summaryrefslogtreecommitdiffstats
path: root/sandbox/src
Commit message (Expand)AuthorAgeFilesLines
* Move the Windows sandbox to sandbox/winjln@chromium.org2012-07-18160-28218/+0
* Emergency revert; rietveld broke; tree brokeerg@google.com2012-07-13160-0/+28218
* Move Windows sandboxjln@chromium.org2012-07-13160-28218/+0
* Suppress STATUS_INVALID_HANDLE (0xc0000008) exceptions triggered by HandleClo...alexeypa@chromium.org2012-07-121-7/+27
* Remove the rest of #pragma once in one big CL.ajwong@chromium.org2012-07-111-1/+0
* Force the interception agent trampoline into the random rangejschuh@chromium.org2012-06-291-6/+19
* Sandbox: Move code around.rvargas@google.com2012-06-283-218/+236
* Sandbox: Two files were left behind when changing the uservargas@google.com2012-06-282-3/+4
* Sandbox: Use ScopedProcessInformation.rvargas@google.com2012-06-278-186/+176
* Make chrome compile with the win8 sdk cpu@chromium.org2012-06-265-7/+7
* Add eight more bits of entropy to the sandbox intercept trampolinejschuh@chromium.org2012-06-252-8/+44
* Sandbox: Add support for the latest version of windows' servicervargas@google.com2012-06-211-6/+49
* Don't break sandboxed sub-processes out of jobs on Win8.siggi@chromium.org2012-06-142-4/+18
* Revert 130716 - Use ScopedProcessInformation and other RAII types in sandbox.rvargas@google.com2012-06-019-163/+168
* Retain permissions on duplicated handle in DuplicateHandleProxyjschuh@chromium.org2012-05-241-1/+1
* Disable UnloadAviCapDllNoPatching because it is flaky.vandebo@chromium.org2012-05-231-7/+3
* Add a sandbox policy for duplicating handles into the broker.jschuh@chromium.org2012-05-195-16/+71
* Sandbox: Limit the memory buffers of the Sandbox IP to 32 bits.rvargas@google.com2012-05-1410-89/+107
* win: Fix a few minor issues found by clang.thakis@chromium.org2012-05-024-5/+5
* win: Fix some preprocessor confusion clang complains about.thakis@chromium.org2012-05-022-7/+7
* win sandbox: Fix minor c++ violation, no functionality changethakis@chromium.org2012-05-011-3/+2
* Mark UnloadAviCapDllNoPatching flakyjbates@chromium.org2012-04-191-1/+1
* Sandbox: Add support for interceptions on Windows 8.rvargas@google.com2012-04-174-25/+169
* Prevent sandboxed processes from opening each other jschuh@chromium.org2012-04-162-12/+6
* Add sandbox support for associating peer processes jschuh@chromium.org2012-04-134-13/+138
* Revert 131940 - Add sandbox support for associating peer processes jbauman@chromium.org2012-04-124-123/+12
* Add sandbox support for associating peer processes jschuh@chromium.org2012-04-124-12/+123
* Revert 131778 - Add sandbox support for associating peer processes jschuh@chromium.org2012-04-114-128/+12
* Add sandbox support for associating peer processes jschuh@chromium.org2012-04-114-12/+128
* Revert 131671 - Add sandbox support for associating peer processesjschuh@chromium.org2012-04-114-128/+12
* Add sandbox support for associating peer processesjschuh@chromium.org2012-04-104-12/+128
* Use ScopedProcessInformation and other RAII types in sandbox.erikwright@chromium.org2012-04-049-168/+163
* Fix race in CrossCallParamsEx::CreateFromBuffercpu@chromium.org2012-04-031-0/+6
* Fix some grammar in comments, error messages and documentation.gavinp@chromium.org2012-04-031-1/+1
* Add a sandbox API for broker handle duplication jschuh@chromium.org2012-03-3115-10/+451
* Revert 129627 - Add a sandbox API for broker handle duplicationjschuh@chromium.org2012-03-2915-451/+10
* Add a sandbox API for broker handle duplicationjschuh@chromium.org2012-03-2915-10/+451
* Revert 128016 - Make sandbox explicitly block opening broker and sandboxed pr...jschuh@chromium.org2012-03-236-107/+9
* Make sandbox explicitly block opening broker and sandboxed processesjschuh@chromium.org2012-03-216-9/+107
* Revert 127836 - Revert 127820 - Revert 127795 - Make sandbox explicitly block...zmo@google.com2012-03-216-107/+9
* Revert 127820 - Revert 127795 - Make sandbox explicitly block opening broker ...zmo@google.com2012-03-206-9/+107
* Revert 127795 - Make sandbox explicitly block opening broker and sandboxed pr...zmo@google.com2012-03-206-107/+9
* Make sandbox explicitly block opening broker and sandboxed processesjschuh@chromium.org2012-03-206-9/+107
* Fix sidestep licensessteveblock@chromium.org2012-03-206-114/+17
* Reserve the bottom of the address space to prevent predictable alocations.jschuh@chromium.org2012-02-281-1/+24
* Flakiness cleanup: disable remaining flaky tests in src/evan@chromium.org2012-02-151-2/+2
* Eliminated memory growth issue by removing null objects from a list that was ...erikghill@gmail.com2012-01-262-22/+18
* Fix memory dealocatiom mismatch by using scoped_ptr_malloccpu@chromium.org2012-01-122-8/+9
* ake string_util::WriteInto() DCHECK() that the supplied |length_with_null| > ...pkasting@chromium.org2011-11-293-33/+4
* Replace all usages of FRIEND_TEST() with FRIEND_TEST_ALL_PREFIXES()robertshield@chromium.org2011-11-292-11/+11