index
:
chromium_src.git
ignore/bar
ignore/foo
infra/config
lkcr
lkgr
master
replicant-6.0
central chromium sources
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
sandbox
/
linux
Commit message (
Expand
)
Author
Age
Files
Lines
*
Clarify the process title of GPU broker process.
dongseong.hwang@intel.com
2014-02-22
4
-16
/
+22
*
Setuid sandbox: exit(2) on SIGABRT
jln@chromium.org
2014-02-15
1
-0
/
+18
*
Revert 251391 "Setuid sandbox: exit(2) on SIGABRT"
asvitkine@chromium.org
2014-02-14
1
-15
/
+0
*
Setuid sandbox: exit(2) on SIGABRT
jln@chromium.org
2014-02-14
1
-0
/
+15
*
Revert r251271 "Setuid sandbox: exit(2) on SIGABRT" Make Linux build again.
pfeldman@chromium.org
2014-02-14
1
-15
/
+0
*
Setuid sandbox: exit(2) on SIGABRT
jln@chromium.org
2014-02-14
1
-0
/
+15
*
Revert 251265 "Setuid sandbox: exit(2) on SIGABRT"
jln@chromium.org
2014-02-14
1
-15
/
+0
*
Setuid sandbox: exit(2) on SIGABRT
jln@chromium.org
2014-02-14
1
-0
/
+15
*
Linux sandbox tests: always stop threads
jln@chromium.org
2014-02-10
1
-0
/
+4
*
Disable the failing ThreadHelpers.* tests under ThreadSanitizer for now.
glider@chromium.org
2014-02-10
1
-3
/
+14
*
android: Require exe unittests to have a foo_unittest_stripped target.
thakis@chromium.org
2014-02-10
1
-0
/
+15
*
Linux Sandbox: Stop GPU watchdog in accountable way.
jln@chromium.org
2014-02-08
5
-0
/
+213
*
Linux Sandbox: EPERM credential changes.
jln@chromium.org
2014-02-04
1
-2
/
+2
*
Disable libc urandom overrides under MSan.
earthdok@chromium.org
2014-01-28
1
-6
/
+6
*
sandbox: Remove a TEXTREL on Linux ARM.
rsesek@chromium.org
2013-12-20
2
-6
/
+1
*
Make building seccomp-bpf a GYP condition
jln@chromium.org
2013-12-19
2
-11
/
+4
*
ARM Linux sandbox: make sure r7 is marked as clobbered
jln@chromium.org
2013-12-19
1
-2
/
+2
*
Making sandbox error message on moving to namespaces more accurate.
mithro@mithis.com
2013-12-18
1
-1
/
+13
*
Revert 240670 "Revert 239894 "Linux Sandbox: check no threads be..."
jln@chromium.org
2013-12-16
2
-0
/
+6
*
Revert 239894 "Linux Sandbox: check no threads before fork()."
jln@chromium.org
2013-12-13
2
-6
/
+0
*
Linux sandbox: Deprecate compatibility API
jln@chromium.org
2013-12-10
2
-13
/
+0
*
Linux Sandbox: check no threads before fork().
jln@chromium.org
2013-12-10
2
-0
/
+6
*
Linux sandbox: cleanup sandbox-bpf naming.
jln@chromium.org
2013-12-10
32
-314
/
+299
*
Linux Sandbox: move NaCl to new BPF policy format.
jln@chromium.org
2013-12-10
3
-28
/
+3
*
Linux sandbox: migrate policies to new format.
jln@chromium.org
2013-12-09
5
-138
/
+382
*
Revert of https://chromiumcodereview.appspot.com/103293003/
jln@chromium.org
2013-12-06
4
-5
/
+23
*
Revert 239102 "Move build/build_config_functions.h to sandbox/"
rlarocque@chromium.org
2013-12-06
3
-89
/
+3
*
Move build/build_config_functions.h to sandbox/
jln@chromium.org
2013-12-06
3
-3
/
+89
*
Add build_config_functions.h to avoid #ifdef
jln@chromium.org
2013-12-06
4
-23
/
+5
*
Move more helpers to seccomp-bpf-helpers.
jln@chromium.org
2013-12-05
6
-3
/
+477
*
Add "cc" to inline asm clobber list.
eugenis@chromium.org
2013-12-05
1
-3
/
+3
*
Linux sandbox: move system call sets to sandbox/
jln@chromium.org
2013-12-05
3
-0
/
+1094
*
Revert of https://codereview.chromium.org/103323003/
robliao@chromium.org
2013-12-04
3
-1092
/
+0
*
Linux sandbox: move system call sets to sandbox/
jln@chromium.org
2013-12-04
3
-0
/
+1092
*
Don't HANDLE_EINTR(close). Either IGNORE_EINTR(close) or just close.
mark@chromium.org
2013-12-03
7
-27
/
+26
*
DPCHECK known conditions when we guess false in CurrentProcessHasOpenDirectories
mostynb@opera.com
2013-11-28
1
-2
/
+8
*
Linux: init_process_reaper comment cleanup.
jln@chromium.org
2013-11-28
1
-7
/
+5
*
Extract CreateInitProcessReaper() from the Zygote.
jln@chromium.org
2013-11-27
5
-0
/
+141
*
Linux sandbox: move CurrentProcessHasOpenDirectories
jln@chromium.org
2013-11-26
3
-3
/
+121
*
Revert 237242 "Linux sandbox: move CurrentProcessHasOpenDirectories"
jln@chromium.org
2013-11-26
3
-121
/
+3
*
Linux sandbox: move CurrentProcessHasOpenDirectories
jln@chromium.org
2013-11-26
3
-3
/
+121
*
Linux sandbox: cleanup BrokerProcess class.
jln@chromium.org
2013-11-23
3
-33
/
+36
*
Linux sandbox: fix demo.cc usage of system call numbers
jln@chromium.org
2013-11-20
2
-6
/
+18
*
Remove SECCOMP_BPF_STANDALONE and port the demo target to gyp.
rsesek@chromium.org
2013-11-14
16
-102
/
+46
*
Fixes for -Wunused-function on Linux, Android and ChromeOS
hans@chromium.org
2013-11-12
1
-12
/
+3
*
Make sandbox/linux/seccomp-bpf/ follow the style guide.
jln@chromium.org
2013-11-08
27
-1344
/
+1439
*
Linux sandbox: make BPF policies an implementation of an interface.
jln@chromium.org
2013-11-08
8
-94
/
+151
*
Linux sandbox: print kernel support in credentials unittests.
jln@chromium.org
2013-11-05
1
-4
/
+7
*
Linux: add basic unprivileged namespace support.
jln@chromium.org
2013-11-05
4
-10
/
+303
*
Linux: add a Credentials class to handle Linux capabilities.
jln@chromium.org
2013-11-05
5
-0
/
+168
[next]