summaryrefslogtreecommitdiffstats
path: root/sandbox/linux/seccomp-bpf/sandbox_bpf.h
Commit message (Expand)AuthorAgeFilesLines
* Remove SECCOMP_BPF_STANDALONE and port the demo target to gyp.rsesek@chromium.org2013-11-141-1/+0
* Make sandbox/linux/seccomp-bpf/ follow the style guide.jln@chromium.org2013-11-081-21/+21
* Linux sandbox: make BPF policies an implementation of an interface.jln@chromium.org2013-11-081-6/+14
* Linux: add a public content/ API to start a sandbox.jln@chromium.org2013-06-181-6/+8
* SECCOMP-BPF: Refactor the BPF sandbox API to use objects rather than "static"...markus@chromium.org2013-02-261-300/+73
* SECCOMP-BPF: Added support for checking system call arguments against bit masks.markus@chromium.org2013-02-151-1/+12
* SECCOMP-BPF: Refactoring in preparation for sandbox stacking.markus@chromium.org2013-01-261-43/+10
* If the kernel lacks support for BPF filtering, we can still perform a couplemarkus@chromium.org2013-01-111-9/+37
* Revert 174135jochen@chromium.org2012-12-201-7/+0
* SECCOMP-BPF: Added support for checking system call arguments against bit masks.markus@chromium.org2012-12-201-0/+7
* Linux Sandbox: get everything to compile on Android.jln@chromium.org2012-12-201-0/+4
* Linux sandbox: compile partially under Android.jln@chromium.org2012-12-191-7/+30
* SECCOMP-BPF: Added supported for inspection system call arguments from BPF fi...markus@chromium.org2012-12-151-56/+109
* SECCOMP-BPF: Fix SandboxSyscall()markus@chromium.org2012-12-041-0/+6
* SECCOMP-BPF: Added support for greylisting of system calls.markus@chromium.org2012-11-221-6/+65
* Revert 168969 - Added support for greylisting of system calls.nona@chromium.org2012-11-211-65/+6
* Added support for greylisting of system calls.markus@chromium.org2012-11-211-6/+65
* Move eintr_wrapper.h from base to base/posixbrettw@chromium.org2012-11-141-1/+1
* Pass a pointer with auxilliary data to a policy function.markus@chromium.org2012-10-311-17/+23
* SANDBOX-BPF: Initial version of the updated code generator.markus@chromium.org2012-10-191-12/+11
* Add a platform-specific syscall number iterator.jorgelo@chromium.org2012-10-151-16/+27
* Refactored ErrorCode into it's own class. Removed operators and made themmarkus@chromium.org2012-08-311-83/+30
* Simplified unit testing of sandboxing code. We now have helper methods that r...markus@chromium.org2012-08-271-44/+8
* Add basic ARM support to the seccomp-bpf sandbox.jorgelo@chromium.org2012-08-101-18/+53
* Fixed coverity defects pertaining to pass-by-value use where pass-by-referenc...orenb@chromium.org2012-07-251-1/+1
* Coverity: Initialize member variables.jhawkins@chromium.org2012-07-251-1/+4
* Seccomp Sandbox: detect a bug with old glibcsjln@chromium.org2012-07-161-0/+6
* seccomp bpf: make more of the Sandbox class privatejln@chromium.org2012-06-221-3/+3
* Use binary search to optimize code generation for BPF filters.markus@chromium.org2012-06-151-1/+16
* Added support for SECCOMP_RET_TRAP handlers.markus@chromium.org2012-06-151-4/+89
* Instead of outputting one BPF check per possible system call coalescemarkus@chromium.org2012-06-151-5/+22
* Added a new Verifier class to the BPF compiler.markus@chromium.org2012-06-141-2/+7
* Second try at landing this patch list. This time, we are super careful about ...markus@chromium.org2012-06-141-7/+14
* Revert 141938 - Improve logging, if we fail due to an internal error when exe...sergeyu@chromium.org2012-06-131-14/+7
* Improve logging, if we fail due to an internal error when executing supportsS...markus@chromium.org2012-06-131-7/+14
* Avoid all library calls (including calls to destructors) after enabling the s...markus@chromium.org2012-06-131-5/+6
* Explicitly test bit 30 in the system call number to distinguish between the n...markus@chromium.org2012-06-081-2/+2
* Initial snapshot of the new BPF-enabled seccomp sandbox. This code ismarkus@chromium.org2012-06-041-0/+244