summaryrefslogtreecommitdiffstats
path: root/sandbox/linux/seccomp-bpf/trap.h
Commit message (Expand)AuthorAgeFilesLines
* Non-SFI mode: Enable seccomp-bpf sandbox on nacl_helper_nonsfi.hidehiko2015-05-011-1/+1
* Reland: Introduce sys_sigprocmask and sys_sigaction. (patchset #4 id:80001 of...hidehiko2015-04-241-3/+3
* Revert of Reland: Introduce sys_sigprocmask and sys_sigaction. (patchset #5 i...magjed2015-04-221-3/+3
* Reland: Introduce sys_sigprocmask and sys_sigaction. (patchset #5 id:160001 o...hidehiko2015-04-221-3/+3
* Revert of Introduce sys_sigprocmask and sys_sigaction. (patchset #5 id:160001...johnme2015-04-171-3/+3
* Introduce sys_sigprocmask and sys_sigaction.hidehiko2015-04-171-3/+3
* bpf_dsl: Change bpf_dsl_unittests into actual standalone unit testsmdempsky2015-03-071-3/+3
* bpf_dsl: decouple PolicyCompiler from Syscallmdempsky2015-03-051-19/+3
* Revert of bpf_dsl: decouple PolicyCompiler from Syscall (patchset #3 id:40001...kaliamoorthi2015-02-201-3/+19
* Revert of bpf_dsl: Change bpf_dsl_unittests into actual standalone unit tests...kaliamoorthi2015-02-201-3/+3
* bpf_dsl: Change bpf_dsl_unittests into actual standalone unit testsmdempsky2015-02-201-3/+3
* bpf_dsl: decouple PolicyCompiler from Syscallmdempsky2015-02-201-19/+3
* Standardize usage of virtual/override/final specifiers in sandbox/.dcheng2014-12-231-2/+2
* bpf_dsl: add TrapRegistry and extract PolicyCompilermdempsky2014-10-161-32/+11
* sandbox_bpf: rework how unsafe traps are compiled/verifiedmdempsky2014-10-091-4/+0
* Decouple Trap from ErrorCodemdempsky2014-09-161-8/+15
* Fix misuses of DISALLOW_IMPLICIT_CONSTRUCTORS()mdempsky@chromium.org2014-05-201-7/+9
* Move sanbox_export.h to //sandbox from //sandbox/linux and split root OWNERS ...rsesek@chromium.org2014-05-121-1/+1
* Linux sandbox: make seccomp_bpf a component target.jln@chromium.org2014-04-041-1/+2
* Linux sandbox: cleanup sandbox-bpf naming.jln@chromium.org2013-12-101-2/+2
* Remove SECCOMP_BPF_STANDALONE and port the demo target to gyp.rsesek@chromium.org2013-11-141-1/+1
* Make sandbox/linux/seccomp-bpf/ follow the style guide.jln@chromium.org2013-11-081-24/+17
* Linux Sandbox: add RawSandboxDie()jln@chromium.org2013-09-061-1/+4
* SECCOMP-BPF: Refactor the BPF sandbox API to use objects rather than "static"...markus@chromium.org2013-02-261-0/+6
* SECCOMP-BPF: Refactoring in preparation for sandbox stacking.markus@chromium.org2013-01-261-0/+114