HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 51 - 75 of 240) sorted by null

1 23 4 5 6 7 8 910

  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
baseline_policy.h 8 #include "sandbox/linux/seccomp-bpf/errorcode.h"
9 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
11 namespace sandbox { namespace
16 // This is a helper to build seccomp-bpf policies, i.e. policies for a sandbox
41 } // namespace sandbox.
  /external/chromium_org/sandbox/win/src/
app_container_unittest.cc 6 #include "sandbox/win/src/app_container.h"
9 namespace sandbox { namespace
58 } // namespace sandbox
eat_resolver.cc 5 #include "sandbox/win/src/eat_resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
10 namespace sandbox { namespace
91 } // namespace sandbox
handle_interception.cc 5 #include "sandbox/win/src/handle_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/sandbox_nt_util.h"
11 #include "sandbox/win/src/sharedmem_ipc_client.h"
12 #include "sandbox/win/src/target_services.h"
14 namespace sandbox { namespace
44 } // namespace sandbox
ipc_ping_test.cc 6 #include "sandbox/win/src/sandbox.h"
7 #include "sandbox/win/src/sandbox_factory.h"
8 #include "sandbox/win/src/target_services.h"
9 #include "sandbox/win/tests/common/controller.h"
11 namespace sandbox { namespace
58 } // namespace sandbox
named_pipe_policy.cc 5 #include "sandbox/win/src/named_pipe_policy.h"
9 #include "sandbox/win/src/ipc_tags.h"
10 #include "sandbox/win/src/policy_engine_opcodes.h"
11 #include "sandbox/win/src/policy_params.h"
12 #include "sandbox/win/src/sandbox_types.h"
43 namespace sandbox { namespace
86 } // namespace sandbox
policy_params.h 8 #include "sandbox/win/src/policy_engine_params.h"
10 namespace sandbox { namespace
19 typedef sandbox::ParameterSet type##Array [type::PolParamLast];
64 } // namespace sandbox
restricted_token_utils.h 11 #include "sandbox/win/src/restricted_token.h"
12 #include "sandbox/win/src/security_level.h"
17 namespace sandbox { namespace
81 } // namespace sandbox
sandbox.cc 7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/broker_services.h"
10 #include "sandbox/win/src/target_services.h"
12 namespace sandbox { namespace
44 } // namespace sandbox
sid.cc 5 #include "sandbox/win/src/sid.h"
9 namespace sandbox { namespace
26 } // namespace sandbox
target_services.h 9 #include "sandbox/win/src/sandbox.h"
10 #include "sandbox/win/src/win_utils.h"
12 namespace sandbox { namespace
38 // Look in the documentation of sandbox::TargetServices for more info.
69 } // namespace sandbox
Wow64.h 11 #include "sandbox/win/src/sandbox_types.h"
13 namespace sandbox { namespace
48 } // namespace sandbox
app_container.h 14 #include "sandbox/win/src/sandbox_types.h"
22 namespace sandbox { namespace
66 } // namespace sandbox
eat_resolver.h 9 #include "sandbox/win/src/nt_internals.h"
10 #include "sandbox/win/src/resolver.h"
12 namespace sandbox { namespace
45 } // namespace sandbox
filesystem_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
58 } // namespace sandbox
handle_dispatcher.h 9 #include "sandbox/win/src/crosscall_server.h"
10 #include "sandbox/win/src/sandbox_policy_base.h"
12 namespace sandbox { namespace
34 } // namespace sandbox
handle_policy.cc 5 #include "sandbox/win/src/handle_policy.h"
10 #include "sandbox/win/src/broker_services.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/policy_engine_opcodes.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/sandbox_utils.h"
17 namespace sandbox { namespace
93 } // namespace sandbox
integrity_level_test.cc 10 #include "sandbox/win/src/sandbox.h"
11 #include "sandbox/win/src/sandbox_policy.h"
12 #include "sandbox/win/src/sandbox_factory.h"
13 #include "sandbox/win/tests/common/controller.h"
15 namespace sandbox { namespace
90 } // namespace sandbox
  /external/chromium_org/sandbox/win/wow_helper/
target_code.cc 5 #include "sandbox/win/wow_helper/target_code.h"
7 namespace sandbox { namespace
34 } // namespace sandbox
  /external/chromium_org/chrome/app/
client_util.h 15 namespace sandbox { namespace
39 int Launch(HINSTANCE instance, sandbox::SandboxInterfaceInfo* sbox_info);
  /external/chromium_org/content/common/sandbox_linux/
bpf_gpu_policy_linux.h 13 namespace sandbox { namespace
30 // Start a broker process to handle open() inside the sandbox.
32 // sandbox for the broker process itself.
41 sandbox::BrokerProcess* broker_process() { return broker_process_; }
44 // A BrokerProcess is a helper that is started before the sandbox is engaged
46 // this runs from a SIGSYS handler triggered by the seccomp-bpf sandbox.
47 // This should never be destroyed, as after the sandbox is started it is
50 // which executes iff the sandbox is going to be enabled afterwards.
51 sandbox::BrokerProcess* broker_process_;
  /external/chromium_org/content/public/app/
content_main_runner.h 16 namespace sandbox { namespace
38 sandbox::SandboxInterfaceInfo* sandbox_info,
  /external/chromium_org/sandbox/linux/seccomp-bpf/
syscall_iterator.cc 5 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
8 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
10 namespace sandbox { namespace
92 } // namespace sandbox
syscall_iterator.h 12 namespace sandbox { namespace
53 } // namespace sandbox
  /external/chromium_org/sandbox/linux/suid/client/
setuid_sandbox_client.h 13 namespace sandbox { namespace
15 // Helper class to use the setuid sandbox. This class is to be used both
21 // 2. The browser launches a renderer through the setuid sandbox.
30 // Ask the setuid helper over the setuid sandbox IPC channel to chroot() us
36 // See sandbox/linux/services/init_process_reaper.h for more information
62 } // namespace sandbox

Completed in 377 milliseconds

1 23 4 5 6 7 8 910