summaryrefslogtreecommitdiffstats
path: root/sandbox
Commit message (Expand)AuthorAgeFilesLines
* Add domain-specific language for BPF policiesmdempsky@chromium.org2014-07-179-0/+885
* Create DispatchSourceMach to run a MACH_RECV dispatch source.rsesek@chromium.org2014-07-177-33/+258
* Revert of Add domain-specific language for BPF policies (https://codereview.c...tapted@chromium.org2014-07-169-865/+0
* Do not create a reply IPCMessage for every message received.rsesek@chromium.org2014-07-165-35/+46
* Add domain-specific language for BPF policiesmdempsky@chromium.org2014-07-169-0/+865
* Fixes for re-enabling more MSVC level 4 warnings: sandbox/ editionpkasting@chromium.org2014-07-109-58/+47
* Rename source_prereqs to inputs in the GN build.brettw@chromium.org2014-07-091-1/+1
* Linux sandbox: add space for 8 parameters to the Syscall() classnedeljko.babic@imgtec.com2014-07-082-23/+80
* Add mdempsky as OWNER for sandbox/linuxmdempsky@chromium.org2014-07-081-0/+1
* Revert of Revert of Disable yama on 3.2 kernels with 32bit userland and 64bit...machenbach@chromium.org2014-07-081-0/+17
* Revert of Disable yama on 3.2 kernels with 32bit userland and 64bit kernel. (...eseidel@chromium.org2014-07-081-17/+0
* build fix (see r281666 and r281672, I screwed up the re-land)thakis@chromium.org2014-07-081-1/+4
* Disable two yama tests on 3.2 kernels with 32bit userland and 64bit kernel.thakis@chromium.org2014-07-081-0/+17
* Revert 281666 "Disable two yama tests on 3.2 kernels with 32bit ..."nhiroki@chromium.org2014-07-081-19/+1
* Disable two yama tests on 3.2 kernels with 32bit userland and 64bit kernel.thakis@chromium.org2014-07-081-1/+19
* gcc 4.7 workaround for __uint16_tmostynb@opera.com2014-07-071-0/+1
* win sandbox tests: Rename OpenFile to OpenFileCmd.thakis@chromium.org2014-07-072-11/+11
* Fix Mac bootstrap sandbox for 64-bit buildsjiangj@opera.com2014-07-031-0/+2
* Extract a virtual interface out of MachMessageServer that can be implemented ...rsesek@chromium.org2014-07-019-77/+145
* Linux sandbox: add test to ensure that pread64 can be forwarded.jln@chromium.org2014-06-278-44/+253
* Add UIPI support for sandbox alternate desktopjschuh@chromium.org2014-06-245-2/+33
* Fix a shutdown crash in the bootstrap sandbox.rsesek@chromium.org2014-06-234-5/+120
* Alter the design of the bootstrap sandbox to only take over the bootstrap por...rsesek@chromium.org2014-06-197-48/+66
* Linux sandbox: add sandbox_linux_unittests.isolatejln@chromium.org2014-06-192-0/+45
* Fix no-op builds, caused by an incorrect output in //sandbox/mac:generate_stubs.rsesek@chromium.org2014-06-181-1/+1
* Revert of Linux sandbox: add sandbox_linux_unittests.isolate (https://coderev...jln@chromium.org2014-06-172-41/+0
* Linux sandbox: add sandbox_linux_unittests.isolatejln@chromium.org2014-06-172-0/+41
* Add dynamic library stubs for XPC in //sandbox/mac.rsesek@chromium.org2014-06-176-0/+167
* Define regs_struct on x86 Bionic as well.rickyz@google.com2014-06-141-1/+29
* Use PTRACE_SET_SYSCALL to override syscalls on ARM.rickyz@google.com2014-06-131-2/+34
* Clean-up the SandboxSyscall interfacejln@chromium.org2014-06-138-411/+388
* Seccomp_bpf. Fix compilation error for Android x64.anton@chromium.org2014-06-121-1/+1
* Update OS version functions.avi@chromium.org2014-06-121-1/+1
* Attempt to fix a NULL deref in sandbox::LaunchdInterceptionServer::HandleLook...rsesek@chromium.org2014-06-122-14/+15
* Linux Sandbox: Add support for SECCOMP_RET_TRACE.rickyz@google.com2014-06-128-1/+223
* Sandbox policy and intercepts for the MITIGATION_WIN32K_DISABLE policy for re...ananta@chromium.org2014-06-1114-6/+343
* Split the generic MachMessageServer logic out of the LaunchdInterceptionServer.rsesek@chromium.org2014-06-116-190/+300
* Make sbox_unittests work with DCHECKs enabledjschuh@chromium.org2014-06-104-14/+5
* Do not instrument the suid sandbox binary with sanitizer tools.earthdok@chromium.org2014-06-101-0/+7
* Remove HandleCloser::SetupHandleInterceptionsjschuh@chromium.org2014-06-108-114/+1
* Add Mac sandbox to the GN build.brettw@chromium.org2014-06-102-3/+44
* Initialize the bootstrap sandbox in the browser process.rsesek@chromium.org2014-06-101-3/+3
* Revert of Revert of Convert installer_util_unittests, sbox_integration_tests,...alph@chromium.org2014-06-094-6/+30
* Revert of Convert installer_util_unittests, sbox_integration_tests, sbox_vali...alph@chromium.org2014-06-094-30/+6
* Convert installer_util_unittests, sbox_integration_tests, sbox_validation_tes...phajdan.jr@chromium.org2014-06-094-6/+30
* Add sandbox support for process memory limitsjschuh@chromium.org2014-06-0711-23/+94
* This will make process launch faster and may prevent the LSASS hangs we've se...jschuh@chromium.org2014-06-066-8/+94
* Linux sandbox: restrict prctl in the baseline.jln@chromium.org2014-06-064-6/+30
* Linux sandbox: restrict futex operations.jln@chromium.org2014-06-0411-5/+112
* Enable some more targets in the GN build.brettw@chromium.org2014-06-041-1/+1