summaryrefslogtreecommitdiffstats
path: root/sandbox/win/src/target_process.cc
Commit message (Expand)AuthorAgeFilesLines
* Move base::FreeDeleter into its own header.dcheng2016-03-261-0/+2
* Convert Pass()→std::move() on Windowsdcheng2016-03-021-3/+4
* Switch to standard integer types in sandbox/.avi2015-12-221-4/+8
* Revert of Switch to standard integer types in sandbox/. (patchset #3 id:40001...petewil2015-12-211-8/+4
* Switch to standard integer types in sandbox/.avi2015-12-211-4/+8
* Added protection against mapping image sections between processes.forshaw2015-12-181-1/+1
* Rework target process creation to minimize creation routesforshaw2015-10-131-64/+41
* Enforce WARN_UNUSED_RESULT attribute on Windowsdcheng2015-10-101-1/+2
* win: Remove uses of UNREFERENCED_PARAMETER.thakis2015-10-061-3/+1
* Sandbox: Update the constructor of TargetProcess to receive ScopedHandles.rvargas2015-07-101-4/+7
* Sandbox: Remove job_object from (IPCInfo::)ClientInfo.rvargas2015-07-101-1/+1
* Revert of Adding checks in sandbox code to get some data on AppContainer base...shrikant2015-04-181-34/+0
* Adding checks in sandbox code to get some data on AppContainer based CreatePr...shrikant2015-04-171-0/+34
* This CL adds a method to create process using LowBox token on Windows. LowBox...shrikant2015-03-021-13/+59
* Cleanup sandbox/ in advance of re-enabling some MSVC warnings.pkasting2014-10-021-4/+6
* Remove implicit HANDLE conversions from sandbox.rvargas2014-09-251-4/+4
* Convert scoped_ptr_malloc -> scoped_ptr, part 2.viettrungluu@chromium.org2014-02-261-1/+1
* Base: Remove Receive() from ScopedHandle.rvargas@chromium.org2013-11-281-3/+3
* Revert of https://codereview.chromium.org/71013004/hashimoto@chromium.org2013-11-271-3/+3
* Base: Remove Receive() from ScopedHandle.rvargas@chromium.org2013-11-271-3/+3
* Windows: Allow subprocesses to inherit non-console stdout/stderrmseaborn@chromium.org2013-02-031-1/+2
* Base: Update ScopedProcessInformation to use ScopedHandle and restrict Receive()rvargas@google.com2013-01-031-3/+4
* Add a parameter to the sandbox policy to allow sandboxed process to run outsi...pastarmovj@chromium.org2012-10-041-8/+10
* Add sandbox support for Windows process mitigations jschuh@chromium.org2012-09-131-23/+0
* Revert 156550 - Add sandbox support for Windows process mitigations jschuh@chromium.org2012-09-131-0/+23
* Add sandbox support for Windows process mitigations jschuh@chromium.org2012-09-131-23/+0
* Revert 156315 - Add sandbox support for Windows process mitigationsjschuh@chromium.org2012-09-121-0/+23
* Add sandbox support for Windows process mitigationsjschuh@chromium.org2012-09-121-23/+0
* Sandbox: Add support for Windows 8' AppContainer.rvargas@google.com2012-09-051-6/+6
* Move STARTUPINFO manipulation into SpawnTargetjschuh@chromium.org2012-08-281-8/+6
* Sandbox: Verify that members of TargetProcess are valid before freeing them.rvargas@google.com2012-08-031-10/+13
* Move the Windows sandbox to sandbox/winjln@chromium.org2012-07-181-0/+355
* Emergency revert; rietveld broke; tree brokeerg@google.com2012-07-131-355/+0
* sandbox/src -> sandbox/win/srcjln@chromium.org2012-07-131-6/+6
* Move Windows sandboxjln@chromium.org2012-07-131-0/+355