summaryrefslogtreecommitdiffstats
path: root/sandbox/linux/seccomp-bpf
Commit message (Expand)AuthorAgeFilesLines
* Linux Sandbox: cleanup code around spurious SIGSYS detection.jln@chromium.org2013-07-121-5/+4
* Linux Sandbox unittests: fix Valgrind detection.jln@chromium.org2013-07-112-18/+9
* Linux Sandbox: forward declare Errorcode in sandbox_bpf_policy_forward.hjln@chromium.org2013-07-101-2/+2
* sandbox_linux_unittests: ignore TSAN when counting threads.jln@chromium.org2013-07-032-2/+5
* sandbox_linux_unittests: disable fork() tests under TSAN.jln@chromium.org2013-07-031-1/+1
* Linux: add a public content/ API to start a sandbox.jln@chromium.org2013-06-182-6/+31
* sandbox_linux_unittests: fail if the kernel does not support BPF.jln@chromium.org2013-04-301-0/+9
* Linux sandbox: add access() brokering to the async-signal safe broker process.jln@chromium.org2013-04-241-0/+14
* Android sandbox: workaround for restricted errno values.jln@chromium.org2013-03-112-3/+37
* SECCOMP-BPF: Refactor the BPF sandbox API to use objects rather than "static"...markus@chromium.org2013-02-2623-990/+1069
* SECCOMP-BPF: Added support for checking system call arguments against bit masks.markus@chromium.org2013-02-158-55/+1041
* Added a unittest to check that we can restrict syscall(__NR_clone)markus@chromium.org2013-02-071-0/+55
* SECCOMP-BPF: Refactoring in preparation for sandbox stacking.markus@chromium.org2013-01-2610-281/+537
* Android: create a generic android_ucontext.hjln@chromium.org2013-01-171-2/+2
* If the kernel lacks support for BPF filtering, we can still perform a couplemarkus@chromium.org2013-01-114-85/+108
* Revert 174135jochen@chromium.org2012-12-207-752/+19
* SECCOMP-BPF: Added support for checking system call arguments against bit masks.markus@chromium.org2012-12-207-19/+752
* Update Linux sandbox tests to pass on Android.palmer@chromium.org2012-12-201-4/+6
* Linux Sandbox: get everything to compile on Android.jln@chromium.org2012-12-203-1/+21
* Linux sandbox: compile partially under Android.jln@chromium.org2012-12-194-9/+33
* SECCOMP-BPF: Added supported for inspection system call arguments from BPF fi...markus@chromium.org2012-12-1512-271/+881
* Linux sandbox: add a new low-level broker process mechanism.jln@chromium.org2012-12-141-0/+100
* Revert 173064gene@chromium.org2012-12-141-100/+0
* Linux sandbox: add a new low-level broker process mechanism.jln@chromium.org2012-12-141-0/+100
* sandbox-bpf: more robust probe process in release modejln@chromium.org2012-12-051-1/+22
* SandboxBpf: new reliable test for SandboxSyscalljln@chromium.org2012-12-052-1/+63
* SECCOMP-BPF: Fix SandboxSyscall()markus@chromium.org2012-12-043-68/+125
* Linux Sandbox: add test for one argument system calls.jln@chromium.org2012-12-031-0/+8
* Seccomp-BPF: disable ASAN on SandboxSyscall()jln@chromium.org2012-11-271-0/+5
* SECCOMP-BPF: Added support for greylisting of system calls.markus@chromium.org2012-11-2213-67/+1071
* Sandbox BPF: print pointer size in testjln@chromium.org2012-11-211-0/+2
* Revert 168969 - Added support for greylisting of system calls.nona@chromium.org2012-11-2113-1005/+67
* Added support for greylisting of system calls.markus@chromium.org2012-11-2113-67/+1005
* Move eintr_wrapper.h from base to base/posixbrettw@chromium.org2012-11-141-1/+1
* Pass a pointer with auxilliary data to a policy function.markus@chromium.org2012-10-316-96/+143
* Seccomp-BPF: relax failure in probe process setupjln@chromium.org2012-10-301-24/+52
* Minor fix for gcc builidng problem.shenhan@google.com2012-10-191-1/+2
* SANDBOX-BPF: Initial version of the updated code generator.markus@chromium.org2012-10-1913-153/+1463
* Add a platform-specific syscall number iterator.jorgelo@chromium.org2012-10-158-107/+398
* Seccomp BPF: handle EINTR in error reporting setup.jln@chromium.org2012-10-111-3/+8
* Fix sandbox_bpf_unittest compile on ARMjorgelo@chromium.org2012-09-151-1/+1
* Refactored ErrorCode into it's own class. Removed operators and made themmarkus@chromium.org2012-08-3112-162/+446
* Simplified unit testing of sandboxing code. We now have helper methods that r...markus@chromium.org2012-08-279-220/+305
* Add basic ARM support to the seccomp-bpf sandbox.jorgelo@chromium.org2012-08-103-29/+82
* Seccomp: always call setSandboxPolicy in unittest.jln@chromium.org2012-08-091-1/+6
* Linux sandbox unit test: log BPF supportjln@chromium.org2012-07-311-1/+11
* Fixed coverity defects pertaining to pass-by-value use where pass-by-referenc...orenb@chromium.org2012-07-252-2/+2
* Coverity: Initialize member variables.jhawkins@chromium.org2012-07-251-1/+4
* Seccomp Sandbox: detect a bug with old glibcsjln@chromium.org2012-07-162-6/+46
* Seccomp-BPF: add a new synthetic unittestjln@chromium.org2012-07-091-0/+59