gecko-dev/security/sandbox
Alex Gaynor 445480436b Bug 1361733 - In debug builds, do not allow content sandbox to write to all of /private/var r=haik
This permission was needed for the memory bloat logging, which is used for
leaktest, including logging intentionally crashing processes. Now we restrict
ourselves to only allowing writes to the location needed for this logging,
rather than all of /private/var.

MozReview-Commit-ID: 5AbJEZlDHNV

--HG--
extra : rebase_source : 26936b8d8bca53f2c37a195b5e7c69c151ec18d2
2017-05-02 11:07:10 -04:00
..
chromium Bug 1337331 Part 6: Re-apply - Change USER_NON_ADMIN access token level from whitelist to blacklist containing Admin SIDs. r=jimm 2017-03-29 14:23:17 +01:00
chromium-shim Bug 1337331 Part 1: Update security/sandbox/chromium/ to commit b169b9a1cc402573843e8c952af14c4e43487e91. r=jld, r=aklotz, r=jimm 2017-03-29 14:23:17 +01:00
linux Bug 1361238 - Re-allow accept4, used by accessibility. r=gcp 2017-05-01 21:51:11 -06:00
mac Bug 1361733 - In debug builds, do not allow content sandbox to write to all of /private/var r=haik 2017-05-02 11:07:10 -04:00
test Bug 1361304 - Remove /private/var read access from Mac level 3 content sandbox; r=Alex_Gaynor 2017-05-05 10:48:52 -07:00
win Bug 1347710 - Enable sandbox protections for the Windows GPU process. r=bobowen 2017-04-24 09:46:09 -07:00
modifications-to-chromium-to-reapply-after-upstream-merge.txt Bug 1337331 Part 7: Re-apply - Allow a special all paths rule in the Windows process sandbox when using semantics FILES_ALLOW_READONLY. r=jimm 2017-03-28 08:36:16 +01:00
moz-chromium-commit-status.txt Bug 1337331 Part 1: Update security/sandbox/chromium/ to commit b169b9a1cc402573843e8c952af14c4e43487e91. r=jld, r=aklotz, r=jimm 2017-03-29 14:23:17 +01:00
moz.build Bug 1337331 Part 1: Update security/sandbox/chromium/ to commit b169b9a1cc402573843e8c952af14c4e43487e91. r=jld, r=aklotz, r=jimm 2017-03-29 14:23:17 +01:00