summaryrefslogtreecommitdiffstats
path: root/sandbox/linux/seccomp/syscall.cc
Commit message (Expand)AuthorAgeFilesLines
* Pull seccomp-sandbox in via DEPS rather than using an in-tree copy mseaborn@chromium.org2010-09-011-380/+0
* Revert 57921 - Pull seccomp-sandbox in via DEPS rather than using an in-tree ...nsylvain@chromium.org2010-08-311-0/+380
* Pull seccomp-sandbox in via DEPS rather than using an in-tree copymseaborn@chromium.org2010-08-301-380/+0
* Added support for sigreturn() and rt_sigreturn(). On x86-32, this ismarkus@chromium.org2010-04-281-31/+81
* Make the use of signals inside of the sandbox safe.markus@chromium.org2010-04-201-5/+5
* Compute and pring the time that it takes to execute system calls. This datamarkus@chromium.org2010-03-181-7/+10
* - Add a custom allocator for STL objects. This fixes sandbox failures thatmarkus@chromium.org2010-03-081-11/+79
* - found all symbols that we directly access from assembly and marked them as ...markus@chromium.org2009-10-211-0/+1
* On Linux, move the passing of filedescriptors to a dedicated socketpair().agl@chromium.org2009-09-041-1/+1
* Initial version of the Seccomp sandbox. Imported from http://code.google.com/...markus@chromium.org2009-08-111-0/+258