gecko-dev/security/sandbox/linux
Gian-Carlo Pascutto 5b6073d494 Bug 1385715 - Add support for WebGL on NVIDIA PRIME. r=jld
MozReview-Commit-ID: 6hXLXgNdVti

--HG--
extra : rebase_source : 14917cd11f97f41f46c6d6b42cea2ecb4162293a
2017-08-02 12:02:16 +02:00
..
broker Bug 1385715 - Add support for WebGL on NVIDIA PRIME. r=jld 2017-08-02 12:02:16 +02:00
glue Bug 1384819 (part 1) - Split MozStackWalk(). r=glandium. 2017-07-27 12:46:47 +10:00
gtest Bug 1376643 - Use 'override' and '= default' on applicable methods in security/sandbox/. r=gcp 2017-06-27 17:57:00 +02:00
interfaces Bug 1286865 - Step 2: Add XPCOM bindings for sandbox syscall reporter. r=gcp r=glandium 2017-01-30 18:50:41 -07:00
reporter Bug 1308400 - Report failures in file processes too. r=jld 2017-07-10 20:20:49 +02:00
LinuxCapabilities.cpp
LinuxCapabilities.h
LinuxSched.h
Sandbox.cpp Backed out 3 changesets (bug 1383007, bug 1376910) 2017-07-26 12:50:28 -06:00
Sandbox.h Bug 1308400 - Support file process, whitelist path prefs. r=jld 2017-07-24 16:32:22 +02:00
SandboxBrokerClient.cpp Bug 1308400 - Symlink handling for read brokering. r=jld 2017-07-06 15:31:13 +02:00
SandboxBrokerClient.h
SandboxChroot.cpp Bug 1338086 - Remove useless else blocks in order to reduce complexity in security/sandbox/linux/ r=gcp 2017-02-09 10:56:05 +01:00
SandboxChroot.h
SandboxFilter.cpp Bug 1384306 - Allow SOCK_CLOEXEC in socketpair(). r=gcp 2017-07-27 15:27:06 -06:00
SandboxFilter.h Bug 1372428 - Extend file pre-opening for sandboxed media plugins. r=gcp 2017-07-07 08:58:50 -06:00
SandboxFilterUtil.cpp
SandboxFilterUtil.h Bug 1376653 - Fix handling of architecture differences for getdents. r=gcp 2017-07-11 17:03:06 -06:00
SandboxHooks.cpp Bug 1376643 - Use 'nullptr' where applicable in security/sandbox/. r=gcp 2017-06-27 17:56:00 +02:00
SandboxInfo.cpp
SandboxInfo.h
SandboxInternal.h
SandboxLogging.cpp
SandboxLogging.h
SandboxOpenedFiles.cpp Bug 1372428 - Extend file pre-opening for sandboxed media plugins. r=gcp 2017-07-07 08:58:50 -06:00
SandboxOpenedFiles.h Bug 1372428 - Extend file pre-opening for sandboxed media plugins. r=gcp 2017-07-07 08:58:50 -06:00
SandboxReporterClient.cpp Bug 1286865 - Step 1: Gather syscall info from SIGSYS handlers into the parent process. r=gcp 2017-01-30 18:49:53 -07:00
SandboxReporterClient.h Bug 1286865 - Step 1: Gather syscall info from SIGSYS handlers into the parent process. r=gcp 2017-01-30 18:49:53 -07:00
SandboxUtil.cpp
SandboxUtil.h
moz.build Bug 1372428 - Extend file pre-opening for sandboxed media plugins. r=gcp 2017-07-07 08:58:50 -06:00