summaryrefslogtreecommitdiffstats
path: root/chrome/browser/zygote_main_linux.cc
Commit message (Expand)AuthorAgeFilesLines
* Coverity: Fix unchecked return values.kmadhusu@chromium.org2011-01-121-2/+4
* Move the SetProcTitle code out of base and into chrome/common. This is onlybrettw@chromium.org2010-12-291-1/+7
* Move unix domain socket support out of base and into chrome common. This is notbrettw@chromium.org2010-12-221-16/+14
* This adds some plumbing for propagating the status and error code of a render...gspencer@chromium.org2010-12-141-12/+18
* Wrap GlobalDescriptors singleton in accessor method.evan@chromium.org2010-12-071-1/+1
* Convert LOG(INFO) to VLOG(1) - misc. chrome/browser/*.pkasting@chromium.org2010-10-211-1/+1
* Revert 63067 - This adds some plumbing for propagating the status and error c...gspencer@chromium.org2010-10-191-17/+12
* This adds some plumbing for propagating the status and error code of agspencer@chromium.org2010-10-191-12/+17
* Linux: Fix problem with zombies and hanging browsers when METHOD_GET_CHILD_WI...thestig@chromium.org2010-09-261-1/+8
* linux: zygote should suicide when the browser channel closes.evan@chromium.org2010-09-241-5/+6
* zygote: use pthread_once to init localtime(_r) functions.agl@chromium.org2010-09-211-47/+38
* Replicate r59512 for localtime_ragl@chromium.org2010-09-201-6/+5
* Support for building Chrome using Clang.evan@chromium.org2010-09-181-2/+3
* Linux zygote: Fix race condition when using SUID + seccomp sandboxesmseaborn@chromium.org2010-09-161-46/+95
* Linux sandbox: Allow seccomp sandbox to be stacked on top of the SUID sandboxmseaborn@chromium.org2010-09-161-4/+6
* Use magic to init our 'localtime' wrapper.agl@chromium.org2010-09-151-6/+5
* Pull seccomp-sandbox in via DEPS rather than using an in-tree copy mseaborn@chromium.org2010-09-011-1/+1
* FBTF: Header cleanup in chrome/common part 2. The majority of the changed filesjhawkins@chromium.org2010-08-201-0/+1
* Linux: bit hacky way to ensure Pepper plugins get loaded by zygote.viettrungluu@chromium.org2010-07-281-1/+5
* base/ header cleanup. Forward declaration instead of including.erg@google.com2010-07-281-0/+1
* Load Pepper v2 internal pdf plugin.jam@chromium.org2010-07-161-14/+0
* Add about:sandbox.agl@chromium.org2010-07-131-1/+28
* Revert 52161 -Accidental checkin. Load Pepper v2 internal pdf plugin.jam@chromium.org2010-07-131-2/+1
* Load Pepper v2 internal pdf plugin.jam@chromium.org2010-07-131-1/+2
* Fix up a comment.agl@chromium.org2010-07-121-2/+2
* Checking in Lei's fix from http://codereview.chromium.org/2827024: Don't cras...jam@chromium.org2010-06-251-1/+1
* Internal plugin needs to be loaded in a different place for the Linux sandbox.jam@chromium.org2010-06-171-0/+14
* Revert 49982 - patchthakis@chromium.org2010-06-161-5/+0
* patchthakis@chromium.org2010-06-161-0/+5
* Log the errno when the zygote fails to fork.agl@chromium.org2010-06-091-1/+1
* Fix typo which was causing unneeded logging messages.agl@chromium.org2010-04-191-1/+3
* SELinux: add basic policy.agl@chromium.org2010-04-191-20/+24
* posix: handle the return value of close() in more places.evan@chromium.org2010-04-161-2/+4
* linux: enable seccomp sandbox by defaultevan@chromium.org2010-03-301-7/+3
* linux: make seccomp sandbox also use OOP font loadingevan@chromium.org2010-03-291-25/+29
* Linux: fix SELinux support.agl@chromium.org2010-03-171-9/+15
* Zygote: Clarify relationship between HandleForkRequest() and ChromeMain()mseaborn@chromium.org2010-03-081-11/+13
* Rename constants to be consistent with the names used inagl@chromium.org2010-02-231-4/+4
* Revert "linux: enable seccomp sandbox by default"evan@chromium.org2010-02-181-7/+7
* linux: enable seccomp sandbox by defaultevan@chromium.org2010-02-181-7/+7
* Linux: Only close kZygoteIdDescriptor when using the SUID sandbox.thestig@chromium.org2010-02-171-1/+2
* linux: unused variable in ARM buildjoel@chromium.org2009-11-191-0/+3
* Hide seccomp sandbox calls from non-x86 machinesjoel@chromium.org2009-11-181-0/+7
* Allow the seccomp sandbox to be enabled, even if the suid sandbox hasmarkus@chromium.org2009-11-071-7/+37
* Only enable the seccomp sandbox, if the machine actually has kernel support formarkus@chromium.org2009-11-041-0/+17
* Add support for getting the real process id from within the suid sandbox. The...thestig@chromium.org2009-11-041-26/+107
* Revert 30938 - Add support for getting the real process id from within the su...thestig@chromium.org2009-11-041-107/+26
* Add support for getting the real process id from within the suid sandbox. The...thestig@chromium.org2009-11-041-26/+107
* CommandLine: rejigger how initialization works.evan@chromium.org2009-10-121-1/+4
* Add a dummy call to icu::TimeZone.createDefault() before the sandbox kicks in.jshin@chromium.org2009-10-051-0/+9