HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 101 - 125 of 795) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/chromium_org/content/common/
sandbox_init_mac.h 10 // Initialize the sandbox for renderer, gpu, utility, worker, and plug-in
13 // Returns true if the sandbox was initialized succesfully, false if an error
  /external/chromium_org/sandbox/linux/services/
android_ucontext.h 11 #include "sandbox/linux/services/android_arm_ucontext.h"
13 #include "sandbox/linux/services/android_i386_ucontext.h"
  /external/chromium_org/sandbox/
sandbox.gyp 21 # A 'default' to accomodate the "sandbox" target.
24 'target_name': 'sandbox',
  /external/chromium_org/sandbox/win/sandbox_poc/pocdll/
pocdll.cc 6 #include "sandbox/win/sandbox_poc/pocdll/exports.h"
7 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
  /external/chromium_org/sandbox/win/src/
ipc_tags.h 8 namespace sandbox { namespace
35 } // namespace sandbox
sid.h 10 namespace sandbox { namespace
27 } // namespace sandbox
sync_policy.cc 7 #include "sandbox/win/src/sync_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/policy_engine_opcodes.h"
12 #include "sandbox/win/src/policy_params.h"
13 #include "sandbox/win/src/sandbox_types.h"
14 #include "sandbox/win/src/sandbox_utils.h"
16 namespace sandbox { namespace
112 } // namespace sandbox
target_services.cc 5 #include "sandbox/win/src/target_services.h"
10 #include "sandbox/win/src/crosscall_client.h"
11 #include "sandbox/win/src/handle_closer_agent.h"
12 #include "sandbox/win/src/handle_interception.h"
13 #include "sandbox/win/src/ipc_tags.h"
14 #include "sandbox/win/src/process_mitigations.h"
15 #include "sandbox/win/src/restricted_token_utils.h"
16 #include "sandbox/win/src/sandbox.h"
17 #include "sandbox/win/src/sandbox_types.h
61 namespace sandbox { namespace
    [all...]
filesystem_dispatcher.h 9 #include "sandbox/win/src/crosscall_server.h"
10 #include "sandbox/win/src/sandbox_policy_base.h"
12 namespace sandbox { namespace
55 } // namespace sandbox
filesystem_interception.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
51 } // namespace sandbox
policy_params.h 8 #include "sandbox/win/src/policy_engine_params.h"
10 namespace sandbox { namespace
19 typedef sandbox::ParameterSet type##Array [type::PolParamLast];
64 } // namespace sandbox
policy_target.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
43 } // namespace sandbox
process_mitigations.h 11 #include "sandbox/win/src/security_level.h"
13 namespace sandbox { namespace
23 // Converts sandbox flags to the PROC_THREAD_ATTRIBUTE_SECURITY_CAPABILITIES
41 } // namespace sandbox
process_thread_dispatcher.h 9 #include "sandbox/win/src/crosscall_server.h"
10 #include "sandbox/win/src/sandbox_policy_base.h"
12 namespace sandbox { namespace
45 } // namespace sandbox
  /external/chromium_org/sandbox/win/tests/validation_tests/
unit_tests.cc 6 #include "sandbox/win/tests/common/controller.h"
11 return sandbox::DispatchCall(argc, argv);
  /external/chromium_org/sandbox/win/tools/finder/
main.cc 5 #include "sandbox/win/src/restricted_token_utils.h"
6 #include "sandbox/win/tools/finder/finder.h"
32 sandbox::TokenLevel token_type = sandbox::USER_LOCKDOWN;
48 token_type = sandbox::USER_LOCKDOWN;
50 token_type = sandbox::USER_RESTRICTED;
52 token_type = sandbox::USER_LIMITED;
54 token_type = sandbox::USER_INTERACTIVE;
56 token_type = sandbox::USER_NON_ADMIN;
58 token_type = sandbox::USER_RESTRICTED_SAME_ACCESS
    [all...]
  /external/chromium_org/sandbox/linux/seccomp-bpf/
sandbox_bpf_unittest.cc 25 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
26 #include "sandbox/linux/seccomp-bpf/syscall.h"
27 #include "sandbox/linux/seccomp-bpf/trap.h"
28 #include "sandbox/linux/seccomp-bpf/verifier.h"
29 #include "sandbox/linux/services/broker_process.h"
30 #include "sandbox/linux/services/linux_syscalls.h"
31 #include "sandbox/linux/tests/unit_tests.h"
44 using sandbox::BrokerProcess;
57 Sandbox::SupportsSeccompSandbox(-1) == Sandbox::STATUS_AVAILABLE
101 Sandbox sandbox; local
319 Sandbox sandbox; local
    [all...]
sandbox_bpf.cc 26 #include "sandbox/linux/seccomp-bpf/codegen.h"
27 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
28 #include "sandbox/linux/seccomp-bpf/syscall.h"
29 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
30 #include "sandbox/linux/seccomp-bpf/verifier.h"
36 using playground2::Sandbox;
64 // We define a really simple sandbox policy. It is just good enough for us
65 // to tell that the sandbox has actually been activated.
66 ErrorCode ProbeEvaluator(Sandbox *, int sysnum, void *) __attribute__((const));
67 ErrorCode ProbeEvaluator(Sandbox *, int sysnum, void *)
174 Sandbox *sandbox = static_cast<Sandbox *>(aux); local
402 Sandbox sandbox; local
    [all...]
basicblock.cc 5 #include "sandbox/linux/seccomp-bpf/basicblock.h"
  /external/chromium/chrome/browser/resources/gpu_internals/
timeline_test.html 30 <div id="sandbox"></div>
33 var sandbox = document.getElementById('sandbox');
41 sandbox.appendChild(timeline);
  /external/chromium_org/content/browser/resources/gpu/
timeline_test.html 29 <div id="sandbox"></div>
32 var sandbox = document.getElementById('sandbox');
40 sandbox.appendChild(timeline);
  /external/chromium_org/content/public/app/
startup_helper_win.h 10 namespace sandbox { namespace
20 // Initializes the sandbox code and turns on DEP. Note: This function
22 // sandbox library); it will not work correctly if it is exported from a
24 void InitializeSandboxInfo(sandbox::SandboxInterfaceInfo* sandbox_info);
  /external/chromium_org/content/utility/
utility_main.cc 17 #include "sandbox/win/src/sandbox.h"
29 // Initialize the sandbox before any thread is created.
41 sandbox::TargetServices* target_services =
  /external/chromium_org/sandbox/win/sandbox_poc/
sandbox.cc 8 #include "sandbox/win/sandbox_poc/sandbox.h"
10 #include "sandbox/win/sandbox_poc/main_ui_window.h"
11 #include "sandbox/win/src/sandbox.h"
12 #include "sandbox/win/src/sandbox_factory.h"
54 sandbox::BrokerServices* broker_service =
55 sandbox::SandboxFactory::GetBrokerServices();
56 sandbox::ResultCode result;
59 // spawns an instance of itself (called a 'target') inside the sandbox
    [all...]
sandbox.h 8 #include "sandbox/win/sandbox_poc/resource.h"

Completed in 654 milliseconds

1 2 3 45 6 7 8 91011>>