gecko-dev/security/sandbox/linux
Jed Davis 7d599256ca Bug 1354731 - Quietly fail mknod of character devices in content sandbox. r=gcp
MozReview-Commit-ID: 2aehI5V7tQp

--HG--
extra : rebase_source : ea933354e4018542e4dedda63318153c7cfbdd4e
2017-04-11 13:22:26 -06:00
..
broker Bug 1338086 - Remove useless else blocks in order to reduce complexity in security/sandbox/linux/ r=gcp 2017-02-09 10:56:05 +01:00
glue Bug 1268733 - Move Linux sandboxing code back out to libmozsandbox.so. r=gcp r=glandium 2016-10-26 16:57:24 -06:00
gtest Bug 1337358 - Converts for(...; ...; ...) loops to use the new range-based loops in C++11 in security/sandbox/ r=gcp 2017-02-08 11:59:38 +01:00
interfaces Bug 1286865 - Step 2: Add XPCOM bindings for sandbox syscall reporter. r=gcp r=glandium 2017-01-30 18:50:41 -07:00
reporter Bug 1286865 - Step 4: Report rejected syscall info in Telemetry. r=gcp r=francois 2017-02-20 19:55:56 +01:00
LinuxCapabilities.cpp
LinuxCapabilities.h Bug 1199481 - Complain more when entering sandboxing code as root. r=kang 2015-08-28 13:37:00 +02:00
LinuxSched.h Bug 1272062 - Merge security/sandbox/linux/common into its parent directory. r=gcp 2016-10-27 22:06:00 +02:00
Sandbox.cpp Bug 1286865 - Step 1: Gather syscall info from SIGSYS handlers into the parent process. r=gcp 2017-01-30 18:49:53 -07:00
Sandbox.h Bug 1335323 - Move vector include to sandbox header to fix bustage. r=bustage-fix a=bustage-fix 2017-01-31 13:06:22 +01:00
SandboxBrokerClient.cpp Bug 1289718 - Clean up stat/stat64 wrapper. Deal with non-default TMPDIR. r=jld 2016-10-06 13:25:13 +02:00
SandboxBrokerClient.h Bug 1289718 - Clean up stat/stat64 wrapper. Deal with non-default TMPDIR. r=jld 2016-10-06 13:25:13 +02:00
SandboxChroot.cpp Bug 1338086 - Remove useless else blocks in order to reduce complexity in security/sandbox/linux/ r=gcp 2017-02-09 10:56:05 +01:00
SandboxChroot.h Bug 1272062 - Merge security/sandbox/linux/common into its parent directory. r=gcp 2016-10-27 22:06:00 +02:00
SandboxFilter.cpp Bug 1354731 - Quietly fail mknod of character devices in content sandbox. r=gcp 2017-04-11 13:22:26 -06:00
SandboxFilter.h Bug 1330326 - Make sandboxing policy more configurable via preferences. r=jld 2017-01-26 19:59:50 +01:00
SandboxFilterUtil.cpp Bug 1273852 - Always add seccomp-bpf socketcall dispatcher. r=jld 2016-06-29 20:34:40 +02:00
SandboxFilterUtil.h Bug 1287426 Part 3: Update security/sandbox/chromium/ to commit 4ec79b7f2379a60cdc15599e93255c0fa417f1ed. r=aklotz, r=jld 2016-09-06 08:57:21 +01:00
SandboxHooks.cpp Bug 1313218 - Preload libmozsandbox.so in child processes on Linux. r=tedd r=billm r=glandium 2016-11-04 18:16:05 -06:00
SandboxInfo.cpp Bug 1317735 - Consolidate env vars for logging. r=jimm 2017-01-23 12:46:49 -08:00
SandboxInfo.h Bug 1317735 - Consolidate env vars for logging. r=jimm 2017-01-23 12:46:49 -08:00
SandboxInternal.h Bug 1257361 - Simplify detecting threads that already have seccomp-bpf applied. r=tedd r=gcp 2016-12-06 12:38:22 -10:00
SandboxLogging.cpp Bug 1287426 Part 3: Update security/sandbox/chromium/ to commit 4ec79b7f2379a60cdc15599e93255c0fa417f1ed. r=aklotz, r=jld 2016-09-06 08:57:21 +01:00
SandboxLogging.h Bug 1181704 - Use chromium SafeSPrintf for sandbox logging. r=gdestuynder r=glandium 2015-07-09 12:09:00 +02:00
SandboxReporterClient.cpp Bug 1286865 - Step 1: Gather syscall info from SIGSYS handlers into the parent process. r=gcp 2017-01-30 18:49:53 -07:00
SandboxReporterClient.h Bug 1286865 - Step 1: Gather syscall info from SIGSYS handlers into the parent process. r=gcp 2017-01-30 18:49:53 -07:00
SandboxUtil.cpp Bug 1302163 - Change code to use SprintfLiteral instead of snprintf. r=ehsan 2016-10-04 17:57:51 +02:00
SandboxUtil.h
moz.build Bug 1337331 Part 1: Update security/sandbox/chromium/ to commit b169b9a1cc402573843e8c952af14c4e43487e91. r=jld, r=aklotz, r=jimm 2017-03-29 14:23:17 +01:00