summaryrefslogtreecommitdiffstats
path: root/sandbox/linux
Commit message (Expand)AuthorAgeFilesLines
...
* Refactored ErrorCode into it's own class. Removed operators and made themmarkus@chromium.org2012-08-3113-162/+449
* Simplified unit testing of sandboxing code. We now have helper methods that r...markus@chromium.org2012-08-2713-229/+453
* Add full ARM syscall list.jorgelo@chromium.org2012-08-212-12/+1361
* Add ARM syscalls to syscall sets.jorgelo@chromium.org2012-08-171-0/+4
* Correct style issues in Linux sandbox code.jln@chromium.org2012-08-173-7/+10
* Add basic ARM policy to seccomp-bpf sandbox.jorgelo@chromium.org2012-08-151-0/+28
* Add basic ARM support to the seccomp-bpf sandbox.jorgelo@chromium.org2012-08-104-31/+86
* Setuid sandbox unittest: fix environment.jln@chromium.org2012-08-091-0/+12
* Seccomp: always call setSandboxPolicy in unittest.jln@chromium.org2012-08-091-1/+6
* Remove X32 syscalls numbers from x86_64_linux_syscalls.hjln@chromium.org2012-08-071-116/+0
* Linux: add our own headers for system call numbers.jln@chromium.org2012-08-073-0/+2801
* Create a LinuxSandbox class.jln@chromium.org2012-08-023-3/+19
* Revert 149692 - Create a LinuxSandbox class.mazda@chromium.org2012-08-023-19/+3
* Create a LinuxSandbox class.jln@chromium.org2012-08-023-3/+19
* Linux sandbox unit test: log BPF supportjln@chromium.org2012-07-311-1/+11
* Fix gcc 4.7 building problems - cont 2.shenhan@google.com2012-07-262-0/+2
* Fixed coverity defects pertaining to pass-by-value use where pass-by-referenc...orenb@chromium.org2012-07-252-2/+2
* Coverity: Initialize member variables.jhawkins@chromium.org2012-07-251-1/+4
* Create a new SetuidSandboxClient class.jln@chromium.org2012-07-238-47/+389
* Move sandbox/sandbox_linux.gypi to sandbox/linuxjln@chromium.org2012-07-181-0/+104
* Seccomp Sandbox: detect a bug with old glibcsjln@chromium.org2012-07-162-6/+46
* Share the zygote's fopen overrides with nacl_helper.ncbray@chromium.org2012-07-132-0/+184
* Remove the rest of #pragma once in one big CL.ajwong@chromium.org2012-07-113-3/+0
* Seccomp-BPF: add a new synthetic unittestjln@chromium.org2012-07-091-0/+59
* Seccomp BPF: add a unittest for a SIGSYS handlerjln@chromium.org2012-06-261-0/+52
* Seccomp BPF: add a simple whitelist unittestjln@chromium.org2012-06-232-22/+113
* Sandbox BPF: add basic unittestsjln@chromium.org2012-06-221-1/+53
* Seccomp BPF: initial structure for unittestsjln@chromium.org2012-06-222-0/+20
* seccomp bpf: make more of the Sandbox class privatejln@chromium.org2012-06-221-3/+3
* Fix compilation error triggered by gcc-4.7+ running in C++-11 mode.markus@chromium.org2012-06-171-1/+2
* Use binary search to optimize code generation for BPF filters.markus@chromium.org2012-06-153-38/+123
* Added support for SECCOMP_RET_TRAP handlers.markus@chromium.org2012-06-154-97/+330
* Instead of outputting one BPF check per possible system call coalescemarkus@chromium.org2012-06-153-53/+177
* Added a new Verifier class to the BPF compiler.markus@chromium.org2012-06-145-8/+284
* Second try at landing this patch list. This time, we are super careful about ...markus@chromium.org2012-06-145-25/+75
* Revert 141938 - Improve logging, if we fail due to an internal error when exe...sergeyu@chromium.org2012-06-132-65/+19
* Improve logging, if we fail due to an internal error when executing supportsS...markus@chromium.org2012-06-132-19/+65
* Avoid all library calls (including calls to destructors) after enabling the s...markus@chromium.org2012-06-132-17/+38
* Explicitly test bit 30 in the system call number to distinguish between the n...markus@chromium.org2012-06-082-6/+27
* BPF: Fix status_ not being set properlyjln@chromium.org2012-06-071-2/+2
* SVN was apparently quite confused by all the changes that we made during the ...markus@chromium.org2012-06-063-5/+5
* Linux: bump the setuid sandbox API numberjln@chromium.org2012-06-051-1/+1
* Setuid sandbox API versioningjln@chromium.org2012-06-052-2/+59
* Initial snapshot of the new BPF-enabled seccomp sandbox. This code ismarkus@chromium.org2012-06-046-0/+1087
* Don't fork Zygote as a background processjln@chromium.org2012-06-011-2/+67
* Revert setuid sandbox as a "init process" changesjln@chromium.org2012-05-233-342/+46
* Fix Mario (32-bit) build.gspencer@chromium.org2012-05-031-1/+1
* This creates a field trial to determine the best level for low memorygspencer@chromium.org2012-05-035-9/+95
* Better check if argc is 0 because argv[0] is later used.erik.sjolund@gmail.com2012-04-171-0/+4
* If using the suid sandbox, but not using the seccomp sandbox, there is amarkus@chromium.org2012-03-121-4/+4