Carsten "Tomcat" Book
0db90d7550
Backed out changeset 4ccaf5ae9ced (bug 1102211) for bustage on a CLOSED TREE
...
--HG--
rename : security/sandbox/chromium/build/build_config.h => security/sandbox/build/build_config.h
rename : security/sandbox/moz-chromium-commit-status.txt => security/sandbox/chromium-commit-status.txt
2015-01-22 10:25:39 +01:00
Carsten "Tomcat" Book
8347439402
Backed out changeset 43f1f9eef449 (bug 1102215)
...
--HG--
rename : security/sandbox/chromium-shim/base/gtest_prod_util.h => security/sandbox/chromium/base/shim/base/gtest_prod_util.h
rename : security/sandbox/chromium-shim/base/logging.cpp => security/sandbox/chromium/base/shim/base/logging.cpp
rename : security/sandbox/chromium-shim/base/strings/string_piece.h => security/sandbox/chromium/base/shim/base/strings/string_piece.h
rename : security/sandbox/chromium-shim/base/third_party/nspr/prtime.h => security/sandbox/chromium/base/shim/base/third_party/nspr/prtime.h
rename : security/sandbox/chromium-shim/base/third_party/nspr/prtypes.h => security/sandbox/chromium/base/shim/base/third_party/nspr/prtypes.h
rename : security/sandbox/chromium-shim/base/threading/thread_local_storage.h => security/sandbox/chromium/base/shim/base/threading/thread_local_storage.h
rename : security/sandbox/chromium-shim/base/tracked_objects.h => security/sandbox/chromium/base/shim/base/tracked_objects.h
rename : security/sandbox/chromium-shim/base/win/registry.h => security/sandbox/chromium/base/shim/base/win/registry.h
rename : security/sandbox/chromium-shim/base/win/sdkdecls.h => security/sandbox/chromium/base/shim/sdkdecls.h
rename : security/sandbox/chromium-shim/sandbox/win/loggingCallbacks.h => security/sandbox/win/src/logging/loggingCallbacks.h
rename : security/sandbox/chromium-shim/sandbox/win/loggingTypes.h => security/sandbox/win/src/logging/loggingTypes.h
rename : security/sandbox/chromium-shim/sandbox/win/sandboxLogging.cpp => security/sandbox/win/src/logging/sandboxLogging.cpp
rename : security/sandbox/chromium-shim/sandbox/win/sandboxLogging.h => security/sandbox/win/src/logging/sandboxLogging.h
2015-01-22 10:25:03 +01:00
Carsten "Tomcat" Book
3a65cb4567
Backed out changeset c607c8d4dacf (bug 1102213)
...
--HG--
rename : security/sandbox/chromium/sandbox/win/src/Wow64.cc => security/sandbox/win/src/Wow64.cc
rename : security/sandbox/chromium/sandbox/win/src/Wow64.h => security/sandbox/win/src/Wow64.h
rename : security/sandbox/chromium/sandbox/win/src/Wow64_64.cc => security/sandbox/win/src/Wow64_64.cc
rename : security/sandbox/chromium/sandbox/win/src/acl.cc => security/sandbox/win/src/acl.cc
rename : security/sandbox/chromium/sandbox/win/src/acl.h => security/sandbox/win/src/acl.h
rename : security/sandbox/chromium/sandbox/win/src/app_container.cc => security/sandbox/win/src/app_container.cc
rename : security/sandbox/chromium/sandbox/win/src/app_container.h => security/sandbox/win/src/app_container.h
rename : security/sandbox/chromium/sandbox/win/src/app_container_test.cc => security/sandbox/win/src/app_container_test.cc
rename : security/sandbox/chromium/sandbox/win/src/app_container_unittest.cc => security/sandbox/win/src/app_container_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/broker_services.cc => security/sandbox/win/src/broker_services.cc
rename : security/sandbox/chromium/sandbox/win/src/broker_services.h => security/sandbox/win/src/broker_services.h
rename : security/sandbox/chromium/sandbox/win/src/crosscall_client.h => security/sandbox/win/src/crosscall_client.h
rename : security/sandbox/chromium/sandbox/win/src/crosscall_params.h => security/sandbox/win/src/crosscall_params.h
rename : security/sandbox/chromium/sandbox/win/src/crosscall_server.cc => security/sandbox/win/src/crosscall_server.cc
rename : security/sandbox/chromium/sandbox/win/src/crosscall_server.h => security/sandbox/win/src/crosscall_server.h
rename : security/sandbox/chromium/sandbox/win/src/eat_resolver.cc => security/sandbox/win/src/eat_resolver.cc
rename : security/sandbox/chromium/sandbox/win/src/eat_resolver.h => security/sandbox/win/src/eat_resolver.h
rename : security/sandbox/chromium/sandbox/win/src/file_policy_test.cc => security/sandbox/win/src/file_policy_test.cc
rename : security/sandbox/chromium/sandbox/win/src/filesystem_dispatcher.cc => security/sandbox/win/src/filesystem_dispatcher.cc
rename : security/sandbox/chromium/sandbox/win/src/filesystem_dispatcher.h => security/sandbox/win/src/filesystem_dispatcher.h
rename : security/sandbox/chromium/sandbox/win/src/filesystem_interception.cc => security/sandbox/win/src/filesystem_interception.cc
rename : security/sandbox/chromium/sandbox/win/src/filesystem_interception.h => security/sandbox/win/src/filesystem_interception.h
rename : security/sandbox/chromium/sandbox/win/src/filesystem_policy.cc => security/sandbox/win/src/filesystem_policy.cc
rename : security/sandbox/chromium/sandbox/win/src/filesystem_policy.h => security/sandbox/win/src/filesystem_policy.h
rename : security/sandbox/chromium/sandbox/win/src/handle_closer.cc => security/sandbox/win/src/handle_closer.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_closer.h => security/sandbox/win/src/handle_closer.h
rename : security/sandbox/chromium/sandbox/win/src/handle_closer_agent.cc => security/sandbox/win/src/handle_closer_agent.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_closer_agent.h => security/sandbox/win/src/handle_closer_agent.h
rename : security/sandbox/chromium/sandbox/win/src/handle_closer_test.cc => security/sandbox/win/src/handle_closer_test.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_dispatcher.cc => security/sandbox/win/src/handle_dispatcher.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_dispatcher.h => security/sandbox/win/src/handle_dispatcher.h
rename : security/sandbox/chromium/sandbox/win/src/handle_inheritance_test.cc => security/sandbox/win/src/handle_inheritance_test.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_interception.cc => security/sandbox/win/src/handle_interception.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_interception.h => security/sandbox/win/src/handle_interception.h
rename : security/sandbox/chromium/sandbox/win/src/handle_policy.cc => security/sandbox/win/src/handle_policy.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_policy.h => security/sandbox/win/src/handle_policy.h
rename : security/sandbox/chromium/sandbox/win/src/handle_policy_test.cc => security/sandbox/win/src/handle_policy_test.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_table.cc => security/sandbox/win/src/handle_table.cc
rename : security/sandbox/chromium/sandbox/win/src/handle_table.h => security/sandbox/win/src/handle_table.h
rename : security/sandbox/chromium/sandbox/win/src/integrity_level_test.cc => security/sandbox/win/src/integrity_level_test.cc
rename : security/sandbox/chromium/sandbox/win/src/interception.cc => security/sandbox/win/src/interception.cc
rename : security/sandbox/chromium/sandbox/win/src/interception.h => security/sandbox/win/src/interception.h
rename : security/sandbox/chromium/sandbox/win/src/interception_agent.cc => security/sandbox/win/src/interception_agent.cc
rename : security/sandbox/chromium/sandbox/win/src/interception_agent.h => security/sandbox/win/src/interception_agent.h
rename : security/sandbox/chromium/sandbox/win/src/interception_internal.h => security/sandbox/win/src/interception_internal.h
rename : security/sandbox/chromium/sandbox/win/src/interception_unittest.cc => security/sandbox/win/src/interception_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/interceptors.h => security/sandbox/win/src/interceptors.h
rename : security/sandbox/chromium/sandbox/win/src/interceptors_64.cc => security/sandbox/win/src/interceptors_64.cc
rename : security/sandbox/chromium/sandbox/win/src/interceptors_64.h => security/sandbox/win/src/interceptors_64.h
rename : security/sandbox/chromium/sandbox/win/src/internal_types.h => security/sandbox/win/src/internal_types.h
rename : security/sandbox/chromium/sandbox/win/src/ipc_ping_test.cc => security/sandbox/win/src/ipc_ping_test.cc
rename : security/sandbox/chromium/sandbox/win/src/ipc_tags.h => security/sandbox/win/src/ipc_tags.h
rename : security/sandbox/chromium/sandbox/win/src/ipc_unittest.cc => security/sandbox/win/src/ipc_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/job.cc => security/sandbox/win/src/job.cc
rename : security/sandbox/chromium/sandbox/win/src/job.h => security/sandbox/win/src/job.h
rename : security/sandbox/chromium/sandbox/win/src/job_unittest.cc => security/sandbox/win/src/job_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/named_pipe_dispatcher.cc => security/sandbox/win/src/named_pipe_dispatcher.cc
rename : security/sandbox/chromium/sandbox/win/src/named_pipe_dispatcher.h => security/sandbox/win/src/named_pipe_dispatcher.h
rename : security/sandbox/chromium/sandbox/win/src/named_pipe_interception.cc => security/sandbox/win/src/named_pipe_interception.cc
rename : security/sandbox/chromium/sandbox/win/src/named_pipe_interception.h => security/sandbox/win/src/named_pipe_interception.h
rename : security/sandbox/chromium/sandbox/win/src/named_pipe_policy.cc => security/sandbox/win/src/named_pipe_policy.cc
rename : security/sandbox/chromium/sandbox/win/src/named_pipe_policy.h => security/sandbox/win/src/named_pipe_policy.h
rename : security/sandbox/chromium/sandbox/win/src/named_pipe_policy_test.cc => security/sandbox/win/src/named_pipe_policy_test.cc
rename : security/sandbox/chromium/sandbox/win/src/nt_internals.h => security/sandbox/win/src/nt_internals.h
rename : security/sandbox/chromium/sandbox/win/src/policy_broker.cc => security/sandbox/win/src/policy_broker.cc
rename : security/sandbox/chromium/sandbox/win/src/policy_broker.h => security/sandbox/win/src/policy_broker.h
rename : security/sandbox/chromium/sandbox/win/src/policy_engine_opcodes.cc => security/sandbox/win/src/policy_engine_opcodes.cc
rename : security/sandbox/chromium/sandbox/win/src/policy_engine_opcodes.h => security/sandbox/win/src/policy_engine_opcodes.h
rename : security/sandbox/chromium/sandbox/win/src/policy_engine_params.h => security/sandbox/win/src/policy_engine_params.h
rename : security/sandbox/chromium/sandbox/win/src/policy_engine_processor.cc => security/sandbox/win/src/policy_engine_processor.cc
rename : security/sandbox/chromium/sandbox/win/src/policy_engine_processor.h => security/sandbox/win/src/policy_engine_processor.h
rename : security/sandbox/chromium/sandbox/win/src/policy_engine_unittest.cc => security/sandbox/win/src/policy_engine_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/policy_low_level.cc => security/sandbox/win/src/policy_low_level.cc
rename : security/sandbox/chromium/sandbox/win/src/policy_low_level.h => security/sandbox/win/src/policy_low_level.h
rename : security/sandbox/chromium/sandbox/win/src/policy_low_level_unittest.cc => security/sandbox/win/src/policy_low_level_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/policy_opcodes_unittest.cc => security/sandbox/win/src/policy_opcodes_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/policy_params.h => security/sandbox/win/src/policy_params.h
rename : security/sandbox/chromium/sandbox/win/src/policy_target.cc => security/sandbox/win/src/policy_target.cc
rename : security/sandbox/chromium/sandbox/win/src/policy_target.h => security/sandbox/win/src/policy_target.h
rename : security/sandbox/chromium/sandbox/win/src/policy_target_test.cc => security/sandbox/win/src/policy_target_test.cc
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations.cc => security/sandbox/win/src/process_mitigations.cc
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations.h => security/sandbox/win/src/process_mitigations.h
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations_test.cc => security/sandbox/win/src/process_mitigations_test.cc
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_dispatcher.cc => security/sandbox/win/src/process_mitigations_win32k_dispatcher.cc
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_dispatcher.h => security/sandbox/win/src/process_mitigations_win32k_dispatcher.h
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_interception.cc => security/sandbox/win/src/process_mitigations_win32k_interception.cc
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_interception.h => security/sandbox/win/src/process_mitigations_win32k_interception.h
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_policy.cc => security/sandbox/win/src/process_mitigations_win32k_policy.cc
rename : security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_policy.h => security/sandbox/win/src/process_mitigations_win32k_policy.h
rename : security/sandbox/chromium/sandbox/win/src/process_policy_test.cc => security/sandbox/win/src/process_policy_test.cc
rename : security/sandbox/chromium/sandbox/win/src/process_thread_dispatcher.cc => security/sandbox/win/src/process_thread_dispatcher.cc
rename : security/sandbox/chromium/sandbox/win/src/process_thread_dispatcher.h => security/sandbox/win/src/process_thread_dispatcher.h
rename : security/sandbox/chromium/sandbox/win/src/process_thread_interception.cc => security/sandbox/win/src/process_thread_interception.cc
rename : security/sandbox/chromium/sandbox/win/src/process_thread_interception.h => security/sandbox/win/src/process_thread_interception.h
rename : security/sandbox/chromium/sandbox/win/src/process_thread_policy.cc => security/sandbox/win/src/process_thread_policy.cc
rename : security/sandbox/chromium/sandbox/win/src/process_thread_policy.h => security/sandbox/win/src/process_thread_policy.h
rename : security/sandbox/chromium/sandbox/win/src/registry_dispatcher.cc => security/sandbox/win/src/registry_dispatcher.cc
rename : security/sandbox/chromium/sandbox/win/src/registry_dispatcher.h => security/sandbox/win/src/registry_dispatcher.h
rename : security/sandbox/chromium/sandbox/win/src/registry_interception.cc => security/sandbox/win/src/registry_interception.cc
rename : security/sandbox/chromium/sandbox/win/src/registry_interception.h => security/sandbox/win/src/registry_interception.h
rename : security/sandbox/chromium/sandbox/win/src/registry_policy.cc => security/sandbox/win/src/registry_policy.cc
rename : security/sandbox/chromium/sandbox/win/src/registry_policy.h => security/sandbox/win/src/registry_policy.h
rename : security/sandbox/chromium/sandbox/win/src/registry_policy_test.cc => security/sandbox/win/src/registry_policy_test.cc
rename : security/sandbox/chromium/sandbox/win/src/resolver.cc => security/sandbox/win/src/resolver.cc
rename : security/sandbox/chromium/sandbox/win/src/resolver.h => security/sandbox/win/src/resolver.h
rename : security/sandbox/chromium/sandbox/win/src/resolver_32.cc => security/sandbox/win/src/resolver_32.cc
rename : security/sandbox/chromium/sandbox/win/src/resolver_64.cc => security/sandbox/win/src/resolver_64.cc
rename : security/sandbox/chromium/sandbox/win/src/restricted_token.cc => security/sandbox/win/src/restricted_token.cc
rename : security/sandbox/chromium/sandbox/win/src/restricted_token.h => security/sandbox/win/src/restricted_token.h
rename : security/sandbox/chromium/sandbox/win/src/restricted_token_unittest.cc => security/sandbox/win/src/restricted_token_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/restricted_token_utils.cc => security/sandbox/win/src/restricted_token_utils.cc
rename : security/sandbox/chromium/sandbox/win/src/restricted_token_utils.h => security/sandbox/win/src/restricted_token_utils.h
rename : security/sandbox/chromium/sandbox/win/src/sandbox.cc => security/sandbox/win/src/sandbox.cc
rename : security/sandbox/chromium/sandbox/win/src/sandbox.h => security/sandbox/win/src/sandbox.h
rename : security/sandbox/chromium/sandbox/win/src/sandbox.vcproj => security/sandbox/win/src/sandbox.vcproj
rename : security/sandbox/chromium/sandbox/win/src/sandbox_factory.h => security/sandbox/win/src/sandbox_factory.h
rename : security/sandbox/chromium/sandbox/win/src/sandbox_globals.cc => security/sandbox/win/src/sandbox_globals.cc
rename : security/sandbox/chromium/sandbox/win/src/sandbox_nt_types.h => security/sandbox/win/src/sandbox_nt_types.h
rename : security/sandbox/chromium/sandbox/win/src/sandbox_nt_util.cc => security/sandbox/win/src/sandbox_nt_util.cc
rename : security/sandbox/chromium/sandbox/win/src/sandbox_nt_util.h => security/sandbox/win/src/sandbox_nt_util.h
rename : security/sandbox/chromium/sandbox/win/src/sandbox_policy.h => security/sandbox/win/src/sandbox_policy.h
rename : security/sandbox/chromium/sandbox/win/src/sandbox_policy_base.cc => security/sandbox/win/src/sandbox_policy_base.cc
rename : security/sandbox/chromium/sandbox/win/src/sandbox_policy_base.h => security/sandbox/win/src/sandbox_policy_base.h
rename : security/sandbox/chromium/sandbox/win/src/sandbox_types.h => security/sandbox/win/src/sandbox_types.h
rename : security/sandbox/chromium/sandbox/win/src/sandbox_utils.cc => security/sandbox/win/src/sandbox_utils.cc
rename : security/sandbox/chromium/sandbox/win/src/sandbox_utils.h => security/sandbox/win/src/sandbox_utils.h
rename : security/sandbox/chromium/sandbox/win/src/security_level.h => security/sandbox/win/src/security_level.h
rename : security/sandbox/chromium/sandbox/win/src/service_resolver.cc => security/sandbox/win/src/service_resolver.cc
rename : security/sandbox/chromium/sandbox/win/src/service_resolver.h => security/sandbox/win/src/service_resolver.h
rename : security/sandbox/chromium/sandbox/win/src/service_resolver_32.cc => security/sandbox/win/src/service_resolver_32.cc
rename : security/sandbox/chromium/sandbox/win/src/service_resolver_64.cc => security/sandbox/win/src/service_resolver_64.cc
rename : security/sandbox/chromium/sandbox/win/src/service_resolver_unittest.cc => security/sandbox/win/src/service_resolver_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/shared_handles.cc => security/sandbox/win/src/shared_handles.cc
rename : security/sandbox/chromium/sandbox/win/src/shared_handles.h => security/sandbox/win/src/shared_handles.h
rename : security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_client.cc => security/sandbox/win/src/sharedmem_ipc_client.cc
rename : security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_client.h => security/sandbox/win/src/sharedmem_ipc_client.h
rename : security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_server.cc => security/sandbox/win/src/sharedmem_ipc_server.cc
rename : security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_server.h => security/sandbox/win/src/sharedmem_ipc_server.h
rename : security/sandbox/chromium/sandbox/win/src/sid.cc => security/sandbox/win/src/sid.cc
rename : security/sandbox/chromium/sandbox/win/src/sid.h => security/sandbox/win/src/sid.h
rename : security/sandbox/chromium/sandbox/win/src/sid_unittest.cc => security/sandbox/win/src/sid_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/sidestep/ia32_modrm_map.cpp => security/sandbox/win/src/sidestep/ia32_modrm_map.cpp
rename : security/sandbox/chromium/sandbox/win/src/sidestep/ia32_opcode_map.cpp => security/sandbox/win/src/sidestep/ia32_opcode_map.cpp
rename : security/sandbox/chromium/sandbox/win/src/sidestep/mini_disassembler.cpp => security/sandbox/win/src/sidestep/mini_disassembler.cpp
rename : security/sandbox/chromium/sandbox/win/src/sidestep/mini_disassembler.h => security/sandbox/win/src/sidestep/mini_disassembler.h
rename : security/sandbox/chromium/sandbox/win/src/sidestep/mini_disassembler_types.h => security/sandbox/win/src/sidestep/mini_disassembler_types.h
rename : security/sandbox/chromium/sandbox/win/src/sidestep/preamble_patcher.h => security/sandbox/win/src/sidestep/preamble_patcher.h
rename : security/sandbox/chromium/sandbox/win/src/sidestep/preamble_patcher_with_stub.cpp => security/sandbox/win/src/sidestep/preamble_patcher_with_stub.cpp
rename : security/sandbox/chromium/sandbox/win/src/sidestep_resolver.cc => security/sandbox/win/src/sidestep_resolver.cc
rename : security/sandbox/chromium/sandbox/win/src/sidestep_resolver.h => security/sandbox/win/src/sidestep_resolver.h
rename : security/sandbox/chromium/sandbox/win/src/sync_dispatcher.cc => security/sandbox/win/src/sync_dispatcher.cc
rename : security/sandbox/chromium/sandbox/win/src/sync_dispatcher.h => security/sandbox/win/src/sync_dispatcher.h
rename : security/sandbox/chromium/sandbox/win/src/sync_interception.cc => security/sandbox/win/src/sync_interception.cc
rename : security/sandbox/chromium/sandbox/win/src/sync_interception.h => security/sandbox/win/src/sync_interception.h
rename : security/sandbox/chromium/sandbox/win/src/sync_policy.cc => security/sandbox/win/src/sync_policy.cc
rename : security/sandbox/chromium/sandbox/win/src/sync_policy.h => security/sandbox/win/src/sync_policy.h
rename : security/sandbox/chromium/sandbox/win/src/sync_policy_test.cc => security/sandbox/win/src/sync_policy_test.cc
rename : security/sandbox/chromium/sandbox/win/src/sync_policy_test.h => security/sandbox/win/src/sync_policy_test.h
rename : security/sandbox/chromium/sandbox/win/src/target_interceptions.cc => security/sandbox/win/src/target_interceptions.cc
rename : security/sandbox/chromium/sandbox/win/src/target_interceptions.h => security/sandbox/win/src/target_interceptions.h
rename : security/sandbox/chromium/sandbox/win/src/target_process.cc => security/sandbox/win/src/target_process.cc
rename : security/sandbox/chromium/sandbox/win/src/target_process.h => security/sandbox/win/src/target_process.h
rename : security/sandbox/chromium/sandbox/win/src/target_services.cc => security/sandbox/win/src/target_services.cc
rename : security/sandbox/chromium/sandbox/win/src/target_services.h => security/sandbox/win/src/target_services.h
rename : security/sandbox/chromium/sandbox/win/src/threadpool_unittest.cc => security/sandbox/win/src/threadpool_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/unload_dll_test.cc => security/sandbox/win/src/unload_dll_test.cc
rename : security/sandbox/chromium/sandbox/win/src/win2k_threadpool.cc => security/sandbox/win/src/win2k_threadpool.cc
rename : security/sandbox/chromium/sandbox/win/src/win2k_threadpool.h => security/sandbox/win/src/win2k_threadpool.h
rename : security/sandbox/chromium/sandbox/win/src/win_utils.cc => security/sandbox/win/src/win_utils.cc
rename : security/sandbox/chromium/sandbox/win/src/win_utils.h => security/sandbox/win/src/win_utils.h
rename : security/sandbox/chromium/sandbox/win/src/win_utils_unittest.cc => security/sandbox/win/src/win_utils_unittest.cc
rename : security/sandbox/chromium/sandbox/win/src/window.cc => security/sandbox/win/src/window.cc
rename : security/sandbox/chromium/sandbox/win/src/window.h => security/sandbox/win/src/window.h
2015-01-22 10:24:57 +01:00
Bob Owen
0399343229
Bug 1102213: Move security/sandbox/win/ into security/sandbox/chromium/sandbox/ r=ted
...
--HG--
rename : security/sandbox/win/src/Wow64.cc => security/sandbox/chromium/sandbox/win/src/Wow64.cc
rename : security/sandbox/win/src/Wow64.h => security/sandbox/chromium/sandbox/win/src/Wow64.h
rename : security/sandbox/win/src/Wow64_64.cc => security/sandbox/chromium/sandbox/win/src/Wow64_64.cc
rename : security/sandbox/win/src/acl.cc => security/sandbox/chromium/sandbox/win/src/acl.cc
rename : security/sandbox/win/src/acl.h => security/sandbox/chromium/sandbox/win/src/acl.h
rename : security/sandbox/win/src/app_container.cc => security/sandbox/chromium/sandbox/win/src/app_container.cc
rename : security/sandbox/win/src/app_container.h => security/sandbox/chromium/sandbox/win/src/app_container.h
rename : security/sandbox/win/src/app_container_test.cc => security/sandbox/chromium/sandbox/win/src/app_container_test.cc
rename : security/sandbox/win/src/app_container_unittest.cc => security/sandbox/chromium/sandbox/win/src/app_container_unittest.cc
rename : security/sandbox/win/src/broker_services.cc => security/sandbox/chromium/sandbox/win/src/broker_services.cc
rename : security/sandbox/win/src/broker_services.h => security/sandbox/chromium/sandbox/win/src/broker_services.h
rename : security/sandbox/win/src/crosscall_client.h => security/sandbox/chromium/sandbox/win/src/crosscall_client.h
rename : security/sandbox/win/src/crosscall_params.h => security/sandbox/chromium/sandbox/win/src/crosscall_params.h
rename : security/sandbox/win/src/crosscall_server.cc => security/sandbox/chromium/sandbox/win/src/crosscall_server.cc
rename : security/sandbox/win/src/crosscall_server.h => security/sandbox/chromium/sandbox/win/src/crosscall_server.h
rename : security/sandbox/win/src/eat_resolver.cc => security/sandbox/chromium/sandbox/win/src/eat_resolver.cc
rename : security/sandbox/win/src/eat_resolver.h => security/sandbox/chromium/sandbox/win/src/eat_resolver.h
rename : security/sandbox/win/src/file_policy_test.cc => security/sandbox/chromium/sandbox/win/src/file_policy_test.cc
rename : security/sandbox/win/src/filesystem_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/filesystem_dispatcher.cc
rename : security/sandbox/win/src/filesystem_dispatcher.h => security/sandbox/chromium/sandbox/win/src/filesystem_dispatcher.h
rename : security/sandbox/win/src/filesystem_interception.cc => security/sandbox/chromium/sandbox/win/src/filesystem_interception.cc
rename : security/sandbox/win/src/filesystem_interception.h => security/sandbox/chromium/sandbox/win/src/filesystem_interception.h
rename : security/sandbox/win/src/filesystem_policy.cc => security/sandbox/chromium/sandbox/win/src/filesystem_policy.cc
rename : security/sandbox/win/src/filesystem_policy.h => security/sandbox/chromium/sandbox/win/src/filesystem_policy.h
rename : security/sandbox/win/src/handle_closer.cc => security/sandbox/chromium/sandbox/win/src/handle_closer.cc
rename : security/sandbox/win/src/handle_closer.h => security/sandbox/chromium/sandbox/win/src/handle_closer.h
rename : security/sandbox/win/src/handle_closer_agent.cc => security/sandbox/chromium/sandbox/win/src/handle_closer_agent.cc
rename : security/sandbox/win/src/handle_closer_agent.h => security/sandbox/chromium/sandbox/win/src/handle_closer_agent.h
rename : security/sandbox/win/src/handle_closer_test.cc => security/sandbox/chromium/sandbox/win/src/handle_closer_test.cc
rename : security/sandbox/win/src/handle_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/handle_dispatcher.cc
rename : security/sandbox/win/src/handle_dispatcher.h => security/sandbox/chromium/sandbox/win/src/handle_dispatcher.h
rename : security/sandbox/win/src/handle_inheritance_test.cc => security/sandbox/chromium/sandbox/win/src/handle_inheritance_test.cc
rename : security/sandbox/win/src/handle_interception.cc => security/sandbox/chromium/sandbox/win/src/handle_interception.cc
rename : security/sandbox/win/src/handle_interception.h => security/sandbox/chromium/sandbox/win/src/handle_interception.h
rename : security/sandbox/win/src/handle_policy.cc => security/sandbox/chromium/sandbox/win/src/handle_policy.cc
rename : security/sandbox/win/src/handle_policy.h => security/sandbox/chromium/sandbox/win/src/handle_policy.h
rename : security/sandbox/win/src/handle_policy_test.cc => security/sandbox/chromium/sandbox/win/src/handle_policy_test.cc
rename : security/sandbox/win/src/handle_table.cc => security/sandbox/chromium/sandbox/win/src/handle_table.cc
rename : security/sandbox/win/src/handle_table.h => security/sandbox/chromium/sandbox/win/src/handle_table.h
rename : security/sandbox/win/src/integrity_level_test.cc => security/sandbox/chromium/sandbox/win/src/integrity_level_test.cc
rename : security/sandbox/win/src/interception.cc => security/sandbox/chromium/sandbox/win/src/interception.cc
rename : security/sandbox/win/src/interception.h => security/sandbox/chromium/sandbox/win/src/interception.h
rename : security/sandbox/win/src/interception_agent.cc => security/sandbox/chromium/sandbox/win/src/interception_agent.cc
rename : security/sandbox/win/src/interception_agent.h => security/sandbox/chromium/sandbox/win/src/interception_agent.h
rename : security/sandbox/win/src/interception_internal.h => security/sandbox/chromium/sandbox/win/src/interception_internal.h
rename : security/sandbox/win/src/interception_unittest.cc => security/sandbox/chromium/sandbox/win/src/interception_unittest.cc
rename : security/sandbox/win/src/interceptors.h => security/sandbox/chromium/sandbox/win/src/interceptors.h
rename : security/sandbox/win/src/interceptors_64.cc => security/sandbox/chromium/sandbox/win/src/interceptors_64.cc
rename : security/sandbox/win/src/interceptors_64.h => security/sandbox/chromium/sandbox/win/src/interceptors_64.h
rename : security/sandbox/win/src/internal_types.h => security/sandbox/chromium/sandbox/win/src/internal_types.h
rename : security/sandbox/win/src/ipc_ping_test.cc => security/sandbox/chromium/sandbox/win/src/ipc_ping_test.cc
rename : security/sandbox/win/src/ipc_tags.h => security/sandbox/chromium/sandbox/win/src/ipc_tags.h
rename : security/sandbox/win/src/ipc_unittest.cc => security/sandbox/chromium/sandbox/win/src/ipc_unittest.cc
rename : security/sandbox/win/src/job.cc => security/sandbox/chromium/sandbox/win/src/job.cc
rename : security/sandbox/win/src/job.h => security/sandbox/chromium/sandbox/win/src/job.h
rename : security/sandbox/win/src/job_unittest.cc => security/sandbox/chromium/sandbox/win/src/job_unittest.cc
rename : security/sandbox/win/src/named_pipe_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/named_pipe_dispatcher.cc
rename : security/sandbox/win/src/named_pipe_dispatcher.h => security/sandbox/chromium/sandbox/win/src/named_pipe_dispatcher.h
rename : security/sandbox/win/src/named_pipe_interception.cc => security/sandbox/chromium/sandbox/win/src/named_pipe_interception.cc
rename : security/sandbox/win/src/named_pipe_interception.h => security/sandbox/chromium/sandbox/win/src/named_pipe_interception.h
rename : security/sandbox/win/src/named_pipe_policy.cc => security/sandbox/chromium/sandbox/win/src/named_pipe_policy.cc
rename : security/sandbox/win/src/named_pipe_policy.h => security/sandbox/chromium/sandbox/win/src/named_pipe_policy.h
rename : security/sandbox/win/src/named_pipe_policy_test.cc => security/sandbox/chromium/sandbox/win/src/named_pipe_policy_test.cc
rename : security/sandbox/win/src/nt_internals.h => security/sandbox/chromium/sandbox/win/src/nt_internals.h
rename : security/sandbox/win/src/policy_broker.cc => security/sandbox/chromium/sandbox/win/src/policy_broker.cc
rename : security/sandbox/win/src/policy_broker.h => security/sandbox/chromium/sandbox/win/src/policy_broker.h
rename : security/sandbox/win/src/policy_engine_opcodes.cc => security/sandbox/chromium/sandbox/win/src/policy_engine_opcodes.cc
rename : security/sandbox/win/src/policy_engine_opcodes.h => security/sandbox/chromium/sandbox/win/src/policy_engine_opcodes.h
rename : security/sandbox/win/src/policy_engine_params.h => security/sandbox/chromium/sandbox/win/src/policy_engine_params.h
rename : security/sandbox/win/src/policy_engine_processor.cc => security/sandbox/chromium/sandbox/win/src/policy_engine_processor.cc
rename : security/sandbox/win/src/policy_engine_processor.h => security/sandbox/chromium/sandbox/win/src/policy_engine_processor.h
rename : security/sandbox/win/src/policy_engine_unittest.cc => security/sandbox/chromium/sandbox/win/src/policy_engine_unittest.cc
rename : security/sandbox/win/src/policy_low_level.cc => security/sandbox/chromium/sandbox/win/src/policy_low_level.cc
rename : security/sandbox/win/src/policy_low_level.h => security/sandbox/chromium/sandbox/win/src/policy_low_level.h
rename : security/sandbox/win/src/policy_low_level_unittest.cc => security/sandbox/chromium/sandbox/win/src/policy_low_level_unittest.cc
rename : security/sandbox/win/src/policy_opcodes_unittest.cc => security/sandbox/chromium/sandbox/win/src/policy_opcodes_unittest.cc
rename : security/sandbox/win/src/policy_params.h => security/sandbox/chromium/sandbox/win/src/policy_params.h
rename : security/sandbox/win/src/policy_target.cc => security/sandbox/chromium/sandbox/win/src/policy_target.cc
rename : security/sandbox/win/src/policy_target.h => security/sandbox/chromium/sandbox/win/src/policy_target.h
rename : security/sandbox/win/src/policy_target_test.cc => security/sandbox/chromium/sandbox/win/src/policy_target_test.cc
rename : security/sandbox/win/src/process_mitigations.cc => security/sandbox/chromium/sandbox/win/src/process_mitigations.cc
rename : security/sandbox/win/src/process_mitigations.h => security/sandbox/chromium/sandbox/win/src/process_mitigations.h
rename : security/sandbox/win/src/process_mitigations_test.cc => security/sandbox/chromium/sandbox/win/src/process_mitigations_test.cc
rename : security/sandbox/win/src/process_mitigations_win32k_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_dispatcher.cc
rename : security/sandbox/win/src/process_mitigations_win32k_dispatcher.h => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_dispatcher.h
rename : security/sandbox/win/src/process_mitigations_win32k_interception.cc => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_interception.cc
rename : security/sandbox/win/src/process_mitigations_win32k_interception.h => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_interception.h
rename : security/sandbox/win/src/process_mitigations_win32k_policy.cc => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_policy.cc
rename : security/sandbox/win/src/process_mitigations_win32k_policy.h => security/sandbox/chromium/sandbox/win/src/process_mitigations_win32k_policy.h
rename : security/sandbox/win/src/process_policy_test.cc => security/sandbox/chromium/sandbox/win/src/process_policy_test.cc
rename : security/sandbox/win/src/process_thread_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/process_thread_dispatcher.cc
rename : security/sandbox/win/src/process_thread_dispatcher.h => security/sandbox/chromium/sandbox/win/src/process_thread_dispatcher.h
rename : security/sandbox/win/src/process_thread_interception.cc => security/sandbox/chromium/sandbox/win/src/process_thread_interception.cc
rename : security/sandbox/win/src/process_thread_interception.h => security/sandbox/chromium/sandbox/win/src/process_thread_interception.h
rename : security/sandbox/win/src/process_thread_policy.cc => security/sandbox/chromium/sandbox/win/src/process_thread_policy.cc
rename : security/sandbox/win/src/process_thread_policy.h => security/sandbox/chromium/sandbox/win/src/process_thread_policy.h
rename : security/sandbox/win/src/registry_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/registry_dispatcher.cc
rename : security/sandbox/win/src/registry_dispatcher.h => security/sandbox/chromium/sandbox/win/src/registry_dispatcher.h
rename : security/sandbox/win/src/registry_interception.cc => security/sandbox/chromium/sandbox/win/src/registry_interception.cc
rename : security/sandbox/win/src/registry_interception.h => security/sandbox/chromium/sandbox/win/src/registry_interception.h
rename : security/sandbox/win/src/registry_policy.cc => security/sandbox/chromium/sandbox/win/src/registry_policy.cc
rename : security/sandbox/win/src/registry_policy.h => security/sandbox/chromium/sandbox/win/src/registry_policy.h
rename : security/sandbox/win/src/registry_policy_test.cc => security/sandbox/chromium/sandbox/win/src/registry_policy_test.cc
rename : security/sandbox/win/src/resolver.cc => security/sandbox/chromium/sandbox/win/src/resolver.cc
rename : security/sandbox/win/src/resolver.h => security/sandbox/chromium/sandbox/win/src/resolver.h
rename : security/sandbox/win/src/resolver_32.cc => security/sandbox/chromium/sandbox/win/src/resolver_32.cc
rename : security/sandbox/win/src/resolver_64.cc => security/sandbox/chromium/sandbox/win/src/resolver_64.cc
rename : security/sandbox/win/src/restricted_token.cc => security/sandbox/chromium/sandbox/win/src/restricted_token.cc
rename : security/sandbox/win/src/restricted_token.h => security/sandbox/chromium/sandbox/win/src/restricted_token.h
rename : security/sandbox/win/src/restricted_token_unittest.cc => security/sandbox/chromium/sandbox/win/src/restricted_token_unittest.cc
rename : security/sandbox/win/src/restricted_token_utils.cc => security/sandbox/chromium/sandbox/win/src/restricted_token_utils.cc
rename : security/sandbox/win/src/restricted_token_utils.h => security/sandbox/chromium/sandbox/win/src/restricted_token_utils.h
rename : security/sandbox/win/src/sandbox.cc => security/sandbox/chromium/sandbox/win/src/sandbox.cc
rename : security/sandbox/win/src/sandbox.h => security/sandbox/chromium/sandbox/win/src/sandbox.h
rename : security/sandbox/win/src/sandbox.vcproj => security/sandbox/chromium/sandbox/win/src/sandbox.vcproj
rename : security/sandbox/win/src/sandbox_factory.h => security/sandbox/chromium/sandbox/win/src/sandbox_factory.h
rename : security/sandbox/win/src/sandbox_globals.cc => security/sandbox/chromium/sandbox/win/src/sandbox_globals.cc
rename : security/sandbox/win/src/sandbox_nt_types.h => security/sandbox/chromium/sandbox/win/src/sandbox_nt_types.h
rename : security/sandbox/win/src/sandbox_nt_util.cc => security/sandbox/chromium/sandbox/win/src/sandbox_nt_util.cc
rename : security/sandbox/win/src/sandbox_nt_util.h => security/sandbox/chromium/sandbox/win/src/sandbox_nt_util.h
rename : security/sandbox/win/src/sandbox_policy.h => security/sandbox/chromium/sandbox/win/src/sandbox_policy.h
rename : security/sandbox/win/src/sandbox_policy_base.cc => security/sandbox/chromium/sandbox/win/src/sandbox_policy_base.cc
rename : security/sandbox/win/src/sandbox_policy_base.h => security/sandbox/chromium/sandbox/win/src/sandbox_policy_base.h
rename : security/sandbox/win/src/sandbox_types.h => security/sandbox/chromium/sandbox/win/src/sandbox_types.h
rename : security/sandbox/win/src/sandbox_utils.cc => security/sandbox/chromium/sandbox/win/src/sandbox_utils.cc
rename : security/sandbox/win/src/sandbox_utils.h => security/sandbox/chromium/sandbox/win/src/sandbox_utils.h
rename : security/sandbox/win/src/security_level.h => security/sandbox/chromium/sandbox/win/src/security_level.h
rename : security/sandbox/win/src/service_resolver.cc => security/sandbox/chromium/sandbox/win/src/service_resolver.cc
rename : security/sandbox/win/src/service_resolver.h => security/sandbox/chromium/sandbox/win/src/service_resolver.h
rename : security/sandbox/win/src/service_resolver_32.cc => security/sandbox/chromium/sandbox/win/src/service_resolver_32.cc
rename : security/sandbox/win/src/service_resolver_64.cc => security/sandbox/chromium/sandbox/win/src/service_resolver_64.cc
rename : security/sandbox/win/src/service_resolver_unittest.cc => security/sandbox/chromium/sandbox/win/src/service_resolver_unittest.cc
rename : security/sandbox/win/src/shared_handles.cc => security/sandbox/chromium/sandbox/win/src/shared_handles.cc
rename : security/sandbox/win/src/shared_handles.h => security/sandbox/chromium/sandbox/win/src/shared_handles.h
rename : security/sandbox/win/src/sharedmem_ipc_client.cc => security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_client.cc
rename : security/sandbox/win/src/sharedmem_ipc_client.h => security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_client.h
rename : security/sandbox/win/src/sharedmem_ipc_server.cc => security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_server.cc
rename : security/sandbox/win/src/sharedmem_ipc_server.h => security/sandbox/chromium/sandbox/win/src/sharedmem_ipc_server.h
rename : security/sandbox/win/src/sid.cc => security/sandbox/chromium/sandbox/win/src/sid.cc
rename : security/sandbox/win/src/sid.h => security/sandbox/chromium/sandbox/win/src/sid.h
rename : security/sandbox/win/src/sid_unittest.cc => security/sandbox/chromium/sandbox/win/src/sid_unittest.cc
rename : security/sandbox/win/src/sidestep/ia32_modrm_map.cpp => security/sandbox/chromium/sandbox/win/src/sidestep/ia32_modrm_map.cpp
rename : security/sandbox/win/src/sidestep/ia32_opcode_map.cpp => security/sandbox/chromium/sandbox/win/src/sidestep/ia32_opcode_map.cpp
rename : security/sandbox/win/src/sidestep/mini_disassembler.cpp => security/sandbox/chromium/sandbox/win/src/sidestep/mini_disassembler.cpp
rename : security/sandbox/win/src/sidestep/mini_disassembler.h => security/sandbox/chromium/sandbox/win/src/sidestep/mini_disassembler.h
rename : security/sandbox/win/src/sidestep/mini_disassembler_types.h => security/sandbox/chromium/sandbox/win/src/sidestep/mini_disassembler_types.h
rename : security/sandbox/win/src/sidestep/preamble_patcher.h => security/sandbox/chromium/sandbox/win/src/sidestep/preamble_patcher.h
rename : security/sandbox/win/src/sidestep/preamble_patcher_with_stub.cpp => security/sandbox/chromium/sandbox/win/src/sidestep/preamble_patcher_with_stub.cpp
rename : security/sandbox/win/src/sidestep_resolver.cc => security/sandbox/chromium/sandbox/win/src/sidestep_resolver.cc
rename : security/sandbox/win/src/sidestep_resolver.h => security/sandbox/chromium/sandbox/win/src/sidestep_resolver.h
rename : security/sandbox/win/src/sync_dispatcher.cc => security/sandbox/chromium/sandbox/win/src/sync_dispatcher.cc
rename : security/sandbox/win/src/sync_dispatcher.h => security/sandbox/chromium/sandbox/win/src/sync_dispatcher.h
rename : security/sandbox/win/src/sync_interception.cc => security/sandbox/chromium/sandbox/win/src/sync_interception.cc
rename : security/sandbox/win/src/sync_interception.h => security/sandbox/chromium/sandbox/win/src/sync_interception.h
rename : security/sandbox/win/src/sync_policy.cc => security/sandbox/chromium/sandbox/win/src/sync_policy.cc
rename : security/sandbox/win/src/sync_policy.h => security/sandbox/chromium/sandbox/win/src/sync_policy.h
rename : security/sandbox/win/src/sync_policy_test.cc => security/sandbox/chromium/sandbox/win/src/sync_policy_test.cc
rename : security/sandbox/win/src/sync_policy_test.h => security/sandbox/chromium/sandbox/win/src/sync_policy_test.h
rename : security/sandbox/win/src/target_interceptions.cc => security/sandbox/chromium/sandbox/win/src/target_interceptions.cc
rename : security/sandbox/win/src/target_interceptions.h => security/sandbox/chromium/sandbox/win/src/target_interceptions.h
rename : security/sandbox/win/src/target_process.cc => security/sandbox/chromium/sandbox/win/src/target_process.cc
rename : security/sandbox/win/src/target_process.h => security/sandbox/chromium/sandbox/win/src/target_process.h
rename : security/sandbox/win/src/target_services.cc => security/sandbox/chromium/sandbox/win/src/target_services.cc
rename : security/sandbox/win/src/target_services.h => security/sandbox/chromium/sandbox/win/src/target_services.h
rename : security/sandbox/win/src/threadpool_unittest.cc => security/sandbox/chromium/sandbox/win/src/threadpool_unittest.cc
rename : security/sandbox/win/src/unload_dll_test.cc => security/sandbox/chromium/sandbox/win/src/unload_dll_test.cc
rename : security/sandbox/win/src/win2k_threadpool.cc => security/sandbox/chromium/sandbox/win/src/win2k_threadpool.cc
rename : security/sandbox/win/src/win2k_threadpool.h => security/sandbox/chromium/sandbox/win/src/win2k_threadpool.h
rename : security/sandbox/win/src/win_utils.cc => security/sandbox/chromium/sandbox/win/src/win_utils.cc
rename : security/sandbox/win/src/win_utils.h => security/sandbox/chromium/sandbox/win/src/win_utils.h
rename : security/sandbox/win/src/win_utils_unittest.cc => security/sandbox/chromium/sandbox/win/src/win_utils_unittest.cc
rename : security/sandbox/win/src/window.cc => security/sandbox/chromium/sandbox/win/src/window.cc
rename : security/sandbox/win/src/window.h => security/sandbox/chromium/sandbox/win/src/window.h
2015-01-22 08:37:31 +00:00
Bob Owen
ec569fff70
Bug 1102215: Move security/sandbox/chromium/base/shim/ to new directory security/sandbox/chromium-shim/ r=ted
...
--HG--
rename : security/sandbox/chromium/base/shim/base/gtest_prod_util.h => security/sandbox/chromium-shim/base/gtest_prod_util.h
rename : security/sandbox/chromium/base/shim/base/logging.cpp => security/sandbox/chromium-shim/base/logging.cpp
rename : security/sandbox/chromium/base/shim/base/strings/string_piece.h => security/sandbox/chromium-shim/base/strings/string_piece.h
rename : security/sandbox/chromium/base/shim/base/third_party/nspr/prtime.h => security/sandbox/chromium-shim/base/third_party/nspr/prtime.h
rename : security/sandbox/chromium/base/shim/base/third_party/nspr/prtypes.h => security/sandbox/chromium-shim/base/third_party/nspr/prtypes.h
rename : security/sandbox/chromium/base/shim/base/threading/thread_local_storage.h => security/sandbox/chromium-shim/base/threading/thread_local_storage.h
rename : security/sandbox/chromium/base/shim/base/tracked_objects.h => security/sandbox/chromium-shim/base/tracked_objects.h
rename : security/sandbox/chromium/base/shim/base/win/registry.h => security/sandbox/chromium-shim/base/win/registry.h
rename : security/sandbox/chromium/base/shim/sdkdecls.h => security/sandbox/chromium-shim/base/win/sdkdecls.h
rename : security/sandbox/win/src/logging/loggingCallbacks.h => security/sandbox/chromium-shim/sandbox/win/loggingCallbacks.h
rename : security/sandbox/win/src/logging/loggingTypes.h => security/sandbox/chromium-shim/sandbox/win/loggingTypes.h
rename : security/sandbox/win/src/logging/sandboxLogging.cpp => security/sandbox/chromium-shim/sandbox/win/sandboxLogging.cpp
rename : security/sandbox/win/src/logging/sandboxLogging.h => security/sandbox/chromium-shim/sandbox/win/sandboxLogging.h
2015-01-22 08:37:30 +00:00
Bob Owen
2b11d85b9b
Bug 1102211: Move security/sandbox/build/ into security/sandbox/chromium/ r=ted
...
--HG--
rename : security/sandbox/build/build_config.h => security/sandbox/chromium/build/build_config.h
rename : security/sandbox/chromium-commit-status.txt => security/sandbox/moz-chromium-commit-status.txt
2015-01-22 08:37:30 +00:00
Bob Owen
8c9dd30f1f
Bug 1121479 Part 4: Turn on DLL_SEARCH_ORDER process-level mitigation for the GMP sandbox. r=tabraldes
2015-01-21 07:59:56 +00:00
Bob Owen
86b8e2d513
Bug 1121479 Part 3: Turn on HEAP_TERMINATE process-level mitigation for the GMP sandbox. r=tabraldes
2015-01-21 07:59:56 +00:00
Bob Owen
b7d1421bfb
Bug 1121479 Part 2: Turn on SEHOP process-level mitigation for the GMP sandbox. r=tabraldes
2015-01-21 07:59:56 +00:00
Bob Owen
ac6485a47e
Bug 1121479 Part 1: Turn on DEP process-level mitigation for the GMP sandbox. r=tabraldes
2015-01-21 07:59:56 +00:00
Brian Smith
7f02c207f4
Bug 1119072, Part 6: Change a non-conforming usage of a const value type to a non-const value type, which VS2015 rightly rejects, r=bobowencode
...
--HG--
extra : rebase_source : 6c8c669d061eb3a107821b23829cd5d029e3eb2b
2015-01-07 23:28:51 -08:00
Brian Smith
83bbd634d6
Bug 1119072, Part 3(b): Silence warning about deprecated use of hash_set and hash_map in security/sandbox, r=jld
...
--HG--
extra : rebase_source : f3e4acd7c2a63566c526a52b339a8d1c325a14d7
2015-01-12 19:58:43 -08:00
Masatoshi Kimura
bf312ad056
Bug 1120062 - Part 1: Remove most Nullptr.h includes. r=waldo
2015-01-11 11:34:52 +09:00
Mike Hommey
08e140cb0d
Bug 1110760 - Build and Package Chromium Sandbox wow_helper. r=gps
2015-01-08 10:44:41 +09:00
Mike Hommey
d4e8fd3af2
Bug 1110760 - Increase the chances of the wow_helper target code symbols being in the assumed order. r=aklotz
2015-01-08 10:44:41 +09:00
Bob Owen
cc298a9892
Bug 1110760 - Import Chromium Sandbox wow_helper code. r=aklotz
2015-01-08 10:44:40 +09:00
Nicholas Nethercote
f8c3848cd7
Bug 1117611 - Fix shadowed variable in SandboxBroker::SetSecurityLevelForContentProcess(). r=bobowen.
...
--HG--
extra : rebase_source : 29f25cc34bd5f66bac2454c30613344fb63a92b5
2015-01-05 15:54:22 -08:00
Kai-Zhen Li
b2ba6d9ceb
bug 1102277 - Update seccomp filter for newer bionic. r=jld
2014-11-21 01:07:15 +08:00
Jed Davis
344f6abf7b
Bug 1093334 - Delete unnecessary copies of Chromium headers in security/sandbox/linux. r=kang
2014-12-10 17:26:12 -08:00
Jed Davis
c2384cf7c7
Bug 1093334 - Adjust includes of Linux sandboxing headers from Chromium. r=kang
...
Also re-sorts some of the includes into something closer to the style guide.
2014-12-10 17:26:12 -08:00
Jed Davis
30e88baa98
Bug 1093334 - Import more headers from Chromium rev 9522fad406dd161400daa518075828e47bd47f60. r=kang
2014-12-10 17:26:12 -08:00
Jed Davis
30ba635db0
Bug 1102209 - Remove use of CodeGen::JoinInstructions in the Linux sandboxing code. r=kang
...
This reorganizes SandboxAssembler to stack up the policy rules and
traverse them in reverse order to build the filter DAG from tail to head
(i.e., starting with "deny all" and prepending allow and return-errno
rules). Thus, this code will continue to work (perhaps with minor
changes, such as to the NodePtr typedef) with future versions of the
Chromium sandbox code that don't allow mutating the filter program with
the JoinInstructions method.
2014-12-10 17:26:12 -08:00
Jed Davis
114cf4fb41
Bug 1108759 - Fix B2G no-optimization builds. r=glandium
2014-12-10 16:17:47 -08:00
Ryan VanderMeulen
529edd40b5
Merge inbound to m-c. a=merge
2014-12-08 15:46:14 -05:00
Jay Wang
56bf9455a1
Bug 1105452 - Need to use new Audio system APIs for audio offload playback. r=roc, r=jld, r=ggrisco
...
Resolve the build failure caused by API changes
There are some changes in Audio APIs in Android version
21. Modifying the code to use the new APIs.
Change-Id: I24fdeb20f8f957d05fb6c0c317de0a6f0769c347
Resolve seccomp violation caused by syscall 256
Modify the filter to allow syscall 256 (set_tid_address).
Change-Id: I49461770c4c5e70bf68462d34321381b0b7ead0a
2014-12-02 17:10:00 -05:00
Steven Michaud
08c8931f01
Bug 1083284 - New sandbox rules for Adobe's code fragment. r=areinald
2014-12-08 12:10:14 -06:00
Bob Owen
e4d5592832
Bug 1105729: Pre VS2010 SP1 define our own verion of _xgetbv. r=tabraldes
2014-11-28 18:58:33 +00:00
Bob Owen
986cd576ef
Bug 1094667: Use the USER_NON_ADMIN access token by default for the Windows content sandbox. r=tabraldes
2014-11-29 17:12:18 +00:00
Bob Owen
ba7a2fa911
Bug 928044 Part 3: Add logging changes back into the Chromium interception code. r=tabraldes
2014-11-29 17:12:18 +00:00
Bob Owen
b539721eb8
Bug 928044 Part 2: Enable the content sandbox by default on Windows with an open policy. r=tabraldes,glandium,jimm
...
--HG--
rename : security/sandbox/win/src/warnonlysandbox/wosCallbacks.h => security/sandbox/win/src/logging/loggingCallbacks.h
rename : security/sandbox/win/src/warnonlysandbox/wosTypes.h => security/sandbox/win/src/logging/loggingTypes.h
rename : security/sandbox/win/src/warnonlysandbox/warnOnlySandbox.cpp => security/sandbox/win/src/logging/sandboxLogging.cpp
rename : security/sandbox/win/src/warnonlysandbox/warnOnlySandbox.h => security/sandbox/win/src/logging/sandboxLogging.h
2014-11-29 17:12:18 +00:00
Bob Owen
888a5871f3
Bug 928044 Part 1: Remove Chromium interception logging changes. r=tabraldes
2014-11-29 17:12:17 +00:00
Bob Owen
c0ebc7a31b
Bug 1027902: Use an intial integrity level of low for the GMP sandbox on Windows. r=tabraldes
2014-11-27 08:44:45 +00:00
Bob Owen
2a1adf9b3e
Bug 1041775 Part 3: Re-apply pre-vista stdout/err process inheritance change to Chromium code after merge. r=tabraldes
...
Originally landed as changsets:
https://hg.mozilla.org/mozilla-central/rev/f94a07671389
2014-11-18 15:11:47 +00:00
Bob Owen
44cdc5f024
Bug 1041775 Part 2: Re-apply warn only sandbox changes to Chromium code after merge. r=tabraldes
...
Originally landed as changsets:
https://hg.mozilla.org/mozilla-central/rev/e7eef85c1b0a
https://hg.mozilla.org/mozilla-central/rev/8d0aca89e1b2
2014-11-18 15:09:55 +00:00
Bob Owen
ba0931eb1d
Bug 1041775 Part 1: Update Chromium sandbox code to commit 9522fad406dd161400daa518075828e47bd47f60. r=jld,aklotz,glandium
...
--HG--
rename : security/sandbox/chromium/sandbox/linux/sandbox_export.h => security/sandbox/chromium/sandbox/sandbox_export.h
2014-11-18 13:48:21 +00:00
Jed Davis
1b16fc180f
Bug 1101170 - Move Linux sandbox code into plugin-container on desktop. r=kang r=glandium
...
Specifically:
* SandboxCrash() uses internal Gecko interfaces, so stays in libxul.
* SandboxInfo moves to libxul from libmozsandbox, which no longer exists.
* Where libxul calls Set*Sandbox(), it uses weak symbols.
* Everything remains as it was on mobile.
2014-11-24 15:22:13 -08:00
Jed Davis
2fdd7150c1
Bug 1101170 - Move sandbox status info into a separate module. r=kang r=glandium
...
This changes the interface so that the code which determines the flags
can live in one place, but checking the flags doesn't need to call into
another library.
Also removes the no-op wrappers for Set*Sandbox when disabled at build
time; nothing used them, one of them was unusable due to having the wrong
type, and all they really accomplish is allowing sloppiness with ifdefs
(which could hide actual mistakes).
2014-11-24 15:22:13 -08:00
Carsten "Tomcat" Book
9401e46090
Backed out changeset 1aebb84c8af1 (bug 1041775) for Windows 8 PGO Build Bustage on a CLOSED TREE
...
--HG--
rename : security/sandbox/chromium/sandbox/sandbox_export.h => security/sandbox/chromium/sandbox/linux/sandbox_export.h
2014-11-20 16:11:56 +01:00
Carsten "Tomcat" Book
345b36dfd5
Backed out changeset ec63befb3ad7 (bug 1041775)
2014-11-20 16:11:12 +01:00
Carsten "Tomcat" Book
0100273df4
Backed out changeset ebe866ff8a44 (bug 1041775)
2014-11-20 16:11:06 +01:00
Bob Owen
e5b2da099b
Bug 1041775 Part 3: Re-apply pre-vista stdout/err process inheritance change to Chromium code after merge. r=tabraldes
...
Originally landed as changsets:
https://hg.mozilla.org/mozilla-central/rev/f94a07671389
2014-11-18 15:11:47 +00:00
Bob Owen
9559e348ee
Bug 1041775 Part 2: Re-apply warn only sandbox changes to Chromium code after merge. r=tabraldes
...
Originally landed as changsets:
https://hg.mozilla.org/mozilla-central/rev/e7eef85c1b0a
https://hg.mozilla.org/mozilla-central/rev/8d0aca89e1b2
2014-11-18 15:09:55 +00:00
Bob Owen
af79dfc438
Bug 1041775 Part 1: Update Chromium sandbox code to commit 9522fad406dd161400daa518075828e47bd47f60. r=jld,aklotz
...
--HG--
rename : security/sandbox/chromium/sandbox/linux/sandbox_export.h => security/sandbox/chromium/sandbox/sandbox_export.h
2014-11-18 13:48:21 +00:00
Chris Peterson
ba22404db5
Bug 1095926 - Fix -Wcomment warning in OCSP test and mark some OCSP tests as FAIL_ON_WARNINGS. r=briansmith
2014-10-11 20:13:45 -07:00
Jed Davis
59573e5f85
Bug 1077057 - Expose Linux sandboxing information to JS via nsSystemInfo. r=kang r=froydnj
...
This adds "hasSeccompBPF" for seccomp-bpf support; other "has" keys
will be added in the future (e.g., user namespaces).
This also adds "canSandboxContent" and "canSandboxMedia", which are
absent if the corresponding type of sandboxing isn't enabled at build
type (or is disabled with environment variables), and otherwise present
as a boolean indicating whether that type of sandboxing is supported.
Currently this is always the same as hasSeccompBPF, but that could change
in the future.
Some changes have been made to the "mozilla/Sandbox.h" interface to
support this; the idea is that the MOZ_DISABLE_*_SANDBOX environment
variables should be equivalent to disabling MOZ_*_SANDBOX at build time.
2014-11-06 13:11:00 +01:00
Jed Davis
e6ede214a5
Bug 1093893 - Fix B2G sandbox for ICS Bionic pthread_kill(). r=kang
2014-11-06 11:04:14 -08:00
Bob Owen
5cc944a89b
Bug 1076903: Add a Chromium LICENSE file to security/sandbox/win/src. r=gerv
2014-11-03 15:34:26 +00:00
André Reinald
436338cb49
Bug 1076385 - Sandbox the content process on Mac. r=smichaud
2014-10-30 13:33:17 -05:00
Mike Hommey
47c853314f
Bug 1077148 part 4 - Add and use new moz.build templates for Gecko programs and libraries. r=gps
...
There are, sadly, many combinations of linkage in use throughout the tree.
The main differentiator, though, is between program/libraries related to
Gecko or not. Kind of. Some need mozglue, some don't. Some need dependent
linkage, some standalone.
Anyways, these new templates remove the need to manually define the
right dependencies against xpcomglue, nspr, mozalloc and mozglue
in most cases.
Places that build programs and were resetting MOZ_GLUE_PROGRAM_LDFLAGS
or that build libraries and were resetting MOZ_GLUE_LDFLAGS can now
just not use those Gecko-specific templates.
2014-10-30 13:06:12 +09:00
Jed Davis
5ec3c350dd
Bug 1081242 - Make ASAN's error reporting work while sandboxed on Linux. r=kang
2014-10-21 11:18:00 +02:00
Jed Davis
82a97e04c9
Bug 1078838 - Restrict clone(2) flags for sandboxed content processes. r=kang
...
--HG--
extra : amend_source : f80a3a672f5496f76d8649f0c8ab905044ea81ac
2014-10-20 12:29:25 -07:00
Jed Davis
67e50f1aa1
Bug 1080165 - Allow setpriority() to fail without crashing in media plugins on Linux. r=kang
2014-10-16 12:42:00 +02:00
Bob Owen
b9708b293b
Bug 1083701: When pre-Vista, for testing purposes allow stdout/err to be inherited by sandboxed process when an env var is set. r=tabraldes
2014-10-17 09:42:09 +01:00
Bob Owen
64a69cb8af
Bug 1080567: Don't report registry NAME_NOT_FOUND errors for the Windows warn only sandbox. r=tabraldes
2014-10-13 15:12:28 +01:00
Jed Davis
56cddbd763
Bug 1080077 - For sandbox failures with no crash reporter, log the C stack. r=kang
...
This is mostly for ASAN builds, which --disable-crash-reporter, but also
fixes a related papercut: debug builds don't use the crash reporter
unless overridden with an environment variable.
Note: this is Linux-only, so NS_StackWalk is always part of the build;
see also bug 1063455.
2014-10-13 18:48:17 -07:00
Nicholas Nethercote
94adb30f77
Bug 1062709 (part 2, attempt 2) - Clean up stack printing and fixing. r=dbaron.
...
--HG--
extra : rebase_source : 626fd23a14ec90cfc9807c3d555169ec6463d19d
2014-09-01 22:56:05 -07:00
Nicholas Nethercote
2eb56008e2
Bug 1062709 (part 1, attempt 2) - Add a frame number argument to NS_WalkStackCallback. r=dbaron.
...
--HG--
extra : rebase_source : 4f7060a9ae0bed180899651c50e8ea8857e72d63
2014-09-10 21:47:01 -07:00
Jed Davis
5043e01249
Bug 1068410 - Convert remote crash dump to use pipe instead of socketpair in the child. r=kang r=ted
2014-10-03 14:55:03 -07:00
Ed Morley
2d0f9579b5
Backed out changeset a0b82c954206 (bug 1062709) for Windows mochitest 5 hangs
2014-10-03 15:06:16 +01:00
Ed Morley
9e223d8a19
Backed out changeset 7a1b7d7eba12 (bug 1062709)
2014-10-03 15:05:26 +01:00
Nicholas Nethercote
5a257b83f9
Bug 1062709 (part 2) - Clean up stack printing and fixing. r=dbaron.
...
--HG--
extra : rebase_source : 18158d4474cb8826813a3866eba57b710e14db99
2014-09-01 22:56:05 -07:00
Nicholas Nethercote
c9c64de53c
Bug 1062709 (part 1) - Add a frame number argument to NS_WalkStackCallback. r=dbaron.
...
--HG--
extra : rebase_source : 0f9b2d6310433ed56f5552706fcf2a96571aee25
2014-09-10 21:47:01 -07:00
Bob Owen
27ae4de9b6
Bug 1068000 - Add client side chrome.* pipe rule for Windows content sandbox. r=tabraldes
2014-09-16 15:44:25 +01:00
Jed Davis
9fd62691c6
Bug 1069700 - Fix recursive crash when non-content children violate sandbox policy. r=kang
2014-09-18 18:17:00 -04:00
Trevor Saunders
4728b78382
bug 1062567 - prevent gcc lto builds from dropping SyscallAsm on the floor r=froydnj
2014-09-15 19:46:14 -04:00
Bob Owen
61056aa4db
Bug 1018988 - Set up a low integrity temp directory when using the Windows content sandbox. r=mrbkap r=tabraldes r=froydnj
2014-09-10 12:36:17 +01:00
Bob Owen
33eaabbf1f
Bug 1063455 - Define MOZ_STACKWALKING when NS_StackWalk is available and replace other instances of the same #if logic. r=mshal, r=froydnj
2014-09-08 18:25:20 +01:00
Jed Davis
af04cea2d8
Bug 1059038 - Move mozilla::unused from xpcom/glue to mfbt. r=Waldo
...
--HG--
rename : xpcom/glue/unused.cpp => mfbt/unused.cpp
rename : xpcom/glue/unused.h => mfbt/unused.h
2014-08-29 10:11:00 +02:00
Bob Owen
a9431992d5
Bug 1018966 - Part 2: Make warn only sandbox changes to the Chromium code. r=tabraldes
2014-09-03 10:31:53 +01:00
Bob Owen
f19448274c
Bug 1018966 - Part 1: Add the main warn only sandbox machinery - with no Chromium code changes. r=bsmedberg
...
This change also includes the content sandboxing code on Windows Nightly by defining MOZ_CONTENT_SANDBOX=1.
Whether the content sandbox is disabled, in warn only mode, or enabled is controlled by a new pref: browser.tabs.remote.sandbox=(off/warn/on)
2014-06-11 15:32:37 +01:00
Carsten "Tomcat" Book
d578571a85
Backed out changeset 5adabc2818b2 (bug 1018966) for b2g bustage
2014-09-04 15:14:41 +02:00
Carsten "Tomcat" Book
39fa254326
Backed out changeset 5d21dd9ca51e (bug 1018966) for b2g Build bustage
2014-09-04 15:13:14 +02:00
Bob Owen
ad41895771
Bug 1018966 - Part 2: Make warn only sandbox changes to the Chromium code. r=tabraldes
2014-09-03 10:31:53 +01:00
Bob Owen
0fdb849687
Bug 1018966 - Part 1: Add the main warn only sandbox machinery - with no Chromium code changes. r=bsmedberg r=tabraldes
...
This change also includes the content sandboxing code on Windows Nightly by defining MOZ_CONTENT_SANDBOX=1.
Whether the content sandbox is disabled, in warn only mode, or enabled is controlled by a new pref: browser.tabs.remote.sandbox=(off/warn/on)
2014-06-11 15:32:37 +01:00
Mike Hommey
4b99580194
Bug 1059113 - Use templates for shared libraries and frameworks. r=gps
...
Also force to use the existing template for XPCOM components.
2014-09-04 09:04:45 +09:00
Mike Hommey
ed70c5f377
Bug 1041941 - Use templates for programs, simple programs, libraries and C++ unit tests. r=gps
2014-09-03 14:10:54 +09:00
Jed Davis
1dfa299843
Bug 1061085 - Clean up misused export macros from bug 1041886. r=glandium
2014-08-31 23:23:00 +02:00
Tim Abraldes
ba6539ecd7
bug 1027906. Set delayed token level for GMP plugin processes to USER_RESTRICTED. Whitelist certain files and registry keys that are required for EME plugins to successfully load. r=bobowen. r=jesup. r=bent.
2014-08-29 17:34:26 -07:00
Jed Davis
1ea7e357ca
Bug 1059602 - Make libxul -> libmozsandbox dependency not a weak symbol. r=glandium
...
MFBT_API is not the right macro for this; it changes the affected
definition/usage to a weak symbol, for reasons explained in the comments
on its definition.
This was causing the linker to drop the dependency from libmozglue
to libmozsandbox, in some cases (--as-needed, with a linker that
doesn't consider weak symbols "needed"), and thus load libxul with
gSandboxCrashFunc relocated to address 0 (the expected behavior of an
unresolved weak symbol), which caused crashes when writing to it on
startup.
--HG--
extra : amend_source : b99fded391ae90b1311f4cabaf40f15e6414f245
2014-08-28 23:23:13 -07:00
David Major
db45c0b01a
Bug 1023941 - Part 2: Static-link the CRT into plugin-container.exe. r=glandium,f=tabraldes
...
--HG--
rename : security/sandbox/moz.build => security/sandbox/objs.mozbuild
extra : rebase_source : e0b1515a4729ecfe82a67b6439d9a38453f7556a
2014-08-28 14:50:10 +12:00
Jed Davis
3f1e2a85b6
Bug 1041886 - Fix no-opt-only build bustage caused by mozilla::unused. r=glandium
...
See also bug 1059038.
2014-08-26 19:23:44 -07:00
Jed Davis
3ae6c90876
Bug 1054616 - Clean up logging-related shims for Linux sandboxing. r=kang
2014-08-26 13:54:16 -07:00
Jed Davis
23c21aa709
Bug 1041886 - Separate Linux sandbox code into its own shared library. r=kang r=glandium
...
This creates libmozsandbox.so on builds that use sandboxing
(MOZ_CONTENT_SANDBOX or MOZ_GMP_SANDBOX).
The unavoidably libxul-dependent parts, for invoking the crash reporter
and printing the JS context, are separated into glue/SandboxCrash.cpp
and invoked via a callback.
2014-08-26 13:54:09 -07:00
Jed Davis
e020caf2de
Bug 1041886 - Break out Linux sandbox logging into its own header. r=kang
2014-08-26 13:54:03 -07:00
Steven Michaud
dfc4c053b1
Bug 1056936 - Specify full path to plugin-container in sandbox rules. r=rjesup
2014-08-25 15:01:04 -05:00
Masatoshi Kimura
f2fb78225b
Bug 1055541 - Fix build failure on VS2013 with --enable-warnings-as-errors due to Warning C4996. r=ehsan
2014-08-20 04:09:03 +09:00
Chris Peterson
64bed2314d
Bug 1052033 - Fix warnings in security/sandbox and mark as FAIL_ON_WARNINGS. r=smichaud
2014-08-09 14:25:24 -07:00
Jed Davis
1c8a8d2d9b
No bug - Add trailing newlines for non-Android Linux sandbox logging. r=kang
...
--HG--
extra : rebase_source : c0e936b62289c0e5eecad41fce9afac881fe4667
2014-08-14 15:39:14 -07:00
Jed Davis
033a6785eb
Bug 1043733 - Require sandboxing to load Gecko Media Plugins on Linux. r=jesup r=kang
...
Also refactors how sandbox support and disabling are handled, and allows
simulating a lack of sandbox support with an env var (for testing
without rebuilding a kernel).
2014-08-12 21:28:27 -07:00
Steven Michaud
844fdf04eb
Bug 1012949
- Sandbox the OpenH264 plugin for Mac r=rjesup,areinald,ted a=PatchNeedsToLandToday
2014-08-08 11:55:22 -05:00
Mike Hommey
89777800f9
Bug 1047267 - Move remaining OS_LIBS and EXTRA_LIBS to moz.build. r=gps
...
* * *
Bug 1047267 - To fold with "Move remaining OS_LIBS and EXTRA_LIBS to moz.build"
2014-08-07 14:21:03 +09:00
Mike Hommey
d9443ec932
Bug 1045783 - Move most OS_LIBS to moz.build and do some related cleanup. r=mshal
2014-08-06 07:25:33 +09:00
Jed Davis
b0bd63525b
Bug 1047620 - Fix sandboxing for B2G --disable-jemalloc builds. r=kang
...
--HG--
extra : rebase_source : 1b2ec6491277a9dc451ab767d8563076cf522c27
2014-08-04 15:11:33 -07:00
Jed Davis
9d31844f0c
Bug 1012951 - Add Linux sandboxing for GeckoMediaPlugin processes. r=kang r=ted
...
--HG--
extra : rebase_source : 1b890000d5b8d2a8954cdd1118a1023eba829c29
2014-08-04 15:11:18 -07:00
Jed Davis
d2d145dc65
Bug 1046541 - Use stdio for non-Android Linux sandbox error messages. r=kang
...
--HG--
extra : rebase_source : e93a4a76f8188d715886e263a366d694c28b4525
2014-08-04 15:11:04 -07:00
Jed Davis
9b70e225e5
Bug 1046525 - Allow get{e,}gid and sched_{g,s}etparam in sandboxed content processes. r=kang
...
Some of these were already in the desktop whitelist; those duplicates
are removed.
--HG--
extra : amend_source : 3ab4b50e3f1980b4d7b93cc17f34b926e2aa2396
2014-08-01 15:05:44 -07:00
Ed Morley
dcbfd040d1
Backed out changeset d50d7e88f35e (bug 1012951) for LSan failures
2014-07-30 16:49:43 +01:00
Jed Davis
8cff1bfff8
Bug 1012951 - Sandbox GMP plugins on Linux using seccomp-bpf. r=kang r=ted
2014-07-29 15:31:12 -07:00
Jed Davis
301d254a40
Bug 1017393 - Record rejected syscall number in crash dump. r=kang
2014-07-24 11:36:00 +02:00
Mike Hommey
95063176fa
Bug 1036894
part 9 - Replace all EXTRA_DSO_LDOPTS, SHARED_LIBRARY_LIBS and LIBS with EXTRA_LIBS, OS_LIBS or OS_LDFLAGS, appropriately. r=gps
...
OS_LIBS for libraries that are not part of the gecko tree, EXTRA_LIBS for
libraries, such as NSPR, that are in the tree, but are not handled by
moz.build just yet. Those EXTRA_LIBS may also come from a system library.
However, in cases where the expanded variables are always empty for the
in-tree case, OS_LIBS is used (as for, e.g. MOZ_ZLIB_LIBS). OS_LDFLAGS is
used exclusively for non-library linker flags.
Always pass EXTRA_LIBS before OS_LIBS on linker command lines.
Forbid EXTRA_DSO_LDOPTS, SHARED_LIBRARY_LIBS and LIBS in Makefiles.
2014-07-23 13:31:02 +09:00
Mike Hommey
5fab42fcaf
Bug 1036894
part 8 - Move most in-tree library linkage information to moz.build, as USE_LIBS. r=gps
2014-07-23 13:30:52 +09:00
Ehsan Akhgari
a50127383b
Bug 1041325 - Use intrin.h for _ReturnAddress in the chromium sandbox code; r=bbondy
...
--HG--
extra : rebase_source : 06bb642636a9f3df2e75eb950816a7d48da85faf
2014-07-20 19:05:44 -04:00
Jed Davis
90ebf4e684
Bug 1037211 - Remove MOZ_CONTENT_SANDBOX_REPORTER by making it always true. r=kang r=ted
...
--HG--
extra : amend_source : 450d51dab077794e194bf407044de95627de0cde
2014-07-17 14:57:28 -07:00
Jed Davis
c55ab9dd20
Bug 1038900 - Dynamically allocate signal number for sandbox startup. r=kang
2014-07-16 13:37:00 +02:00
Tim Abraldes
1aaa7148c1
bug 985252. Build sandbox code regardless of whether --enable-content-sandbox/MOZ_CONTENT_SANDBOX is provided. Enable sandboxing of GMP plugins. Enable `SandboxBroker` to set different security policies for different process types. r=bbondy, r=cpearce, r=bent
2014-07-16 16:01:34 -07:00
Bob Owen
d1da9cff99
Bug 1035275 - Remove unused base Chromium code. r=bbondy
2014-07-07 13:59:11 +01:00
Jed Davis
2ff3fcad0d
Bug 1038490 - Fix misuse of MOZ_WIDGET_GONK in Linux content process sandbox policy. r=kang
...
--HG--
extra : amend_source : 0a7fe8ca751b59102cbc23316b18982268306423
2014-07-14 18:35:56 -07:00
Jed Davis
79f8763545
Bug 1038486 - Fix Linux desktop seccomp sandbox build on 32-bit x86. r=kang
...
--HG--
extra : amend_source : 130d2cbd485734997739ea96ac5d83c01899d8b0
2014-07-09 16:52:56 -07:00
jvoisin
20443103f0
Bug 1035786 - Fix namespace bug in Linux sandbox LOG_ERROR macro. r=jld
2014-07-08 05:53:00 +01:00
Jed Davis
51e7e12a6c
Bug 1035786 - Avoid warning-as-error sandbox build failure with an explicit cast. r=gdestuynder
...
getpid() is never negative, so this is safe.
2014-07-10 17:37:45 -07:00
Bob Owen
d9210e4477
Bug 1035786 - Fix member variable initialisation order in LogMessage stub in Linux Sandbox.cpp. r=jld
2014-07-09 12:32:49 +01:00
Mike Hommey
70a5917917
Bug 1036864 - Remove EXPORT_LIBRARY. r=mshal
2014-07-11 19:06:55 +09:00
Jed Davis
afdeb7bf07
Bug 956961 - Stop disabling sandboxing when DMD is enabled. r=kang
...
--HG--
extra : rebase_source : 4737cfd613c1ddee8e1a4340e819eddc151e73f7
extra : histedit_source : 2d2610a775a3ae986157f61ef3797f4e88baa922
2014-07-02 11:28:48 -07:00
Wes Kocher
03cdc19fec
Backed out 3 changesets (bug 956961) for non-unified build bustage
...
Backed out changeset f1be89cb58b9 (bug 956961)
Backed out changeset 272b01e4f856 (bug 956961)
Backed out changeset 56907af18c66 (bug 956961)
2014-07-02 15:03:29 -07:00
Jed Davis
1ef012aafb
Bug 956961 - Stop disabling sandboxing when DMD is enabled. r=kang
...
--HG--
extra : amend_source : 66f2453794e6a8a581e1564e786cfc8cac1f6bbd
2014-07-02 11:28:48 -07:00
Jed Davis
0fb3cb7f61
Bug 1014299 - Add times() to seccomp whitelist. r=kang
...
This system call seems to be used by some versions of the Qualcomm Adreno
graphics drivers when we run WebGL apps.
2014-06-02 14:52:00 +02:00
Bob Owen
a597c57860
Bug 1009452 - inherit stdout and stderr into the content process to allow logging. r=aklotz
2014-05-14 16:09:31 +01:00
Jed Davis
9f78dc2ea0
Bug 920372 - Fix socketcall whitelisting on i386. r=kang
2014-05-20 18:38:14 -07:00
Jed Davis
f6ffcab30d
Bug 920372 - Allow tgkill only for threads of the calling process itself. r=kang
2014-05-20 18:38:06 -07:00
Jed Davis
ebb89f61f4
Bug 920372 - Use Chromium seccomp-bpf compiler to dynamically build sandbox program. r=kang
2014-05-20 18:37:53 -07:00
Jed Davis
9e94aea459
Bug 920372 - Import Chromium seccomp-bpf compiler, rev 4c08f442d2588a2c7cfaa117a55bd87d2ac32f9a. r=kang
...
Newly imported:
* sandbox/linux/seccomp-bpf/
* sandbox/linux/sandbox_export.h
* base/posix/eintr_wrapper.h
Updated:
* base/basictypes.h
* base/macros.h
At the time of this writing (see future patches for this bug) the only
things we're using from sandbox/linux/seccomp-bpf/ are codegen.cc and
basicblock.cc, and the header files they require. However, we may use
more of this code in the future, and it seems cleaner in general to
import the entire subtree.
2014-05-20 18:37:45 -07:00
Jed Davis
3ab8eb01df
Bug 1004832 - Add tgkill to seccomp-bpf whitelist. r=kang
2014-05-02 16:57:00 +02:00
Jed Davis
3fd7deadb7
Bug 997409 - Add set_thread_area to seccomp whitelist if available. r=kang
2014-04-17 16:23:23 -04:00
Jed Davis
59ee14f2ce
Bug 981949 - Whitelist ftruncate for seccomp-bpf sandboxing. r=kang
2014-04-11 13:09:00 +02:00
Boris Zbarsky
e3cb82bf06
Bug 995047 followup. Fix a caller that I missed because it's only compiled on some platforms, so we can reopen the CLOSED TREE
2014-04-12 00:38:06 -04:00
Jed Davis
7f0d9d7eb4
Bug 993145 - Skip attempting seccomp sandboxing if seccomp unavailable. r=kang
2014-04-09 15:23:00 +02:00
Bob Owen
e5a5d4a701
Bug 928062 - Set Windows sandbox delayed integrity level to INTEGRITY_LEVEL_LOW. r=aklotz
2014-04-08 16:25:18 +01:00
Jed Davis
628fb11481
Bug 989172 - Re-add sigaltstack to seccomp whitelist. r=kang
...
This reinstates the patch from bug 983518, which was unintentionally
dropped while merging with the reorganization in bug 985227.
2014-03-28 17:58:26 -07:00
Makoto Kato
2244b78e3a
Bug 987888 - --enable-content-sandbox breaks 64-bit builds. r=dkeeler,r=mshal
2014-03-28 13:59:16 +09:00
Jed Davis
5a499cf36e
Bug 985227 - Part 3: Replace the seccomp filter arch ifdefs with syscall existence tests. r=kang
2014-03-20 10:19:42 -04:00
Jed Davis
ebdd7da812
Bug 985227 - Part 2: Flatten out the #define maze in the seccomp filter. r=kang
2014-03-20 10:19:42 -04:00
Jed Davis
5ddfd55b71
Bug 985227 - Part 1: Move the seccomp filter into its own translation unit. r=kang
...
--HG--
rename : security/sandbox/linux/seccomp_filter.h => security/sandbox/linux/SandboxFilter.cpp
2014-03-20 10:19:42 -04:00
Jed Davis
3c61d46763
Bug 975273 - Add missing include to unbreak desktop seccomp build. r=kang
2014-03-20 09:27:28 -04:00
Phil Ringnalda
4f870b786b
Merge m-c to m-i
2014-03-15 12:32:04 -07:00
Kyle Huey
fe6c4e28d6
Bug 967364: Rename already_AddRefed::get to take. r=bsmedberg
2014-03-15 12:00:15 -07:00
Guillaume Destuynder
6034a4eab4
Bug 983518: Fix running B2G-1.4 on KitKat by whitelisting sigalstack in the sandbox. r=kang r=jld
2014-03-14 18:54:20 -07:00
Vicamo Yang
c7a5c70ed1
Bug 944625 - B2G Emulator-x86: fix undeclared __NR_sendto, __NR_recvfrom. r=jld,kang
2014-03-13 13:44:43 +09:00
Jed Davis
154d9c5e2a
Bug 977859 - Drop uid 0 in all content processes immediately after fork. r=bent r=kang
...
Now all regular child processes, including preallocated, are deprivileged.
Only Nuwa needs uid 0, because each of its children has a different uid/gid.
2014-03-12 15:48:15 -07:00
Jed Davis
0b447036a1
Bug 979686 - Fix the non-(ARM|x86|x86_64) desktop build. r=kang
2014-03-06 12:23:06 -08:00
Brian R. Bondy
f2c70589f0
Bug 941110 - Make the Windows sandbox code compile without the Win8 SDK. r=jimm
2014-03-06 12:53:24 -05:00
Jed Davis
a76ee1d66c
Bug 946407 - Disable sandbox when DMDing. r=njn r=kang
...
See also bug 956961.
2014-03-04 18:27:14 -08:00
Ehsan Akhgari
17f4a32d8b
Bug 976896 - Port STL_FLAGS to moz.build; r=mshal
2014-03-04 19:39:06 -05:00
Ryan VanderMeulen
bc6f7d9058
Merge m-c to inbound.
2014-02-28 10:15:57 -05:00
Jed Davis
789c3d2ddb
Bug 970676 - Turn on sandboxing on all relevant threads. r=dhylands r=bent f=kang
2014-02-27 13:18:01 -08:00
Ehsan Akhgari
95a47b6810
Bug 976898 - Move the sdkdecls.h force-include out of the build system; r=bbondy,glandium
2014-02-28 08:17:22 -05:00
Jed Davis
065803a376
Bug 971128 - Add sched_yield to seccomp whitelist. r=kang
2014-02-22 18:58:59 -08:00
Jed Davis
de99e18e18
Bug 970562 - Add sched_getscheduler to seccomp whitelist. r=kang
2014-02-22 18:58:59 -08:00
Brian R. Bondy
99f63f63b5
Bug 974979 - Browser crashes after trying to restart a crashed e10s process. r=aklotz
2014-02-20 12:58:04 -05:00
Brian R. Bondy
0551446474
Bug 928061 - Enable separate Desktop in Windows sandbox policy. r=aklotz
2014-02-20 12:37:22 -05:00
Jed Davis
ad35f7df7c
Bug 974230 - Adjust sandbox so that socket() simply fails. r=kang
...
This is a workaround for issues with the SCTP code (bug 969715) and
NSPR's IPv6 support (bug 936320).
2014-02-20 09:35:44 -05:00
Jed Davis
3a2e9e491d
Bug 966547 - Switch sipcc from named to anonymous sockets on Unix. r=jesup, r=kang
2014-02-20 09:35:26 -05:00
Jed Davis
c630909fd0
Bug 974227 - Allow readlink while sandboxed to work around bug 964455. r=kang
2014-02-19 15:55:42 -05:00
Ehsan Akhgari
9df66916f4
Bug 973405 - Move some misc LOCAL_INCLUDES to moz.build; r=glandium
2014-02-18 08:49:12 -05:00
Ms2ger
33da18c67e
Bug 968856 - Move unconditional LOCAL_INCLUDES into moz.build; r=mshal
2014-02-15 21:24:59 +01:00
Brian R. Bondy
88633c121b
Bug 969559 - Set delayed restricted integrity in child process to block off pipe and file access after LowerToken call. r=aklotz
2014-02-14 11:07:16 -05:00
Wes Kocher
3211da1532
Merge m-c to inbound on a CLOSED TREE
2014-02-13 18:50:08 -08:00
Jed Davis
abe287ce8a
Bug 971370 - Fix seccomp whitelist errors caused by strace bug. r=kang
2014-02-13 09:47:16 -05:00
Guillaume Destuynder
5957791d98
bug 948620 - Add env variable MOZ_DISABLE_CONTENT_SANDBOX to disable sandbox at runtime. r=jld
2014-02-13 16:26:28 -08:00
Jed Davis
be875d9a91
Bug 945504 - Include JS stack in sandbox reporter logs. r=kang
2014-02-07 10:46:38 -05:00
Eric Rahm
4fd1e475bc
Bug 969126 - Fix sandbox build for b2g on OS X. r=kang
2014-02-06 16:11:53 -08:00
Jed Davis
9af16a662a
Bug 945498 - Use breakpad to report seccomp violations as crashes. r=ted, r=kang
...
Upstream issue for breakpad patch: https://breakpad.appspot.com/1114003/
2014-02-05 13:29:51 -05:00
Brian R. Bondy
e351d68da5
Bug 961757 - Add the ability to include shim first for a buildable sandbox on Windows. r=glandium
...
--HG--
rename : security/sandbox/base/at_exit.cc => security/sandbox/chromium/base/at_exit.cc
rename : security/sandbox/base/at_exit.h => security/sandbox/chromium/base/at_exit.h
rename : security/sandbox/base/atomic_ref_count.h => security/sandbox/chromium/base/atomic_ref_count.h
rename : security/sandbox/base/atomic_sequence_num.h => security/sandbox/chromium/base/atomic_sequence_num.h
rename : security/sandbox/base/atomicops.h => security/sandbox/chromium/base/atomicops.h
rename : security/sandbox/base/atomicops_internals_tsan.h => security/sandbox/chromium/base/atomicops_internals_tsan.h
rename : security/sandbox/base/atomicops_internals_x86_gcc.h => security/sandbox/chromium/base/atomicops_internals_x86_gcc.h
rename : security/sandbox/base/atomicops_internals_x86_msvc.h => security/sandbox/chromium/base/atomicops_internals_x86_msvc.h
rename : security/sandbox/base/base_export.h => security/sandbox/chromium/base/base_export.h
rename : security/sandbox/base/base_paths.cc => security/sandbox/chromium/base/base_paths.cc
rename : security/sandbox/base/base_paths.h => security/sandbox/chromium/base/base_paths.h
rename : security/sandbox/base/base_paths_win.cc => security/sandbox/chromium/base/base_paths_win.cc
rename : security/sandbox/base/base_paths_win.h => security/sandbox/chromium/base/base_paths_win.h
rename : security/sandbox/base/base_switches.cc => security/sandbox/chromium/base/base_switches.cc
rename : security/sandbox/base/base_switches.h => security/sandbox/chromium/base/base_switches.h
rename : security/sandbox/base/basictypes.h => security/sandbox/chromium/base/basictypes.h
rename : security/sandbox/base/bind.h => security/sandbox/chromium/base/bind.h
rename : security/sandbox/base/bind_helpers.h => security/sandbox/chromium/base/bind_helpers.h
rename : security/sandbox/base/bind_internal.h => security/sandbox/chromium/base/bind_internal.h
rename : security/sandbox/base/bind_internal_win.h => security/sandbox/chromium/base/bind_internal_win.h
rename : security/sandbox/base/callback.h => security/sandbox/chromium/base/callback.h
rename : security/sandbox/base/callback_forward.h => security/sandbox/chromium/base/callback_forward.h
rename : security/sandbox/base/callback_internal.cc => security/sandbox/chromium/base/callback_internal.cc
rename : security/sandbox/base/callback_internal.h => security/sandbox/chromium/base/callback_internal.h
rename : security/sandbox/base/command_line.cc => security/sandbox/chromium/base/command_line.cc
rename : security/sandbox/base/command_line.h => security/sandbox/chromium/base/command_line.h
rename : security/sandbox/base/compiler_specific.h => security/sandbox/chromium/base/compiler_specific.h
rename : security/sandbox/base/containers/hash_tables.h => security/sandbox/chromium/base/containers/hash_tables.h
rename : security/sandbox/base/cpu.cc => security/sandbox/chromium/base/cpu.cc
rename : security/sandbox/base/cpu.h => security/sandbox/chromium/base/cpu.h
rename : security/sandbox/base/critical_closure.h => security/sandbox/chromium/base/critical_closure.h
rename : security/sandbox/base/debug/alias.cc => security/sandbox/chromium/base/debug/alias.cc
rename : security/sandbox/base/debug/alias.h => security/sandbox/chromium/base/debug/alias.h
rename : security/sandbox/base/debug/debugger.h => security/sandbox/chromium/base/debug/debugger.h
rename : security/sandbox/base/debug/leak_annotations.h => security/sandbox/chromium/base/debug/leak_annotations.h
rename : security/sandbox/base/debug/profiler.cc => security/sandbox/chromium/base/debug/profiler.cc
rename : security/sandbox/base/debug/profiler.h => security/sandbox/chromium/base/debug/profiler.h
rename : security/sandbox/base/environment.h => security/sandbox/chromium/base/environment.h
rename : security/sandbox/base/file_descriptor_posix.h => security/sandbox/chromium/base/file_descriptor_posix.h
rename : security/sandbox/base/file_util.cc => security/sandbox/chromium/base/file_util.cc
rename : security/sandbox/base/file_util.h => security/sandbox/chromium/base/file_util.h
rename : security/sandbox/base/file_util_win.cc => security/sandbox/chromium/base/file_util_win.cc
rename : security/sandbox/base/file_version_info.h => security/sandbox/chromium/base/file_version_info.h
rename : security/sandbox/base/file_version_info_win.h => security/sandbox/chromium/base/file_version_info_win.h
rename : security/sandbox/base/files/file_path.h => security/sandbox/chromium/base/files/file_path.h
rename : security/sandbox/base/float_util.h => security/sandbox/chromium/base/float_util.h
rename : security/sandbox/base/format_macros.h => security/sandbox/chromium/base/format_macros.h
rename : security/sandbox/base/guid.h => security/sandbox/chromium/base/guid.h
rename : security/sandbox/base/lazy_instance.cc => security/sandbox/chromium/base/lazy_instance.cc
rename : security/sandbox/base/lazy_instance.h => security/sandbox/chromium/base/lazy_instance.h
rename : security/sandbox/base/location.cc => security/sandbox/chromium/base/location.cc
rename : security/sandbox/base/location.h => security/sandbox/chromium/base/location.h
rename : security/sandbox/base/logging.cc => security/sandbox/chromium/base/logging.cc
rename : security/sandbox/base/logging.h => security/sandbox/chromium/base/logging.h
rename : security/sandbox/base/logging_win.cc => security/sandbox/chromium/base/logging_win.cc
rename : security/sandbox/base/logging_win.h => security/sandbox/chromium/base/logging_win.h
rename : security/sandbox/base/memory/aligned_memory.h => security/sandbox/chromium/base/memory/aligned_memory.h
rename : security/sandbox/base/memory/raw_scoped_refptr_mismatch_checker.h => security/sandbox/chromium/base/memory/raw_scoped_refptr_mismatch_checker.h
rename : security/sandbox/base/memory/ref_counted.cc => security/sandbox/chromium/base/memory/ref_counted.cc
rename : security/sandbox/base/memory/ref_counted.h => security/sandbox/chromium/base/memory/ref_counted.h
rename : security/sandbox/base/memory/scoped_ptr.h => security/sandbox/chromium/base/memory/scoped_ptr.h
rename : security/sandbox/base/memory/singleton.cc => security/sandbox/chromium/base/memory/singleton.cc
rename : security/sandbox/base/memory/singleton.h => security/sandbox/chromium/base/memory/singleton.h
rename : security/sandbox/base/memory/weak_ptr.h => security/sandbox/chromium/base/memory/weak_ptr.h
rename : security/sandbox/base/move.h => security/sandbox/chromium/base/move.h
rename : security/sandbox/base/observer_list.h => security/sandbox/chromium/base/observer_list.h
rename : security/sandbox/base/observer_list_threadsafe.h => security/sandbox/chromium/base/observer_list_threadsafe.h
rename : security/sandbox/base/os_compat_nacl.h => security/sandbox/chromium/base/os_compat_nacl.h
rename : security/sandbox/base/path_service.cc => security/sandbox/chromium/base/path_service.cc
rename : security/sandbox/base/path_service.h => security/sandbox/chromium/base/path_service.h
rename : security/sandbox/base/pending_task.h => security/sandbox/chromium/base/pending_task.h
rename : security/sandbox/base/platform_file.cc => security/sandbox/chromium/base/platform_file.cc
rename : security/sandbox/base/platform_file.h => security/sandbox/chromium/base/platform_file.h
rename : security/sandbox/base/port.h => security/sandbox/chromium/base/port.h
rename : security/sandbox/base/process/process_handle.h => security/sandbox/chromium/base/process/process_handle.h
rename : security/sandbox/base/profiler/alternate_timer.h => security/sandbox/chromium/base/profiler/alternate_timer.h
rename : security/sandbox/base/profiler/tracked_time.h => security/sandbox/chromium/base/profiler/tracked_time.h
rename : security/sandbox/base/rand_util.h => security/sandbox/chromium/base/rand_util.h
rename : security/sandbox/base/run_loop.h => security/sandbox/chromium/base/run_loop.h
rename : security/sandbox/base/scoped_clear_errno.h => security/sandbox/chromium/base/scoped_clear_errno.h
rename : security/sandbox/base/sequence_checker.h => security/sandbox/chromium/base/sequence_checker.h
rename : security/sandbox/base/sequence_checker_impl.h => security/sandbox/chromium/base/sequence_checker_impl.h
rename : security/sandbox/base/sequenced_task_runner.h => security/sandbox/chromium/base/sequenced_task_runner.h
rename : security/sandbox/base/sequenced_task_runner_helpers.h => security/sandbox/chromium/base/sequenced_task_runner_helpers.h
rename : security/sandbox/base/shim/base/gtest_prod_util.h => security/sandbox/chromium/base/shim/base/gtest_prod_util.h
rename : security/sandbox/base/shim/base/logging.cpp => security/sandbox/chromium/base/shim/base/logging.cpp
rename : security/sandbox/base/shim/base/strings/string_piece.h => security/sandbox/chromium/base/shim/base/strings/string_piece.h
rename : security/sandbox/base/shim/base/third_party/nspr/prtime.h => security/sandbox/chromium/base/shim/base/third_party/nspr/prtime.h
rename : security/sandbox/base/shim/base/third_party/nspr/prtypes.h => security/sandbox/chromium/base/shim/base/third_party/nspr/prtypes.h
rename : security/sandbox/base/shim/base/tracked_objects.h => security/sandbox/chromium/base/shim/base/tracked_objects.h
rename : security/sandbox/base/shim/sdkdecls.h => security/sandbox/chromium/base/shim/sdkdecls.h
rename : security/sandbox/base/single_thread_task_runner.h => security/sandbox/chromium/base/single_thread_task_runner.h
rename : security/sandbox/base/stl_util.h => security/sandbox/chromium/base/stl_util.h
rename : security/sandbox/base/strings/nullable_string16.cc => security/sandbox/chromium/base/strings/nullable_string16.cc
rename : security/sandbox/base/strings/nullable_string16.h => security/sandbox/chromium/base/strings/nullable_string16.h
rename : security/sandbox/base/strings/string16.h => security/sandbox/chromium/base/strings/string16.h
rename : security/sandbox/base/strings/string_number_conversions.cc => security/sandbox/chromium/base/strings/string_number_conversions.cc
rename : security/sandbox/base/strings/string_number_conversions.h => security/sandbox/chromium/base/strings/string_number_conversions.h
rename : security/sandbox/base/strings/string_piece.cc => security/sandbox/chromium/base/strings/string_piece.cc
rename : security/sandbox/base/strings/string_piece.h => security/sandbox/chromium/base/strings/string_piece.h
rename : security/sandbox/base/strings/string_util.h => security/sandbox/chromium/base/strings/string_util.h
rename : security/sandbox/base/strings/string_util_constants.cc => security/sandbox/chromium/base/strings/string_util_constants.cc
rename : security/sandbox/base/strings/string_util_stripped.cc => security/sandbox/chromium/base/strings/string_util_stripped.cc
rename : security/sandbox/base/strings/string_util_win.h => security/sandbox/chromium/base/strings/string_util_win.h
rename : security/sandbox/base/strings/stringprintf.cc => security/sandbox/chromium/base/strings/stringprintf.cc
rename : security/sandbox/base/strings/stringprintf.h => security/sandbox/chromium/base/strings/stringprintf.h
rename : security/sandbox/base/strings/utf_string_conversion_utils.cc => security/sandbox/chromium/base/strings/utf_string_conversion_utils.cc
rename : security/sandbox/base/strings/utf_string_conversion_utils.h => security/sandbox/chromium/base/strings/utf_string_conversion_utils.h
rename : security/sandbox/base/strings/utf_string_conversions.cc => security/sandbox/chromium/base/strings/utf_string_conversions.cc
rename : security/sandbox/base/strings/utf_string_conversions.h => security/sandbox/chromium/base/strings/utf_string_conversions.h
rename : security/sandbox/base/synchronization/lock.cc => security/sandbox/chromium/base/synchronization/lock.cc
rename : security/sandbox/base/synchronization/lock.h => security/sandbox/chromium/base/synchronization/lock.h
rename : security/sandbox/base/synchronization/lock_impl.h => security/sandbox/chromium/base/synchronization/lock_impl.h
rename : security/sandbox/base/synchronization/lock_impl_win.cc => security/sandbox/chromium/base/synchronization/lock_impl_win.cc
rename : security/sandbox/base/sys_info.h => security/sandbox/chromium/base/sys_info.h
rename : security/sandbox/base/task_runner.h => security/sandbox/chromium/base/task_runner.h
rename : security/sandbox/base/template_util.h => security/sandbox/chromium/base/template_util.h
rename : security/sandbox/base/third_party/dmg_fp/LICENSE => security/sandbox/chromium/base/third_party/dmg_fp/LICENSE
rename : security/sandbox/base/third_party/dmg_fp/dmg_fp.h => security/sandbox/chromium/base/third_party/dmg_fp/dmg_fp.h
rename : security/sandbox/base/third_party/dmg_fp/dtoa.cc => security/sandbox/chromium/base/third_party/dmg_fp/dtoa.cc
rename : security/sandbox/base/third_party/dmg_fp/g_fmt.cc => security/sandbox/chromium/base/third_party/dmg_fp/g_fmt.cc
rename : security/sandbox/base/third_party/dynamic_annotations/LICENSE => security/sandbox/chromium/base/third_party/dynamic_annotations/LICENSE
rename : security/sandbox/base/third_party/dynamic_annotations/dynamic_annotations.h => security/sandbox/chromium/base/third_party/dynamic_annotations/dynamic_annotations.h
rename : security/sandbox/base/third_party/icu/LICENSE => security/sandbox/chromium/base/third_party/icu/LICENSE
rename : security/sandbox/base/third_party/icu/icu_utf.cc => security/sandbox/chromium/base/third_party/icu/icu_utf.cc
rename : security/sandbox/base/third_party/icu/icu_utf.h => security/sandbox/chromium/base/third_party/icu/icu_utf.h
rename : security/sandbox/base/thread_task_runner_handle.h => security/sandbox/chromium/base/thread_task_runner_handle.h
rename : security/sandbox/base/threading/platform_thread.h => security/sandbox/chromium/base/threading/platform_thread.h
rename : security/sandbox/base/threading/platform_thread_win.cc => security/sandbox/chromium/base/threading/platform_thread_win.cc
rename : security/sandbox/base/threading/sequenced_worker_pool.h => security/sandbox/chromium/base/threading/sequenced_worker_pool.h
rename : security/sandbox/base/threading/thread_checker_impl.h => security/sandbox/chromium/base/threading/thread_checker_impl.h
rename : security/sandbox/base/threading/thread_collision_warner.cc => security/sandbox/chromium/base/threading/thread_collision_warner.cc
rename : security/sandbox/base/threading/thread_collision_warner.h => security/sandbox/chromium/base/threading/thread_collision_warner.h
rename : security/sandbox/base/threading/thread_id_name_manager.cc => security/sandbox/chromium/base/threading/thread_id_name_manager.cc
rename : security/sandbox/base/threading/thread_id_name_manager.h => security/sandbox/chromium/base/threading/thread_id_name_manager.h
rename : security/sandbox/base/threading/thread_local.h => security/sandbox/chromium/base/threading/thread_local.h
rename : security/sandbox/base/threading/thread_local_storage.h => security/sandbox/chromium/base/threading/thread_local_storage.h
rename : security/sandbox/base/threading/thread_local_win.cc => security/sandbox/chromium/base/threading/thread_local_win.cc
rename : security/sandbox/base/threading/thread_restrictions.cc => security/sandbox/chromium/base/threading/thread_restrictions.cc
rename : security/sandbox/base/threading/thread_restrictions.h => security/sandbox/chromium/base/threading/thread_restrictions.h
rename : security/sandbox/base/time/time.cc => security/sandbox/chromium/base/time/time.cc
rename : security/sandbox/base/time/time.h => security/sandbox/chromium/base/time/time.h
rename : security/sandbox/base/time/time_win.cc => security/sandbox/chromium/base/time/time_win.cc
rename : security/sandbox/base/tracking_info.h => security/sandbox/chromium/base/tracking_info.h
rename : security/sandbox/base/tuple.h => security/sandbox/chromium/base/tuple.h
rename : security/sandbox/base/values.h => security/sandbox/chromium/base/values.h
rename : security/sandbox/base/version.h => security/sandbox/chromium/base/version.h
rename : security/sandbox/base/win/event_trace_provider.cc => security/sandbox/chromium/base/win/event_trace_provider.cc
rename : security/sandbox/base/win/event_trace_provider.h => security/sandbox/chromium/base/win/event_trace_provider.h
rename : security/sandbox/base/win/pe_image.cc => security/sandbox/chromium/base/win/pe_image.cc
rename : security/sandbox/base/win/pe_image.h => security/sandbox/chromium/base/win/pe_image.h
rename : security/sandbox/base/win/registry.cc => security/sandbox/chromium/base/win/registry.cc
rename : security/sandbox/base/win/registry.h => security/sandbox/chromium/base/win/registry.h
rename : security/sandbox/base/win/scoped_handle.cc => security/sandbox/chromium/base/win/scoped_handle.cc
rename : security/sandbox/base/win/scoped_handle.h => security/sandbox/chromium/base/win/scoped_handle.h
rename : security/sandbox/base/win/scoped_process_information.cc => security/sandbox/chromium/base/win/scoped_process_information.cc
rename : security/sandbox/base/win/scoped_process_information.h => security/sandbox/chromium/base/win/scoped_process_information.h
rename : security/sandbox/base/win/startup_information.cc => security/sandbox/chromium/base/win/startup_information.cc
rename : security/sandbox/base/win/startup_information.h => security/sandbox/chromium/base/win/startup_information.h
rename : security/sandbox/base/win/windows_version.cc => security/sandbox/chromium/base/win/windows_version.cc
rename : security/sandbox/base/win/windows_version.h => security/sandbox/chromium/base/win/windows_version.h
2014-01-28 15:19:22 -05:00
Jed Davis
7752a142f0
Bug 964427 - Whitelist msync (asm.js cache) and sched_get_priority_m{in,ax} (webrtc). r=kang
2014-01-28 09:04:39 -05:00
Jed Davis
7ee34b3db7
Bug 960365 - Whitelist uname for nsSystemInfo. r=kang
2014-01-21 15:48:00 -05:00
Jed Davis
1acb8c0912
Bug 945330 - Reword and slightly improve sandbox violation log message. r=kang
...
The main goal is to have a message that unambiguously indicates a crash,
so mozharness can grep for it even if some of the details change later.
Also now includes the entire argument list; most syscalls don't use all
six, so the last few will be meaningless, but it can't hurt to log them.
2014-01-10 08:22:58 -05:00
Ryan VanderMeulen
52ab5ad2dc
Merge b2g-inbound to m-c.
2013-12-09 17:26:11 -05:00
Birunthan Mohanathas
3440613a39
Bug 713082 - Part 2: Rename Util.h to ArrayUtils.h. r=Waldo
...
--HG--
rename : mfbt/Util.h => mfbt/ArrayUtils.h
2013-12-08 21:52:54 -05:00
Vicamo Yang
00ea22f388
Bug 944625 - B2G Emulator-x86: fix undeclared __NR_socketpair, __NR_sendmsg. r=kang,jld
2013-12-09 21:02:54 +08:00
Jed Davis
6b929fc140
Bug 943774 - Allow sigaction when sandboxed, for the crash reporter. r=kang
2013-12-03 18:45:17 -05:00
Ms2ger
c51e826c53
Bug 937258 - Part a: Remove empty makefiles; r=gps
2013-11-28 15:25:40 +01:00
Mike Hommey
8fd06cf41b
Bug 874266 - Move all DEFINES that can be moved to moz.build. r=mshal
2013-11-27 22:55:07 +09:00
Mike Hommey
b32a4ed166
Backout changeset 3fd4b546eed4 (bug 874266) and changeset a35d2e3a872f (bug 942043) for ASAN build bustage and Windows test bustage
...
--HG--
extra : amend_source : f20d09aeff1c8b5cbd0f1d24c7ce04e86f3aed1d
2013-11-28 14:24:05 +09:00
Mike Hommey
682364d535
Bug 874266 - Move all DEFINES that can be moved to moz.build. r=mshal
2013-11-28 13:08:16 +09:00
Christoph Kerschbaumer
b8680805ea
Bug 935111 - Enable seccomp-bpf for Linux. r=jld
2013-11-19 16:09:18 -08:00
Mike Hommey
2812d11fce
Bug 939632 - Remove LIBRARY_NAME for leaf libraries. r=gps
...
Landing on a CLOSED TREE.
2013-11-19 11:50:54 +09:00
Mike Hommey
e06d795c71
Bug 939074 - Remove most LIBXUL_LIBRARY. rs=gps
2013-11-19 11:48:10 +09:00
Mike Hommey
b2e90f6233
Bug 914245 - Move FORCE_SHARED_LIB to moz.build. r=mshal
2013-11-19 11:47:45 +09:00
Mike Hommey
e80e877ab7
Bug 939044 - Remove most definitions of MODULE. r=mshal
2013-11-19 11:47:39 +09:00
Mike Hommey
ffe0380912
Bug 935881 - Use FINAL_LIBRARY for all (fake) libraries that end up linked in a single other library. r=gps
2013-11-19 11:47:14 +09:00
Jed Davis
c4794bebcf
Bug 936163 - Fix profiling-specific sandbox whitelist for x86_64. r=kang
...
There is no sigaction, only rt_sigaction.
2013-11-08 13:30:05 -08:00
Jed Davis
d8cfcfe430
Bug 936252 - Augment seccomp whitelist for b2g mochitests. r=kang
...
FormHistory invokes sqlite3, which calls fsync and geteuid.
A form test calls nsIFile's remove method, which uses lstat.
The crash reporter uses socketpair/sendmsg, to send a pipe back to the parent.
2013-11-11 09:11:43 -05:00
Jed Davis
47aea81a72
Bug 936145 - Clean up architecture-specific parts of seccomp whitelist. r=kang
2013-11-08 15:31:20 -05:00
Brian R. Bondy
84c90e539e
Bug 935042 - Allow more than one process to be sandboxed from a single sandboxbroker. r=aklotz
2013-11-05 13:07:40 -05:00
Brian R. Bondy
f20fd64d25
Bug 934445 - Fix Windows linking error in Release mode only when MOZ_CONTENT_SANDBOX is defined. r=aklotz
2013-11-04 15:35:03 -05:00
Brian R. Bondy
71d02b0488
Bug 925571 - Packaging for Sandboxing dll. r=bsmedberg
2013-10-30 16:58:56 -07:00
Brian R. Bondy
eba93af7a1
Bug 925571 - Initial Windows content process sandbox broker code. r=aklotz
2013-10-30 16:58:52 -07:00
Brian R. Bondy
4c0646b2d2
Bug 925571 - Build config for plugin_container windows sandboxing. r=bsmedberg
2013-10-30 16:58:45 -07:00
Brian R. Bondy
e4698a14ab
Bug 922756 - Changes to import of Chromium sandbox so that it's buildable. r=aklotz
2013-10-28 14:54:46 -07:00
Brian R. Bondy
52aea6cfef
Bug 922756 - Initial import of subset of Chromium sandbox. r=aklotz
2013-10-28 14:54:42 -07:00
Brian R. Bondy
de45bd4422
Bug 922756 - Build config for Chromium sandbox. r=bsmedberg
...
--HG--
rename : security/sandbox/LICENSE => security/sandbox/linux/LICENSE
rename : security/sandbox/Makefile.in => security/sandbox/linux/Makefile.in
rename : security/sandbox/Sandbox.cpp => security/sandbox/linux/Sandbox.cpp
rename : security/sandbox/Sandbox.h => security/sandbox/linux/Sandbox.h
rename : security/sandbox/android_arm_ucontext.h => security/sandbox/linux/android_arm_ucontext.h
rename : security/sandbox/android_i386_ucontext.h => security/sandbox/linux/android_i386_ucontext.h
rename : security/sandbox/android_ucontext.h => security/sandbox/linux/android_ucontext.h
rename : security/sandbox/arm_linux_syscalls.h => security/sandbox/linux/arm_linux_syscalls.h
rename : security/sandbox/linux_seccomp.h => security/sandbox/linux/linux_seccomp.h
rename : security/sandbox/linux_syscalls.h => security/sandbox/linux/linux_syscalls.h
rename : security/sandbox/moz.build => security/sandbox/linux/moz.build
rename : security/sandbox/seccomp_filter.h => security/sandbox/linux/seccomp_filter.h
rename : security/sandbox/x86_32_linux_syscalls.h => security/sandbox/linux/x86_32_linux_syscalls.h
rename : security/sandbox/x86_64_linux_syscalls.h => security/sandbox/linux/x86_64_linux_syscalls.h
2013-10-28 14:54:36 -07:00
Brian R. Bondy
35c298f670
Bug 931429 - Fix PR_LOG compiling error for sandbox code on Linux. r=kang
2013-10-28 14:42:26 -07:00
Birunthan Mohanathas
145d3ff4f2
Bug 784739 - Switch from NULL to nullptr in security/; r=ehsan
2013-10-28 10:05:19 -04:00
Mike Hommey
b000a846c2
Bug 929905 - Consolidate sources in moz.build. r=gps
2013-10-25 08:23:05 +09:00
Brian O'Keefe
9c9d71fddb
Bug 928709 - Convert chromium-config.mk to mozbuild, r=mshal
2013-10-02 13:17:55 -04:00
Ms2ger
788668d2c2
Bug 908142 - Part b: Move FAIL_ON_WARNINGS to moz.build in security/sandbox/; r=gps
2013-10-20 09:25:19 +02:00
Jed Davis
d613247079
Bug 912822 - Enable sandbox logging on Android without setting NSPR_LOG_MODULES. r=kang
2013-10-06 15:15:50 -04:00
Jed Davis
2282623604
Bug 919090 - Let content processes use sigaction and tgkill if profiling enabled. r=kang
2013-10-04 13:29:48 -04:00
Ms2ger
f4153f40d4
Bug 900980 - Part a: Move unconditional assignments to EXPORT_LIBRARY to moz.build; rs=gps
2013-10-03 09:11:13 +02:00
David Keeler
2deb764710
bug 914716 - get seccomp-bpf sandboxing to compile on x86_64 r=kang
2013-09-25 11:14:34 -07:00
Vicamo Yang
f88086df70
Bug 909658: B2G emulator-x86 has no __NR_{recv,msgget,semget}. r=kang
2013-09-11 00:23:35 +08:00
Jed Davis
bc85533cf4
Bug 908907 - Fill in gaps in seccomp-bpf whitelist for b2g. r=kang, r=bsmith
...
Relatively harmless syscalls:
* dup, used by mozilla::ipc::Shmem
* getuid, for android::IPCThreadState, used in audio decode
* nanosleep, used by android::AudioTrack
Of potential concern:
* sched_setscheduler, used by audio threads in e.g. CubeVid
This might be restrictable somewhat by inspecting its arguments.
Of serious concern:
* unlink, as a workaround for bug 906996 (q.v.).
Note that we already allow open(), including for writing (temporary
files, /dev/genlock on qcom devices, probably more), so allowing unlink
won't make the situation much worse.
2013-09-06 09:13:59 -04:00
Mike Hommey
f8bc7fa754
Bug 912293 - Remove now redundant boilerplate from Makefile.in. r=gps
2013-09-05 09:01:46 +09:00
Brian O'Keefe
d118b95a0d
Bug 875934 - Move LIBRARY_NAME to moz.build, batch 3; r=mshal
2013-08-15 09:02:09 -04:00
Jed Davis
b772ac570e
Bug 907002 - Add restart_syscall to seccomp whitelist. r=kang
2013-08-26 11:27:49 -04:00
Ms2ger
3a103a7e9f
Bug 883284 - Part f: Move LIBXUL_LIBRARY into moz.build (p-z); r=glandium
2013-08-22 08:56:01 +02:00
Guillaume Destuynder
ced6ec4f73
Bug 790923: Adds seccomp-bfp sandboxing support for B2G. r=khuey, r=gerv, r=agal, r=dhylands, r=keeler, r=imelven, a=kang.
2013-08-12 12:58:35 -07:00
Ms2ger
c85f768b0d
Backout changeset 9a57f0f347e3 for insufficient review.
2013-08-13 13:30:00 +02:00
Guillaume Destuynder
b7704a2398
Bug 790923: Adds seccomp-bfp sandboxing support for B2G. r=agal, r=dhylands, r=dkeeler, r=imelven, a=kang.
2013-08-12 12:58:35 -07:00