OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:sandbox
(Results
301 - 325
of
851
) sorted by null
<<
11
12
13
14
15
16
17
18
19
20
>>
/external/chromium_org/sandbox/linux/services/
init_process_reaper.cc
5
#include "
sandbox
/linux/services/init_process_reaper.h"
18
namespace
sandbox
{
namespace
101
} // namespace
sandbox
.
thread_helpers.cc
5
#include "
sandbox
/linux/services/thread_helpers.h"
22
namespace
sandbox
{
namespace
84
} // namespace
sandbox
android_arm_ucontext.h
11
// We also need greg_t for the
sandbox
, include it in this header as well.
broker_process.h
15
namespace
sandbox
{
namespace
25
// 3. Enable
sandbox
.
46
//
sandbox
in the broker.
100
} // namespace
sandbox
thread_helpers.h
12
namespace
sandbox
{
namespace
/external/chromium_org/sandbox/win/src/
acl.cc
5
#include "
sandbox
/win/src/acl.h"
12
namespace
sandbox
{
namespace
124
} // namespace
sandbox
policy_engine_processor.cc
5
#include "
sandbox
/win/src/policy_engine_processor.h"
7
namespace
sandbox
{
namespace
107
} // namespace
sandbox
sid_unittest.cc
11
#include "
sandbox
/win/src/sid.h"
14
namespace
sandbox
{
namespace
71
} // namespace
sandbox
target_process.cc
5
#include "
sandbox
/win/src/target_process.h"
12
#include "
sandbox
/win/src/crosscall_server.h"
13
#include "
sandbox
/win/src/crosscall_client.h"
14
#include "
sandbox
/win/src/policy_low_level.h"
15
#include "
sandbox
/win/src/sandbox_types.h"
16
#include "
sandbox
/win/src/sharedmem_ipc_server.h"
24
sandbox
::PolicyGlobal* policy =
25
reinterpret_cast<
sandbox
::PolicyGlobal*>(dest);
29
for (size_t i = 0; i <
sandbox
::kMaxServiceCount; i++) {
33
policy->entry[i] = reinterpret_cast<
sandbox
::PolicyBuffer*>(buffer)
40
namespace
sandbox
{
namespace
[
all
...]
threadpool_unittest.cc
5
#include "
sandbox
/win/src/win2k_threadpool.h"
16
namespace
sandbox
{
namespace
94
} // namespace
sandbox
resolver.h
7
// http://dev.chromium.org/developers/design-documents/
sandbox
.
10
#include "
sandbox
/win/src/nt_internals.h"
15
namespace
sandbox
{
namespace
103
} // namespace
sandbox
/external/chromium_org/sandbox/win/tools/finder/
finder_fs.cc
5
#include "
sandbox
/win/src/restricted_token.h"
6
#include "
sandbox
/win/src/restricted_token_utils.h"
7
#include "
sandbox
/win/tools/finder/finder.h"
finder_registry.cc
5
#include "
sandbox
/win/src/restricted_token.h"
6
#include "
sandbox
/win/src/restricted_token_utils.h"
7
#include "
sandbox
/win/tools/finder/finder.h"
/external/chromium_org/content/browser/zygote_host/
zygote_host_impl_linux.cc
37
#include "
sandbox
/linux/suid/client/setuid_sandbox_client.h"
38
#include "
sandbox
/linux/suid/common/
sandbox
.h"
126
// A non empty sandbox_cmd means we want a SUID
sandbox
.
132
LOG(FATAL) << "The SUID
sandbox
helper binary is missing: "
142
scoped_ptr<
sandbox
::SetuidSandboxClient>
143
sandbox_client(
sandbox
::SetuidSandboxClient::Create());
146
LOG(FATAL) << "The SUID
sandbox
helper binary was found, but is not "
153
// Start up the
sandbox
host process and get the file descriptor for the
172
// In the SUID
sandbox
, the real zygote is forked from the sandbox
[
all
...]
/external/chromium/webkit/glue/
idb_bindings.h
18
//
sandbox
.
/external/chromium_org/chrome/browser/resources/chromeos/genius_app/
manifest.json
32
"https://www-googleapis-test.
sandbox
.google.com/*",
/external/chromium_org/components/nacl/loader/
nacl_main_platform_delegate_mac.mm
25
<< "Error initializing
sandbox
for " << switches::kNaClLoaderProcess;
/external/chromium_org/content/
OWNERS
9
# Mac
Sandbox
profiles.
/external/chromium_org/content/app/
content_main.cc
14
sandbox
::SandboxInterfaceInfo* sandbox_info,
/external/chromium_org/content/common/
font_config_ipc_linux.h
16
// of the
sandbox
. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC
process_type.cc
27
return "
Sandbox
helper";
sandbox_util.h
11
// This file contains cross-platform
sandbox
code internal to content.
/external/chromium_org/content/public/app/
content_main_delegate.h
34
// before the
sandbox
is engaged.
37
// This is where the embedder can add startup code to run after the
sandbox
51
// can allocate an IO port for it before the
sandbox
is initialized. Embedders
61
// Allows the embedder to override initializing the
sandbox
. This is needed
/external/chromium_org/sandbox/linux/seccomp-bpf/
die.cc
14
#include "
sandbox
/linux/seccomp-bpf/sandbox_bpf.h"
15
#include "
sandbox
/linux/seccomp-bpf/syscall.h"
17
namespace
sandbox
{
namespace
85
} // namespace
sandbox
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
syscall_sets.h
12
//
sandbox
that reduces the Linux kernel's attack surface. Given their
16
namespace
sandbox
{
namespace
74
// These give a lot of ambient authority and bypass the setuid
sandbox
.
103
} // namespace
sandbox
.
Completed in 383 milliseconds
<<
11
12
13
14
15
16
17
18
19
20
>>