summaryrefslogtreecommitdiffstats
path: root/sandbox
Commit message (Expand)AuthorAgeFilesLines
* Explicitly test bit 30 in the system call number to distinguish between the n...markus@chromium.org2012-06-082-6/+27
* Build seccomp 1 for supported architecture onlyjln@chromium.org2012-06-081-1/+2
* Compile the new sandbox-bpf API code, don't use it yet.jln@chromium.org2012-06-071-1/+16
* Revert 140971 - Broke compile on CrOS Daisy botrsleevi@chromium.org2012-06-071-16/+1
* Compile the new sandbox-bpf API codejln@chromium.org2012-06-071-1/+16
* BPF: Fix status_ not being set properlyjln@chromium.org2012-06-071-2/+2
* SVN was apparently quite confused by all the changes that we made during the ...markus@chromium.org2012-06-063-5/+5
* Linux: bump the setuid sandbox API numberjln@chromium.org2012-06-051-1/+1
* Setuid sandbox API versioningjln@chromium.org2012-06-052-2/+59
* Initial snapshot of the new BPF-enabled seccomp sandbox. This code ismarkus@chromium.org2012-06-046-0/+1087
* Revert 130716 - Use ScopedProcessInformation and other RAII types in sandbox.rvargas@google.com2012-06-019-163/+168
* Don't fork Zygote as a background processjln@chromium.org2012-06-011-2/+67
* Added markus@chromium.org for Linux sandbox workmarkus@chromium.org2012-05-311-0/+1
* Retain permissions on duplicated handle in DuplicateHandleProxyjschuh@chromium.org2012-05-241-1/+1
* Disable UnloadAviCapDllNoPatching because it is flaky.vandebo@chromium.org2012-05-231-7/+3
* Revert setuid sandbox as a "init process" changesjln@chromium.org2012-05-234-344/+46
* Add a sandbox policy for duplicating handles into the broker.jschuh@chromium.org2012-05-195-16/+71
* Sandbox: Limit the memory buffers of the Sandbox IP to 32 bits.rvargas@google.com2012-05-1410-89/+107
* Fix Mario (32-bit) build.gspencer@chromium.org2012-05-031-1/+1
* This creates a field trial to determine the best level for low memorygspencer@chromium.org2012-05-036-9/+96
* win: Fix a few minor issues found by clang.thakis@chromium.org2012-05-024-5/+5
* win: Fix some preprocessor confusion clang complains about.thakis@chromium.org2012-05-022-7/+7
* win sandbox: Fix minor c++ violation, no functionality changethakis@chromium.org2012-05-011-3/+2
* Set svn:executable on windows executables.maruel@chromium.org2012-04-271-0/+0
* Mark UnloadAviCapDllNoPatching flakyjbates@chromium.org2012-04-191-1/+1
* Sandbox: Add support for interceptions on Windows 8.rvargas@google.com2012-04-174-25/+169
* Better check if argc is 0 because argv[0] is later used.erik.sjolund@gmail.com2012-04-171-0/+4
* Prevent sandboxed processes from opening each other jschuh@chromium.org2012-04-165-25/+112
* Add sandbox support for associating peer processes jschuh@chromium.org2012-04-137-28/+174
* Revert 131940 - Add sandbox support for associating peer processes jbauman@chromium.org2012-04-127-160/+28
* Add sandbox support for associating peer processes jschuh@chromium.org2012-04-127-28/+160
* Revert 131778 - Add sandbox support for associating peer processes jschuh@chromium.org2012-04-117-166/+27
* Add sandbox support for associating peer processes jschuh@chromium.org2012-04-117-27/+166
* Revert 131671 - Add sandbox support for associating peer processesjschuh@chromium.org2012-04-117-166/+27
* Add sandbox support for associating peer processesjschuh@chromium.org2012-04-107-27/+166
* Use ScopedProcessInformation and other RAII types in sandbox.erikwright@chromium.org2012-04-049-168/+163
* Fix race in CrossCallParamsEx::CreateFromBuffercpu@chromium.org2012-04-031-0/+6
* Fix some grammar in comments, error messages and documentation.gavinp@chromium.org2012-04-031-1/+1
* Add a sandbox API for broker handle duplication jschuh@chromium.org2012-03-3118-15/+506
* Revert 129627 - Add a sandbox API for broker handle duplicationjschuh@chromium.org2012-03-2918-506/+15
* Add a sandbox API for broker handle duplicationjschuh@chromium.org2012-03-2918-15/+506
* Revert 128016 - Make sandbox explicitly block opening broker and sandboxed pr...jschuh@chromium.org2012-03-237-121/+10
* Make sandbox explicitly block opening broker and sandboxed processesjschuh@chromium.org2012-03-217-10/+121
* Revert 127836 - Revert 127820 - Revert 127795 - Make sandbox explicitly block...zmo@google.com2012-03-217-121/+10
* Revert 127820 - Revert 127795 - Make sandbox explicitly block opening broker ...zmo@google.com2012-03-207-10/+121
* Revert 127795 - Make sandbox explicitly block opening broker and sandboxed pr...zmo@google.com2012-03-207-121/+10
* Make sandbox explicitly block opening broker and sandboxed processesjschuh@chromium.org2012-03-207-10/+121
* Fix sidestep licensessteveblock@chromium.org2012-03-206-114/+17
* Add sandbox/OWNERSdpranke@chromium.org2012-03-131-0/+4
* If using the suid sandbox, but not using the seccomp sandbox, there is amarkus@chromium.org2012-03-121-4/+4