summaryrefslogtreecommitdiffstats
path: root/sandbox/linux
Commit message (Expand)AuthorAgeFilesLines
* Linux Sandbox: assert monothreaded in testsjln@chromium.org2013-04-031-7/+5
* Android sandbox: workaround for restricted errno values.jln@chromium.org2013-03-112-3/+37
* The 'sandbox' target is always 'none'.bungeman@chromium.org2013-02-281-1/+0
* SECCOMP-BPF: Refactor the BPF sandbox API to use objects rather than "static"...markus@chromium.org2013-02-2624-990/+1071
* Move file_path.h to base/files.brettw@chromium.org2013-02-241-1/+1
* SECCOMP-BPF: Added support for checking system call arguments against bit masks.markus@chromium.org2013-02-158-55/+1041
* Replace FilePath with base::FilePath in some more top level directories.brettw@chromium.org2013-02-101-1/+1
* Added a unittest to check that we can restrict syscall(__NR_clone)markus@chromium.org2013-02-071-0/+55
* Linux sandbox: add warning if running tests multithreaded.jln@chromium.org2013-02-052-5/+22
* Linux sandbox: Make the test run on Android as Native executablejln@chromium.org2013-02-023-37/+67
* SECCOMP-BPF: Refactoring in preparation for sandbox stacking.markus@chromium.org2013-01-2611-281/+539
* Linux sandbox: more internal timeout in unit tests.jln@chromium.org2013-01-201-8/+32
* Linux sandbox: add timeout to tests.jln@chromium.org2013-01-181-0/+44
* Linux Sandbox: ASSERT instead of EXPECT in broker tests.jln@chromium.org2013-01-181-28/+40
* Use SOCK_SEQPACKET for synchronous IPC.glider@google.com2013-01-181-1/+1
* Android make sandbox/linux/seccomp-bpf compile on i386jln@chromium.org2013-01-185-42/+99
* Android: remove x86 from sandbox/linux once again.jln@chromium.org2013-01-171-1/+1
* Android: create a generic android_ucontext.hjln@chromium.org2013-01-175-6/+74
* If the kernel lacks support for BPF filtering, we can still perform a couplemarkus@chromium.org2013-01-114-85/+108
* Linux Sandbox: handle O_CREAT properly in broker process.jln@chromium.org2013-01-092-1/+13
* Fix Android x86 build with a quick hack.jln@chromium.org2012-12-201-2/+3
* Revert 174135jochen@chromium.org2012-12-207-752/+19
* SECCOMP-BPF: Added support for checking system call arguments against bit masks.markus@chromium.org2012-12-207-19/+752
* Update Linux sandbox tests to pass on Android.palmer@chromium.org2012-12-202-7/+25
* Fix for downstream android webviewboliu@chromium.org2012-12-201-0/+3
* Linux Sandbox: get everything to compile on Android.jln@chromium.org2012-12-205-7/+47
* Linux sandbox: compile partially under Android.jln@chromium.org2012-12-195-16/+99
* SECCOMP-BPF: Added supported for inspection system call arguments from BPF fi...markus@chromium.org2012-12-1514-290/+1029
* Linux Sandbox: Basic support for GPU broker.jln@chromium.org2012-12-142-7/+9
* Linux sandbox: add a new low-level broker process mechanism.jln@chromium.org2012-12-145-0/+809
* Revert 173064gene@chromium.org2012-12-145-809/+0
* Linux sandbox: add a new low-level broker process mechanism.jln@chromium.org2012-12-145-0/+809
* sandbox-bpf: more robust probe process in release modejln@chromium.org2012-12-051-1/+22
* SandboxBpf: new reliable test for SandboxSyscalljln@chromium.org2012-12-052-1/+63
* SECCOMP-BPF: Fix SandboxSyscall()markus@chromium.org2012-12-043-68/+125
* Linux Sandbox: add test for one argument system calls.jln@chromium.org2012-12-031-0/+8
* Seccomp-BPF: disable ASAN on SandboxSyscall()jln@chromium.org2012-11-271-0/+5
* setuid tools: open /proc directories relativelyjln@chromium.org2012-11-271-21/+44
* SECCOMP-BPF: Added support for greylisting of system calls.markus@chromium.org2012-11-2214-67/+1074
* Sandbox BPF: print pointer size in testjln@chromium.org2012-11-211-0/+2
* Revert 168969 - Added support for greylisting of system calls.nona@chromium.org2012-11-2114-1008/+67
* Added support for greylisting of system calls.markus@chromium.org2012-11-2114-67/+1008
* Move eintr_wrapper.h from base to base/posixbrettw@chromium.org2012-11-143-3/+3
* Pass a pointer with auxilliary data to a policy function.markus@chromium.org2012-10-317-97/+143
* Seccomp-BPF: relax failure in probe process setupjln@chromium.org2012-10-301-24/+52
* Minor fix for gcc builidng problem.shenhan@google.com2012-10-191-1/+2
* SANDBOX-BPF: Initial version of the updated code generator.markus@chromium.org2012-10-1914-153/+1469
* Add a platform-specific syscall number iterator.jorgelo@chromium.org2012-10-159-107/+401
* Seccomp BPF: handle EINTR in error reporting setup.jln@chromium.org2012-10-111-3/+8
* Fix sandbox_bpf_unittest compile on ARMjorgelo@chromium.org2012-09-151-1/+1