gecko-dev/security/sandbox/linux
Jed Davis b129f08d7f Bug 1322784 - Gently fail utime(), to deal with GConf/ORBit. r=gcp
MozReview-Commit-ID: B4LmSGR6OEz

--HG--
extra : rebase_source : 613409994c0ba50c34c57537343484f1dc85b7aa
2017-05-30 23:13:37 -06:00
..
broker Backed out changeset 4e283b54baa6 (bug 1358223) for build bustage on Android at dom/ipc/ContentChild.cpp:21. r=backout 2017-05-31 21:34:13 +02:00
glue
gtest Bug 1337358 - Converts for(...; ...; ...) loops to use the new range-based loops in C++11 in security/sandbox/ r=gcp 2017-02-08 11:59:38 +01:00
interfaces Bug 1286865 - Step 2: Add XPCOM bindings for sandbox syscall reporter. r=gcp r=glandium 2017-01-30 18:50:41 -07:00
reporter Bug 1286865 - Step 4: Report rejected syscall info in Telemetry. r=gcp r=francois 2017-02-20 19:55:56 +01:00
LinuxCapabilities.cpp
LinuxCapabilities.h
LinuxSched.h
moz.build Bug 1337331 Part 1: Update security/sandbox/chromium/ to commit b169b9a1cc402573843e8c952af14c4e43487e91. r=jld, r=aklotz, r=jimm 2017-03-29 14:23:17 +01:00
Sandbox.cpp Bug 1286865 - Step 1: Gather syscall info from SIGSYS handlers into the parent process. r=gcp 2017-01-30 18:49:53 -07:00
Sandbox.h Bug 1335323 - Move vector include to sandbox header to fix bustage. r=bustage-fix a=bustage-fix 2017-01-31 13:06:22 +01:00
SandboxBrokerClient.cpp
SandboxBrokerClient.h
SandboxChroot.cpp Bug 1338086 - Remove useless else blocks in order to reduce complexity in security/sandbox/linux/ r=gcp 2017-02-09 10:56:05 +01:00
SandboxChroot.h
SandboxFilter.cpp Bug 1322784 - Gently fail utime(), to deal with GConf/ORBit. r=gcp 2017-05-30 23:13:37 -06:00
SandboxFilter.h Bug 1330326 - Make sandboxing policy more configurable via preferences. r=jld 2017-01-26 19:59:50 +01:00
SandboxFilterUtil.cpp
SandboxFilterUtil.h
SandboxHooks.cpp
SandboxInfo.cpp Bug 1317735 - Consolidate env vars for logging. r=jimm 2017-01-23 12:46:49 -08:00
SandboxInfo.h Bug 1317735 - Consolidate env vars for logging. r=jimm 2017-01-23 12:46:49 -08:00
SandboxInternal.h Bug 1257361 - Simplify detecting threads that already have seccomp-bpf applied. r=tedd r=gcp 2016-12-06 12:38:22 -10:00
SandboxLogging.cpp
SandboxLogging.h
SandboxReporterClient.cpp Bug 1286865 - Step 1: Gather syscall info from SIGSYS handlers into the parent process. r=gcp 2017-01-30 18:49:53 -07:00
SandboxReporterClient.h Bug 1286865 - Step 1: Gather syscall info from SIGSYS handlers into the parent process. r=gcp 2017-01-30 18:49:53 -07:00
SandboxUtil.cpp
SandboxUtil.h