : security/sandbox/win/src/sandbox.cc => security/sandbox/chromium/sandbox/win/src/sandbox.cc
rename : security/sandbox/win/src/sandbox.h => security/sandbox/chromium/sandbox/win/src/sandbox.h
rename : security/sandbox/win/src/sandbox.vcproj => security/sandbox/chromium/sandbox/win/src/sandbox.vcproj
rename : security/sandbox/win/src/sandbox_factory.h => security/sandbox/chromium/sandbox/win/src/sandbox_factory.h
rename : security/sandbox/win/src/sandbox_globals.cc => security/sandbox/chromium/sandbox/win/src/sandbox_globals.cc
rename : security/sandbox/win/src/sandbox_nt_types.h => security/sandbox/chromium/sandbox/win/src/sandbox_nt_types.h
rename : security/sandbox/win/src/sandbox_nt_util.cc => security/sandbox/chromium/sandbox/win/src/sandbox_nt_util.cc
rename : security/sandbox/win/src/sandbox_nt_util.h => security/sandbox/chromium/sandbox/win/src/sandbox_nt_util.h
rename : security/sandbox/win/src/sandbox_policy.h => security/sandbox/chromium/sandbox/win/src/sandbox_policy.h
rename : security/sandbox/win/src/sandbox_policy_base.cc => security/sandbox/chromium/sandbox/win/src/sandbox_policy_base.cc
rename : security/sandbox/win/src/sandbox_policy_base.h => security/sandbox/chromium/sandbox/win/src/sandbox_policy_base.h
rename : security/sandbox/win/src/sandbox_types.h => security/sandbox/chromium/sandbox/win/src/sandbox_types.h
rename : security/sandbox/win/src/sandbox_utils.cc => security/sandbox/chromium/sandbox/win/src/sandbox_utils.cc
rename : security/sandbox/win/src/sandbox_utils.h => security/sandbox/chromium/sandbox/win/src/sandbox_utils.h
rename : security/sandbox/win/src/security_level.h => security/sandbox/chromium/sandbox/win/src/security_level.h
rename : security/sandbox/win/src/service_resolver.cc => security/sandbox/chromium/sandbox/win/src/service_resolver.cc
rename : security/sandbox/win/src/service_resolver.h => security/sandbox/chromium/sandbox/win/src/service_resolver.h
rename : security/sandbox/win/src/service_resolver_32.cc => security/sandbox/chromium/sandbox/win/src/service_resolver_32.cc
rename : security/sandbox/win/src/service_resolver_64.cc => security/sandbox/chromium/sandbox/win/src/service_resolver_64.cc
rename : security/sandbox/win/src/service_resolver_unittest.cc => security/sandbox/chromium/sandbox/win/src/service_resolver_unittest.cc
rename : security/sandbox/win/src/shared_handles.cc => security/sandbox/chromium/sandbox/win/src/shared_handles.cc
rename : security/sandbox/win/src/shared_handles.h => security/sandbox/chromium/sandbox/win/src/shared_handles.h
rename : security/sandbox/win/src/sharedmem_ipc_client.cc => security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_client.cc
rename : security/sandbox/win/src/sharedmem_ipc_client.h => security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_client.h
rename : security/sandbox/win/src/sharedmem_ipc_server.cc => security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_server.cc
rename : security/sandbox/win/src/sharedmem_ipc_server.h => security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_server.h
rename : security/sandbox/win/src/sid.cc => security/sandbox/chromium/sandbox/win/src/sid.cc
rename : security/sandbox/win/src/sid.h => security/sandbox/chromium/sandbox/win/src/sid.h
rename : security/sandbox/win/src/sid_unittest.cc => security/sandbox/chromium/sandbox/win/src/sid_unittest.cc
rename : security/sandbox/win/src/sidestep/ia32_modrm_map.cpp => security/sandbox/chromium/sandbox/win/src/sidestep/ia32_modrm_map.cpp
rename : security/sandbox/win/src/sidestep/ia32_opcode_map.cpp => security/sandbox/chromium/sandbox/win/src/sidestep/ia32_opcode_map.cpp
rename : security/sandbox/win/src/sidestep/mini_disassembler.cpp => security/sandbox/chromium/sandbox/win/src/sidestep/mini_disassembler.cpp
rename : security/sandbox/win/src/sidestep/mini_disassembler.h => security/sandbox/chromium/sandbox/win/src/sidestep/mini_disassembler.h
rename : security/sandbox/win/src/sidestep/mini_disassembler_types.h => security/sandbox/chromium/sandbox/win/src/sidestep/mini_disassembler_types.h
rename : security/sandbox/win/src/sidestep/preamble_patcher.h => security/sandbox/chromium/sandbox/win/src/sidestep/preamble_patcher.h
rename : security/sandbox/win/src/sidestep/preamble_patcher_with_stub.cpp => security/sandbox/chromium/sandbox/win/src/sidestep/preamble_patcher_with_stub.cpp
rename : security/sandbox/win/src/sidestep_resolver.cc => security/sandbox/chromium/sandbox/win/src/sidestep_resolver.cc
rename : security/sandbox/win/src/sidestep_resolver.h => security/sandbox/chromium/sandbox/win/src/sidestep_resolver.h
rename : security/sandbox/win/src/sync_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/sync_dispatcher.cc
rename : security/sandbox/win/src/sync_dispatcher.h => security/sandbox/chromium/sandbox/win/src/sync_dispatcher.h
rename : security/sandbox/win/src/sync_interception.cc => security/sandbox/chromium/sandbox/win/src/sync_interception.cc
rename : security/sandbox/win/src/sync_interception.h => security/sandbox/chromium/sandbox/win/src/sync_interception.h
rename : security/sandbox/win/src/sync_policy.cc => security/sandbox/chromium/sandbox/win/src/sync_policy.cc
rename : security/sandbox/win/src/sync_policy.h => security/sandbox/chromium/sandbox/win/src/sync_policy.h
rename : security/sandbox/win/src/sync_policy_test.cc => security/sandbox/chromium/sandbox/win/src/sync_policy_test.cc
rename : security/sandbox/win/src/sync_policy_test.h => security/sandbox/chromium/sandbox/win/src/sync_policy_test.h
rename : security/sandbox/win/src/target_interceptions.cc => security/sandbox/chromium/sandbox/win/src/target_interceptions.cc
rename : security/sandbox/win/src/target_interceptions.h => security/sandbox/chromium/sandbox/win/src/target_interceptions.h
rename : security/sandbox/win/src/target_process.cc => security/sandbox/chromium/sandbox/win/src/target_process.cc
rename : security/sandbox/win/src/target_process.h => security/sandbox/chromium/sandbox/win/src/target_process.h
rename : security/sandbox/win/src/target_services.cc => security/sandbox/chromium/sandbox/win/src/target_services.cc
rename : security/sandbox/win/src/target_services.h => security/sandbox/chromium/sandbox/win/src/target_services.h
rename : security/sandbox/win/src/threadpool_unittest.cc => security/sandbox/chromium/sandbox/win/src/threadpool_unittest.cc
rename : security/sandbox/win/src/unload_dll_test.cc => security/sandbox/chromium/sandbox/win/src/unload_dll_test.cc
rename : security/sandbox/win/src/win2k_threadpool.cc => security/sandbox/chromium/sandbox/win/src/win2k_threadpool.cc
rename : security/sandbox/win/src/win2k_threadpool.h => security/sandbox/chromium/sandbox/win/src/win2k_threadpool.h
rename : security/sandbox/win/src/win_utils.cc => security/sandbox/chromium/sandbox/win/src/win_utils.cc
rename : security/sandbox/win/src/win_utils.h => security/sandbox/chromium/sandbox/win/src/win_utils.h
rename : security/sandbox/win/src/win_utils_unittest.cc => security/sandbox/chromium/sandbox/win/src/win_utils_unittest.cc
rename : security/sandbox/win/src/window.cc => security/sandbox/chromium/sandbox/win/src/window.cc
rename : security/sandbox/win/src/window.h => security/sandbox/chromium/sandbox/win/src/window.h
2015-01-22 08:37:31 +00:00
Bob Owen ec569fff70 Bug 1102215: Move security/sandbox/chromium/base/shim/ to new directory security/sandbox/chromium-shim/ r=ted
--HG--
rename : security/sandbox/chromium/base/shim/base/gtest_prod_util.h => security/sandbox/chromium-shim/base/gtest_prod_util.h
rename : security/sandbox/chromium/base/shim/base/logging.cpp => security/sandbox/chromium-shim/base/logging.cpp
rename : security/sandbox/chromium/base/shim/base/strings/string_piece.h => security/sandbox/chromium-shim/base/strings/string_piece.h
rename : security/sandbox/chromium/base/shim/base/third_party/nspr/prtime.h => security/sandbox/chromium-shim/base/third_party/nspr/prtime.h
rename : security/sandbox/chromium/base/shim/base/third_party/nspr/prtypes.h => security/sandbox/chromium-shim/base/third_party/nspr/prtypes.h
rename : security/sandbox/chromium/base/shim/base/threading/thread_local_storage.h => security/sandbox/chromium-shim/base/threading/thread_local_storage.h
rename : security/sandbox/chromium/base/shim/base/tracked_objects.h => security/sandbox/chromium-shim/base/tracked_objects.h
rename : security/sandbox/chromium/base/shim/base/win/registry.h => security/sandbox/chromium-shim/base/win/registry.h
rename : security/sandbox/chromium/base/shim/sdkdecls.h => security/sandbox/chromium-shim/base/win/sdkdecls.h
rename : security/sandbox/win/src/logging/loggingCallbacks.h => security/sandbox/chromium-shim/sandbox/win/loggingCallbacks.h
rename : security/sandbox/win/src/logging/loggingTypes.h => security/sandbox/chromium-shim/sandbox/win/loggingTypes.h
rename : security/sandbox/win/src/logging/sandboxLogging.cpp => security/sandbox/chromium-shim/sandbox/win/sandboxLogging.cpp
rename : security/sandbox/win/src/logging/sandboxLogging.h => security/sandbox/chromium-shim/sandbox/win/sandboxLogging.h
2015-01-22 08:37:30 +00:00
Bob Owen 2b11d85b9b Bug 1102211: Move security/sandbox/build/ into security/sandbox/chromium/ r=ted
--HG--
rename : security/sandbox/build/build_config.h => security/sandbox/chromium/build/build_config.h
rename : security/sandbox/chromium-commit-status.txt => security/sandbox/moz-chromium-commit-status.txt
2015-01-22 08:37:30 +00:00
Bob Owen 8c9dd30f1f Bug 1121479 Part 4: Turn on DLL_SEARCH_ORDER process-level mitigation for the GMP sandbox. r=tabraldes 2015-01-21 07:59:56 +00:00
Bob Owen 86b8e2d513 Bug 1121479 Part 3: Turn on HEAP_TERMINATE process-level mitigation for the GMP sandbox. r=tabraldes 2015-01-21 07:59:56 +00:00
Bob Owen b7d1421bfb Bug 1121479 Part 2: Turn on SEHOP process-level mitigation for the GMP sandbox. r=tabraldes 2015-01-21 07:59:56 +00:00
Bob Owen ac6485a47e Bug 1121479 Part 1: Turn on DEP process-level mitigation for the GMP sandbox. r=tabraldes 2015-01-21 07:59:56 +00:00
Brian Smith 7f02c207f4 Bug 1119072, Part 6: Change a non-conforming usage of a const value type to a non-const value type, which VS2015 rightly rejects, r=bobowencode
--HG--
extra : rebase_source : 6c8c669d061eb3a107821b23829cd5d029e3eb2b
2015-01-07 23:28:51 -08:00
Brian Smith 83bbd634d6 Bug 1119072, Part 3(b): Silence warning about deprecated use of hash_set and hash_map in security/sandbox, r=jld
--HG--
extra : rebase_source : f3e4acd7c2a63566c526a52b339a8d1c325a14d7
2015-01-12 19:58:43 -08:00
Masatoshi Kimura bf312ad056 Bug 1120062 - Part 1: Remove most Nullptr.h includes. r=waldo 2015-01-11 11:34:52 +09:00
Mike Hommey 08e140cb0d Bug 1110760 - Build and Package Chromium Sandbox wow_helper. r=gps 2015-01-08 10:44:41 +09:00
Mike Hommey d4e8fd3af2 Bug 1110760 - Increase the chances of the wow_helper target code symbols being in the assumed order. r=aklotz 2015-01-08 10:44:41 +09:00
Bob Owen cc298a9892 Bug 1110760 - Import Chromium Sandbox wow_helper code. r=aklotz 2015-01-08 10:44:40 +09:00
Nicholas Nethercote f8c3848cd7 Bug 1117611 - Fix shadowed variable in SandboxBroker::SetSecurityLevelForContentProcess(). r=bobowen.
--HG--
extra : rebase_source : 29f25cc34bd5f66bac2454c30613344fb63a92b5
2015-01-05 15:54:22 -08:00
Kai-Zhen Li b2ba6d9ceb bug 1102277 - Update seccomp filter for newer bionic. r=jld 2014-11-21 01:07:15 +08:00
Jed Davis 344f6abf7b Bug 1093334 - Delete unnecessary copies of Chromium headers in security/sandbox/linux. r=kang 2014-12-10 17:26:12 -08:00
Jed Davis c2384cf7c7 Bug 1093334 - Adjust includes of Linux sandboxing headers from Chromium. r=kang
Also re-sorts some of the includes into something closer to the style guide.
2014-12-10 17:26:12 -08:00
Jed Davis 30e88baa98 Bug 1093334 - Import more headers from Chromium rev 9522fad406dd161400daa518075828e47bd47f60. r=kang 2014-12-10 17:26:12 -08:00
Jed Davis 30ba635db0 Bug 1102209 - Remove use of CodeGen::JoinInstructions in the Linux sandboxing code. r=kang
This reorganizes SandboxAssembler to stack up the policy rules and
traverse them in reverse order to build the filter DAG from tail to head
(i.e., starting with "deny all" and prepending allow and return-errno
rules).  Thus, this code will continue to work (perhaps with minor
changes, such as to the NodePtr typedef) with future versions of the
Chromium sandbox code that don't allow mutating the filter program with
the JoinInstructions method.
2014-12-10 17:26:12 -08:00
Jed Davis 114cf4fb41 Bug 1108759 - Fix B2G no-optimization builds. r=glandium 2014-12-10 16:17:47 -08:00
Ryan VanderMeulen 529edd40b5 Merge inbound to m-c. a=merge 2014-12-08 15:46:14 -05:00
Jay Wang 56bf9455a1 Bug 1105452 - Need to use new Audio system APIs for audio offload playback. r=roc, r=jld, r=ggrisco
Resolve the build failure caused by API changes

There are some changes in Audio APIs in Android version
21. Modifying the code to use the new APIs.

Change-Id: I24fdeb20f8f957d05fb6c0c317de0a6f0769c347

Resolve seccomp violation caused by syscall 256

Modify the filter to allow syscall 256 (set_tid_address).

Change-Id: I49461770c4c5e70bf68462d34321381b0b7ead0a
2014-12-02 17:10:00 -05:00
Steven Michaud 08c8931f01 Bug 1083284 - New sandbox rules for Adobe's code fragment. r=areinald 2014-12-08 12:10:14 -06:00
Bob Owen e4d5592832 Bug 1105729: Pre VS2010 SP1 define our own verion of _xgetbv. r=tabraldes 2014-11-28 18:58:33 +00:00
Bob Owen 986cd576ef Bug 1094667: Use the USER_NON_ADMIN access token by default for the Windows content sandbox. r=tabraldes 2014-11-29 17:12:18 +00:00
Bob Owen ba7a2fa911 Bug 928044 Part 3: Add logging changes back into the Chromium interception code. r=tabraldes 2014-11-29 17:12:18 +00:00
Bob Owen b539721eb8 Bug 928044 Part 2: Enable the content sandbox by default on Windows with an open policy. r=tabraldes,glandium,jimm
--HG--
rename : security/sandbox/win/src/warnonlysandbox/wosCallbacks.h => security/sandbox/win/src/logging/loggingCallbacks.h
rename : security/sandbox/win/src/warnonlysandbox/wosTypes.h => security/sandbox/win/src/logging/loggingTypes.h
rename : security/sandbox/win/src/warnonlysandbox/warnOnlySandbox.cpp => security/sandbox/win/src/logging/sandboxLogging.cpp
rename : security/sandbox/win/src/warnonlysandbox/warnOnlySandbox.h => security/sandbox/win/src/logging/sandboxLogging.h
2014-11-29 17:12:18 +00:00
Bob Owen 888a5871f3 Bug 928044 Part 1: Remove Chromium interception logging changes. r=tabraldes 2014-11-29 17:12:17 +00:00
Bob Owen c0ebc7a31b Bug 1027902: Use an intial integrity level of low for the GMP sandbox on Windows. r=tabraldes 2014-11-27 08:44:45 +00:00
Bob Owen 2a1adf9b3e Bug 1041775 Part 3: Re-apply pre-vista stdout/err process inheritance change to Chromium code after merge. r=tabraldes
Originally landed as changsets:
https://hg.mozilla.org/mozilla-central/rev/f94a07671389
2014-11-18 15:11:47 +00:00
Bob Owen 44cdc5f024 Bug 1041775 Part 2: Re-apply warn only sandbox changes to Chromium code after merge. r=tabraldes
Originally landed as changsets:
https://hg.mozilla.org/mozilla-central/rev/e7eef85c1b0a
https://hg.mozilla.org/mozilla-central/rev/8d0aca89e1b2
2014-11-18 15:09:55 +00:00
Bob Owen ba0931eb1d Bug 1041775 Part 1: Update Chromium sandbox code to commit 9522fad406dd161400daa518075828e47bd47f60. r=jld,aklotz,glandium
--HG--
rename : security/sandbox/chromium/sandbox/linux/sandbox_export.h => security/sandbox/chromium/sandbox/sandbox_export.h
2014-11-18 13:48:21 +00:00
Jed Davis 1b16fc180f Bug 1101170 - Move Linux sandbox code into plugin-container on desktop. r=kang r=glandium
Specifically:
* SandboxCrash() uses internal Gecko interfaces, so stays in libxul.
* SandboxInfo moves to libxul from libmozsandbox, which no longer exists.
* Where libxul calls Set*Sandbox(), it uses weak symbols.
* Everything remains as it was on mobile.
2014-11-24 15:22:13 -08:00
Jed Davis 2fdd7150c1 Bug 1101170 - Move sandbox status info into a separate module. r=kang r=glandium
This changes the interface so that the code which determines the flags
can live in one place, but checking the flags doesn't need to call into
another library.

Also removes the no-op wrappers for Set*Sandbox when disabled at build
time; nothing used them, one of them was unusable due to having the wrong
type, and all they really accomplish is allowing sloppiness with ifdefs
(which could hide actual mistakes).
2014-11-24 15:22:13 -08:00
Carsten "Tomcat" Book 9401e46090 Backed out changeset 1aebb84c8af1 (bug 1041775) for Windows 8 PGO Build Bustage on a CLOSED TREE
--HG--
rename : security/sandbox/chromium/sandbox/sandbox_export.h => security/sandbox/chromium/sandbox/linux/sandbox_export.h
2014-11-20 16:11:56 +01:00
Carsten "Tomcat" Book 345b36dfd5 Backed out changeset ec63befb3ad7 (bug 1041775) 2014-11-20 16:11:12 +01:00
Carsten "Tomcat" Book 0100273df4 Backed out changeset ebe866ff8a44 (bug 1041775) 2014-11-20 16:11:06 +01:00
Bob Owen e5b2da099b Bug 1041775 Part 3: Re-apply pre-vista stdout/err process inheritance change to Chromium code after merge. r=tabraldes
Originally landed as changsets:
https://hg.mozilla.org/mozilla-central/rev/f94a07671389
2014-11-18 15:11:47 +00:00
Bob Owen 9559e348ee Bug 1041775 Part 2: Re-apply warn only sandbox changes to Chromium code after merge. r=tabraldes
Originally landed as changsets:
https://hg.mozilla.org/mozilla-central/rev/e7eef85c1b0a
https://hg.mozilla.org/mozilla-central/rev/8d0aca89e1b2
2014-11-18 15:09:55 +00:00
Bob Owen af79dfc438 Bug 1041775 Part 1: Update Chromium sandbox code to commit 9522fad406dd161400daa518075828e47bd47f60. r=jld,aklotz
--HG--
rename : security/sandbox/chromium/sandbox/linux/sandbox_export.h => security/sandbox/chromium/sandbox/sandbox_export.h
2014-11-18 13:48:21 +00:00
Chris Peterson ba22404db5 Bug 1095926 - Fix -Wcomment warning in OCSP test and mark some OCSP tests as FAIL_ON_WARNINGS. r=briansmith 2014-10-11 20:13:45 -07:00
Jed Davis 59573e5f85 Bug 1077057 - Expose Linux sandboxing information to JS via nsSystemInfo. r=kang r=froydnj
This adds "hasSeccompBPF" for seccomp-bpf support; other "has" keys
will be added in the future (e.g., user namespaces).

This also adds "canSandboxContent" and "canSandboxMedia", which are
absent if the corresponding type of sandboxing isn't enabled at build
type (or is disabled with environment variables), and otherwise present
as a boolean indicating whether that type of sandboxing is supported.
Currently this is always the same as hasSeccompBPF, but that could change
in the future.

Some changes have been made to the "mozilla/Sandbox.h" interface to
support this; the idea is that the MOZ_DISABLE_*_SANDBOX environment
variables should be equivalent to disabling MOZ_*_SANDBOX at build time.
2014-11-06 13:11:00 +01:00
Jed Davis e6ede214a5 Bug 1093893 - Fix B2G sandbox for ICS Bionic pthread_kill(). r=kang 2014-11-06 11:04:14 -08:00
Bob Owen 5cc944a89b Bug 1076903: Add a Chromium LICENSE file to security/sandbox/win/src. r=gerv 2014-11-03 15:34:26 +00:00
André Reinald 436338cb49 Bug 1076385 - Sandbox the content process on Mac. r=smichaud 2014-10-30 13:33:17 -05:00
Mike Hommey 47c853314f Bug 1077148 part 4 - Add and use new moz.build templates for Gecko programs and libraries. r=gps
There are, sadly, many combinations of linkage in use throughout the tree.
The main differentiator, though, is between program/libraries related to
Gecko or not. Kind of. Some need mozglue, some don't. Some need dependent
linkage, some standalone.

Anyways, these new templates remove the need to manually define the
right dependencies against xpcomglue, nspr, mozalloc and mozglue
in most cases.

Places that build programs and were resetting MOZ_GLUE_PROGRAM_LDFLAGS
or that build libraries and were resetting MOZ_GLUE_LDFLAGS can now
just not use those Gecko-specific templates.
2014-10-30 13:06:12 +09:00
Jed Davis 5ec3c350dd Bug 1081242 - Make ASAN's error reporting work while sandboxed on Linux. r=kang 2014-10-21 11:18:00 +02:00
Jed Davis 82a97e04c9 Bug 1078838 - Restrict clone(2) flags for sandboxed content processes. r=kang
--HG--
extra : amend_source : f80a3a672f5496f76d8649f0c8ab905044ea81ac
2014-10-20 12:29:25 -07:00
Jed Davis 67e50f1aa1 Bug 1080165 - Allow setpriority() to fail without crashing in media plugins on Linux. r=kang 2014-10-16 12:42:00 +02:00
Bob Owen b9708b293b Bug 1083701: When pre-Vista, for testing purposes allow stdout/err to be inherited by sandboxed process when an env var is set. r=tabraldes 2014-10-17 09:42:09 +01:00
Bob Owen 64a69cb8af Bug 1080567: Don't report registry NAME_NOT_FOUND errors for the Windows warn only sandbox. r=tabraldes 2014-10-13 15:12:28 +01:00
Jed Davis 56cddbd763 Bug 1080077 - For sandbox failures with no crash reporter, log the C stack. r=kang
This is mostly for ASAN builds, which --disable-crash-reporter, but also
fixes a related papercut: debug builds don't use the crash reporter
unless overridden with an environment variable.

Note: this is Linux-only, so NS_StackWalk is always part of the build;
see also bug 1063455.
2014-10-13 18:48:17 -07:00
Nicholas Nethercote 94adb30f77 Bug 1062709 (part 2, attempt 2) - Clean up stack printing and fixing. r=dbaron.
--HG--
extra : rebase_source : 626fd23a14ec90cfc9807c3d555169ec6463d19d
2014-09-01 22:56:05 -07:00
Nicholas Nethercote 2eb56008e2 Bug 1062709 (part 1, attempt 2) - Add a frame number argument to NS_WalkStackCallback. r=dbaron.
--HG--
extra : rebase_source : 4f7060a9ae0bed180899651c50e8ea8857e72d63
2014-09-10 21:47:01 -07:00
Jed Davis 5043e01249 Bug 1068410 - Convert remote crash dump to use pipe instead of socketpair in the child. r=kang r=ted 2014-10-03 14:55:03 -07:00
Ed Morley 2d0f9579b5 Backed out changeset a0b82c954206 (bug 1062709) for Windows mochitest 5 hangs 2014-10-03 15:06:16 +01:00
Ed Morley 9e223d8a19 Backed out changeset 7a1b7d7eba12 (bug 1062709) 2014-10-03 15:05:26 +01:00
Nicholas Nethercote 5a257b83f9 Bug 1062709 (part 2) - Clean up stack printing and fixing. r=dbaron.
--HG--
extra : rebase_source : 18158d4474cb8826813a3866eba57b710e14db99
2014-09-01 22:56:05 -07:00
Nicholas Nethercote c9c64de53c Bug 1062709 (part 1) - Add a frame number argument to NS_WalkStackCallback. r=dbaron.
--HG--
extra : rebase_source : 0f9b2d6310433ed56f5552706fcf2a96571aee25
2014-09-10 21:47:01 -07:00
Bob Owen 27ae4de9b6 Bug 1068000 - Add client side chrome.* pipe rule for Windows content sandbox. r=tabraldes 2014-09-16 15:44:25 +01:00
Jed Davis 9fd62691c6 Bug 1069700 - Fix recursive crash when non-content children violate sandbox policy. r=kang 2014-09-18 18:17:00 -04:00
Trevor Saunders 4728b78382 bug 1062567 - prevent gcc lto builds from dropping SyscallAsm on the floor r=froydnj 2014-09-15 19:46:14 -04:00
Bob Owen 61056aa4db Bug 1018988 - Set up a low integrity temp directory when using the Windows content sandbox. r=mrbkap r=tabraldes r=froydnj 2014-09-10 12:36:17 +01:00
Bob Owen 33eaabbf1f Bug 1063455 - Define MOZ_STACKWALKING when NS_StackWalk is available and replace other instances of the same #if logic. r=mshal, r=froydnj 2014-09-08 18:25:20 +01:00
Jed Davis af04cea2d8 Bug 1059038 - Move mozilla::unused from xpcom/glue to mfbt. r=Waldo
--HG--
rename : xpcom/glue/unused.cpp => mfbt/unused.cpp
rename : xpcom/glue/unused.h => mfbt/unused.h
2014-08-29 10:11:00 +02:00
Bob Owen a9431992d5 Bug 1018966 - Part 2: Make warn only sandbox changes to the Chromium code. r=tabraldes 2014-09-03 10:31:53 +01:00
Bob Owen f19448274c Bug 1018966 - Part 1: Add the main warn only sandbox machinery - with no Chromium code changes. r=bsmedberg
This change also includes the content sandboxing code on Windows Nightly by defining MOZ_CONTENT_SANDBOX=1.
Whether the content sandbox is disabled, in warn only mode, or enabled is controlled by a new pref: browser.tabs.remote.sandbox=(off/warn/on)
2014-06-11 15:32:37 +01:00
Carsten "Tomcat" Book d578571a85 Backed out changeset 5adabc2818b2 (bug 1018966) for b2g bustage 2014-09-04 15:14:41 +02:00
Carsten "Tomcat" Book 39fa254326 Backed out changeset 5d21dd9ca51e (bug 1018966) for b2g Build bustage 2014-09-04 15:13:14 +02:00
Bob Owen ad41895771 Bug 1018966 - Part 2: Make warn only sandbox changes to the Chromium code. r=tabraldes 2014-09-03 10:31:53 +01:00
Bob Owen 0fdb849687 Bug 1018966 - Part 1: Add the main warn only sandbox machinery - with no Chromium code changes. r=bsmedberg r=tabraldes
This change also includes the content sandboxing code on Windows Nightly by defining MOZ_CONTENT_SANDBOX=1.
Whether the content sandbox is disabled, in warn only mode, or enabled is controlled by a new pref: browser.tabs.remote.sandbox=(off/warn/on)
2014-06-11 15:32:37 +01:00
Mike Hommey 4b99580194 Bug 1059113 - Use templates for shared libraries and frameworks. r=gps
Also force to use the existing template for XPCOM components.
2014-09-04 09:04:45 +09:00
Mike Hommey ed70c5f377 Bug 1041941 - Use templates for programs, simple programs, libraries and C++ unit tests. r=gps 2014-09-03 14:10:54 +09:00
Jed Davis 1dfa299843 Bug 1061085 - Clean up misused export macros from bug 1041886. r=glandium 2014-08-31 23:23:00 +02:00
Tim Abraldes ba6539ecd7 bug 1027906. Set delayed token level for GMP plugin processes to USER_RESTRICTED. Whitelist certain files and registry keys that are required for EME plugins to successfully load. r=bobowen. r=jesup. r=bent. 2014-08-29 17:34:26 -07:00
Jed Davis 1ea7e357ca Bug 1059602 - Make libxul -> libmozsandbox dependency not a weak symbol. r=glandium
MFBT_API is not the right macro for this; it changes the affected
definition/usage to a weak symbol, for reasons explained in the comments
on its definition.

This was causing the linker to drop the dependency from libmozglue
to libmozsandbox, in some cases (--as-needed, with a linker that
doesn't consider weak symbols "needed"), and thus load libxul with
gSandboxCrashFunc relocated to address 0 (the expected behavior of an
unresolved weak symbol), which caused crashes when writing to it on
startup.

--HG--
extra : amend_source : b99fded391ae90b1311f4cabaf40f15e6414f245
2014-08-28 23:23:13 -07:00
David Major db45c0b01a Bug 1023941 - Part 2: Static-link the CRT into plugin-container.exe. r=glandium,f=tabraldes
--HG--
rename : security/sandbox/moz.build => security/sandbox/objs.mozbuild
extra : rebase_source : e0b1515a4729ecfe82a67b6439d9a38453f7556a
2014-08-28 14:50:10 +12:00
Jed Davis 3f1e2a85b6 Bug 1041886 - Fix no-opt-only build bustage caused by mozilla::unused. r=glandium
See also bug 1059038.
2014-08-26 19:23:44 -07:00
Jed Davis 3ae6c90876 Bug 1054616 - Clean up logging-related shims for Linux sandboxing. r=kang 2014-08-26 13:54:16 -07:00
Jed Davis 23c21aa709 Bug 1041886 - Separate Linux sandbox code into its own shared library. r=kang r=glandium
This creates libmozsandbox.so on builds that use sandboxing
(MOZ_CONTENT_SANDBOX or MOZ_GMP_SANDBOX).

The unavoidably libxul-dependent parts, for invoking the crash reporter
and printing the JS context, are separated into glue/SandboxCrash.cpp
and invoked via a callback.
2014-08-26 13:54:09 -07:00
Jed Davis e020caf2de Bug 1041886 - Break out Linux sandbox logging into its own header. r=kang 2014-08-26 13:54:03 -07:00
Steven Michaud dfc4c053b1 Bug 1056936 - Specify full path to plugin-container in sandbox rules. r=rjesup 2014-08-25 15:01:04 -05:00
Masatoshi Kimura f2fb78225b Bug 1055541 - Fix build failure on VS2013 with --enable-warnings-as-errors due to Warning C4996. r=ehsan 2014-08-20 04:09:03 +09:00
Chris Peterson 64bed2314d Bug 1052033 - Fix warnings in security/sandbox and mark as FAIL_ON_WARNINGS. r=smichaud 2014-08-09 14:25:24 -07:00
Jed Davis 1c8a8d2d9b No bug - Add trailing newlines for non-Android Linux sandbox logging. r=kang
--HG--
extra : rebase_source : c0e936b62289c0e5eecad41fce9afac881fe4667
2014-08-14 15:39:14 -07:00
Jed Davis 033a6785eb Bug 1043733 - Require sandboxing to load Gecko Media Plugins on Linux. r=jesup r=kang
Also refactors how sandbox support and disabling are handled, and allows
simulating a lack of sandbox support with an env var (for testing
without rebuilding a kernel).
2014-08-12 21:28:27 -07:00
Steven Michaud 844fdf04eb Bug 1012949 - Sandbox the OpenH264 plugin for Mac r=rjesup,areinald,ted a=PatchNeedsToLandToday 2014-08-08 11:55:22 -05:00
Mike Hommey 89777800f9 Bug 1047267 - Move remaining OS_LIBS and EXTRA_LIBS to moz.build. r=gps
* * *
Bug 1047267 - To fold with "Move remaining OS_LIBS and EXTRA_LIBS to moz.build"
2014-08-07 14:21:03 +09:00
Mike Hommey d9443ec932 Bug 1045783 - Move most OS_LIBS to moz.build and do some related cleanup. r=mshal 2014-08-06 07:25:33 +09:00
Jed Davis b0bd63525b Bug 1047620 - Fix sandboxing for B2G --disable-jemalloc builds. r=kang
--HG--
extra : rebase_source : 1b2ec6491277a9dc451ab767d8563076cf522c27
2014-08-04 15:11:33 -07:00
Jed Davis 9d31844f0c Bug 1012951 - Add Linux sandboxing for GeckoMediaPlugin processes. r=kang r=ted
--HG--
extra : rebase_source : 1b890000d5b8d2a8954cdd1118a1023eba829c29
2014-08-04 15:11:18 -07:00
Jed Davis d2d145dc65 Bug 1046541 - Use stdio for non-Android Linux sandbox error messages. r=kang
--HG--
extra : rebase_source : e93a4a76f8188d715886e263a366d694c28b4525
2014-08-04 15:11:04 -07:00
Jed Davis 9b70e225e5 Bug 1046525 - Allow get{e,}gid and sched_{g,s}etparam in sandboxed content processes. r=kang
Some of these were already in the desktop whitelist; those duplicates
are removed.

--HG--
extra : amend_source : 3ab4b50e3f1980b4d7b93cc17f34b926e2aa2396
2014-08-01 15:05:44 -07:00
Ed Morley dcbfd040d1 Backed out changeset d50d7e88f35e (bug 1012951) for LSan failures 2014-07-30 16:49:43 +01:00
Jed Davis 8cff1bfff8 Bug 1012951 - Sandbox GMP plugins on Linux using seccomp-bpf. r=kang r=ted 2014-07-29 15:31:12 -07:00
Jed Davis 301d254a40 Bug 1017393 - Record rejected syscall number in crash dump. r=kang 2014-07-24 11:36:00 +02:00
Mike Hommey 95063176fa Bug 1036894 part 9 - Replace all EXTRA_DSO_LDOPTS, SHARED_LIBRARY_LIBS and LIBS with EXTRA_LIBS, OS_LIBS or OS_LDFLAGS, appropriately. r=gps
OS_LIBS for libraries that are not part of the gecko tree, EXTRA_LIBS for
libraries, such as NSPR, that are in the tree, but are not handled by
moz.build just yet. Those EXTRA_LIBS may also come from a system library.
However, in cases where the expanded variables are always empty for the
in-tree case, OS_LIBS is used (as for, e.g. MOZ_ZLIB_LIBS). OS_LDFLAGS is
used exclusively for non-library linker flags.

Always pass EXTRA_LIBS before OS_LIBS on linker command lines.

Forbid EXTRA_DSO_LDOPTS, SHARED_LIBRARY_LIBS and LIBS in Makefiles.
2014-07-23 13:31:02 +09:00