summaryrefslogtreecommitdiffstats
path: root/sandbox
Commit message (Expand)AuthorAgeFilesLines
* Linux Sandbox: Move setuid sandbox localization code.jln@chromium.org2014-04-153-2/+88
* Linux sandbox: style cleanup for setuid sandbox.jln@chromium.org2014-04-147-55/+52
* Fix BrokerProcess.RecvMsgDescriptorLeak under Valgrindmdempsky@chromium.org2014-04-121-2/+8
* Enable the new test launcher for sandbox_linux_unittestsphajdan.jr@chromium.org2014-04-114-18/+10
* Add unit test to check for broker FD leakmdempsky@chromium.org2014-04-115-0/+90
* sandbox_bpf_unittest.cc: Remove old code.jorgelo@chromium.org2014-04-101-7/+0
* Fixes for sandbox unit tests on Androidzhenyu.liang@intel.com2014-04-101-0/+26
* Always output seccomp error messages to stderrhamaji@chromium.org2014-04-091-10/+9
* [Linux] Use PR_SET_NO_NEW_PRIVS by default in base/process/launch.h.rsesek@chromium.org2014-04-091-3/+11
* Switch broker_process.cc to use ScopedFD.mdempsky@chromium.org2014-04-091-5/+9
* Removed a single legacy windows function from the sandbox code.Blurrech@gmail.com2014-04-079-76/+2
* sandbox: Add support for starting seccomp-bpf with threads.rsesek@chromium.org2014-04-055-13/+58
* Revert of sandbox: Add support for starting seccomp-bpf with threads. (https:...scottmg@chromium.org2014-04-055-56/+13
* sandbox: Add support for starting seccomp-bpf with threads.rsesek@chromium.org2014-04-055-13/+56
* Linux sandbox: componentize almost everything.jln@chromium.org2014-04-0512-24/+52
* Fix clang warnings and errors in sandbox/winrnk@chromium.org2014-04-044-10/+9
* Linux sandbox: make seccomp_bpf a component target.jln@chromium.org2014-04-049-36/+78
* Linux sandbox: add unit test sanity check.jln@chromium.org2014-04-041-0/+21
* Linux sandbox tests: change a magic exit code value.jln@chromium.org2014-04-031-1/+3
* Linux sandbox: reformat codegen_unittest.ccjln@chromium.org2014-03-311-81/+76
* Linux Sandbox: fix BPF compiler bugjln@chromium.org2014-03-282-1/+121
* Fix masking error in InterceptionManager::PatchNtdlljschuh@chromium.org2014-03-281-1/+1
* Add HANDLE_EINTR in some places missing it.brettw@chromium.org2014-03-271-1/+1
* Add x86_64 ucontext structure for Android x64zhenyu.liang@intel.com2014-03-272-0/+90
* Linux sandbox: disable bare BPF tests on TSANv2thakis@chromium.org2014-03-261-2/+2
* Linux: do not associate SIGSYS with the StackDumpSignalHandlerjln@chromium.org2014-03-261-2/+5
* Make seccomp-bpf mandatory on ARM.jln@chromium.org2014-03-251-4/+3
* Linux sandbox: use openat() instead of open() in broker process.jln@chromium.org2014-03-221-3/+18
* Revert 258683 "Linux sandbox: use openat() instead of open() in ..."jln@chromium.org2014-03-211-1/+1
* Linux sandbox: use openat() instead of open() in broker process.jln@chromium.org2014-03-211-1/+1
* Linux sandbox: add a few missing HANDLE_EINTR()jln@chromium.org2014-03-212-3/+3
* Fix DEATH_BY_SIGNAL helpermdempsky@chromium.org2014-03-193-1/+34
* Make chrome_elf use thunks instead of function pointers.caitkp@chromium.org2014-03-183-0/+59
* Move ScopedFILE to base namespace and scoped_file.hbrettw@chromium.org2014-03-171-1/+1
* Implement ScopedFD in terms of ScopedGeneric.brettw@chromium.org2014-03-174-19/+18
* Don't explicitly set DEP flags on Vistajschuh@chromium.org2014-03-151-3/+1
* Revert of Implement ScopedFD in terms of ScopedGeneric. (https://codereview.c...jochen@chromium.org2014-03-154-18/+19
* Implement ScopedFD in terms of ScopedGeneric.brettw@chromium.org2014-03-144-19/+18
* Fix unreachable code in sandbox/. Found with MSVC warning 4702.pkasting@chromium.org2014-03-141-2/+3
* Pass expected value as first argument to ASSERT_EQmdempsky@chromium.org2014-03-141-3/+3
* Revert of Implement ScopedFD in terms of ScopedGeneric. (https://codereview.c...thakis@chromium.org2014-03-144-18/+19
* Implement ScopedFD in terms of ScopedGeneric.brettw@chromium.org2014-03-144-19/+18
* Revert of Fix DEATH_BY_SIGNAL test helper (https://codereview.chromium.org/19...mdempsky@chromium.org2014-03-133-26/+1
* Fix DEATH_BY_SIGNAL test helpermdempsky@chromium.org2014-03-123-1/+26
* Remove DELETE permission on the sandboxed desktopjschuh@chromium.org2014-03-111-0/+1
* Linux Sandbox: scope child process with BrokerProcess class.jln@chromium.org2014-03-106-20/+102
* Revert 255151 "Make chrome_elf use thunks instead of function po..."caitkp@chromium.org2014-03-073-59/+0
* Revert 255478 "Style nits"jln@chromium.org2014-03-071-2/+0
* Style nitsmatthew@dempsky.org2014-03-071-0/+2
* Linux sandbox: add basic Yama supportjln@chromium.org2014-03-0714-10/+667