summaryrefslogtreecommitdiffstats
path: root/sandbox/linux/seccomp
Commit message (Expand)AuthorAgeFilesLines
* linux: make the seccomp sandbox work againevan@chromium.org2010-01-081-12/+54
* Allow the seccomp sandbox to be enabled, even if the suid sandbox hasmarkus@chromium.org2009-11-0720-103/+141
* Only enable the seccomp sandbox, if the machine actually has kernel support formarkus@chromium.org2009-11-043-1/+66
* GCC's optimizer is getting more aggressive. It is no longer goodmarkus@chromium.org2009-10-223-7/+14
* - found all symbols that we directly access from assembly and marked them as ...markus@chromium.org2009-10-2113-486/+210
* Fix minor compilation issues that can trigger on some platforms (e.g. CentOS)markus@chromium.org2009-09-142-2/+2
* Despite the futex(2) manual page telling us to include <linux/futex.h>, thismarkus@chromium.org2009-09-142-1/+59
* On Linux, move the passing of filedescriptors to a dedicated socketpair().agl@chromium.org2009-09-041-1/+1
* Linux: fix seccomp sandbox for GCC 4.4agl@chromium.org2009-08-131-2/+4
* Fix seccomp sandbox for gcc44markus@chromium.org2009-08-122-2/+2
* Initial version of the Seccomp sandbox. Imported from http://code.google.com/...markus@chromium.org2009-08-1136-0/+11365