index
:
chromium_src.git
ignore/bar
ignore/foo
infra/config
lkcr
lkgr
master
replicant-6.0
central chromium sources
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
content
/
common
/
sandbox_init_linux.cc
Commit message (
Expand
)
Author
Age
Files
Lines
*
Linux: limit the address space size in sandbox initialization.
jln@chromium.org
2012-10-22
1
-0
/
+3
*
Linux: add a seccomp-bpf sandbox for renderers
jln@chromium.org
2012-08-30
1
-9
/
+6
*
Linux: return sandbox status in InitializeSandbox().
jln@chromium.org
2012-08-28
1
-3
/
+6
*
Clean up GPU process seccomp-bpf sandbox policies.
jorgelo@chromium.org
2012-08-07
1
-1
/
+0
*
Create a class for seccomp-bpf sandboxing in content.
jln@chromium.org
2012-08-02
1
-544
/
+17
*
Create a LinuxSandbox class.
jln@chromium.org
2012-08-02
1
-18
/
+2
*
Revert 149692 - Create a LinuxSandbox class.
mazda@chromium.org
2012-08-02
1
-2
/
+18
*
Create a LinuxSandbox class.
jln@chromium.org
2012-08-02
1
-18
/
+2
*
Linux: unify seccomp sandbox initialization
jln@chromium.org
2012-08-01
1
-37
/
+62
*
Tweak the GPU process sandbox to allow accelerated video decode.
jorgelo@chromium.org
2012-07-26
1
-6
/
+37
*
Remove the seccomp filter disable.
jorgelo@chromium.org
2012-07-23
1
-14
/
+0
*
Seccomp BPF sandbox: fix compilation on 32 bits
jln@chromium.org
2012-07-18
1
-0
/
+2
*
Implement open() hook for GPU process.
jorgelo@chromium.org
2012-07-18
1
-1
/
+86
*
Add mknod* to the list of syscalls which use filesystem paths. mknod() has
cevans@chromium.org
2012-07-18
1
-0
/
+2
*
Use IsChromeOS() instead of ifdef
jln@chromium.org
2012-07-16
1
-25
/
+34
*
Linux: Unify InitializeSandbox between 32/64 bits
jln@chromium.org
2012-07-13
1
-56
/
+110
*
Disable seccomp filter sandbox temporarily.
jorgelo@chromium.org
2012-07-12
1
-0
/
+12
*
Some GPU and Flash policy tweaks.
cevans@chromium.org
2012-07-03
1
-0
/
+5
*
Seccomp-BPF: switch from the old to the new API
jln@chromium.org
2012-06-28
1
-329
/
+223
*
Log the activation of the seccomp filter sandbox to help eventual debugging.
jorgelo@chromium.org
2012-06-22
1
-0
/
+7
*
Linux BPF: always check for multiple threads
jln@chromium.org
2012-06-19
1
-10
/
+19
*
Restrict ioctl() to return ENOTTY.
jorgelo@chromium.org
2012-06-16
1
-2
/
+1
*
Add ioctl() and dup() to Pepper Flash sandbox for Flash Access.
jorgelo@chromium.org
2012-06-15
1
-0
/
+3
*
Linux BPF sandbox: report process type on failure
jln@chromium.org
2012-06-13
1
-3
/
+5
*
Disable the seccomp filter GPU process sandbox by default on Chrome OS.
jorgelo@chromium.org
2012-06-12
1
-2
/
+22
*
Allow sys_time in the Pepper Flash syscall filter policy.
jorgelo@chromium.org
2012-06-11
1
-0
/
+1
*
Linux BPF sandbox: relax CheckSingleThreaded
jln@chromium.org
2012-06-01
1
-5
/
+8
*
Block ptrace (and ptrace-like) syscalls from the renderer and worker processs.
cevans@chromium.org
2012-06-01
1
-8
/
+45
*
Handle socket() more gracefully in the GPU policy.
cevans@chromium.org
2012-05-29
1
-0
/
+1
*
Fix Pepper Flash SIGSYS crash: recognize openat() and refactor ENOENT filesystem
cevans@chromium.org
2012-05-25
1
-8
/
+28
*
Sandbox policy fixes for all known remaining issues.
cevans@chromium.org
2012-05-22
1
-4
/
+14
*
Add a couple more syscalls for the Nvidia binary driver, based on a real-world
cevans@chromium.org
2012-05-04
1
-4
/
+11
*
Policy tweaks to address syscall failures seen in 20.0.115.1
cevans@chromium.org
2012-04-30
1
-0
/
+6
*
Allow kill(self) for the GPU watchdog.
cevans@chromium.org
2012-04-20
1
-6
/
+34
*
Handle three syscalls seen so far in crash logs.
cevans@chromium.org
2012-04-19
1
-1
/
+15
*
Fix CHECK() loading Pepper Flash when inside the suid sandbox.
cevans@chromium.org
2012-04-18
1
-3
/
+5
*
Apply an initial seccomp filter policy for Pepper Flash.
cevans@chromium.org
2012-04-17
1
-1
/
+55
*
Add an initial Linux GPU sandbox using the seccomp filter framework.
cevans@chromium.org
2012-04-13
1
-0
/
+263