/external/chromium_org/content/common/ |
sandbox_init_mac.h | 10 // Initialize the sandbox for renderer, gpu, utility, worker, and plug-in 13 // Returns true if the sandbox was initialized succesfully, false if an error
|
/external/chromium_org/sandbox/linux/services/ |
android_ucontext.h | 11 #include "sandbox/linux/services/android_arm_ucontext.h" 13 #include "sandbox/linux/services/android_i386_ucontext.h"
|
/external/chromium_org/sandbox/ |
sandbox.gyp | 21 # A 'default' to accomodate the "sandbox" target. 24 'target_name': 'sandbox',
|
/external/chromium_org/sandbox/win/sandbox_poc/pocdll/ |
pocdll.cc | 6 #include "sandbox/win/sandbox_poc/pocdll/exports.h" 7 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
|
/external/chromium_org/sandbox/win/src/ |
ipc_tags.h | 8 namespace sandbox { namespace 35 } // namespace sandbox
|
sid.h | 10 namespace sandbox { namespace 27 } // namespace sandbox
|
sync_policy.cc | 7 #include "sandbox/win/src/sync_policy.h" 10 #include "sandbox/win/src/ipc_tags.h" 11 #include "sandbox/win/src/policy_engine_opcodes.h" 12 #include "sandbox/win/src/policy_params.h" 13 #include "sandbox/win/src/sandbox_types.h" 14 #include "sandbox/win/src/sandbox_utils.h" 16 namespace sandbox { namespace 112 } // namespace sandbox
|
target_services.cc | 5 #include "sandbox/win/src/target_services.h" 10 #include "sandbox/win/src/crosscall_client.h" 11 #include "sandbox/win/src/handle_closer_agent.h" 12 #include "sandbox/win/src/handle_interception.h" 13 #include "sandbox/win/src/ipc_tags.h" 14 #include "sandbox/win/src/process_mitigations.h" 15 #include "sandbox/win/src/restricted_token_utils.h" 16 #include "sandbox/win/src/sandbox.h" 17 #include "sandbox/win/src/sandbox_types.h 61 namespace sandbox { namespace [all...] |
filesystem_dispatcher.h | 9 #include "sandbox/win/src/crosscall_server.h" 10 #include "sandbox/win/src/sandbox_policy_base.h" 12 namespace sandbox { namespace 55 } // namespace sandbox
|
filesystem_interception.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 51 } // namespace sandbox
|
policy_params.h | 8 #include "sandbox/win/src/policy_engine_params.h" 10 namespace sandbox { namespace 19 typedef sandbox::ParameterSet type##Array [type::PolParamLast]; 64 } // namespace sandbox
|
policy_target.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 43 } // namespace sandbox
|
process_mitigations.h | 11 #include "sandbox/win/src/security_level.h" 13 namespace sandbox { namespace 23 // Converts sandbox flags to the PROC_THREAD_ATTRIBUTE_SECURITY_CAPABILITIES 41 } // namespace sandbox
|
process_thread_dispatcher.h | 9 #include "sandbox/win/src/crosscall_server.h" 10 #include "sandbox/win/src/sandbox_policy_base.h" 12 namespace sandbox { namespace 45 } // namespace sandbox
|
/external/chromium_org/sandbox/win/tests/validation_tests/ |
unit_tests.cc | 6 #include "sandbox/win/tests/common/controller.h" 11 return sandbox::DispatchCall(argc, argv);
|
/external/chromium_org/sandbox/win/tools/finder/ |
main.cc | 5 #include "sandbox/win/src/restricted_token_utils.h" 6 #include "sandbox/win/tools/finder/finder.h" 32 sandbox::TokenLevel token_type = sandbox::USER_LOCKDOWN; 48 token_type = sandbox::USER_LOCKDOWN; 50 token_type = sandbox::USER_RESTRICTED; 52 token_type = sandbox::USER_LIMITED; 54 token_type = sandbox::USER_INTERACTIVE; 56 token_type = sandbox::USER_NON_ADMIN; 58 token_type = sandbox::USER_RESTRICTED_SAME_ACCESS [all...] |
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
sandbox_bpf_unittest.cc | 25 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 26 #include "sandbox/linux/seccomp-bpf/syscall.h" 27 #include "sandbox/linux/seccomp-bpf/trap.h" 28 #include "sandbox/linux/seccomp-bpf/verifier.h" 29 #include "sandbox/linux/services/broker_process.h" 30 #include "sandbox/linux/services/linux_syscalls.h" 31 #include "sandbox/linux/tests/unit_tests.h" 44 using sandbox::BrokerProcess; 57 Sandbox::SupportsSeccompSandbox(-1) == Sandbox::STATUS_AVAILABLE 101 Sandbox sandbox; local 319 Sandbox sandbox; local [all...] |
sandbox_bpf.cc | 26 #include "sandbox/linux/seccomp-bpf/codegen.h" 27 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 28 #include "sandbox/linux/seccomp-bpf/syscall.h" 29 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h" 30 #include "sandbox/linux/seccomp-bpf/verifier.h" 36 using playground2::Sandbox; 64 // We define a really simple sandbox policy. It is just good enough for us 65 // to tell that the sandbox has actually been activated. 66 ErrorCode ProbeEvaluator(Sandbox *, int sysnum, void *) __attribute__((const)); 67 ErrorCode ProbeEvaluator(Sandbox *, int sysnum, void *) 174 Sandbox *sandbox = static_cast<Sandbox *>(aux); local 402 Sandbox sandbox; local [all...] |
basicblock.cc | 5 #include "sandbox/linux/seccomp-bpf/basicblock.h"
|
/external/chromium/chrome/browser/resources/gpu_internals/ |
timeline_test.html | 30 <div id="sandbox"></div> 33 var sandbox = document.getElementById('sandbox'); 41 sandbox.appendChild(timeline);
|
/external/chromium_org/content/browser/resources/gpu/ |
timeline_test.html | 29 <div id="sandbox"></div> 32 var sandbox = document.getElementById('sandbox'); 40 sandbox.appendChild(timeline);
|
/external/chromium_org/content/public/app/ |
startup_helper_win.h | 10 namespace sandbox { namespace 20 // Initializes the sandbox code and turns on DEP. Note: This function 22 // sandbox library); it will not work correctly if it is exported from a 24 void InitializeSandboxInfo(sandbox::SandboxInterfaceInfo* sandbox_info);
|
/external/chromium_org/content/utility/ |
utility_main.cc | 17 #include "sandbox/win/src/sandbox.h" 29 // Initialize the sandbox before any thread is created. 41 sandbox::TargetServices* target_services =
|
/external/chromium_org/sandbox/win/sandbox_poc/ |
sandbox.cc | 8 #include "sandbox/win/sandbox_poc/sandbox.h" 10 #include "sandbox/win/sandbox_poc/main_ui_window.h" 11 #include "sandbox/win/src/sandbox.h" 12 #include "sandbox/win/src/sandbox_factory.h" 54 sandbox::BrokerServices* broker_service = 55 sandbox::SandboxFactory::GetBrokerServices(); 56 sandbox::ResultCode result; 59 // spawns an instance of itself (called a 'target') inside the sandbox [all...] |
sandbox.h | 8 #include "sandbox/win/sandbox_poc/resource.h"
|