index
:
chromium_src.git
ignore/bar
ignore/foo
infra/config
lkcr
lkgr
master
replicant-6.0
central chromium sources
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
sandbox
/
linux
Commit message (
Expand
)
Author
Age
Files
Lines
*
Linux sandbox: print kernel support in credentials unittests.
jln@chromium.org
2013-11-05
1
-4
/
+7
*
Linux: add basic unprivileged namespace support.
jln@chromium.org
2013-11-05
4
-10
/
+303
*
Linux: add a Credentials class to handle Linux capabilities.
jln@chromium.org
2013-11-05
5
-0
/
+168
*
Revert 232852 "Linux: add a Credentials class to handle Linux ca..."
ilevy@chromium.org
2013-11-05
5
-168
/
+0
*
Linux: add a Credentials class to handle Linux capabilities.
jln@chromium.org
2013-11-05
5
-0
/
+168
*
Revert 232837 "Linux: add a Credentials class to handle Linux ca..."
jln@chromium.org
2013-11-05
5
-168
/
+0
*
Linux: add a Credentials class to handle Linux capabilities.
jln@chromium.org
2013-11-04
5
-0
/
+168
*
Revert 232280 "Linux: add a Credentials class to handle Linux ca..."
jln@chromium.org
2013-11-01
5
-168
/
+0
*
Linux: add a Credentials class to handle Linux capabilities.
jln@chromium.org
2013-11-01
5
-0
/
+168
*
cros: Remove unused low memory margin code from sandbox and zygote
jamescook@chromium.org
2013-10-29
3
-44
/
+0
*
Linux Sandbox: make error tunable in open broker
jln@chromium.org
2013-10-14
4
-58
/
+84
*
Clean up unused constant globals
hans@chromium.org
2013-10-03
1
-1
/
+0
*
Android seccomp-bpf: allow clone without CLONE_DETACHED
jln@chromium.org
2013-10-01
1
-6
/
+15
*
Linux Sandbox: add RawSandboxDie()
jln@chromium.org
2013-09-06
4
-6
/
+22
*
Linux Sandbox: LOG error if a previous SIGSYS handler exists.
jln@chromium.org
2013-09-05
1
-1
/
+15
*
Linux sandbox: do not crash on spurious SIGSYS.
jln@chromium.org
2013-09-04
1
-12
/
+15
*
Do not use O_CLOEXEC for open() in the broker process.
jorgelo@chromium.org
2013-08-30
2
-19
/
+4
*
Update include paths in sandbox for base/process changes.
rsesek@chromium.org
2013-07-23
1
-1
/
+1
*
Linux sandbox: clean temporary file creation
jln@chromium.org
2013-07-17
1
-29
/
+41
*
Linux sandbox unittests: make tests pass as root
jln@chromium.org
2013-07-16
1
-21
/
+28
*
Linux Sandbox: cleanup code around spurious SIGSYS detection.
jln@chromium.org
2013-07-12
1
-5
/
+4
*
Linux Sandbox unittests: fix Valgrind detection.
jln@chromium.org
2013-07-11
5
-19
/
+41
*
Linux Sandbox: forward declare Errorcode in sandbox_bpf_policy_forward.h
jln@chromium.org
2013-07-10
1
-2
/
+2
*
Avoid std::string copying in GetFileNameInWhitelist.
jorgelo@chromium.org
2013-07-09
1
-7
/
+12
*
sandbox_linux_unittests: ignore TSAN when counting threads.
jln@chromium.org
2013-07-03
4
-12
/
+23
*
Add compiler flags that prevent text relocations.
shashishekhar@chromium.org
2013-07-03
1
-0
/
+5
*
sandbox_linux_unittests: disable fork() tests under TSAN.
jln@chromium.org
2013-07-03
2
-2
/
+12
*
linux: make libc urandom override work for non-glibc too
mostynb@opera.com
2013-06-29
1
-16
/
+89
*
Revert 208924 "attempt to make the libc urandom override work fo..."
asvitkine@chromium.org
2013-06-27
1
-86
/
+19
*
attempt to make the libc urandom override work for non-glibc too
mostynb@opera.com
2013-06-27
1
-19
/
+86
*
Linux: add a public content/ API to start a sandbox.
jln@chromium.org
2013-06-18
3
-6
/
+32
*
don't override libc code in a glibc-specific way when not using glibc
mostynb@opera.com
2013-06-13
1
-1
/
+3
*
Use a direct include of strings headers in rlz/, sandbox/, skia/, sql/, sync/.
avi@chromium.org
2013-06-11
2
-2
/
+2
*
Linux: remove unmaintained SELinux code.
phajdan.jr@chromium.org
2013-05-17
5
-63
/
+0
*
Linux sandbox: fix O_CLOEXEC support.
jln@chromium.org
2013-05-01
2
-5
/
+19
*
sandbox_linux_unittests: fail if the kernel does not support BPF.
jln@chromium.org
2013-04-30
1
-0
/
+9
*
Remove seccomp-legacy: phase 2.
jln@chromium.org
2013-04-30
1
-9
/
+1
*
Linux sandbox: allow non racy use of O_CLOEXEC
jln@chromium.org
2013-04-26
2
-29
/
+26
*
Linux sandbox: support O_NONBLOCK and O_CLOEXEC
jln@chromium.org
2013-04-25
3
-18
/
+65
*
Re-enable the BrokerProcess.OpenFileRW test on Android.
palmer@chromium.org
2013-04-24
1
-11
/
+3
*
Linux sandbox: add access() brokering to the async-signal safe broker process.
jln@chromium.org
2013-04-24
4
-55
/
+305
*
Remove inline definition of SIZE_MAX in header.
thakis@chromium.org
2013-04-19
1
-10
/
+3
*
Rewrite std::string("") to std::string(), Linux edition.
dcheng@chromium.org
2013-04-09
1
-1
/
+1
*
Revert "Rewrite std::string("") to std::string(), Linux edition."
dcheng@chromium.org
2013-04-09
1
-1
/
+1
*
Rewrite std::string("") to std::string(), Linux edition.
dcheng@chromium.org
2013-04-09
1
-1
/
+1
*
Linux Sandbox: assert monothreaded in tests
jln@chromium.org
2013-04-03
1
-7
/
+5
*
Android sandbox: workaround for restricted errno values.
jln@chromium.org
2013-03-11
2
-3
/
+37
*
The 'sandbox' target is always 'none'.
bungeman@chromium.org
2013-02-28
1
-1
/
+0
*
SECCOMP-BPF: Refactor the BPF sandbox API to use objects rather than "static"...
markus@chromium.org
2013-02-26
24
-990
/
+1071
*
Move file_path.h to base/files.
brettw@chromium.org
2013-02-24
1
-1
/
+1
[next]