Commit Graph

140 Commits

Author SHA1 Message Date
Bob Owen
b56ef398b7 Bug 1132021 - Add a new sandbox level for Windows NPAPI to use USER_LIMITED access token level. r=bsmedberg, r=bbondy 2015-02-11 16:25:43 +00:00
Bob Owen
721c4e20e1 Bug 1127230: Change the NPAPI sandbox prefs to integers to indicate the level of sandboxing. r=bsmedberg 2015-01-30 17:48:15 +00:00
Bob Owen
8299a8da28 Bug 1126402: Add a pref to enable a more strict version of the Windows NPAPI process sandbox. r=bsmedberg, r=bbondy 2015-01-29 08:13:07 +00:00
Bob Owen
0ab45dda9a Bug 1123245 Part 3: Add prefs for the Windows NPAPI process sandbox. r=bsmedberg 2015-01-23 08:32:21 +00:00
Bob Owen
674aea744b Bug 1123245 Part 1: Enable an open sandbox on Windows NPAPI processes. r=josh, r=tabraldes 2015-01-23 08:32:20 +00:00
Aaron Klotz
45ab93fa46 Bug 998863: Asynchronous Plugin Initialization, Part 8: Plugin process launch changes; r=josh 2014-12-29 16:13:28 -07:00
Phil Ringnalda
fff1f4378e Backed out 15 changesets (bug 1070755, bug 998863) for e10s bustage
CLOSED TREE

Backed out changeset 076d1d47d601 (bug 1070755)
Backed out changeset 43819af59ca5 (bug 998863)
Backed out changeset 5f587697ae63 (bug 998863)
Backed out changeset e2cf239e8572 (bug 998863)
Backed out changeset fe21b6b789ce (bug 998863)
Backed out changeset 404f59f86edc (bug 998863)
Backed out changeset 5dd57abaf2b0 (bug 998863)
Backed out changeset 6c1f006a03bc (bug 998863)
Backed out changeset 9e69875e3667 (bug 998863)
Backed out changeset c6b68f8f72ba (bug 998863)
Backed out changeset 713799a7afe4 (bug 998863)
Backed out changeset 4244d662787c (bug 998863)
Backed out changeset ba058cc7a1b2 (bug 998863)
Backed out changeset dabc69b0b09a (bug 998863)
Backed out changeset 18dad6d2e7cc (bug 998863)
2014-12-24 18:28:45 -08:00
Aaron Klotz
1dd7e5ba49 Bug 998863: Asynchronous Plugin Initialization, Part 8: Plugin process launch changes; r=josh 2014-12-24 17:56:53 -07:00
Bob Owen
9a0a395aed Bug 928044 Part 2: Enable the content sandbox by default on Windows with an open policy. r=tabraldes,glandium,jimm
--HG--
rename : security/sandbox/win/src/warnonlysandbox/wosCallbacks.h => security/sandbox/win/src/logging/loggingCallbacks.h
rename : security/sandbox/win/src/warnonlysandbox/wosTypes.h => security/sandbox/win/src/logging/loggingTypes.h
rename : security/sandbox/win/src/warnonlysandbox/warnOnlySandbox.cpp => security/sandbox/win/src/logging/sandboxLogging.cpp
rename : security/sandbox/win/src/warnonlysandbox/warnOnlySandbox.h => security/sandbox/win/src/logging/sandboxLogging.h
2014-11-29 17:12:18 +00:00
Stephen Pohl
6b7b767456 Bug 1077282: Cleanup uses of GreD vs GreBinD, introcuded by v2 signature changes on OSX. Based on initial patch by rstrong. r=bsmedberg 2014-10-10 15:06:57 -04:00
Stephen Pohl
0abcadeb62 Mac v2 signing - Bug 1059504 - Avoid plugin-container from crashing due to the new v2 bundle structure on OSX. r=bsmedberg 2014-09-29 11:51:17 -07:00
Stephen Pohl
b8761ffa6f Mac v2 signing - Bug 1050944 - Get Firefox to launch and run on OSX with the new .app bundle structure, made necessary by Apple's v2 signatures. r=smichaud, r=ted, sr=bsmedberg 2014-09-29 11:51:04 -07:00
Jacek Caban
bf62af6357 Bug 1063511 - Fix mingw builds after bug 1027906. r=tabraldes 2014-09-08 10:35:24 +02:00
Bob Owen
3f62750874 Bug 1018966 - Part 1: Add the main warn only sandbox machinery - with no Chromium code changes. r=bsmedberg
This change also includes the content sandboxing code on Windows Nightly by defining MOZ_CONTENT_SANDBOX=1.
Whether the content sandbox is disabled, in warn only mode, or enabled is controlled by a new pref: browser.tabs.remote.sandbox=(off/warn/on)
2014-06-11 15:32:37 +01:00
Carsten "Tomcat" Book
0b56bf9838 Backed out changeset 5adabc2818b2 (bug 1018966) for b2g bustage 2014-09-04 15:14:41 +02:00
Bob Owen
cf06b12d8d Bug 1018966 - Part 1: Add the main warn only sandbox machinery - with no Chromium code changes. r=bsmedberg r=tabraldes
This change also includes the content sandboxing code on Windows Nightly by defining MOZ_CONTENT_SANDBOX=1.
Whether the content sandbox is disabled, in warn only mode, or enabled is controlled by a new pref: browser.tabs.remote.sandbox=(off/warn/on)
2014-06-11 15:32:37 +01:00
Josh Aas
afbaee0bdb Bug 1059479 - remove Chromium path service and trace events code. r=bent 2014-09-02 14:23:58 -05:00
Ehsan Akhgari
4a47ec0f0c Bug 1060997 - Fix more bad implicit constructors in IPC; r=smaug 2014-08-31 21:12:55 -04:00
Tim Abraldes
6157602479 bug 1027906. Set delayed token level for GMP plugin processes to USER_RESTRICTED. Whitelist certain files and registry keys that are required for EME plugins to successfully load. r=bobowen. r=jesup. r=bent. 2014-08-29 17:34:26 -07:00
Jacek Caban
57c0ae2d2e Bug 1042426 - Added --disable-sandbox option that disables building sandbox code. r=glandium 2014-08-27 16:32:55 +02:00
Georg Fritzsche
5251b3061c Bug 1041525 - Remove workaround for GMP SyncRunnable deadlock in Crashreporter::OOPInit() r=jesup 2014-07-24 18:16:08 +02:00
Randell Jesup
47c5fa426c Bug 1041525: Disable GMP OOPInit() during SyncLaunch() until crashreporting fully hooked up r=gfritzsche 2014-07-21 10:24:29 -04:00
Randell Jesup
d61e033d0f Backed out changeset 40954106dc7a (bug 1041525) (incorrect patch landed) 2014-07-21 10:24:25 -04:00
Randell Jesup
3188e08cae Bug 1041525: Disable GMP OOPInit() during SyncLaunch() until crashreporting fully hooked up r=gfritzsche 2014-07-21 09:59:13 -04:00
Benjamin Smedberg
77900cedeb Bug 1033522 - Only initialize the Windows Group ID for plugin processes: other process types don't need it. Refactor the saved GRE dir to use a path rather than a non-threadsafe nsIFile object, r=jimm
--HG--
extra : rebase_source : d15c56da6cc5679516b259a6fc7efb31b070f715
2014-07-17 11:15:09 -04:00
Tim Abraldes
2271b8aa31 bug 985252. Build sandbox code regardless of whether --enable-content-sandbox/MOZ_CONTENT_SANDBOX is provided. Enable sandboxing of GMP plugins. Enable SandboxBroker to set different security policies for different process types. r=bbondy, r=cpearce, r=bent 2014-07-16 16:01:34 -07:00
Mike Hommey
57c0c91b43 Bug 1022259 - Only load Gtk+2 stub for plugin processes in Gtk+3 builds. r=bent,r=karlt 2014-06-10 16:00:42 +09:00
Emilio Pozuelo Monfort
0a6f0617ab Bug 624422 - Let plugin-container load libmozgtk2. r=glandium 2014-05-01 13:37:48 +02:00
Birunthan Mohanathas
562904c002 Bug 869836 - Part 12: Use Assign('c') instead of AssignLiteral("c"). r=ehsan
--HG--
extra : rebase_source : a6b15019cee452973dd8bf3112c15e14175855a9
2014-05-26 21:55:08 +03:00
Birunthan Mohanathas
411a8639b4 Bug 869836 - Part 3: Use Append('c') instead of AppendLiteral("c"). r=ehsan 2014-05-22 06:48:51 +03:00
Josh Aas
054a93df8f Bustage fix for Gecko Media Plugins landing, bug 957928. 2014-05-17 23:25:36 -05:00
Josh Aas
3675b7efa2 Bug 957928: Gecko Media Plugins implementation. No consumers in Gecko yet. r=bent 2014-05-17 22:05:46 -05:00
Phil Ringnalda
3b63909530 Back out a4b51aff4b3c (bug 957928) for build bustage
CLOSED TREE
2014-05-17 17:43:07 -07:00
Josh Aas
792dc0a797 Bug 957928: Gecko Media Plugins implementation. No consumers in Gecko yet. r=bent 2014-05-17 18:53:03 -05:00
Dave Hylands
f93caa5984 Bug 988410 - Move directory service calls onto MainThread. r=bent 2014-04-04 12:16:16 -07:00
Jed Davis
f290cbcf2b Bug 943174 - Avoid waitpid on already-reaped content processes. r=bsmedberg 2014-03-21 08:50:07 -04:00
Honza Bambas
02010883fb Bug 977339 - Do GECKO_SEPARATE_NSPR_LOGS=1 by default, r=jduell 2014-03-05 14:01:09 +01:00
Josh Aas
7de9a1ae69 Bug 957883: Handle channel errors during process launch such that we don't sit on a dead channel for the full time-out (e.g. 45 secs for NPAPI), and allow us to detect when an error happens during child process init. Also, now that it's possible, actually check for an error during NPAPI child process init. r=bsmedberg 2014-01-11 21:51:00 -06:00
Ehsan Akhgari
124f372395 Bug 951207 - Rename the chromium LOG macro to CHROMIUM_LOG; r=bent 2013-12-17 13:26:45 -05:00
Jacek Caban
08ee154ee6 Bug 945245 - Fixed misc char16_t/wchar_t mismatches. r=ehsan
--HG--
extra : rebase_source : fcab74b295b513f4185cf9c12f31ebaddb7c8e0e
2013-12-03 16:09:50 +01:00
Brian R. Bondy
e38cfb36ed Bug 928042 - Add an environment variable to disable content processes sandboxing even when MOZ_CONTENT_SANDBOX is defined. r=aklotz 2013-11-01 19:09:45 -07:00
Brian R. Bondy
038d21bf1d Bug 925571 - Initial Windows content process sandbox broker code. r=aklotz 2013-10-30 16:58:52 -07:00
Thinker Lee ext:(%2C%20Cervantes%20Yu%20%3Ccyu%40mozilla.com%3E)
7d20b19ad7 Bug 771765 - Support template content process, part 2: IPC and glue changes. r=bent
Changes include:
* Getting/resetting platform thread ID.
* Creating an IPC channel with existing file descriptor sent from the template process.
* Child process host with existing process forked from the template.
2013-05-31 21:16:54 +08:00
Ryan VanderMeulen
0e6eeaf7da Backed out changeset 09274cc38453 (bug 869167) for OSX crashes. 2013-08-16 16:56:06 -04:00
Andrey Zaytsev
4b8aacaa2d Bug 869167 - Firefox hangs on Mac when ASan-built plugin is used in non-ASan build. r=bsmedberg 2013-08-16 15:31:03 -04:00
Mark Hammond
2e90091786 Bug 902790 - prevent browser crash if child process fails to start. r=jlebar 2013-08-09 16:23:24 +10:00
Mike Shal
576f2400a5 Bug 889787 - Define XP_LINUX globally; r=ted 2013-07-16 17:10:10 -04:00
Shelly Lin
3fde9d9b2f Bug 811636 - Close the child FD in the parent asap in order to detect when the child closes its FD. r=dhylands 2013-07-09 10:37:33 +08:00
Mike Hommey
1f51f75539 Bug 859763 - Remove more remains of the old linker. r=blassey 2013-04-10 09:02:32 +02:00
Chris Jones
7af4883dee Bug 786631, part 2: Make the prelaunch process totipotent and specialize when it's taken. r=jlebar 2013-01-17 12:06:36 -08:00