OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
defs:sandbox
(Results
51 - 75
of
240
) sorted by null
1
2
3
4
5
6
7
8
9
10
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
baseline_policy.h
8
#include "
sandbox
/linux/seccomp-bpf/errorcode.h"
9
#include "
sandbox
/linux/seccomp-bpf/sandbox_bpf_policy.h"
11
namespace
sandbox
{
namespace
16
// This is a helper to build seccomp-bpf policies, i.e. policies for a
sandbox
41
} // namespace
sandbox
.
/external/chromium_org/sandbox/win/src/
app_container_unittest.cc
6
#include "
sandbox
/win/src/app_container.h"
9
namespace
sandbox
{
namespace
58
} // namespace
sandbox
eat_resolver.cc
5
#include "
sandbox
/win/src/eat_resolver.h"
8
#include "
sandbox
/win/src/sandbox_nt_util.h"
10
namespace
sandbox
{
namespace
91
} // namespace
sandbox
handle_interception.cc
5
#include "
sandbox
/win/src/handle_interception.h"
7
#include "
sandbox
/win/src/crosscall_client.h"
8
#include "
sandbox
/win/src/ipc_tags.h"
9
#include "
sandbox
/win/src/sandbox_factory.h"
10
#include "
sandbox
/win/src/sandbox_nt_util.h"
11
#include "
sandbox
/win/src/sharedmem_ipc_client.h"
12
#include "
sandbox
/win/src/target_services.h"
14
namespace
sandbox
{
namespace
44
} // namespace
sandbox
ipc_ping_test.cc
6
#include "
sandbox
/win/src/
sandbox
.h"
7
#include "
sandbox
/win/src/sandbox_factory.h"
8
#include "
sandbox
/win/src/target_services.h"
9
#include "
sandbox
/win/tests/common/controller.h"
11
namespace
sandbox
{
namespace
58
} // namespace
sandbox
named_pipe_policy.cc
5
#include "
sandbox
/win/src/named_pipe_policy.h"
9
#include "
sandbox
/win/src/ipc_tags.h"
10
#include "
sandbox
/win/src/policy_engine_opcodes.h"
11
#include "
sandbox
/win/src/policy_params.h"
12
#include "
sandbox
/win/src/sandbox_types.h"
43
namespace
sandbox
{
namespace
86
} // namespace
sandbox
policy_params.h
8
#include "
sandbox
/win/src/policy_engine_params.h"
10
namespace
sandbox
{
namespace
19
typedef
sandbox
::ParameterSet type##Array [type::PolParamLast];
64
} // namespace
sandbox
restricted_token_utils.h
11
#include "
sandbox
/win/src/restricted_token.h"
12
#include "
sandbox
/win/src/security_level.h"
17
namespace
sandbox
{
namespace
81
} // namespace
sandbox
sandbox.cc
7
#include "
sandbox
/win/src/
sandbox
.h"
8
#include "
sandbox
/win/src/sandbox_factory.h"
9
#include "
sandbox
/win/src/broker_services.h"
10
#include "
sandbox
/win/src/target_services.h"
12
namespace
sandbox
{
namespace
44
} // namespace
sandbox
sid.cc
5
#include "
sandbox
/win/src/sid.h"
9
namespace
sandbox
{
namespace
26
} // namespace
sandbox
target_services.h
9
#include "
sandbox
/win/src/
sandbox
.h"
10
#include "
sandbox
/win/src/win_utils.h"
12
namespace
sandbox
{
namespace
38
// Look in the documentation of
sandbox
::TargetServices for more info.
69
} // namespace
sandbox
Wow64.h
11
#include "
sandbox
/win/src/sandbox_types.h"
13
namespace
sandbox
{
namespace
48
} // namespace
sandbox
app_container.h
14
#include "
sandbox
/win/src/sandbox_types.h"
22
namespace
sandbox
{
namespace
66
} // namespace
sandbox
eat_resolver.h
9
#include "
sandbox
/win/src/nt_internals.h"
10
#include "
sandbox
/win/src/resolver.h"
12
namespace
sandbox
{
namespace
45
} // namespace
sandbox
filesystem_dispatcher.h
10
#include "
sandbox
/win/src/crosscall_server.h"
11
#include "
sandbox
/win/src/sandbox_policy_base.h"
13
namespace
sandbox
{
namespace
58
} // namespace
sandbox
handle_dispatcher.h
9
#include "
sandbox
/win/src/crosscall_server.h"
10
#include "
sandbox
/win/src/sandbox_policy_base.h"
12
namespace
sandbox
{
namespace
34
} // namespace
sandbox
handle_policy.cc
5
#include "
sandbox
/win/src/handle_policy.h"
10
#include "
sandbox
/win/src/broker_services.h"
11
#include "
sandbox
/win/src/ipc_tags.h"
12
#include "
sandbox
/win/src/policy_engine_opcodes.h"
13
#include "
sandbox
/win/src/policy_params.h"
14
#include "
sandbox
/win/src/sandbox_types.h"
15
#include "
sandbox
/win/src/sandbox_utils.h"
17
namespace
sandbox
{
namespace
93
} // namespace
sandbox
integrity_level_test.cc
10
#include "
sandbox
/win/src/
sandbox
.h"
11
#include "
sandbox
/win/src/sandbox_policy.h"
12
#include "
sandbox
/win/src/sandbox_factory.h"
13
#include "
sandbox
/win/tests/common/controller.h"
15
namespace
sandbox
{
namespace
90
} // namespace
sandbox
/external/chromium_org/sandbox/win/wow_helper/
target_code.cc
5
#include "
sandbox
/win/wow_helper/target_code.h"
7
namespace
sandbox
{
namespace
34
} // namespace
sandbox
/external/chromium_org/chrome/app/
client_util.h
15
namespace
sandbox
{
namespace
39
int Launch(HINSTANCE instance,
sandbox
::SandboxInterfaceInfo* sbox_info);
/external/chromium_org/content/common/sandbox_linux/
bpf_gpu_policy_linux.h
13
namespace
sandbox
{
namespace
30
// Start a broker process to handle open() inside the
sandbox
.
32
//
sandbox
for the broker process itself.
41
sandbox
::BrokerProcess* broker_process() { return broker_process_; }
44
// A BrokerProcess is a helper that is started before the
sandbox
is engaged
46
// this runs from a SIGSYS handler triggered by the seccomp-bpf
sandbox
.
47
// This should never be destroyed, as after the
sandbox
is started it is
50
// which executes iff the
sandbox
is going to be enabled afterwards.
51
sandbox
::BrokerProcess* broker_process_;
/external/chromium_org/content/public/app/
content_main_runner.h
16
namespace
sandbox
{
namespace
38
sandbox
::SandboxInterfaceInfo* sandbox_info,
/external/chromium_org/sandbox/linux/seccomp-bpf/
syscall_iterator.cc
5
#include "
sandbox
/linux/seccomp-bpf/syscall_iterator.h"
8
#include "
sandbox
/linux/seccomp-bpf/linux_seccomp.h"
10
namespace
sandbox
{
namespace
92
} // namespace
sandbox
syscall_iterator.h
12
namespace
sandbox
{
namespace
53
} // namespace
sandbox
/external/chromium_org/sandbox/linux/suid/client/
setuid_sandbox_client.h
13
namespace
sandbox
{
namespace
15
// Helper class to use the setuid
sandbox
. This class is to be used both
21
// 2. The browser launches a renderer through the setuid
sandbox
.
30
// Ask the setuid helper over the setuid
sandbox
IPC channel to chroot() us
36
// See
sandbox
/linux/services/init_process_reaper.h for more information
62
} // namespace
sandbox
Completed in 377 milliseconds
1
2
3
4
5
6
7
8
9
10