summaryrefslogtreecommitdiffstats
path: root/sandbox/win/src/sandbox_policy_base.cc
Commit message (Expand)AuthorAgeFilesLines
* Cleanup/Remove Windows XP/Vista version checks from Windows sandbox codekylixrd2016-03-211-2/+1
* Windows: Expose handle inheritance to the sandboxed launcherrockot2016-02-261-19/+8
* Intercept CreateThread inside renderer and proxy out to CreateRemoteThread in...liamjm2016-02-091-1/+9
* [Win10 sandbox mitigations] Four new Win10 mitigations added.Penny MacNeil2016-02-031-1/+5
* Switch to standard integer types in sandbox/.avi2015-12-221-2/+3
* Revert of Switch to standard integer types in sandbox/. (patchset #3 id:40001...petewil2015-12-211-3/+2
* Switch to standard integer types in sandbox/.avi2015-12-211-2/+3
* Make dispatcher a member of PolicyBase.rickyz2015-12-121-124/+10
* clang/win: Let some chromium_code targets build with -Wextra.thakis2015-12-101-1/+1
* Rework target process creation to minimize creation routesforshaw2015-10-131-2/+3
* Sandbox: Make Job store a ScopedHandle and not a raw handle.rvargas2015-07-271-5/+5
* Sandbox: Make CreateRestrictedToken return a ScopedHandle.rvargas2015-07-201-8/+4
* Revert of Sandbox: Make CreateRestrictedToken return a ScopedHandle. (patchse...thakis2015-07-161-4/+8
* Sandbox: Make CreateRestrictedToken return a ScopedHandle.rvargas2015-07-161-8/+4
* Sandbox: Make PolicyBase::MakeTokens return ScopedHandesrvargas2015-07-101-11/+16
* Sandbox: Remove raw handles from PolicyBase.rvargas2015-07-101-17/+11
* Fix some clang warnings with -Wmissing-braces in sandbox.dcheng2015-07-021-2/+2
* Add creation of AC object directory to fix issue with VS debugger.forshaw2015-05-211-1/+51
* Provide a facility for sharing Window handles with target processes launched ...ananta2015-05-061-0/+33
* This CL adds a method to create process using LowBox token on Windows. LowBox...shrikant2015-03-021-1/+56
* Check alternate desktop before applying integrity labeljschuh2014-11-071-1/+1
* Do not cache tokens that have app container SIDswfh2014-10-291-1/+1
* Fixes for more MSVC warnings, sandbox/ edition.pkasting2014-10-041-1/+1
* Added logging in PolicyBase::AddRule.vitalybuka2014-09-071-78/+89
* Add UIPI support for sandbox alternate desktopjschuh@chromium.org2014-06-241-1/+25
* Sandbox policy and intercepts for the MITIGATION_WIN32K_DISABLE policy for re...ananta@chromium.org2014-06-111-0/+17
* Remove HandleCloser::SetupHandleInterceptionsjschuh@chromium.org2014-06-101-3/+0
* Add sandbox support for process memory limitsjschuh@chromium.org2014-06-071-1/+14
* This will make process launch faster and may prevent the LSASS hangs we've se...jschuh@chromium.org2014-06-061-1/+13
* Update some uses of char16 to use the base:: namespace.avi@chromium.org2013-12-251-2/+2
* Add base:: to string16s in sandbox/.dbeam@chromium.org2013-12-201-5/+5
* Use non-array operator new for memory deleted by non-array delete.bruening@google.com2013-06-211-4/+4
* Windows: Allow subprocesses to inherit non-console stdout/stderrmseaborn@chromium.org2013-02-031-0/+38
* Revert 162293 - Enable DEP earlier on Vista and belowmattm@chromium.org2012-10-171-1/+3
* Enable DEP earlier on Vista and belowjschuh@chromium.org2012-10-171-3/+1
* Add a parameter to the sandbox policy to allow sandboxed process to run outsi...pastarmovj@chromium.org2012-10-041-6/+10
* Add sandbox support for Windows process mitigations jschuh@chromium.org2012-09-131-0/+46
* Revert 156550 - Add sandbox support for Windows process mitigations jschuh@chromium.org2012-09-131-46/+0
* Add sandbox support for Windows process mitigations jschuh@chromium.org2012-09-131-0/+46
* Revert 156315 - Add sandbox support for Windows process mitigationsjschuh@chromium.org2012-09-121-46/+0
* Add sandbox support for Windows process mitigationsjschuh@chromium.org2012-09-121-0/+46
* Sandbox: Add support for Windows 8' AppContainer.rvargas@google.com2012-09-051-12/+57
* Move the Windows sandbox to sandbox/winjln@chromium.org2012-07-181-0/+542
* Emergency revert; rietveld broke; tree brokeerg@google.com2012-07-131-542/+0
* sandbox/src -> sandbox/win/srcjln@chromium.org2012-07-131-22/+22
* Move Windows sandboxjln@chromium.org2012-07-131-0/+542