summaryrefslogtreecommitdiffstats
path: root/sandbox
Commit message (Expand)AuthorAgeFilesLines
* Linux sandbox: more verbose test failuresjln@chromium.org2014-07-311-2/+4
* Cleanup SandboxBPF policies now that we have InvalidSyscall()mdempsky@chromium.org2014-07-316-1/+42
* Sandbox: Fix the BrokerProcess RecvMsgDescriptorLeak testleecam@chromium.org2014-07-311-0/+5
* Fix line endings on BUILD.gnwfh@chromium.org2014-07-311-285/+285
* Android sandbox: EPERM fork() properlyjln@chromium.org2014-07-312-1/+9
* Android sandbox: fix most BaselinePolicy testsjln@chromium.org2014-07-304-14/+67
* Android seccomp-bpf: fix a few unittestsjln@chromium.org2014-07-303-22/+26
* [MIPS] Add seccomp bpf supportnedeljko.babic@imgtec.com2014-07-2520-75/+1909
* Make HandleCloserAgent walk in 4x multiples on x64jschuh@chromium.org2014-07-242-2/+2
* Patch NtOpenKeyEx on Windows Server 2008jschuh@chromium.org2014-07-241-1/+4
* GN: Add //ui/base/ime, fix up printing on macjamesr@chromium.org2014-07-231-0/+2
* Fix the //sandbox/mac build when using a modern (10.7+) SDK.rsesek@chromium.org2014-07-214-40/+61
* Run XPCMessageServerTest on 10.8+ rather than 10.7+.rsesek@chromium.org2014-07-191-1/+1
* Add an XPC implementation of sandbox::MessageServer.rsesek@chromium.org2014-07-1910-1/+446
* Add domain-specific language for BPF policiesmdempsky@chromium.org2014-07-179-0/+885
* Create DispatchSourceMach to run a MACH_RECV dispatch source.rsesek@chromium.org2014-07-177-33/+258
* Revert of Add domain-specific language for BPF policies (https://codereview.c...tapted@chromium.org2014-07-169-865/+0
* Do not create a reply IPCMessage for every message received.rsesek@chromium.org2014-07-165-35/+46
* Add domain-specific language for BPF policiesmdempsky@chromium.org2014-07-169-0/+865
* Fixes for re-enabling more MSVC level 4 warnings: sandbox/ editionpkasting@chromium.org2014-07-109-58/+47
* Rename source_prereqs to inputs in the GN build.brettw@chromium.org2014-07-091-1/+1
* Linux sandbox: add space for 8 parameters to the Syscall() classnedeljko.babic@imgtec.com2014-07-082-23/+80
* Add mdempsky as OWNER for sandbox/linuxmdempsky@chromium.org2014-07-081-0/+1
* Revert of Revert of Disable yama on 3.2 kernels with 32bit userland and 64bit...machenbach@chromium.org2014-07-081-0/+17
* Revert of Disable yama on 3.2 kernels with 32bit userland and 64bit kernel. (...eseidel@chromium.org2014-07-081-17/+0
* build fix (see r281666 and r281672, I screwed up the re-land)thakis@chromium.org2014-07-081-1/+4
* Disable two yama tests on 3.2 kernels with 32bit userland and 64bit kernel.thakis@chromium.org2014-07-081-0/+17
* Revert 281666 "Disable two yama tests on 3.2 kernels with 32bit ..."nhiroki@chromium.org2014-07-081-19/+1
* Disable two yama tests on 3.2 kernels with 32bit userland and 64bit kernel.thakis@chromium.org2014-07-081-1/+19
* gcc 4.7 workaround for __uint16_tmostynb@opera.com2014-07-071-0/+1
* win sandbox tests: Rename OpenFile to OpenFileCmd.thakis@chromium.org2014-07-072-11/+11
* Fix Mac bootstrap sandbox for 64-bit buildsjiangj@opera.com2014-07-031-0/+2
* Extract a virtual interface out of MachMessageServer that can be implemented ...rsesek@chromium.org2014-07-019-77/+145
* Linux sandbox: add test to ensure that pread64 can be forwarded.jln@chromium.org2014-06-278-44/+253
* Add UIPI support for sandbox alternate desktopjschuh@chromium.org2014-06-245-2/+33
* Fix a shutdown crash in the bootstrap sandbox.rsesek@chromium.org2014-06-234-5/+120
* Alter the design of the bootstrap sandbox to only take over the bootstrap por...rsesek@chromium.org2014-06-197-48/+66
* Linux sandbox: add sandbox_linux_unittests.isolatejln@chromium.org2014-06-192-0/+45
* Fix no-op builds, caused by an incorrect output in //sandbox/mac:generate_stubs.rsesek@chromium.org2014-06-181-1/+1
* Revert of Linux sandbox: add sandbox_linux_unittests.isolate (https://coderev...jln@chromium.org2014-06-172-41/+0
* Linux sandbox: add sandbox_linux_unittests.isolatejln@chromium.org2014-06-172-0/+41
* Add dynamic library stubs for XPC in //sandbox/mac.rsesek@chromium.org2014-06-176-0/+167
* Define regs_struct on x86 Bionic as well.rickyz@google.com2014-06-141-1/+29
* Use PTRACE_SET_SYSCALL to override syscalls on ARM.rickyz@google.com2014-06-131-2/+34
* Clean-up the SandboxSyscall interfacejln@chromium.org2014-06-138-411/+388
* Seccomp_bpf. Fix compilation error for Android x64.anton@chromium.org2014-06-121-1/+1
* Update OS version functions.avi@chromium.org2014-06-121-1/+1
* Attempt to fix a NULL deref in sandbox::LaunchdInterceptionServer::HandleLook...rsesek@chromium.org2014-06-122-14/+15
* Linux Sandbox: Add support for SECCOMP_RET_TRACE.rickyz@google.com2014-06-128-1/+223
* Sandbox policy and intercepts for the MITIGATION_WIN32K_DISABLE policy for re...ananta@chromium.org2014-06-1114-6/+343