summaryrefslogtreecommitdiffstats
path: root/sandbox/sandbox.gyp
Commit message (Expand)AuthorAgeFilesLines
* Calling clone(CLONE_NEWPID) results in the new pid namespace getting a new "i...markus@chromium.org2012-01-301-0/+2
* Remove 'settings' type from gyp filesevan@chromium.org2011-09-221-1/+1
* These unit tests are flaky and the code is exercised in the integration tests.jschuh@chromium.org2011-09-121-1/+0
* Make sandbox target a settings target type to fix a linker error.craig.schlenter@chromium.org2011-08-111-1/+1
* seccomp: simplify enable/disable logicevan@chromium.org2011-07-291-23/+11
* Re-enabling chrome-sandbox for Clang builds.glotov@google.com2011-07-271-2/+2
* Add a sandbox API to allow closing open handles at lockdown. jschuh@chromium.org2011-07-211-0/+5
* Revert 93308 - Add a sandbox API to allow closing open handles at lockdown. jschuh@chromium.org2011-07-211-5/+0
* Add a sandbox API to allow closing open handles at lockdown. jschuh@chromium.org2011-07-211-0/+5
* Revert 93274 - Add a sandbox API to allow closing open handles at lockdown. jschuh@chromium.org2011-07-201-5/+0
* Add a sandbox API to allow closing open handles at lockdown. jschuh@chromium.org2011-07-201-0/+5
* Revert 93113 - Add a sandbox API to allow closing open handles at lockdown.jschuh@chromium.org2011-07-191-5/+0
* Add a sandbox API to allow closing open handles at lockdown.jschuh@chromium.org2011-07-191-0/+5
* Revert 92887 - Add a sandbox API to allow closing open handles at lockdown.jschuh@chromium.org2011-07-181-5/+0
* Add a sandbox API to allow closing open handles at lockdown.jschuh@chromium.org2011-07-181-0/+5
* Add COMPONENT_BUILD global define. darin@chromium.org2011-07-131-0/+1
* Revert "Add COMPONENT_BUILD global define. "yurys@chromium.org2011-07-131-1/+0
* Add COMPONENT_BUILD global define. darin@chromium.org2011-07-131-0/+1
* Remove the comments setting emands and vim tab width and expansion variables.tony@chromium.org2011-07-111-6/+0
* Factor Windows handle enumeration code into its own classesI did some general...jschuh@chromium.org2011-06-241-0/+3
* Remove msvs_guids from ipc, media, net, ppapi, printing, sandbox,tony@chromium.org2011-06-161-2/+0
* Final gyp patch to make use of the new cross-platform POSIX defines toolkit_u...tony@chromium.org2011-05-231-1/+1
* Globally replace <(library) with static_libraryevan@chromium.org2011-05-191-3/+3
* Base: Adjust dependencies to build with base.dllrvargas@google.com2011-04-261-0/+3
* Create a base_static library with files that should notrvargas@google.com2011-04-041-1/+2
* Support for building Chrome using Clang.evan@chromium.org2010-09-181-2/+2
* Pull seccomp-sandbox in via DEPS rather than using an in-tree copy mseaborn@chromium.org2010-09-011-1/+1
* Revert 49982 - patchthakis@chromium.org2010-06-161-2/+2
* patchthakis@chromium.org2010-06-161-2/+2
* seccomp sandbox: Split source file list into a separate .gyp filemseaborn@chromium.org2010-05-201-52/+4
* Add support for calling {rt_,}sigaction(), and for invoking signal handlersmarkus@chromium.org2010-05-181-0/+1
* GYP changes for FreeBSD and OpenBSDpvalchev@google.com2010-05-141-0/+9
* Make the use of signals inside of the sandbox safe.markus@chromium.org2010-04-201-0/+1
* Add a first version of a tool for analyzing performance data output by themarkus@chromium.org2010-03-181-0/+7
* Third change to port sandbox to 64 bitscpu@chromium.org2010-03-161-8/+8
* Re-land second sandbox round of changescpu@chromium.org2010-03-131-4/+4
* Revert 41481 - Secound round of sbox changes for 64 bit portericu@google.com2010-03-121-4/+4
* Secound round of sbox changes for 64 bit portcpu@chromium.org2010-03-121-4/+4
* Make sandbox code compile as "chromium_code".craig.schlenter@chromium.org2010-03-101-0/+3
* - Add a custom allocator for STL objects. This fixes sandbox failures thatmarkus@chromium.org2010-03-081-0/+2
* Sandbox: Add code for all the interceptors.rvargas@google.com2010-03-051-9/+9
* Porting sbox IPC to 64 bitcpu@chromium.org2010-03-031-4/+4
* Sandbox: Some cleanup after the previous changes.rvargas@google.com2010-02-111-2/+4
* Sandbox: Finish the interception manager support for x64.rvargas@google.com2010-02-041-17/+18
* Sandbox: Add the 64-bit service resolver and a fewrvargas@google.com2010-02-011-1/+5
* Sandbox: Add the base code for the 46-bit service resolver.rvargas@google.com2010-01-291-1/+5
* Improve handling and testing of reparse points.rvargas@google.com2010-01-271-0/+5
* Prepare the sandbox for integration with NaCl broker for 64-bit Windows. The ...gregoryd@google.com2010-01-171-82/+128
* Linux: Adjust /proc/pid/oom_adj to sacrifice plugin and renderer processes to...thestig@chromium.org2009-12-101-0/+2
* Sort the source files in sandbox.gypgregoryd@google.com2009-11-091-70/+70