summaryrefslogtreecommitdiffstats
path: root/sandbox/linux
Commit message (Expand)AuthorAgeFilesLines
* Pull seccomp-sandbox in via DEPS rather than using an in-tree copy mseaborn@chromium.org2010-09-0145-14319/+0
* Revert 57921 - Pull seccomp-sandbox in via DEPS rather than using an in-tree ...nsylvain@chromium.org2010-08-3145-0/+14319
* Pull seccomp-sandbox in via DEPS rather than using an in-tree copymseaborn@chromium.org2010-08-3045-14319/+0
* Seccomp sandbox: Add a policy flag to allow file namespace access to be disabledmseaborn@chromium.org2010-08-276-14/+103
* Remove NEWNS from the setuid sandbox.mal@chromium.org2010-08-261-4/+0
* Fix about:sandbox's network isolation indication.agl@chromium.org2010-07-211-1/+1
* Remove <iostream> where possible.erg@google.com2010-07-203-3/+0
* Add about:sandbox.agl@chromium.org2010-07-131-1/+14
* Seccomp sandbox: Add Gyp rules for building the test suitemseaborn@chromium.org2010-05-241-0/+30
* Add NEWNS and NEWNET to the SUID sandbox.agl@chromium.org2010-05-241-15/+30
* Remove a possible race in the SUID sandbox (minor)agl@chromium.org2010-05-201-7/+18
* seccomp sandbox: Split source file list into a separate .gyp filemseaborn@chromium.org2010-05-201-0/+63
* Add support for calling {rt_,}sigaction(), and for invoking signal handlersmarkus@chromium.org2010-05-189-66/+624
* seccomp sandbox: Add tests for signal handlingmseaborn@chromium.org2010-05-181-3/+145
* Prevent FPU state corruption by directly creating the signal frame on themarkus@chromium.org2010-05-114-69/+56
* Add a couple more testsmarkus@chromium.org2010-04-281-7/+126
* Correctly align memory allocations in the case where we need to allocate memorymarkus@chromium.org2010-04-281-1/+4
* Added support for sigreturn() and rt_sigreturn(). On x86-32, this ismarkus@chromium.org2010-04-285-127/+239
* Merged Mark Seaborn's changes:markus@chromium.org2010-04-2218-76/+427
* Make the use of signals inside of the sandbox safe.markus@chromium.org2010-04-2011-409/+964
* SELinux: add basic policy.agl@chromium.org2010-04-193-0/+53
* Fix SELinux warnings when running on Fedora.markus@chromium.org2010-03-301-3/+3
* Update/add copyright headers.markus@chromium.org2010-03-293-30/+13
* linux: turn on -Wextraevan@chromium.org2010-03-267-22/+22
* Revert "linux: turn on -Wextra"evan@chromium.org2010-03-257-22/+22
* linux: turn on -Wextraevan@chromium.org2010-03-257-22/+22
* Fix a few more places where we need to use our own allocator.markus@chromium.org2010-03-252-5/+19
* Add #include to fix compile errors on "Linux Perf (webkit.org)" bot.yutak@chromium.org2010-03-181-0/+1
* Add a first version of a tool for analyzing performance data output by themarkus@chromium.org2010-03-181-0/+190
* Compute and pring the time that it takes to execute system calls. This datamarkus@chromium.org2010-03-1820-84/+327
* Make sandbox code compile as "chromium_code".craig.schlenter@chromium.org2010-03-101-2/+3
* Added missing copyright header.markus@chromium.org2010-03-0822-0/+88
* - Add a custom allocator for STL objects. This fixes sandbox failures thatmarkus@chromium.org2010-03-0812-218/+641
* Be more restrictive when finding file names for libraries that need patching.markus@chromium.org2010-02-241-2/+17
* Explicitly ask for unsigned values when comparing addresses. Not only is thismarkus@chromium.org2010-02-241-2/+2
* Treat calls to lstat() and lstat64() the same as calls to stat(). In practise,markus@chromium.org2010-02-243-17/+72
* If /tmp is not a POSIX file system, try to use /dev/shm for creating ourmarkus@chromium.org2010-02-231-3/+58
* linux: change a type in the sandbox to fix a warningevan@chromium.org2010-02-151-1/+1
* seccomp: allow dup/dup2evan@chromium.org2010-02-031-0/+2
* linux: make the seccomp sandbox work againevan@chromium.org2010-01-081-12/+54
* Linux: Adjust /proc/pid/oom_adj to sacrifice plugin and renderer processes to...thestig@chromium.org2009-12-103-1/+81
* Allow the seccomp sandbox to be enabled, even if the suid sandbox hasmarkus@chromium.org2009-11-0720-103/+141
* linux: compile fix for chrome_sandbox on 64-bit karmicevan@chromium.org2009-11-041-0/+1
* Only enable the seccomp sandbox, if the machine actually has kernel support formarkus@chromium.org2009-11-043-1/+66
* Allow chrome_sandbox to act as a helper program and find the socket with a gi...thestig@chromium.org2009-11-043-4/+162
* GCC's optimizer is getting more aggressive. It is no longer goodmarkus@chromium.org2009-10-223-7/+14
* - found all symbols that we directly access from assembly and marked them as ...markus@chromium.org2009-10-2113-486/+210
* Fix minor compilation issues that can trigger on some platforms (e.g. CentOS)markus@chromium.org2009-09-142-2/+2
* Despite the futex(2) manual page telling us to include <linux/futex.h>, thismarkus@chromium.org2009-09-142-1/+59
* On Linux, move the passing of filedescriptors to a dedicated socketpair().agl@chromium.org2009-09-041-1/+1