index
:
chromium_src.git
ignore/bar
ignore/foo
infra/config
lkcr
lkgr
master
replicant-6.0
central chromium sources
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
sandbox
Commit message (
Expand
)
Author
Age
Files
Lines
*
Emergency revert; rietveld broke; tree broke
erg@google.com
2012-07-13
215
-628
/
+628
*
sandbox_win.gypi: one less.. for other .gyp files
jln@chromium.org
2012-07-13
1
-10
/
+10
*
sandbox/wow_helper -> sandbox/win/wow_helper
jln@chromium.org
2012-07-13
3
-5
/
+5
*
sandbox/tools -> sandbox/win/tools
jln@chromium.org
2012-07-13
7
-8
/
+8
*
sandbox_poc + test to sandbox/win
jln@chromium.org
2012-07-13
31
-43
/
+43
*
sandbox/src -> sandbox/win/src
jln@chromium.org
2012-07-13
162
-566
/
+566
*
Move Windows sandbox
jln@chromium.org
2012-07-13
215
-16
/
+16
*
Share the zygote's fopen overrides with nacl_helper.
ncbray@chromium.org
2012-07-13
3
-0
/
+198
*
Suppress STATUS_INVALID_HANDLE (0xc0000008) exceptions triggered by HandleClo...
alexeypa@chromium.org
2012-07-12
1
-7
/
+27
*
Make wow_helper.sln pure ASCII
jln@chromium.org
2012-07-12
1
-1
/
+1
*
Remove the rest of #pragma once in one big CL.
ajwong@chromium.org
2012-07-11
4
-4
/
+0
*
Seccomp-BPF: add a new synthetic unittest
jln@chromium.org
2012-07-09
1
-0
/
+59
*
Add Julien Tinnes as OWNER of Linux sandboxing and Zygote
jln@chromium.org
2012-07-09
1
-0
/
+5
*
Force the interception agent trampoline into the random range
jschuh@chromium.org
2012-06-29
1
-6
/
+19
*
Sandbox: Move code around.
rvargas@google.com
2012-06-28
3
-218
/
+236
*
Sandbox: Two files were left behind when changing the use
rvargas@google.com
2012-06-28
2
-3
/
+4
*
Sandbox: Use ScopedProcessInformation.
rvargas@google.com
2012-06-27
8
-186
/
+176
*
Make chrome compile with the win8 sdk
cpu@chromium.org
2012-06-26
5
-7
/
+7
*
Seccomp BPF: add a unittest for a SIGSYS handler
jln@chromium.org
2012-06-26
1
-0
/
+52
*
Add eight more bits of entropy to the sandbox intercept trampoline
jschuh@chromium.org
2012-06-25
2
-8
/
+44
*
Seccomp BPF: add a simple whitelist unittest
jln@chromium.org
2012-06-23
2
-22
/
+113
*
Sandbox Gyp: split Windows into its own .gypi file
jln@chromium.org
2012-06-23
2
-338
/
+347
*
Sandbox BPF: add basic unittests
jln@chromium.org
2012-06-22
2
-2
/
+54
*
Seccomp BPF: initial structure for unittests
jln@chromium.org
2012-06-22
3
-11
/
+62
*
seccomp bpf: make more of the Sandbox class private
jln@chromium.org
2012-06-22
1
-3
/
+3
*
Sandbox Gyp: move Linux to its own .gypi file
jln@chromium.org
2012-06-21
2
-53
/
+69
*
Revert 143426 - Sandbox GYP: separate Windows and Linux
sky@chromium.org
2012-06-21
3
-397
/
+386
*
Sandbox: Add support for the latest version of windows' service
rvargas@google.com
2012-06-21
1
-6
/
+49
*
Sandbox GYP: separate Windows and Linux
jln@chromium.org
2012-06-21
3
-386
/
+397
*
Fix compilation error triggered by gcc-4.7+ running in C++-11 mode.
markus@chromium.org
2012-06-17
1
-1
/
+2
*
Use binary search to optimize code generation for BPF filters.
markus@chromium.org
2012-06-15
3
-38
/
+123
*
Added support for SECCOMP_RET_TRAP handlers.
markus@chromium.org
2012-06-15
4
-97
/
+330
*
Instead of outputting one BPF check per possible system call coalesce
markus@chromium.org
2012-06-15
3
-53
/
+177
*
Added a new Verifier class to the BPF compiler.
markus@chromium.org
2012-06-14
6
-8
/
+286
*
Don't break sandboxed sub-processes out of jobs on Win8.
siggi@chromium.org
2012-06-14
2
-4
/
+18
*
Second try at landing this patch list. This time, we are super careful about ...
markus@chromium.org
2012-06-14
5
-25
/
+75
*
Revert 141938 - Improve logging, if we fail due to an internal error when exe...
sergeyu@chromium.org
2012-06-13
2
-65
/
+19
*
Improve logging, if we fail due to an internal error when executing supportsS...
markus@chromium.org
2012-06-13
2
-19
/
+65
*
Avoid all library calls (including calls to destructors) after enabling the s...
markus@chromium.org
2012-06-13
2
-17
/
+38
*
Explicitly test bit 30 in the system call number to distinguish between the n...
markus@chromium.org
2012-06-08
2
-6
/
+27
*
Build seccomp 1 for supported architecture only
jln@chromium.org
2012-06-08
1
-1
/
+2
*
Compile the new sandbox-bpf API code, don't use it yet.
jln@chromium.org
2012-06-07
1
-1
/
+16
*
Revert 140971 - Broke compile on CrOS Daisy bot
rsleevi@chromium.org
2012-06-07
1
-16
/
+1
*
Compile the new sandbox-bpf API code
jln@chromium.org
2012-06-07
1
-1
/
+16
*
BPF: Fix status_ not being set properly
jln@chromium.org
2012-06-07
1
-2
/
+2
*
SVN was apparently quite confused by all the changes that we made during the ...
markus@chromium.org
2012-06-06
3
-5
/
+5
*
Linux: bump the setuid sandbox API number
jln@chromium.org
2012-06-05
1
-1
/
+1
*
Setuid sandbox API versioning
jln@chromium.org
2012-06-05
2
-2
/
+59
*
Initial snapshot of the new BPF-enabled seccomp sandbox. This code is
markus@chromium.org
2012-06-04
6
-0
/
+1087
*
Revert 130716 - Use ScopedProcessInformation and other RAII types in sandbox.
rvargas@google.com
2012-06-01
9
-163
/
+168
[next]