summaryrefslogtreecommitdiffstats
path: root/sandbox/linux
Commit message (Expand)AuthorAgeFilesLines
* linux: make the seccomp sandbox work againevan@chromium.org2010-01-081-12/+54
* Linux: Adjust /proc/pid/oom_adj to sacrifice plugin and renderer processes to...thestig@chromium.org2009-12-103-1/+81
* Allow the seccomp sandbox to be enabled, even if the suid sandbox hasmarkus@chromium.org2009-11-0720-103/+141
* linux: compile fix for chrome_sandbox on 64-bit karmicevan@chromium.org2009-11-041-0/+1
* Only enable the seccomp sandbox, if the machine actually has kernel support formarkus@chromium.org2009-11-043-1/+66
* Allow chrome_sandbox to act as a helper program and find the socket with a gi...thestig@chromium.org2009-11-043-4/+162
* GCC's optimizer is getting more aggressive. It is no longer goodmarkus@chromium.org2009-10-223-7/+14
* - found all symbols that we directly access from assembly and marked them as ...markus@chromium.org2009-10-2113-486/+210
* Fix minor compilation issues that can trigger on some platforms (e.g. CentOS)markus@chromium.org2009-09-142-2/+2
* Despite the futex(2) manual page telling us to include <linux/futex.h>, thismarkus@chromium.org2009-09-142-1/+59
* On Linux, move the passing of filedescriptors to a dedicated socketpair().agl@chromium.org2009-09-041-1/+1
* Clean out leftover bits of the path-based Linux SUID sandbox.thestig@chromium.org2009-09-011-4/+0
* Linux: updates to the SUID sandboxagl@chromium.org2009-08-281-84/+64
* Linux: fix seccomp sandbox for GCC 4.4agl@chromium.org2009-08-131-2/+4
* Linux sandbox: fix security issue.agl@chromium.org2009-08-121-2/+6
* Fix seccomp sandbox for gcc44markus@chromium.org2009-08-122-2/+2
* Initial version of the Seccomp sandbox. Imported from http://code.google.com/...markus@chromium.org2009-08-1136-0/+11365
* Linux sandbox: save full list of SUID unsafe environment variables.agl@chromium.org2009-07-172-7/+78
* Linux sandbox: comment typo fix.agl@chromium.org2009-07-171-1/+1
* Linux: move hardcoded paths to GYP variables.agl@chromium.org2009-07-151-1/+10
* Linux: add comment to the sandbox binary as suggested by Markus.agl@chromium.org2009-07-151-1/+3
* Linux: propagate LD_LIBRARY_PATH through the SUID sandbox.agl@chromium.org2009-07-151-0/+15
* Linux: Fix sandbox defineagl@chromium.org2009-07-151-1/+1
* Linux: various sandbox changesagl@chromium.org2009-07-151-0/+6
* Linux: fix for developing on a machine with google-chrome packages installed.agl@chromium.org2009-07-151-0/+40
* Linux: don't bother passing the chroot directory fd to the zygote.agl@chromium.org2009-07-101-19/+3
* Linux: use a temp directory for the chroot.agl@chromium.org2009-07-101-6/+41
* Linux: SUID sandbox supportagl@chromium.org2009-07-081-0/+224