summaryrefslogtreecommitdiffstats
path: root/sandbox
Commit message (Expand)AuthorAgeFilesLines
* Restructure sandbox code to reduce dependencies pulled in by intercept code.robertshield@chromium.org2013-12-0415-36/+101
* Don't HANDLE_EINTR(close). Either IGNORE_EINTR(close) or just close.mark@chromium.org2013-12-037-27/+26
* DPCHECK known conditions when we guess false in CurrentProcessHasOpenDirectoriesmostynb@opera.com2013-11-281-2/+8
* Linux: init_process_reaper comment cleanup.jln@chromium.org2013-11-281-7/+5
* Base: Remove Receive() from ScopedHandle.rvargas@chromium.org2013-11-286-23/+37
* Revert of https://codereview.chromium.org/71013004/hashimoto@chromium.org2013-11-276-37/+23
* Extract CreateInitProcessReaper() from the Zygote.jln@chromium.org2013-11-275-0/+141
* Base: Remove Receive() from ScopedHandle.rvargas@chromium.org2013-11-276-23/+37
* Linux sandbox: move CurrentProcessHasOpenDirectoriesjln@chromium.org2013-11-263-3/+121
* Revert 237242 "Linux sandbox: move CurrentProcessHasOpenDirectories"jln@chromium.org2013-11-263-121/+3
* Linux sandbox: move CurrentProcessHasOpenDirectoriesjln@chromium.org2013-11-263-3/+121
* Linux sandbox: cleanup BrokerProcess class.jln@chromium.org2013-11-233-33/+36
* Add jorgelo as a Linux sandbox OWNERjschuh@chromium.org2013-11-211-0/+1
* Linux sandbox: fix demo.cc usage of system call numbersjln@chromium.org2013-11-202-6/+18
* Remove SECCOMP_BPF_STANDALONE and port the demo target to gyp.rsesek@chromium.org2013-11-1416-102/+46
* Fixes for -Wunused-function on Linux, Android and ChromeOShans@chromium.org2013-11-121-12/+3
* Add a comment identifying Windows ownersjschuh@chromium.org2013-11-091-0/+1
* Make sandbox/linux/seccomp-bpf/ follow the style guide.jln@chromium.org2013-11-0827-1344/+1439
* Linux sandbox: make BPF policies an implementation of an interface.jln@chromium.org2013-11-088-94/+151
* Linux sandbox: print kernel support in credentials unittests.jln@chromium.org2013-11-051-4/+7
* Linux: add basic unprivileged namespace support.jln@chromium.org2013-11-054-10/+303
* Linux: add a Credentials class to handle Linux capabilities.jln@chromium.org2013-11-055-0/+168
* Revert 232852 "Linux: add a Credentials class to handle Linux ca..."ilevy@chromium.org2013-11-055-168/+0
* Linux: add a Credentials class to handle Linux capabilities.jln@chromium.org2013-11-055-0/+168
* Revert 232837 "Linux: add a Credentials class to handle Linux ca..."jln@chromium.org2013-11-055-168/+0
* Linux: add a Credentials class to handle Linux capabilities.jln@chromium.org2013-11-045-0/+168
* Revert 232280 "Linux: add a Credentials class to handle Linux ca..."jln@chromium.org2013-11-015-168/+0
* Linux: add a Credentials class to handle Linux capabilities.jln@chromium.org2013-11-015-0/+168
* cros: Remove unused low memory margin code from sandbox and zygotejamescook@chromium.org2013-10-293-44/+0
* Disabling the TestEvent and TestEventReadOnly tests while I figure out why th...ananta@chromium.org2013-10-251-2/+2
* Attempt3 at landing this. The previous attempt failed on Windows XP because t...ananta@chromium.org2013-10-2510-273/+350
* Revert 230660 "Relanding this with fixes for the SyncPolicyTest...."falken@chromium.org2013-10-2410-259/+273
* Relanding this with fixes for the SyncPolicyTest.TestEvent and SyncPolicyTest...ananta@chromium.org2013-10-2410-273/+259
* Revert 230512 "Replace the CreateEvent/OpenEvent patches with th..."thakis@chromium.org2013-10-2410-255/+273
* Replace the CreateEvent/OpenEvent patches with their Nt counterparts like NtO...ananta@chromium.org2013-10-2310-273/+255
* This patch addresses two issues:zturner@chromium.org2013-10-219-32/+42
* Remove dependency of sandbox_win64 on gtestscottmg@chromium.org2013-10-181-1/+0
* Fix a bug which caused the OpenEventA function in kernelbase to not get patch...ananta@chromium.org2013-10-171-3/+3
* Linux Sandbox: make error tunable in open brokerjln@chromium.org2013-10-144-58/+84
* Fix a hang in the GPU process in the XP presentation path.ananta@chromium.org2013-10-101-1/+1
* Clean up unused constant globalshans@chromium.org2013-10-031-1/+0
* Android seccomp-bpf: allow clone without CLONE_DETACHEDjln@chromium.org2013-10-011-6/+15
* Ensure that the gpu process can run in the restricted sandbox for the XP pres...ananta@chromium.org2013-09-276-61/+209
* Sandbox: Update for Windows 8.1rvargas@google.com2013-09-203-26/+38
* add missing #include of <algorithm>, needed on VS2013 for std::minscottmg@chromium.org2013-09-121-0/+2
* Linux Sandbox: add RawSandboxDie()jln@chromium.org2013-09-064-6/+22
* Linux Sandbox: LOG error if a previous SIGSYS handler exists.jln@chromium.org2013-09-051-1/+15
* Linux sandbox: do not crash on spurious SIGSYS.jln@chromium.org2013-09-041-12/+15
* Move ReadFileToString to the base namespace.brettw@chromium.org2013-08-301-2/+1
* Do not use O_CLOEXEC for open() in the broker process.jorgelo@chromium.org2013-08-302-19/+4