HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 301 - 325 of 851) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/linux/services/
init_process_reaper.cc 5 #include "sandbox/linux/services/init_process_reaper.h"
18 namespace sandbox { namespace
101 } // namespace sandbox.
thread_helpers.cc 5 #include "sandbox/linux/services/thread_helpers.h"
22 namespace sandbox { namespace
84 } // namespace sandbox
android_arm_ucontext.h 11 // We also need greg_t for the sandbox, include it in this header as well.
broker_process.h 15 namespace sandbox { namespace
25 // 3. Enable sandbox.
46 // sandbox in the broker.
100 } // namespace sandbox
thread_helpers.h 12 namespace sandbox { namespace
  /external/chromium_org/sandbox/win/src/
acl.cc 5 #include "sandbox/win/src/acl.h"
12 namespace sandbox { namespace
124 } // namespace sandbox
policy_engine_processor.cc 5 #include "sandbox/win/src/policy_engine_processor.h"
7 namespace sandbox { namespace
107 } // namespace sandbox
sid_unittest.cc 11 #include "sandbox/win/src/sid.h"
14 namespace sandbox { namespace
71 } // namespace sandbox
target_process.cc 5 #include "sandbox/win/src/target_process.h"
12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/crosscall_client.h"
14 #include "sandbox/win/src/policy_low_level.h"
15 #include "sandbox/win/src/sandbox_types.h"
16 #include "sandbox/win/src/sharedmem_ipc_server.h"
24 sandbox::PolicyGlobal* policy =
25 reinterpret_cast<sandbox::PolicyGlobal*>(dest);
29 for (size_t i = 0; i < sandbox::kMaxServiceCount; i++) {
33 policy->entry[i] = reinterpret_cast<sandbox::PolicyBuffer*>(buffer)
40 namespace sandbox { namespace
    [all...]
threadpool_unittest.cc 5 #include "sandbox/win/src/win2k_threadpool.h"
16 namespace sandbox { namespace
94 } // namespace sandbox
resolver.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
10 #include "sandbox/win/src/nt_internals.h"
15 namespace sandbox { namespace
103 } // namespace sandbox
  /external/chromium_org/sandbox/win/tools/finder/
finder_fs.cc 5 #include "sandbox/win/src/restricted_token.h"
6 #include "sandbox/win/src/restricted_token_utils.h"
7 #include "sandbox/win/tools/finder/finder.h"
finder_registry.cc 5 #include "sandbox/win/src/restricted_token.h"
6 #include "sandbox/win/src/restricted_token_utils.h"
7 #include "sandbox/win/tools/finder/finder.h"
  /external/chromium_org/content/browser/zygote_host/
zygote_host_impl_linux.cc 37 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
38 #include "sandbox/linux/suid/common/sandbox.h"
126 // A non empty sandbox_cmd means we want a SUID sandbox.
132 LOG(FATAL) << "The SUID sandbox helper binary is missing: "
142 scoped_ptr<sandbox::SetuidSandboxClient>
143 sandbox_client(sandbox::SetuidSandboxClient::Create());
146 LOG(FATAL) << "The SUID sandbox helper binary was found, but is not "
153 // Start up the sandbox host process and get the file descriptor for the
172 // In the SUID sandbox, the real zygote is forked from the sandbox
    [all...]
  /external/chromium/webkit/glue/
idb_bindings.h 18 // sandbox.
  /external/chromium_org/chrome/browser/resources/chromeos/genius_app/
manifest.json 32 "https://www-googleapis-test.sandbox.google.com/*",
  /external/chromium_org/components/nacl/loader/
nacl_main_platform_delegate_mac.mm 25 << "Error initializing sandbox for " << switches::kNaClLoaderProcess;
  /external/chromium_org/content/
OWNERS 9 # Mac Sandbox profiles.
  /external/chromium_org/content/app/
content_main.cc 14 sandbox::SandboxInterfaceInfo* sandbox_info,
  /external/chromium_org/content/common/
font_config_ipc_linux.h 16 // of the sandbox. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC
process_type.cc 27 return "Sandbox helper";
sandbox_util.h 11 // This file contains cross-platform sandbox code internal to content.
  /external/chromium_org/content/public/app/
content_main_delegate.h 34 // before the sandbox is engaged.
37 // This is where the embedder can add startup code to run after the sandbox
51 // can allocate an IO port for it before the sandbox is initialized. Embedders
61 // Allows the embedder to override initializing the sandbox. This is needed
  /external/chromium_org/sandbox/linux/seccomp-bpf/
die.cc 14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
15 #include "sandbox/linux/seccomp-bpf/syscall.h"
17 namespace sandbox { namespace
85 } // namespace sandbox
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
syscall_sets.h 12 // sandbox that reduces the Linux kernel's attack surface. Given their
16 namespace sandbox { namespace
74 // These give a lot of ambient authority and bypass the setuid sandbox.
103 } // namespace sandbox.

Completed in 383 milliseconds

<<11121314151617181920>>