.. |
broker
|
Bug 1338086 - Remove useless else blocks in order to reduce complexity in security/sandbox/linux/ r=gcp
|
2017-02-09 10:56:05 +01:00 |
glue
|
Bug 1268733 - Move Linux sandboxing code back out to libmozsandbox.so. r=gcp r=glandium
|
2016-10-26 16:57:24 -06:00 |
gtest
|
Bug 1337358 - Converts for(...; ...; ...) loops to use the new range-based loops in C++11 in security/sandbox/ r=gcp
|
2017-02-08 11:59:38 +01:00 |
interfaces
|
Bug 1286865 - Step 2: Add XPCOM bindings for sandbox syscall reporter. r=gcp r=glandium
|
2017-01-30 18:50:41 -07:00 |
reporter
|
Bug 1286865 - Step 4: Report rejected syscall info in Telemetry. r=gcp r=francois
|
2017-02-20 19:55:56 +01:00 |
LinuxCapabilities.cpp
|
Bug 1151607 - Step 2: Apply net/ipc namespace separation and chroot to media plugins. r=kang
|
2015-04-10 18:05:19 -07:00 |
LinuxCapabilities.h
|
Bug 1199481 - Complain more when entering sandboxing code as root. r=kang
|
2015-08-28 13:37:00 +02:00 |
LinuxSched.h
|
Bug 1272062 - Merge security/sandbox/linux/common into its parent directory. r=gcp
|
2016-10-27 22:06:00 +02:00 |
Sandbox.cpp
|
Bug 1286865 - Step 1: Gather syscall info from SIGSYS handlers into the parent process. r=gcp
|
2017-01-30 18:49:53 -07:00 |
Sandbox.h
|
Bug 1335323 - Move vector include to sandbox header to fix bustage. r=bustage-fix a=bustage-fix
|
2017-01-31 13:06:22 +01:00 |
SandboxBrokerClient.cpp
|
Bug 1289718 - Clean up stat/stat64 wrapper. Deal with non-default TMPDIR. r=jld
|
2016-10-06 13:25:13 +02:00 |
SandboxBrokerClient.h
|
Bug 1289718 - Clean up stat/stat64 wrapper. Deal with non-default TMPDIR. r=jld
|
2016-10-06 13:25:13 +02:00 |
SandboxChroot.cpp
|
Bug 1338086 - Remove useless else blocks in order to reduce complexity in security/sandbox/linux/ r=gcp
|
2017-02-09 10:56:05 +01:00 |
SandboxChroot.h
|
Bug 1272062 - Merge security/sandbox/linux/common into its parent directory. r=gcp
|
2016-10-27 22:06:00 +02:00 |
SandboxFilter.cpp
|
Bug 1354731 - Quietly fail mknod of character devices in content sandbox. r=gcp
|
2017-04-11 13:22:26 -06:00 |
SandboxFilter.h
|
Bug 1330326 - Make sandboxing policy more configurable via preferences. r=jld
|
2017-01-26 19:59:50 +01:00 |
SandboxFilterUtil.cpp
|
Bug 1273852 - Always add seccomp-bpf socketcall dispatcher. r=jld
|
2016-06-29 20:34:40 +02:00 |
SandboxFilterUtil.h
|
Bug 1287426 Part 3: Update security/sandbox/chromium/ to commit 4ec79b7f2379a60cdc15599e93255c0fa417f1ed. r=aklotz, r=jld
|
2016-09-06 08:57:21 +01:00 |
SandboxHooks.cpp
|
Bug 1313218 - Preload libmozsandbox.so in child processes on Linux. r=tedd r=billm r=glandium
|
2016-11-04 18:16:05 -06:00 |
SandboxInfo.cpp
|
Bug 1317735 - Consolidate env vars for logging. r=jimm
|
2017-01-23 12:46:49 -08:00 |
SandboxInfo.h
|
Bug 1317735 - Consolidate env vars for logging. r=jimm
|
2017-01-23 12:46:49 -08:00 |
SandboxInternal.h
|
Bug 1257361 - Simplify detecting threads that already have seccomp-bpf applied. r=tedd r=gcp
|
2016-12-06 12:38:22 -10:00 |
SandboxLogging.cpp
|
Bug 1287426 Part 3: Update security/sandbox/chromium/ to commit 4ec79b7f2379a60cdc15599e93255c0fa417f1ed. r=aklotz, r=jld
|
2016-09-06 08:57:21 +01:00 |
SandboxLogging.h
|
Bug 1181704 - Use chromium SafeSPrintf for sandbox logging. r=gdestuynder r=glandium
|
2015-07-09 12:09:00 +02:00 |
SandboxReporterClient.cpp
|
Bug 1286865 - Step 1: Gather syscall info from SIGSYS handlers into the parent process. r=gcp
|
2017-01-30 18:49:53 -07:00 |
SandboxReporterClient.h
|
Bug 1286865 - Step 1: Gather syscall info from SIGSYS handlers into the parent process. r=gcp
|
2017-01-30 18:49:53 -07:00 |
SandboxUtil.cpp
|
Bug 1302163 - Change code to use SprintfLiteral instead of snprintf. r=ehsan
|
2016-10-04 17:57:51 +02:00 |
SandboxUtil.h
|
Bug 1151607 - Step 2: Apply net/ipc namespace separation and chroot to media plugins. r=kang
|
2015-04-10 18:05:19 -07:00 |
moz.build
|
Bug 1337331 Part 1: Update security/sandbox/chromium/ to commit b169b9a1cc402573843e8c952af14c4e43487e91. r=jld, r=aklotz, r=jimm
|
2017-03-29 14:23:17 +01:00 |