summaryrefslogtreecommitdiffstats
path: root/sandbox
Commit message (Expand)AuthorAgeFilesLines
* Removed a single legacy windows function from the sandbox code.Blurrech@gmail.com2014-04-079-76/+2
* sandbox: Add support for starting seccomp-bpf with threads.rsesek@chromium.org2014-04-055-13/+58
* Revert of sandbox: Add support for starting seccomp-bpf with threads. (https:...scottmg@chromium.org2014-04-055-56/+13
* sandbox: Add support for starting seccomp-bpf with threads.rsesek@chromium.org2014-04-055-13/+56
* Linux sandbox: componentize almost everything.jln@chromium.org2014-04-0512-24/+52
* Fix clang warnings and errors in sandbox/winrnk@chromium.org2014-04-044-10/+9
* Linux sandbox: make seccomp_bpf a component target.jln@chromium.org2014-04-049-36/+78
* Linux sandbox: add unit test sanity check.jln@chromium.org2014-04-041-0/+21
* Linux sandbox tests: change a magic exit code value.jln@chromium.org2014-04-031-1/+3
* Linux sandbox: reformat codegen_unittest.ccjln@chromium.org2014-03-311-81/+76
* Linux Sandbox: fix BPF compiler bugjln@chromium.org2014-03-282-1/+121
* Fix masking error in InterceptionManager::PatchNtdlljschuh@chromium.org2014-03-281-1/+1
* Add HANDLE_EINTR in some places missing it.brettw@chromium.org2014-03-271-1/+1
* Add x86_64 ucontext structure for Android x64zhenyu.liang@intel.com2014-03-272-0/+90
* Linux sandbox: disable bare BPF tests on TSANv2thakis@chromium.org2014-03-261-2/+2
* Linux: do not associate SIGSYS with the StackDumpSignalHandlerjln@chromium.org2014-03-261-2/+5
* Make seccomp-bpf mandatory on ARM.jln@chromium.org2014-03-251-4/+3
* Linux sandbox: use openat() instead of open() in broker process.jln@chromium.org2014-03-221-3/+18
* Revert 258683 "Linux sandbox: use openat() instead of open() in ..."jln@chromium.org2014-03-211-1/+1
* Linux sandbox: use openat() instead of open() in broker process.jln@chromium.org2014-03-211-1/+1
* Linux sandbox: add a few missing HANDLE_EINTR()jln@chromium.org2014-03-212-3/+3
* Fix DEATH_BY_SIGNAL helpermdempsky@chromium.org2014-03-193-1/+34
* Make chrome_elf use thunks instead of function pointers.caitkp@chromium.org2014-03-183-0/+59
* Move ScopedFILE to base namespace and scoped_file.hbrettw@chromium.org2014-03-171-1/+1
* Implement ScopedFD in terms of ScopedGeneric.brettw@chromium.org2014-03-174-19/+18
* Don't explicitly set DEP flags on Vistajschuh@chromium.org2014-03-151-3/+1
* Revert of Implement ScopedFD in terms of ScopedGeneric. (https://codereview.c...jochen@chromium.org2014-03-154-18/+19
* Implement ScopedFD in terms of ScopedGeneric.brettw@chromium.org2014-03-144-19/+18
* Fix unreachable code in sandbox/. Found with MSVC warning 4702.pkasting@chromium.org2014-03-141-2/+3
* Pass expected value as first argument to ASSERT_EQmdempsky@chromium.org2014-03-141-3/+3
* Revert of Implement ScopedFD in terms of ScopedGeneric. (https://codereview.c...thakis@chromium.org2014-03-144-18/+19
* Implement ScopedFD in terms of ScopedGeneric.brettw@chromium.org2014-03-144-19/+18
* Revert of Fix DEATH_BY_SIGNAL test helper (https://codereview.chromium.org/19...mdempsky@chromium.org2014-03-133-26/+1
* Fix DEATH_BY_SIGNAL test helpermdempsky@chromium.org2014-03-123-1/+26
* Remove DELETE permission on the sandboxed desktopjschuh@chromium.org2014-03-111-0/+1
* Linux Sandbox: scope child process with BrokerProcess class.jln@chromium.org2014-03-106-20/+102
* Revert 255151 "Make chrome_elf use thunks instead of function po..."caitkp@chromium.org2014-03-073-59/+0
* Revert 255478 "Style nits"jln@chromium.org2014-03-071-2/+0
* Style nitsmatthew@dempsky.org2014-03-071-0/+2
* Linux sandbox: add basic Yama supportjln@chromium.org2014-03-0714-10/+667
* Don't modify the alternate winstation DACLjschuh@chromium.org2014-03-061-13/+1
* Make chrome_elf use thunks instead of function pointers.caitkp@chromium.org2014-03-053-0/+59
* Pass correct object_type in AddKnownSidToObjectjschuh@chromium.org2014-03-051-1/+1
* Correctly bounds check FileNameLength in IsSupportedRenameCalljschuh@chromium.org2014-03-051-5/+8
* Further tighten desktop permissions and cleanup style nitsjschuh@chromium.org2014-03-051-12/+14
* refactor ResolveNTFunctionPtrluken@chromium.org2014-03-051-16/+13
* Handle waitpid returning EINTR.mdempsky@chromium.org2014-03-031-2/+1
* Linux Sandbox: add Credentials::SupportsNewUserNS()jln@chromium.org2014-03-033-9/+72
* Check destination in sandbox CopyParamInjschuh@chromium.org2014-03-011-1/+2
* Convert scoped_ptr_malloc -> scoped_ptr, part 2.viettrungluu@chromium.org2014-02-266-10/+14