summaryrefslogtreecommitdiffstats
path: root/sandbox/linux/seccomp/trusted_thread.cc
Commit message (Expand)AuthorAgeFilesLines
* Pull seccomp-sandbox in via DEPS rather than using an in-tree copy mseaborn@chromium.org2010-09-011-1483/+0
* Revert 57921 - Pull seccomp-sandbox in via DEPS rather than using an in-tree ...nsylvain@chromium.org2010-08-311-0/+1483
* Pull seccomp-sandbox in via DEPS rather than using an in-tree copymseaborn@chromium.org2010-08-301-1483/+0
* Add support for calling {rt_,}sigaction(), and for invoking signal handlersmarkus@chromium.org2010-05-181-0/+2
* Prevent FPU state corruption by directly creating the signal frame on themarkus@chromium.org2010-05-111-27/+17
* Make the use of signals inside of the sandbox safe.markus@chromium.org2010-04-201-285/+519
* Compute and pring the time that it takes to execute system calls. This datamarkus@chromium.org2010-03-181-0/+4
* - Add a custom allocator for STL objects. This fixes sandbox failures thatmarkus@chromium.org2010-03-081-112/+158
* GCC's optimizer is getting more aggressive. It is no longer goodmarkus@chromium.org2009-10-221-2/+2
* Fix minor compilation issues that can trigger on some platforms (e.g. CentOS)markus@chromium.org2009-09-141-1/+1
* Initial version of the Seccomp sandbox. Imported from http://code.google.com/...markus@chromium.org2009-08-111-0/+1207