summaryrefslogtreecommitdiffstats
path: root/sandbox/linux/seccomp-bpf
Commit message (Expand)AuthorAgeFilesLines
* CodeGen: reuse far jumps when possiblemdempsky2014-12-023-16/+61
* Linux sandbox: set policy in constructorjln2014-11-274-24/+12
* Linux sandbox: Use ScopedFD in SandboxBPFjln2014-11-263-17/+99
* Linux sandbox: do not detect seccomp on Valgrind.jln2014-11-261-0/+9
* bpf_dsl: remove some PolicyCompiler dependencies on ErrorCodemdempsky2014-11-262-10/+14
* Linux sandbox: cleanup the SandboxBPF classjln2014-11-262-118/+93
* Linux sandbox: change seccomp detection and initialization.jln2014-11-253-304/+67
* Linux sandbox: change API to start the sandboxjln2014-11-253-99/+43
* Linux sandbox: start adding syscall wrappersjln2014-11-202-8/+8
* CodeGen: rewrite implementation [3/3]mdempsky2014-11-206-759/+195
* CodeGen: simplify unit tests [2/3]mdempsky2014-11-181-334/+164
* CodeGen: refactor API [1/3]mdempsky2014-11-173-136/+119
* CodeGen: refactor unit tests using parameterized testsmdempsky2014-11-031-173/+152
* sandbox: extract PrintProgram() into a separate DumpBPF classmdempsky2014-10-313-95/+3
* SyscallSet: add ValidOnlymdempsky2014-10-283-35/+77
* bpf_dsl: rename SandboxBPFDSLPolicy to just Policymdempsky2014-10-2411-41/+39
* SyscallIterator: support C++11 range-based for loopsmdempsky2014-10-225-47/+129
* Syscall: Fix Syscall::Call's X86-64 implementation for CFI unwindingmdempsky2014-10-201-37/+22
* bpf_dsl: move more implementation details out of bpf_dsl.hmdempsky2014-10-171-2/+3
* bpf_dsl: add TrapRegistry and extract PolicyCompilermdempsky2014-10-1613-806/+132
* SyscallIterator: cleanup tests toomdempsky2014-10-141-143/+63
* seccomp-bpf: Remove legacy SandboxBPFPolicy classmdempsky2014-10-1411-89/+37
* sandbox_bpf: Remove Traverse method.rickyz2014-10-142-45/+0
* sandbox_bpf: rework how unsafe traps are compiled/verifiedmdempsky2014-10-095-178/+73
* SyscallIterator: refactor internalsmdempsky2014-10-082-73/+62
* replace OVERRIDE and FINAL with override and final in sandbox/mostynb2014-10-076-15/+15
* sandbox_bpf: convert remaining policies to use bpf_dslmdempsky2014-10-044-26/+45
* sandbox: Fix uninitialized data in non-jumping bpf instructionsleecam2014-10-032-23/+22
* Linux sandbox: fill all parameters when detecting seccomp syscall.Julien Tinnes2014-09-251-12/+9
* sandbox: Convert remaining legacy tests to use policy classesMatthew Dempsky2014-09-235-110/+65
* Linux sandbox: Remove CodeGen::JoinInstructions.rickyz2014-09-183-65/+25
* Decouple CodeGen from ErrorCodemdempsky2014-09-174-46/+36
* Large IWYU cleanup for seccomp-bpfmdempsky2014-09-1619-36/+61
* Decouple Trap from ErrorCodemdempsky2014-09-166-103/+105
* Split AssembleFilter into comprehensible chunksmdempsky2014-09-162-149/+205
* Convert sandbox_bpf_unittest.cc to use bpf_dslmdempsky2014-09-131-2425/+0
* sandbox: remove seccomp-bpf demo programmdempsky2014-09-091-542/+0
* bpf_dsl: support arbitrary (arg & mask) == val expressionsMatthew Dempsky2014-09-046-338/+415
* sandbox: Fix RedirectToUserSpacePolicyWrapperleecam2014-09-033-24/+112
* Disable SandboxBPF.StartSingleThreadedAsMultiThreaded under TSan v2.jyasskin2014-08-271-0/+3
* sandbox: Add support for the new seccomp() system call in kernel 3.17.rsesek2014-08-254-28/+160
* sandbox: Add Arm64 support for seccomp-BPFleecam2014-08-244-9/+128
* Annotate IA-32's SyscallAsm implementation with CFI directivesmdempsky@chromium.org2014-08-011-8/+8
* Cleanup SandboxBPF policies now that we have InvalidSyscall()mdempsky@chromium.org2014-07-313-0/+24
* Android seccomp-bpf: fix a few unittestsjln@chromium.org2014-07-302-22/+19
* [MIPS] Add seccomp bpf supportnedeljko.babic@imgtec.com2014-07-259-10/+300
* Linux sandbox: add space for 8 parameters to the Syscall() classnedeljko.babic@imgtec.com2014-07-082-23/+80
* gcc 4.7 workaround for __uint16_tmostynb@opera.com2014-07-071-0/+1
* Linux sandbox: add test to ensure that pread64 can be forwarded.jln@chromium.org2014-06-272-8/+101
* Define regs_struct on x86 Bionic as well.rickyz@google.com2014-06-141-1/+29