summaryrefslogtreecommitdiffstats
path: root/sandbox
Commit message (Expand)AuthorAgeFilesLines
* Fix compilation error triggered by gcc-4.7+ running in C++-11 mode.markus@chromium.org2012-06-171-1/+2
* Use binary search to optimize code generation for BPF filters.markus@chromium.org2012-06-153-38/+123
* Added support for SECCOMP_RET_TRAP handlers.markus@chromium.org2012-06-154-97/+330
* Instead of outputting one BPF check per possible system call coalescemarkus@chromium.org2012-06-153-53/+177
* Added a new Verifier class to the BPF compiler.markus@chromium.org2012-06-146-8/+286
* Don't break sandboxed sub-processes out of jobs on Win8.siggi@chromium.org2012-06-142-4/+18
* Second try at landing this patch list. This time, we are super careful about ...markus@chromium.org2012-06-145-25/+75
* Revert 141938 - Improve logging, if we fail due to an internal error when exe...sergeyu@chromium.org2012-06-132-65/+19
* Improve logging, if we fail due to an internal error when executing supportsS...markus@chromium.org2012-06-132-19/+65
* Avoid all library calls (including calls to destructors) after enabling the s...markus@chromium.org2012-06-132-17/+38
* Explicitly test bit 30 in the system call number to distinguish between the n...markus@chromium.org2012-06-082-6/+27
* Build seccomp 1 for supported architecture onlyjln@chromium.org2012-06-081-1/+2
* Compile the new sandbox-bpf API code, don't use it yet.jln@chromium.org2012-06-071-1/+16
* Revert 140971 - Broke compile on CrOS Daisy botrsleevi@chromium.org2012-06-071-16/+1
* Compile the new sandbox-bpf API codejln@chromium.org2012-06-071-1/+16
* BPF: Fix status_ not being set properlyjln@chromium.org2012-06-071-2/+2
* SVN was apparently quite confused by all the changes that we made during the ...markus@chromium.org2012-06-063-5/+5
* Linux: bump the setuid sandbox API numberjln@chromium.org2012-06-051-1/+1
* Setuid sandbox API versioningjln@chromium.org2012-06-052-2/+59
* Initial snapshot of the new BPF-enabled seccomp sandbox. This code ismarkus@chromium.org2012-06-046-0/+1087
* Revert 130716 - Use ScopedProcessInformation and other RAII types in sandbox.rvargas@google.com2012-06-019-163/+168
* Don't fork Zygote as a background processjln@chromium.org2012-06-011-2/+67
* Added markus@chromium.org for Linux sandbox workmarkus@chromium.org2012-05-311-0/+1
* Retain permissions on duplicated handle in DuplicateHandleProxyjschuh@chromium.org2012-05-241-1/+1
* Disable UnloadAviCapDllNoPatching because it is flaky.vandebo@chromium.org2012-05-231-7/+3
* Revert setuid sandbox as a "init process" changesjln@chromium.org2012-05-234-344/+46
* Add a sandbox policy for duplicating handles into the broker.jschuh@chromium.org2012-05-195-16/+71
* Sandbox: Limit the memory buffers of the Sandbox IP to 32 bits.rvargas@google.com2012-05-1410-89/+107
* Fix Mario (32-bit) build.gspencer@chromium.org2012-05-031-1/+1
* This creates a field trial to determine the best level for low memorygspencer@chromium.org2012-05-036-9/+96
* win: Fix a few minor issues found by clang.thakis@chromium.org2012-05-024-5/+5
* win: Fix some preprocessor confusion clang complains about.thakis@chromium.org2012-05-022-7/+7
* win sandbox: Fix minor c++ violation, no functionality changethakis@chromium.org2012-05-011-3/+2
* Set svn:executable on windows executables.maruel@chromium.org2012-04-271-0/+0
* Mark UnloadAviCapDllNoPatching flakyjbates@chromium.org2012-04-191-1/+1
* Sandbox: Add support for interceptions on Windows 8.rvargas@google.com2012-04-174-25/+169
* Better check if argc is 0 because argv[0] is later used.erik.sjolund@gmail.com2012-04-171-0/+4
* Prevent sandboxed processes from opening each other jschuh@chromium.org2012-04-165-25/+112
* Add sandbox support for associating peer processes jschuh@chromium.org2012-04-137-28/+174
* Revert 131940 - Add sandbox support for associating peer processes jbauman@chromium.org2012-04-127-160/+28
* Add sandbox support for associating peer processes jschuh@chromium.org2012-04-127-28/+160
* Revert 131778 - Add sandbox support for associating peer processes jschuh@chromium.org2012-04-117-166/+27
* Add sandbox support for associating peer processes jschuh@chromium.org2012-04-117-27/+166
* Revert 131671 - Add sandbox support for associating peer processesjschuh@chromium.org2012-04-117-166/+27
* Add sandbox support for associating peer processesjschuh@chromium.org2012-04-107-27/+166
* Use ScopedProcessInformation and other RAII types in sandbox.erikwright@chromium.org2012-04-049-168/+163
* Fix race in CrossCallParamsEx::CreateFromBuffercpu@chromium.org2012-04-031-0/+6
* Fix some grammar in comments, error messages and documentation.gavinp@chromium.org2012-04-031-1/+1
* Add a sandbox API for broker handle duplication jschuh@chromium.org2012-03-3118-15/+506
* Revert 129627 - Add a sandbox API for broker handle duplicationjschuh@chromium.org2012-03-2918-506/+15