index
:
chromium_src.git
ignore/bar
ignore/foo
infra/config
lkcr
lkgr
master
replicant-6.0
central chromium sources
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
sandbox
/
linux
/
seccomp-bpf
/
sandbox_bpf.cc
Commit message (
Expand
)
Author
Age
Files
Lines
*
Remove SECCOMP_BPF_STANDALONE and port the demo target to gyp.
rsesek@chromium.org
2013-11-14
1
-6
/
+4
*
Fixes for -Wunused-function on Linux, Android and ChromeOS
hans@chromium.org
2013-11-12
1
-12
/
+3
*
Make sandbox/linux/seccomp-bpf/ follow the style guide.
jln@chromium.org
2013-11-08
1
-281
/
+309
*
Linux sandbox: make BPF policies an implementation of an interface.
jln@chromium.org
2013-11-08
1
-75
/
+91
*
SECCOMP-BPF: Refactor the BPF sandbox API to use objects rather than "static"...
markus@chromium.org
2013-02-26
1
-161
/
+223
*
SECCOMP-BPF: Added support for checking system call arguments against bit masks.
markus@chromium.org
2013-02-15
1
-9
/
+127
*
SECCOMP-BPF: Refactoring in preparation for sandbox stacking.
markus@chromium.org
2013-01-26
1
-218
/
+40
*
Android: create a generic android_ucontext.h
jln@chromium.org
2013-01-17
1
-2
/
+2
*
If the kernel lacks support for BPF filtering, we can still perform a couple
markus@chromium.org
2013-01-11
1
-72
/
+63
*
Revert 174135
jochen@chromium.org
2012-12-20
1
-114
/
+4
*
SECCOMP-BPF: Added support for checking system call arguments against bit masks.
markus@chromium.org
2012-12-20
1
-4
/
+114
*
Linux Sandbox: get everything to compile on Android.
jln@chromium.org
2012-12-20
1
-1
/
+11
*
SECCOMP-BPF: Added supported for inspection system call arguments from BPF fi...
markus@chromium.org
2012-12-15
1
-108
/
+180
*
sandbox-bpf: more robust probe process in release mode
jln@chromium.org
2012-12-05
1
-1
/
+22
*
SECCOMP-BPF: Added support for greylisting of system calls.
markus@chromium.org
2012-11-22
1
-53
/
+287
*
Revert 168969 - Added support for greylisting of system calls.
nona@chromium.org
2012-11-21
1
-283
/
+53
*
Added support for greylisting of system calls.
markus@chromium.org
2012-11-21
1
-53
/
+283
*
Pass a pointer with auxilliary data to a policy function.
markus@chromium.org
2012-10-31
1
-16
/
+18
*
Seccomp-BPF: relax failure in probe process setup
jln@chromium.org
2012-10-30
1
-24
/
+52
*
SANDBOX-BPF: Initial version of the updated code generator.
markus@chromium.org
2012-10-19
1
-115
/
+49
*
Add a platform-specific syscall number iterator.
jorgelo@chromium.org
2012-10-15
1
-62
/
+23
*
Seccomp BPF: handle EINTR in error reporting setup.
jln@chromium.org
2012-10-11
1
-3
/
+8
*
Refactored ErrorCode into it's own class. Removed operators and made them
markus@chromium.org
2012-08-31
1
-43
/
+66
*
Simplified unit testing of sandboxing code. We now have helper methods that r...
markus@chromium.org
2012-08-27
1
-42
/
+49
*
Add basic ARM support to the seccomp-bpf sandbox.
jorgelo@chromium.org
2012-08-10
1
-10
/
+10
*
Fixed coverity defects pertaining to pass-by-value use where pass-by-referenc...
orenb@chromium.org
2012-07-25
1
-1
/
+1
*
Seccomp Sandbox: detect a bug with old glibcs
jln@chromium.org
2012-07-16
1
-6
/
+40
*
Fix compilation error triggered by gcc-4.7+ running in C++-11 mode.
markus@chromium.org
2012-06-17
1
-1
/
+2
*
Use binary search to optimize code generation for BPF filters.
markus@chromium.org
2012-06-15
1
-37
/
+103
*
Added support for SECCOMP_RET_TRAP handlers.
markus@chromium.org
2012-06-15
1
-57
/
+128
*
Instead of outputting one BPF check per possible system call coalesce
markus@chromium.org
2012-06-15
1
-46
/
+153
*
Added a new Verifier class to the BPF compiler.
markus@chromium.org
2012-06-14
1
-5
/
+22
*
Second try at landing this patch list. This time, we are super careful about ...
markus@chromium.org
2012-06-14
1
-13
/
+52
*
Revert 141938 - Improve logging, if we fail due to an internal error when exe...
sergeyu@chromium.org
2012-06-13
1
-51
/
+12
*
Improve logging, if we fail due to an internal error when executing supportsS...
markus@chromium.org
2012-06-13
1
-12
/
+51
*
Avoid all library calls (including calls to destructors) after enabling the s...
markus@chromium.org
2012-06-13
1
-12
/
+32
*
Explicitly test bit 30 in the system call number to distinguish between the n...
markus@chromium.org
2012-06-08
1
-4
/
+25
*
BPF: Fix status_ not being set properly
jln@chromium.org
2012-06-07
1
-2
/
+2
*
SVN was apparently quite confused by all the changes that we made during the ...
markus@chromium.org
2012-06-06
1
-1
/
+1
*
Initial snapshot of the new BPF-enabled seccomp sandbox. This code is
markus@chromium.org
2012-06-04
1
-0
/
+319