gecko-dev/security/sandbox/linux
Bob Owen 6bd2ddcccd Bug 1366701 Part 1: Roll-up of chromium sandbox update and mozilla patches to get a running browser. r=jld,aklotz,jimm,bobowen
This updates security/sandbox/chromium/ files to chromium commit 937db09514e061d7983e90e0c448cfa61680f605.

Additional patches re-applied from security/sandbox/chromium-shim/patches/with_update/ to give a compiling and mostly working browser.
See patch files for additional commit comments.
2017-10-26 15:10:41 +01:00
..
broker Bug 1416016 - Add ../config to the sandbox whitelist for older Mesa. r=jld 2017-11-17 15:23:28 +01:00
glue Backed out 16 changesets (bug 1402519) for conflicts during merge r=backout on a CLOSED TREE 2017-11-23 00:11:44 +02:00
gtest Backed out 3 changesets (bug 1380701, bug 1384804) 2017-08-24 15:02:48 -06:00
interfaces Bug 1286865 - Step 2: Add XPCOM bindings for sandbox syscall reporter. r=gcp r=glandium 2017-01-30 18:50:41 -07:00
launch Bug 1401786 - Move the Linux sandboxing parts of GeckoChildProcessHost into security/sandbox. r=gcp 2017-10-06 17:15:46 -06:00
reporter Bug 1328896 - Restrict fcntl() in sandboxed content processes. r=gcp 2017-07-24 17:33:07 -06:00
LinuxCapabilities.cpp
LinuxCapabilities.h
LinuxSched.h
moz.build Bug 1366701 Part 1: Roll-up of chromium sandbox update and mozilla patches to get a running browser. r=jld,aklotz,jimm,bobowen 2017-10-26 15:10:41 +01:00
Sandbox.cpp Bug 1410241 - Don't call destructors on objects we use in the SIGSYS handler. r=gcp 2017-10-25 17:58:22 -06:00
Sandbox.h Backed out 1 changesets (bug 1365257) for failing gl in \build\build\src\obj-firefox\dist\include\mozilla/ServoStyleSet.h:97 r=backout on a CLOSED TREE 2017-11-10 19:23:58 +02:00
SandboxBrokerClient.cpp Backed out 3 changesets (bug 1380701, bug 1384804) 2017-08-24 15:02:48 -06:00
SandboxBrokerClient.h Backed out 3 changesets (bug 1380701, bug 1384804) 2017-08-24 15:02:48 -06:00
SandboxChroot.cpp Bug 1338086 - Remove useless else blocks in order to reduce complexity in security/sandbox/linux/ r=gcp 2017-02-09 10:56:05 +01:00
SandboxChroot.h
SandboxFilter.cpp Bug 1413312 - Fix media plugin sandbox policy for sched_get_priority_{min,max}. r=gcp 2017-10-31 18:12:43 -06:00
SandboxFilter.h Bug 1372428 - Extend file pre-opening for sandboxed media plugins. r=gcp 2017-07-07 08:58:50 -06:00
SandboxFilterUtil.cpp
SandboxFilterUtil.h Bug 1376653 - Fix handling of architecture differences for getdents. r=gcp 2017-07-11 17:03:06 -06:00
SandboxHooks.cpp Bug 1412464 - Change sandboxing inotify denial from seccomp-bpf to symbol interception. r=gcp 2017-10-30 19:45:39 -06:00
SandboxInfo.cpp Backed out 1 changesets (bug 1365257) for failing gl in \build\build\src\obj-firefox\dist\include\mozilla/ServoStyleSet.h:97 r=backout on a CLOSED TREE 2017-11-10 19:23:58 +02:00
SandboxInfo.h Backed out 1 changesets (bug 1365257) for failing gl in \build\build\src\obj-firefox\dist\include\mozilla/ServoStyleSet.h:97 r=backout on a CLOSED TREE 2017-11-10 19:23:58 +02:00
SandboxInternal.h Bug 1257361 - Simplify detecting threads that already have seccomp-bpf applied. r=tedd r=gcp 2016-12-06 12:38:22 -10:00
SandboxLogging.cpp
SandboxLogging.h
SandboxOpenedFiles.cpp Bug 1372428 - Extend file pre-opening for sandboxed media plugins. r=gcp 2017-07-07 08:58:50 -06:00
SandboxOpenedFiles.h Bug 1372428 - Extend file pre-opening for sandboxed media plugins. r=gcp 2017-07-07 08:58:50 -06:00
SandboxReporterClient.cpp Bug 1286865 - Step 1: Gather syscall info from SIGSYS handlers into the parent process. r=gcp 2017-01-30 18:49:53 -07:00
SandboxReporterClient.h Bug 1286865 - Step 1: Gather syscall info from SIGSYS handlers into the parent process. r=gcp 2017-01-30 18:49:53 -07:00
SandboxUtil.cpp Bug 1369561 - Address misc. SnprintfLiteral correctness nits. r=jld, r=froydnj 2017-09-15 14:47:54 -07:00
SandboxUtil.h