summaryrefslogtreecommitdiffstats
path: root/sandbox/linux
Commit message (Expand)AuthorAgeFilesLines
* Clarify the process title of GPU broker process.dongseong.hwang@intel.com2014-02-224-16/+22
* Setuid sandbox: exit(2) on SIGABRTjln@chromium.org2014-02-151-0/+18
* Revert 251391 "Setuid sandbox: exit(2) on SIGABRT"asvitkine@chromium.org2014-02-141-15/+0
* Setuid sandbox: exit(2) on SIGABRTjln@chromium.org2014-02-141-0/+15
* Revert r251271 "Setuid sandbox: exit(2) on SIGABRT" Make Linux build again.pfeldman@chromium.org2014-02-141-15/+0
* Setuid sandbox: exit(2) on SIGABRTjln@chromium.org2014-02-141-0/+15
* Revert 251265 "Setuid sandbox: exit(2) on SIGABRT"jln@chromium.org2014-02-141-15/+0
* Setuid sandbox: exit(2) on SIGABRTjln@chromium.org2014-02-141-0/+15
* Linux sandbox tests: always stop threadsjln@chromium.org2014-02-101-0/+4
* Disable the failing ThreadHelpers.* tests under ThreadSanitizer for now.glider@chromium.org2014-02-101-3/+14
* android: Require exe unittests to have a foo_unittest_stripped target.thakis@chromium.org2014-02-101-0/+15
* Linux Sandbox: Stop GPU watchdog in accountable way.jln@chromium.org2014-02-085-0/+213
* Linux Sandbox: EPERM credential changes.jln@chromium.org2014-02-041-2/+2
* Disable libc urandom overrides under MSan.earthdok@chromium.org2014-01-281-6/+6
* sandbox: Remove a TEXTREL on Linux ARM.rsesek@chromium.org2013-12-202-6/+1
* Make building seccomp-bpf a GYP conditionjln@chromium.org2013-12-192-11/+4
* ARM Linux sandbox: make sure r7 is marked as clobberedjln@chromium.org2013-12-191-2/+2
* Making sandbox error message on moving to namespaces more accurate.mithro@mithis.com2013-12-181-1/+13
* Revert 240670 "Revert 239894 "Linux Sandbox: check no threads be..."jln@chromium.org2013-12-162-0/+6
* Revert 239894 "Linux Sandbox: check no threads before fork()."jln@chromium.org2013-12-132-6/+0
* Linux sandbox: Deprecate compatibility APIjln@chromium.org2013-12-102-13/+0
* Linux Sandbox: check no threads before fork().jln@chromium.org2013-12-102-0/+6
* Linux sandbox: cleanup sandbox-bpf naming.jln@chromium.org2013-12-1032-314/+299
* Linux Sandbox: move NaCl to new BPF policy format.jln@chromium.org2013-12-103-28/+3
* Linux sandbox: migrate policies to new format.jln@chromium.org2013-12-095-138/+382
* Revert of https://chromiumcodereview.appspot.com/103293003/jln@chromium.org2013-12-064-5/+23
* Revert 239102 "Move build/build_config_functions.h to sandbox/"rlarocque@chromium.org2013-12-063-89/+3
* Move build/build_config_functions.h to sandbox/jln@chromium.org2013-12-063-3/+89
* Add build_config_functions.h to avoid #ifdefjln@chromium.org2013-12-064-23/+5
* Move more helpers to seccomp-bpf-helpers.jln@chromium.org2013-12-056-3/+477
* Add "cc" to inline asm clobber list.eugenis@chromium.org2013-12-051-3/+3
* Linux sandbox: move system call sets to sandbox/jln@chromium.org2013-12-053-0/+1094
* Revert of https://codereview.chromium.org/103323003/robliao@chromium.org2013-12-043-1092/+0
* Linux sandbox: move system call sets to sandbox/jln@chromium.org2013-12-043-0/+1092
* Don't HANDLE_EINTR(close). Either IGNORE_EINTR(close) or just close.mark@chromium.org2013-12-037-27/+26
* DPCHECK known conditions when we guess false in CurrentProcessHasOpenDirectoriesmostynb@opera.com2013-11-281-2/+8
* Linux: init_process_reaper comment cleanup.jln@chromium.org2013-11-281-7/+5
* Extract CreateInitProcessReaper() from the Zygote.jln@chromium.org2013-11-275-0/+141
* Linux sandbox: move CurrentProcessHasOpenDirectoriesjln@chromium.org2013-11-263-3/+121
* Revert 237242 "Linux sandbox: move CurrentProcessHasOpenDirectories"jln@chromium.org2013-11-263-121/+3
* Linux sandbox: move CurrentProcessHasOpenDirectoriesjln@chromium.org2013-11-263-3/+121
* Linux sandbox: cleanup BrokerProcess class.jln@chromium.org2013-11-233-33/+36
* Linux sandbox: fix demo.cc usage of system call numbersjln@chromium.org2013-11-202-6/+18
* Remove SECCOMP_BPF_STANDALONE and port the demo target to gyp.rsesek@chromium.org2013-11-1416-102/+46
* Fixes for -Wunused-function on Linux, Android and ChromeOShans@chromium.org2013-11-121-12/+3
* Make sandbox/linux/seccomp-bpf/ follow the style guide.jln@chromium.org2013-11-0827-1344/+1439
* Linux sandbox: make BPF policies an implementation of an interface.jln@chromium.org2013-11-088-94/+151
* Linux sandbox: print kernel support in credentials unittests.jln@chromium.org2013-11-051-4/+7
* Linux: add basic unprivileged namespace support.jln@chromium.org2013-11-054-10/+303
* Linux: add a Credentials class to handle Linux capabilities.jln@chromium.org2013-11-055-0/+168