summaryrefslogtreecommitdiffstats
path: root/sandbox/linux/seccomp-bpf/bpf_tests.h
Commit message (Expand)AuthorAgeFilesLines
* Convert a bunch of BPF_TEST tests to use BPF_TEST_Cmdempsky@chromium.org2014-05-211-5/+3
* NaCl non-sfi sandbox: use modern framework for testsjln@chromium.org2014-05-071-9/+9
* Linux sandbox: implement new BPF testing macrosjln@chromium.org2014-05-071-80/+87
* Linux sandbox: cleanup test framework furtherjln@chromium.org2014-05-061-76/+40
* Linux sandbox: get rid of a number of reinterpret_castjln@chromium.org2014-05-021-21/+54
* Reland: Add seccomp sandbox for non-SFI NaClhamaji@chromium.org2014-04-171-0/+6
* Revert of Add seccomp sandbox for non-SFI NaCl (https://codereview.chromium.o...jln@chromium.org2014-04-171-6/+0
* Add seccomp sandbox for non-SFI NaClhamaji@chromium.org2014-04-171-0/+6
* sandbox: Add support for starting seccomp-bpf with threads.rsesek@chromium.org2014-04-051-1/+2
* Revert of sandbox: Add support for starting seccomp-bpf with threads. (https:...scottmg@chromium.org2014-04-051-2/+1
* sandbox: Add support for starting seccomp-bpf with threads.rsesek@chromium.org2014-04-051-1/+2
* Make seccomp-bpf mandatory on ARM.jln@chromium.org2014-03-251-4/+3
* Linux sandbox: cleanup sandbox-bpf naming.jln@chromium.org2013-12-101-22/+22
* Revert of https://chromiumcodereview.appspot.com/103293003/jln@chromium.org2013-12-061-3/+1
* Revert 239102 "Move build/build_config_functions.h to sandbox/"rlarocque@chromium.org2013-12-061-2/+2
* Move build/build_config_functions.h to sandbox/jln@chromium.org2013-12-061-2/+2
* Add build_config_functions.h to avoid #ifdefjln@chromium.org2013-12-061-1/+3
* Make sandbox/linux/seccomp-bpf/ follow the style guide.jln@chromium.org2013-11-081-20/+14
* Linux sandbox: make BPF policies an implementation of an interface.jln@chromium.org2013-11-081-2/+2
* Linux Sandbox unittests: fix Valgrind detection.jln@chromium.org2013-07-111-9/+8
* sandbox_linux_unittests: ignore TSAN when counting threads.jln@chromium.org2013-07-031-1/+3
* sandbox_linux_unittests: disable fork() tests under TSAN.jln@chromium.org2013-07-031-1/+1
* sandbox_linux_unittests: fail if the kernel does not support BPF.jln@chromium.org2013-04-301-0/+9
* SECCOMP-BPF: Refactor the BPF sandbox API to use objects rather than "static"...markus@chromium.org2013-02-261-5/+11
* SECCOMP-BPF: Added support for checking system call arguments against bit masks.markus@chromium.org2013-02-151-1/+1
* SECCOMP-BPF: Refactoring in preparation for sandbox stacking.markus@chromium.org2013-01-261-1/+0
* If the kernel lacks support for BPF filtering, we can still perform a couplemarkus@chromium.org2013-01-111-3/+7
* SECCOMP-BPF: Added supported for inspection system call arguments from BPF fi...markus@chromium.org2012-12-151-13/+22
* Pass a pointer with auxilliary data to a policy function.markus@chromium.org2012-10-311-11/+49
* Simplified unit testing of sandboxing code. We now have helper methods that r...markus@chromium.org2012-08-271-0/+56