gecko-dev/security/sandbox
Alex Gaynor 82705afe91 Bug 1354678 - Switch our sandbox policies to use C++ raw strings and put them in a new header file r=haik
r=haik

MozReview-Commit-ID: Fr5liCjcJtg

--HG--
extra : rebase_source : 3e90f7075e4e5b410ba0b8a08b0c6e403eb925f6
2017-04-14 13:12:09 -04:00
..
chromium Bug 1337331 Part 6: Re-apply - Change USER_NON_ADMIN access token level from whitelist to blacklist containing Admin SIDs. r=jimm 2017-03-29 14:23:17 +01:00
chromium-shim Bug 1337331 Part 1: Update security/sandbox/chromium/ to commit b169b9a1cc402573843e8c952af14c4e43487e91. r=jld, r=aklotz, r=jimm 2017-03-29 14:23:17 +01:00
linux Bug 1354731 - Quietly fail mknod of character devices in content sandbox. r=gcp 2017-04-11 13:22:26 -06:00
mac Bug 1354678 - Switch our sandbox policies to use C++ raw strings and put them in a new header file r=haik 2017-04-14 13:12:09 -04:00
test Merge m-c to autoland a=merge 2017-04-10 16:55:21 -07:00
win Bug 1348269 - When SpawnTarget fails during Windows sandboxed process creation, log more information r=bobowen 2017-04-04 10:54:14 -04:00
modifications-to-chromium-to-reapply-after-upstream-merge.txt Bug 1337331 Part 7: Re-apply - Allow a special all paths rule in the Windows process sandbox when using semantics FILES_ALLOW_READONLY. r=jimm 2017-03-28 08:36:16 +01:00
moz-chromium-commit-status.txt Bug 1337331 Part 1: Update security/sandbox/chromium/ to commit b169b9a1cc402573843e8c952af14c4e43487e91. r=jld, r=aklotz, r=jimm 2017-03-29 14:23:17 +01:00
moz.build Bug 1337331 Part 1: Update security/sandbox/chromium/ to commit b169b9a1cc402573843e8c952af14c4e43487e91. r=jld, r=aklotz, r=jimm 2017-03-29 14:23:17 +01:00