summaryrefslogtreecommitdiffstats
path: root/sandbox/linux
Commit message (Expand)AuthorAgeFilesLines
* Linux sandbox: cleanup BrokerProcess class.jln@chromium.org2013-11-233-33/+36
* Linux sandbox: fix demo.cc usage of system call numbersjln@chromium.org2013-11-202-6/+18
* Remove SECCOMP_BPF_STANDALONE and port the demo target to gyp.rsesek@chromium.org2013-11-1416-102/+46
* Fixes for -Wunused-function on Linux, Android and ChromeOShans@chromium.org2013-11-121-12/+3
* Make sandbox/linux/seccomp-bpf/ follow the style guide.jln@chromium.org2013-11-0827-1344/+1439
* Linux sandbox: make BPF policies an implementation of an interface.jln@chromium.org2013-11-088-94/+151
* Linux sandbox: print kernel support in credentials unittests.jln@chromium.org2013-11-051-4/+7
* Linux: add basic unprivileged namespace support.jln@chromium.org2013-11-054-10/+303
* Linux: add a Credentials class to handle Linux capabilities.jln@chromium.org2013-11-055-0/+168
* Revert 232852 "Linux: add a Credentials class to handle Linux ca..."ilevy@chromium.org2013-11-055-168/+0
* Linux: add a Credentials class to handle Linux capabilities.jln@chromium.org2013-11-055-0/+168
* Revert 232837 "Linux: add a Credentials class to handle Linux ca..."jln@chromium.org2013-11-055-168/+0
* Linux: add a Credentials class to handle Linux capabilities.jln@chromium.org2013-11-045-0/+168
* Revert 232280 "Linux: add a Credentials class to handle Linux ca..."jln@chromium.org2013-11-015-168/+0
* Linux: add a Credentials class to handle Linux capabilities.jln@chromium.org2013-11-015-0/+168
* cros: Remove unused low memory margin code from sandbox and zygotejamescook@chromium.org2013-10-293-44/+0
* Linux Sandbox: make error tunable in open brokerjln@chromium.org2013-10-144-58/+84
* Clean up unused constant globalshans@chromium.org2013-10-031-1/+0
* Android seccomp-bpf: allow clone without CLONE_DETACHEDjln@chromium.org2013-10-011-6/+15
* Linux Sandbox: add RawSandboxDie()jln@chromium.org2013-09-064-6/+22
* Linux Sandbox: LOG error if a previous SIGSYS handler exists.jln@chromium.org2013-09-051-1/+15
* Linux sandbox: do not crash on spurious SIGSYS.jln@chromium.org2013-09-041-12/+15
* Do not use O_CLOEXEC for open() in the broker process.jorgelo@chromium.org2013-08-302-19/+4
* Update include paths in sandbox for base/process changes.rsesek@chromium.org2013-07-231-1/+1
* Linux sandbox: clean temporary file creationjln@chromium.org2013-07-171-29/+41
* Linux sandbox unittests: make tests pass as rootjln@chromium.org2013-07-161-21/+28
* Linux Sandbox: cleanup code around spurious SIGSYS detection.jln@chromium.org2013-07-121-5/+4
* Linux Sandbox unittests: fix Valgrind detection.jln@chromium.org2013-07-115-19/+41
* Linux Sandbox: forward declare Errorcode in sandbox_bpf_policy_forward.hjln@chromium.org2013-07-101-2/+2
* Avoid std::string copying in GetFileNameInWhitelist.jorgelo@chromium.org2013-07-091-7/+12
* sandbox_linux_unittests: ignore TSAN when counting threads.jln@chromium.org2013-07-034-12/+23
* Add compiler flags that prevent text relocations.shashishekhar@chromium.org2013-07-031-0/+5
* sandbox_linux_unittests: disable fork() tests under TSAN.jln@chromium.org2013-07-032-2/+12
* linux: make libc urandom override work for non-glibc toomostynb@opera.com2013-06-291-16/+89
* Revert 208924 "attempt to make the libc urandom override work fo..."asvitkine@chromium.org2013-06-271-86/+19
* attempt to make the libc urandom override work for non-glibc toomostynb@opera.com2013-06-271-19/+86
* Linux: add a public content/ API to start a sandbox.jln@chromium.org2013-06-183-6/+32
* don't override libc code in a glibc-specific way when not using glibcmostynb@opera.com2013-06-131-1/+3
* Use a direct include of strings headers in rlz/, sandbox/, skia/, sql/, sync/.avi@chromium.org2013-06-112-2/+2
* Linux: remove unmaintained SELinux code.phajdan.jr@chromium.org2013-05-175-63/+0
* Linux sandbox: fix O_CLOEXEC support.jln@chromium.org2013-05-012-5/+19
* sandbox_linux_unittests: fail if the kernel does not support BPF.jln@chromium.org2013-04-301-0/+9
* Remove seccomp-legacy: phase 2.jln@chromium.org2013-04-301-9/+1
* Linux sandbox: allow non racy use of O_CLOEXECjln@chromium.org2013-04-262-29/+26
* Linux sandbox: support O_NONBLOCK and O_CLOEXECjln@chromium.org2013-04-253-18/+65
* Re-enable the BrokerProcess.OpenFileRW test on Android.palmer@chromium.org2013-04-241-11/+3
* Linux sandbox: add access() brokering to the async-signal safe broker process.jln@chromium.org2013-04-244-55/+305
* Remove inline definition of SIZE_MAX in header.thakis@chromium.org2013-04-191-10/+3
* Rewrite std::string("") to std::string(), Linux edition.dcheng@chromium.org2013-04-091-1/+1
* Revert "Rewrite std::string("") to std::string(), Linux edition."dcheng@chromium.org2013-04-091-1/+1