summaryrefslogtreecommitdiffstats
path: root/sandbox/linux/seccomp-bpf
Commit message (Expand)AuthorAgeFilesLines
* NaCl non-sfi sandbox: use modern framework for testsjln@chromium.org2014-05-071-9/+9
* Linux sandbox: implement new BPF testing macrosjln@chromium.org2014-05-074-88/+241
* Linux sandbox: cleanup test framework furtherjln@chromium.org2014-05-065-79/+189
* Linux sandbox: add basic DEPS files.jln@chromium.org2014-05-021-0/+3
* Linux sandbox: get rid of a number of reinterpret_castjln@chromium.org2014-05-028-73/+230
* Revert 267599 "Linux sandbox: add basic DEPS files."noamsml@google.com2014-05-011-3/+0
* Linux sandbox: add basic DEPS files.jln@chromium.org2014-05-011-0/+3
* Reland: Add seccomp sandbox for non-SFI NaClhamaji@chromium.org2014-04-171-0/+6
* Revert of Add seccomp sandbox for non-SFI NaCl (https://codereview.chromium.o...jln@chromium.org2014-04-171-6/+0
* Add seccomp sandbox for non-SFI NaClhamaji@chromium.org2014-04-171-0/+6
* sandbox_bpf_unittest.cc: Remove old code.jorgelo@chromium.org2014-04-101-7/+0
* Fixes for sandbox unit tests on Androidzhenyu.liang@intel.com2014-04-101-0/+26
* sandbox: Add support for starting seccomp-bpf with threads.rsesek@chromium.org2014-04-055-13/+58
* Revert of sandbox: Add support for starting seccomp-bpf with threads. (https:...scottmg@chromium.org2014-04-055-56/+13
* sandbox: Add support for starting seccomp-bpf with threads.rsesek@chromium.org2014-04-055-13/+56
* Linux sandbox: make seccomp_bpf a component target.jln@chromium.org2014-04-047-35/+51
* Linux sandbox: reformat codegen_unittest.ccjln@chromium.org2014-03-311-81/+76
* Linux Sandbox: fix BPF compiler bugjln@chromium.org2014-03-282-1/+121
* Linux sandbox: disable bare BPF tests on TSANv2thakis@chromium.org2014-03-261-2/+2
* Linux: do not associate SIGSYS with the StackDumpSignalHandlerjln@chromium.org2014-03-261-2/+5
* Make seccomp-bpf mandatory on ARM.jln@chromium.org2014-03-251-4/+3
* Clarify the process title of GPU broker process.dongseong.hwang@intel.com2014-02-221-1/+4
* sandbox: Remove a TEXTREL on Linux ARM.rsesek@chromium.org2013-12-201-1/+1
* ARM Linux sandbox: make sure r7 is marked as clobberedjln@chromium.org2013-12-191-2/+2
* Revert 240670 "Revert 239894 "Linux Sandbox: check no threads be..."jln@chromium.org2013-12-161-0/+4
* Revert 239894 "Linux Sandbox: check no threads before fork()."jln@chromium.org2013-12-131-4/+0
* Linux Sandbox: check no threads before fork().jln@chromium.org2013-12-101-0/+4
* Linux sandbox: cleanup sandbox-bpf naming.jln@chromium.org2013-12-1027-266/+269
* Linux Sandbox: move NaCl to new BPF policy format.jln@chromium.org2013-12-102-27/+3
* Revert of https://chromiumcodereview.appspot.com/103293003/jln@chromium.org2013-12-062-5/+2
* Revert 239102 "Move build/build_config_functions.h to sandbox/"rlarocque@chromium.org2013-12-062-3/+3
* Move build/build_config_functions.h to sandbox/jln@chromium.org2013-12-062-3/+3
* Add build_config_functions.h to avoid #ifdefjln@chromium.org2013-12-062-2/+5
* Add "cc" to inline asm clobber list.eugenis@chromium.org2013-12-051-3/+3
* Don't HANDLE_EINTR(close). Either IGNORE_EINTR(close) or just close.mark@chromium.org2013-12-033-11/+10
* Linux sandbox: fix demo.cc usage of system call numbersjln@chromium.org2013-11-201-0/+1
* Remove SECCOMP_BPF_STANDALONE and port the demo target to gyp.rsesek@chromium.org2013-11-1414-99/+31
* Fixes for -Wunused-function on Linux, Android and ChromeOShans@chromium.org2013-11-121-12/+3
* Make sandbox/linux/seccomp-bpf/ follow the style guide.jln@chromium.org2013-11-0824-1284/+1374
* Linux sandbox: make BPF policies an implementation of an interface.jln@chromium.org2013-11-087-94/+150
* Linux Sandbox: make error tunable in open brokerjln@chromium.org2013-10-141-1/+2
* Clean up unused constant globalshans@chromium.org2013-10-031-1/+0
* Android seccomp-bpf: allow clone without CLONE_DETACHEDjln@chromium.org2013-10-011-6/+15
* Linux Sandbox: add RawSandboxDie()jln@chromium.org2013-09-064-6/+22
* Linux Sandbox: LOG error if a previous SIGSYS handler exists.jln@chromium.org2013-09-051-1/+15
* Linux sandbox: do not crash on spurious SIGSYS.jln@chromium.org2013-09-041-12/+15
* Linux Sandbox: cleanup code around spurious SIGSYS detection.jln@chromium.org2013-07-121-5/+4
* Linux Sandbox unittests: fix Valgrind detection.jln@chromium.org2013-07-112-18/+9
* Linux Sandbox: forward declare Errorcode in sandbox_bpf_policy_forward.hjln@chromium.org2013-07-101-2/+2
* sandbox_linux_unittests: ignore TSAN when counting threads.jln@chromium.org2013-07-032-2/+5