summaryrefslogtreecommitdiffstats
path: root/sandbox
Commit message (Expand)AuthorAgeFilesLines
* Remove SECCOMP_BPF_STANDALONE and port the demo target to gyp.rsesek@chromium.org2013-11-1416-102/+46
* Fixes for -Wunused-function on Linux, Android and ChromeOShans@chromium.org2013-11-121-12/+3
* Add a comment identifying Windows ownersjschuh@chromium.org2013-11-091-0/+1
* Make sandbox/linux/seccomp-bpf/ follow the style guide.jln@chromium.org2013-11-0827-1344/+1439
* Linux sandbox: make BPF policies an implementation of an interface.jln@chromium.org2013-11-088-94/+151
* Linux sandbox: print kernel support in credentials unittests.jln@chromium.org2013-11-051-4/+7
* Linux: add basic unprivileged namespace support.jln@chromium.org2013-11-054-10/+303
* Linux: add a Credentials class to handle Linux capabilities.jln@chromium.org2013-11-055-0/+168
* Revert 232852 "Linux: add a Credentials class to handle Linux ca..."ilevy@chromium.org2013-11-055-168/+0
* Linux: add a Credentials class to handle Linux capabilities.jln@chromium.org2013-11-055-0/+168
* Revert 232837 "Linux: add a Credentials class to handle Linux ca..."jln@chromium.org2013-11-055-168/+0
* Linux: add a Credentials class to handle Linux capabilities.jln@chromium.org2013-11-045-0/+168
* Revert 232280 "Linux: add a Credentials class to handle Linux ca..."jln@chromium.org2013-11-015-168/+0
* Linux: add a Credentials class to handle Linux capabilities.jln@chromium.org2013-11-015-0/+168
* cros: Remove unused low memory margin code from sandbox and zygotejamescook@chromium.org2013-10-293-44/+0
* Disabling the TestEvent and TestEventReadOnly tests while I figure out why th...ananta@chromium.org2013-10-251-2/+2
* Attempt3 at landing this. The previous attempt failed on Windows XP because t...ananta@chromium.org2013-10-2510-273/+350
* Revert 230660 "Relanding this with fixes for the SyncPolicyTest...."falken@chromium.org2013-10-2410-259/+273
* Relanding this with fixes for the SyncPolicyTest.TestEvent and SyncPolicyTest...ananta@chromium.org2013-10-2410-273/+259
* Revert 230512 "Replace the CreateEvent/OpenEvent patches with th..."thakis@chromium.org2013-10-2410-255/+273
* Replace the CreateEvent/OpenEvent patches with their Nt counterparts like NtO...ananta@chromium.org2013-10-2310-273/+255
* This patch addresses two issues:zturner@chromium.org2013-10-219-32/+42
* Remove dependency of sandbox_win64 on gtestscottmg@chromium.org2013-10-181-1/+0
* Fix a bug which caused the OpenEventA function in kernelbase to not get patch...ananta@chromium.org2013-10-171-3/+3
* Linux Sandbox: make error tunable in open brokerjln@chromium.org2013-10-144-58/+84
* Fix a hang in the GPU process in the XP presentation path.ananta@chromium.org2013-10-101-1/+1
* Clean up unused constant globalshans@chromium.org2013-10-031-1/+0
* Android seccomp-bpf: allow clone without CLONE_DETACHEDjln@chromium.org2013-10-011-6/+15
* Ensure that the gpu process can run in the restricted sandbox for the XP pres...ananta@chromium.org2013-09-276-61/+209
* Sandbox: Update for Windows 8.1rvargas@google.com2013-09-203-26/+38
* add missing #include of <algorithm>, needed on VS2013 for std::minscottmg@chromium.org2013-09-121-0/+2
* Linux Sandbox: add RawSandboxDie()jln@chromium.org2013-09-064-6/+22
* Linux Sandbox: LOG error if a previous SIGSYS handler exists.jln@chromium.org2013-09-051-1/+15
* Linux sandbox: do not crash on spurious SIGSYS.jln@chromium.org2013-09-041-12/+15
* Move ReadFileToString to the base namespace.brettw@chromium.org2013-08-301-2/+1
* Do not use O_CLOEXEC for open() in the broker process.jorgelo@chromium.org2013-08-302-19/+4
* don't truncate pointers in fake _InterlockedCompareExchangePointer jschuh@chromium.org2013-08-291-0/+12
* Fix PVS assignment warning in DuplicateHandleProxyActionjschuh@chromium.org2013-08-151-1/+1
* Fixing arg type in fprintf.finnur@chromium.org2013-08-141-1/+1
* Remove wow_helper from 64-bit buildsjschuh@chromium.org2013-08-031-9/+13
* Fix invalid check of ntstatus code.etienneb@chromium.org2013-07-311-1/+1
* Update include paths in sandbox for base/process changes.rsesek@chromium.org2013-07-232-3/+2
* Linux sandbox: clean temporary file creationjln@chromium.org2013-07-171-29/+41
* Linux sandbox unittests: make tests pass as rootjln@chromium.org2013-07-161-21/+28
* Linux Sandbox: cleanup code around spurious SIGSYS detection.jln@chromium.org2013-07-121-5/+4
* Linux Sandbox unittests: fix Valgrind detection.jln@chromium.org2013-07-115-19/+41
* Linux Sandbox: forward declare Errorcode in sandbox_bpf_policy_forward.hjln@chromium.org2013-07-101-2/+2
* Avoid std::string copying in GetFileNameInWhitelist.jorgelo@chromium.org2013-07-091-7/+12
* sandbox_linux_unittests: ignore TSAN when counting threads.jln@chromium.org2013-07-034-12/+23
* Add compiler flags that prevent text relocations.shashishekhar@chromium.org2013-07-031-0/+5