summaryrefslogtreecommitdiffstats
path: root/sandbox/linux/seccomp-bpf/sandbox_bpf.cc
Commit message (Expand)AuthorAgeFilesLines
* Remove SECCOMP_BPF_STANDALONE and port the demo target to gyp.rsesek@chromium.org2013-11-141-6/+4
* Fixes for -Wunused-function on Linux, Android and ChromeOShans@chromium.org2013-11-121-12/+3
* Make sandbox/linux/seccomp-bpf/ follow the style guide.jln@chromium.org2013-11-081-281/+309
* Linux sandbox: make BPF policies an implementation of an interface.jln@chromium.org2013-11-081-75/+91
* SECCOMP-BPF: Refactor the BPF sandbox API to use objects rather than "static"...markus@chromium.org2013-02-261-161/+223
* SECCOMP-BPF: Added support for checking system call arguments against bit masks.markus@chromium.org2013-02-151-9/+127
* SECCOMP-BPF: Refactoring in preparation for sandbox stacking.markus@chromium.org2013-01-261-218/+40
* Android: create a generic android_ucontext.hjln@chromium.org2013-01-171-2/+2
* If the kernel lacks support for BPF filtering, we can still perform a couplemarkus@chromium.org2013-01-111-72/+63
* Revert 174135jochen@chromium.org2012-12-201-114/+4
* SECCOMP-BPF: Added support for checking system call arguments against bit masks.markus@chromium.org2012-12-201-4/+114
* Linux Sandbox: get everything to compile on Android.jln@chromium.org2012-12-201-1/+11
* SECCOMP-BPF: Added supported for inspection system call arguments from BPF fi...markus@chromium.org2012-12-151-108/+180
* sandbox-bpf: more robust probe process in release modejln@chromium.org2012-12-051-1/+22
* SECCOMP-BPF: Added support for greylisting of system calls.markus@chromium.org2012-11-221-53/+287
* Revert 168969 - Added support for greylisting of system calls.nona@chromium.org2012-11-211-283/+53
* Added support for greylisting of system calls.markus@chromium.org2012-11-211-53/+283
* Pass a pointer with auxilliary data to a policy function.markus@chromium.org2012-10-311-16/+18
* Seccomp-BPF: relax failure in probe process setupjln@chromium.org2012-10-301-24/+52
* SANDBOX-BPF: Initial version of the updated code generator.markus@chromium.org2012-10-191-115/+49
* Add a platform-specific syscall number iterator.jorgelo@chromium.org2012-10-151-62/+23
* Seccomp BPF: handle EINTR in error reporting setup.jln@chromium.org2012-10-111-3/+8
* Refactored ErrorCode into it's own class. Removed operators and made themmarkus@chromium.org2012-08-311-43/+66
* Simplified unit testing of sandboxing code. We now have helper methods that r...markus@chromium.org2012-08-271-42/+49
* Add basic ARM support to the seccomp-bpf sandbox.jorgelo@chromium.org2012-08-101-10/+10
* Fixed coverity defects pertaining to pass-by-value use where pass-by-referenc...orenb@chromium.org2012-07-251-1/+1
* Seccomp Sandbox: detect a bug with old glibcsjln@chromium.org2012-07-161-6/+40
* Fix compilation error triggered by gcc-4.7+ running in C++-11 mode.markus@chromium.org2012-06-171-1/+2
* Use binary search to optimize code generation for BPF filters.markus@chromium.org2012-06-151-37/+103
* Added support for SECCOMP_RET_TRAP handlers.markus@chromium.org2012-06-151-57/+128
* Instead of outputting one BPF check per possible system call coalescemarkus@chromium.org2012-06-151-46/+153
* Added a new Verifier class to the BPF compiler.markus@chromium.org2012-06-141-5/+22
* Second try at landing this patch list. This time, we are super careful about ...markus@chromium.org2012-06-141-13/+52
* Revert 141938 - Improve logging, if we fail due to an internal error when exe...sergeyu@chromium.org2012-06-131-51/+12
* Improve logging, if we fail due to an internal error when executing supportsS...markus@chromium.org2012-06-131-12/+51
* Avoid all library calls (including calls to destructors) after enabling the s...markus@chromium.org2012-06-131-12/+32
* Explicitly test bit 30 in the system call number to distinguish between the n...markus@chromium.org2012-06-081-4/+25
* BPF: Fix status_ not being set properlyjln@chromium.org2012-06-071-2/+2
* SVN was apparently quite confused by all the changes that we made during the ...markus@chromium.org2012-06-061-1/+1
* Initial snapshot of the new BPF-enabled seccomp sandbox. This code ismarkus@chromium.org2012-06-041-0/+319