<feed xmlns='http://www.w3.org/2005/Atom'>
<title>platform_external_minijail/syscall_wrapper.c, branch pie-dr1-release</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_minijail/'/>
<entry>
<title>add seccomp syscall fallbacks</title>
<updated>2018-01-25T22:43:20+00:00</updated>
<author>
<name>Mike Frysinger</name>
<email>vapier@google.com</email>
</author>
<published>2018-01-25T05:31:45+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_minijail/commit/?id=8022e140219e9c8d99e9cba4a7d5e967bc6a4cf4'/>
<id>8022e140219e9c8d99e9cba4a7d5e967bc6a4cf4</id>
<content type='text'>
Some of the android prebuilts use linux 3.2.14 which don't include the
seccomp syscall define.  Add some fallbacks for the main arches we have
support for in android.  The rest we'll force to update.

Bug: None
Test: build passes for host
Change-Id: I00bd3aeaed7df32cc28aee9ccd0172a1d0bd2a6c
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Some of the android prebuilts use linux 3.2.14 which don't include the
seccomp syscall define.  Add some fallbacks for the main arches we have
support for in android.  The rest we'll force to update.

Bug: None
Test: build passes for host
Change-Id: I00bd3aeaed7df32cc28aee9ccd0172a1d0bd2a6c
</pre>
</div>
</content>
</entry>
<entry>
<title>relicense new source files under BSD</title>
<updated>2018-01-23T18:10:19+00:00</updated>
<author>
<name>Mike Frysinger</name>
<email>vapier@google.com</email>
</author>
<published>2018-01-19T23:59:49+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_minijail/commit/?id=50e31fa7e92cd0cceefa89e65837c1ee04aaf2bb'/>
<id>50e31fa7e92cd0cceefa89e65837c1ee04aaf2bb</id>
<content type='text'>
This project was started as a BSD licensed work, and it remained that
way even after the AOSP move, so make sure new files correctly reflect
that too.  Otherwise we end up with half the files using BSD and the
other half using Apache which is annoying.

Bug: None
Test: grepped for "apache" in all the files
Change-Id: I7cc7c890b42a1ded7552e1852246eaf86ca8428c
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This project was started as a BSD licensed work, and it remained that
way even after the AOSP move, so make sure new files correctly reflect
that too.  Otherwise we end up with half the files using BSD and the
other half using Apache which is annoying.

Bug: None
Test: grepped for "apache" in all the files
Change-Id: I7cc7c890b42a1ded7552e1852246eaf86ca8428c
</pre>
</div>
</content>
</entry>
<entry>
<title>Add support for SECCOMP_FILTER_FLAG_TSYNC.</title>
<updated>2016-09-09T18:27:21+00:00</updated>
<author>
<name>Jorge Lucangeli Obes</name>
<email>jorgelo@google.com</email>
</author>
<published>2016-09-02T15:27:29+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_minijail/commit/?id=13650616ba6faa3ad84c69816e80a2f65bce6331'/>
<id>13650616ba6faa3ad84c69816e80a2f65bce6331</id>
<content type='text'>
This allows synchronizing all threads in a thread group to the same
seccomp filter tree.

Some processes only receive control over their execution after
threads have already been created in their thread group. This happens
for example with apps forked from the Android zygote.

Thread sync (TSYNC) allows these processes to safely apply seccomp
filters to all threads in their thread group, therefore preventing
a thread running with seccomp filters from being able to circumvent
the filter by exploiting an unconfined thread in the same thread
group.

Bug: 31267783
Test: Manual, with multithreaded program calling libminijail.

Change-Id: I902428abf2e4d7fb3e2200ebfe9d5e640a1b10e0
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This allows synchronizing all threads in a thread group to the same
seccomp filter tree.

Some processes only receive control over their execution after
threads have already been created in their thread group. This happens
for example with apps forked from the Android zygote.

Thread sync (TSYNC) allows these processes to safely apply seccomp
filters to all threads in their thread group, therefore preventing
a thread running with seccomp filters from being able to circumvent
the filter by exploiting an unconfined thread in the same thread
group.

Bug: 31267783
Test: Manual, with multithreaded program calling libminijail.

Change-Id: I902428abf2e4d7fb3e2200ebfe9d5e640a1b10e0
</pre>
</div>
</content>
</entry>
</feed>
