index
:
chromium_src.git
ignore/bar
ignore/foo
infra/config
lkcr
lkgr
master
replicant-6.0
central chromium sources
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
sandbox
/
linux
/
seccomp-bpf
/
sandbox_bpf.h
Commit message (
Expand
)
Author
Age
Files
Lines
*
Remove SECCOMP_BPF_STANDALONE and port the demo target to gyp.
rsesek@chromium.org
2013-11-14
1
-1
/
+0
*
Make sandbox/linux/seccomp-bpf/ follow the style guide.
jln@chromium.org
2013-11-08
1
-21
/
+21
*
Linux sandbox: make BPF policies an implementation of an interface.
jln@chromium.org
2013-11-08
1
-6
/
+14
*
Linux: add a public content/ API to start a sandbox.
jln@chromium.org
2013-06-18
1
-6
/
+8
*
SECCOMP-BPF: Refactor the BPF sandbox API to use objects rather than "static"...
markus@chromium.org
2013-02-26
1
-300
/
+73
*
SECCOMP-BPF: Added support for checking system call arguments against bit masks.
markus@chromium.org
2013-02-15
1
-1
/
+12
*
SECCOMP-BPF: Refactoring in preparation for sandbox stacking.
markus@chromium.org
2013-01-26
1
-43
/
+10
*
If the kernel lacks support for BPF filtering, we can still perform a couple
markus@chromium.org
2013-01-11
1
-9
/
+37
*
Revert 174135
jochen@chromium.org
2012-12-20
1
-7
/
+0
*
SECCOMP-BPF: Added support for checking system call arguments against bit masks.
markus@chromium.org
2012-12-20
1
-0
/
+7
*
Linux Sandbox: get everything to compile on Android.
jln@chromium.org
2012-12-20
1
-0
/
+4
*
Linux sandbox: compile partially under Android.
jln@chromium.org
2012-12-19
1
-7
/
+30
*
SECCOMP-BPF: Added supported for inspection system call arguments from BPF fi...
markus@chromium.org
2012-12-15
1
-56
/
+109
*
SECCOMP-BPF: Fix SandboxSyscall()
markus@chromium.org
2012-12-04
1
-0
/
+6
*
SECCOMP-BPF: Added support for greylisting of system calls.
markus@chromium.org
2012-11-22
1
-6
/
+65
*
Revert 168969 - Added support for greylisting of system calls.
nona@chromium.org
2012-11-21
1
-65
/
+6
*
Added support for greylisting of system calls.
markus@chromium.org
2012-11-21
1
-6
/
+65
*
Move eintr_wrapper.h from base to base/posix
brettw@chromium.org
2012-11-14
1
-1
/
+1
*
Pass a pointer with auxilliary data to a policy function.
markus@chromium.org
2012-10-31
1
-17
/
+23
*
SANDBOX-BPF: Initial version of the updated code generator.
markus@chromium.org
2012-10-19
1
-12
/
+11
*
Add a platform-specific syscall number iterator.
jorgelo@chromium.org
2012-10-15
1
-16
/
+27
*
Refactored ErrorCode into it's own class. Removed operators and made them
markus@chromium.org
2012-08-31
1
-83
/
+30
*
Simplified unit testing of sandboxing code. We now have helper methods that r...
markus@chromium.org
2012-08-27
1
-44
/
+8
*
Add basic ARM support to the seccomp-bpf sandbox.
jorgelo@chromium.org
2012-08-10
1
-18
/
+53
*
Fixed coverity defects pertaining to pass-by-value use where pass-by-referenc...
orenb@chromium.org
2012-07-25
1
-1
/
+1
*
Coverity: Initialize member variables.
jhawkins@chromium.org
2012-07-25
1
-1
/
+4
*
Seccomp Sandbox: detect a bug with old glibcs
jln@chromium.org
2012-07-16
1
-0
/
+6
*
seccomp bpf: make more of the Sandbox class private
jln@chromium.org
2012-06-22
1
-3
/
+3
*
Use binary search to optimize code generation for BPF filters.
markus@chromium.org
2012-06-15
1
-1
/
+16
*
Added support for SECCOMP_RET_TRAP handlers.
markus@chromium.org
2012-06-15
1
-4
/
+89
*
Instead of outputting one BPF check per possible system call coalesce
markus@chromium.org
2012-06-15
1
-5
/
+22
*
Added a new Verifier class to the BPF compiler.
markus@chromium.org
2012-06-14
1
-2
/
+7
*
Second try at landing this patch list. This time, we are super careful about ...
markus@chromium.org
2012-06-14
1
-7
/
+14
*
Revert 141938 - Improve logging, if we fail due to an internal error when exe...
sergeyu@chromium.org
2012-06-13
1
-14
/
+7
*
Improve logging, if we fail due to an internal error when executing supportsS...
markus@chromium.org
2012-06-13
1
-7
/
+14
*
Avoid all library calls (including calls to destructors) after enabling the s...
markus@chromium.org
2012-06-13
1
-5
/
+6
*
Explicitly test bit 30 in the system call number to distinguish between the n...
markus@chromium.org
2012-06-08
1
-2
/
+2
*
Initial snapshot of the new BPF-enabled seccomp sandbox. This code is
markus@chromium.org
2012-06-04
1
-0
/
+244