summaryrefslogtreecommitdiffstats
path: root/sandbox
Commit message (Expand)AuthorAgeFilesLines
* Linux Sandbox: cleanup code around spurious SIGSYS detection.jln@chromium.org2013-07-121-5/+4
* Linux Sandbox unittests: fix Valgrind detection.jln@chromium.org2013-07-115-19/+41
* Linux Sandbox: forward declare Errorcode in sandbox_bpf_policy_forward.hjln@chromium.org2013-07-101-2/+2
* Avoid std::string copying in GetFileNameInWhitelist.jorgelo@chromium.org2013-07-091-7/+12
* sandbox_linux_unittests: ignore TSAN when counting threads.jln@chromium.org2013-07-034-12/+23
* Add compiler flags that prevent text relocations.shashishekhar@chromium.org2013-07-031-0/+5
* sandbox_linux_unittests: disable fork() tests under TSAN.jln@chromium.org2013-07-032-2/+12
* linux: make libc urandom override work for non-glibc toomostynb@opera.com2013-06-291-16/+89
* Revert 208924 "attempt to make the libc urandom override work fo..."asvitkine@chromium.org2013-06-271-86/+19
* attempt to make the libc urandom override work for non-glibc toomostynb@opera.com2013-06-271-19/+86
* Use non-array operator new for memory deleted by non-array delete.bruening@google.com2013-06-211-4/+4
* Sandbox: be defensive against compiler (de)optimizations when handling IPCs.rvargas@chromium.org2013-06-201-14/+32
* Linux: add a public content/ API to start a sandbox.jln@chromium.org2013-06-183-6/+32
* don't override libc code in a glibc-specific way when not using glibcmostynb@opera.com2013-06-131-1/+3
* Use a direct include of strings headers in rlz/, sandbox/, skia/, sql/, sync/.avi@chromium.org2013-06-1113-13/+13
* Fix new[]/delete mismatches in sandbox handle code by switching to scoped_ptr...bruening@chromium.org2013-06-082-4/+7
* Fix DCHECK_NT macrohans@chromium.org2013-05-301-1/+1
* Include stddef.h for the definition of size_t.hans@chromium.org2013-05-301-0/+2
* Linux: remove unmaintained SELinux code.phajdan.jr@chromium.org2013-05-175-63/+0
* Grab bag of clang fixes for Windows codernk@chromium.org2013-05-171-2/+4
* Linux sandbox: fix O_CLOEXEC support.jln@chromium.org2013-05-012-5/+19
* sandbox_linux_unittests: fail if the kernel does not support BPF.jln@chromium.org2013-04-301-0/+9
* Remove seccomp-legacy: phase 2.jln@chromium.org2013-04-301-9/+1
* Linux sandbox: allow non racy use of O_CLOEXECjln@chromium.org2013-04-262-29/+26
* Linux sandbox: support O_NONBLOCK and O_CLOEXECjln@chromium.org2013-04-253-18/+65
* Re-enable the BrokerProcess.OpenFileRW test on Android.palmer@chromium.org2013-04-241-11/+3
* Linux sandbox: add access() brokering to the async-signal safe broker process.jln@chromium.org2013-04-244-55/+305
* Remove inline definition of SIZE_MAX in header.thakis@chromium.org2013-04-191-10/+3
* Fix small race in the sandboxcpu@chromium.org2013-04-194-9/+4
* Rewrite scoped_array<T> to scoped_ptr<T[]> in sandbox.dcheng@chromium.org2013-04-129-10/+10
* Rewrite std::string("") to std::string(), Linux edition.dcheng@chromium.org2013-04-091-1/+1
* Revert "Rewrite std::string("") to std::string(), Linux edition."dcheng@chromium.org2013-04-091-1/+1
* Rewrite std::string("") to std::string(), Linux edition.dcheng@chromium.org2013-04-091-1/+1
* Linux Sandbox: assert monothreaded in testsjln@chromium.org2013-04-031-7/+5
* Update the remaining references to sys_string_conversions.h to its new location.tfarina@chromium.org2013-03-302-3/+3
* Refactor sandbox_policy.cc so that it doesn't contain the sandbox policies fo...jam@chromium.org2013-03-201-0/+2
* Android sandbox: workaround for restricted errno values.jln@chromium.org2013-03-112-3/+37
* The 'sandbox' target is always 'none'.bungeman@chromium.org2013-02-281-1/+0
* SECCOMP-BPF: Refactor the BPF sandbox API to use objects rather than "static"...markus@chromium.org2013-02-2624-990/+1071
* Move file_path.h to base/files.brettw@chromium.org2013-02-241-1/+1
* SECCOMP-BPF: Added support for checking system call arguments against bit masks.markus@chromium.org2013-02-158-55/+1041
* Remove sandbox win64 warningjschuh@chromium.org2013-02-121-7/+0
* Ignore DEP and SEHOP flags on Win64jschuh@chromium.org2013-02-121-0/+3
* Replace FilePath with base::FilePath in some more top level directories.brettw@chromium.org2013-02-102-2/+3
* Disable ProcessMitigationsTest.CheckDep on Win64jschuh@chromium.org2013-02-071-2/+2
* Added a unittest to check that we can restrict syscall(__NR_clone)markus@chromium.org2013-02-071-0/+55
* Linux sandbox: add warning if running tests multithreaded.jln@chromium.org2013-02-052-5/+22
* Windows: Allow subprocesses to inherit non-console stdout/stderrmseaborn@chromium.org2013-02-038-3/+142
* Linux sandbox: Make the test run on Android as Native executablejln@chromium.org2013-02-023-37/+67
* SECCOMP-BPF: Refactoring in preparation for sandbox stacking.markus@chromium.org2013-01-2611-281/+539