summaryrefslogtreecommitdiffstats
path: root/sandbox/linux/seccomp-bpf/Makefile
Commit message (Expand)AuthorAgeFilesLines
* Remove SECCOMP_BPF_STANDALONE and port the demo target to gyp.rsesek@chromium.org2013-11-141-30/+0
* SECCOMP-BPF: Refactor the BPF sandbox API to use objects rather than "static"...markus@chromium.org2013-02-261-1/+1
* SECCOMP-BPF: Refactoring in preparation for sandbox stacking.markus@chromium.org2013-01-261-1/+1
* If the kernel lacks support for BPF filtering, we can still perform a couplemarkus@chromium.org2013-01-111-1/+1
* SECCOMP-BPF: Added support for greylisting of system calls.markus@chromium.org2012-11-221-1/+1
* Revert 168969 - Added support for greylisting of system calls.nona@chromium.org2012-11-211-1/+1
* Added support for greylisting of system calls.markus@chromium.org2012-11-211-1/+1
* SANDBOX-BPF: Initial version of the updated code generator.markus@chromium.org2012-10-191-1/+1
* Add a platform-specific syscall number iterator.jorgelo@chromium.org2012-10-151-1/+1
* Refactored ErrorCode into it's own class. Removed operators and made themmarkus@chromium.org2012-08-311-8/+8
* Simplified unit testing of sandboxing code. We now have helper methods that r...markus@chromium.org2012-08-271-1/+1
* Added a new Verifier class to the BPF compiler.markus@chromium.org2012-06-141-1/+1
* Second try at landing this patch list. This time, we are super careful about ...markus@chromium.org2012-06-141-2/+1
* Initial snapshot of the new BPF-enabled seccomp sandbox. This code ismarkus@chromium.org2012-06-041-0/+31