HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 51 - 75 of 851) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/chromium/chrome/common/
sandbox_policy.h 14 namespace sandbox { namespace
18 void InitBrokerServices(sandbox::BrokerServices* broker_services);
25 } // namespace sandbox
  /external/chromium_org/content/common/sandbox_linux/
sandbox_init_linux.cc 9 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
13 bool InitializeSandbox(scoped_ptr<sandbox::SandboxBPFPolicy> policy) {
17 scoped_ptr<sandbox::SandboxBPFPolicy> GetBPFSandboxBaselinePolicy() {
  /external/chromium_org/sandbox/linux/services/
linux_syscalls.h 13 #include "sandbox/linux/services/x86_64_linux_syscalls.h"
17 #include "sandbox/linux/services/x86_32_linux_syscalls.h"
21 #include "sandbox/linux/services/arm_linux_syscalls.h"
  /external/chromium_org/sandbox/win/src/
policy_broker.cc 7 #include "sandbox/win/src/policy_broker.h"
12 #include "sandbox/win/src/interception.h"
13 #include "sandbox/win/src/interceptors.h"
14 #include "sandbox/win/src/policy_target.h"
15 #include "sandbox/win/src/process_thread_interception.h"
16 #include "sandbox/win/src/sandbox.h"
17 #include "sandbox/win/src/sandbox_nt_types.h"
18 #include "sandbox/win/src/sandbox_types.h"
19 #include "sandbox/win/src/target_process.h
24 namespace sandbox { namespace
    [all...]
policy_broker.h 8 #include "sandbox/win/src/interception.h"
10 namespace sandbox { namespace
21 } // namespace sandbox
sandbox_utils.h 13 #include "sandbox/win/src/nt_internals.h"
15 namespace sandbox { namespace
26 } // namespace sandbox
sid.cc 5 #include "sandbox/win/src/sid.h"
9 namespace sandbox { namespace
26 } // namespace sandbox
eat_resolver.h 9 #include "sandbox/win/src/nt_internals.h"
10 #include "sandbox/win/src/resolver.h"
12 namespace sandbox { namespace
45 } // namespace sandbox
handle_closer_agent.h 10 #include "sandbox/win/src/handle_closer.h"
11 #include "sandbox/win/src/sandbox_types.h"
13 namespace sandbox { namespace
35 } // namespace sandbox
handle_dispatcher.h 9 #include "sandbox/win/src/crosscall_server.h"
10 #include "sandbox/win/src/sandbox_policy_base.h"
12 namespace sandbox { namespace
34 } // namespace sandbox
named_pipe_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
36 } // namespace sandbox
registry_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
38 } // namespace sandbox
registry_interception.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
36 } // namespace sandbox
sync_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
36 } // namespace sandbox
sync_interception.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
44 } // namespace sandbox
registry_policy.h 12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/nt_internals.h"
14 #include "sandbox/win/src/policy_low_level.h"
15 #include "sandbox/win/src/sandbox_policy.h"
17 namespace sandbox { namespace
56 } // namespace sandbox
sync_policy.h 12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/nt_internals.h"
14 #include "sandbox/win/src/policy_low_level.h"
15 #include "sandbox/win/src/sandbox_policy.h"
17 namespace sandbox { namespace
49 } // namespace sandbox
  /external/chromium_org/sandbox/win/tests/integration_tests/
integration_tests.cc 6 #include "sandbox/win/tests/common/controller.h"
11 0 == _wcsicmp(argv[1], L"-child-no-sandbox"))
13 return sandbox::DispatchCall(argc, argv);
  /external/chromium_org/chrome/nacl/
DEPS 8 "+sandbox/win/src",
  /external/chromium_org/chrome/test/security_tests/
security_tests.gyp 14 '../../../sandbox/win/tests/validation_tests/commands.cc',
15 '../../../sandbox/win/tests/validation_tests/commands.h',
  /external/chromium_org/content/app/
startup_helper_win.cc 13 #include "sandbox/win/src/process_mitigations.h"
14 #include "sandbox/win/src/sandbox_factory.h"
38 void InitializeSandboxInfo(sandbox::SandboxInterfaceInfo* info) {
39 info->broker_services = sandbox::SandboxFactory::GetBrokerServices();
41 info->target_services = sandbox::SandboxFactory::GetTargetServices();
44 sandbox::ApplyProcessMitigationsToCurrentProcess(
45 sandbox::MITIGATION_DEP |
46 sandbox::MITIGATION_DEP_NO_ATL_THUNK);
  /external/chromium_org/content/public/common/
sandboxed_process_launcher_delegate.h 14 namespace sandbox { namespace
21 // BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy,
29 // |in_sandbox| to false if this process should be launched without a sandbox
33 // Called before the default sandbox is applied. If the default policy is too
36 //directory through the sandbox.
41 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
sandbox_init.h 19 namespace sandbox { namespace
29 // Initialize the sandbox for renderer, gpu, utility, worker, nacl, and plug-in
33 // Returns true if the sandbox was initialized succesfully, false if an error
37 sandbox::SandboxInterfaceInfo* sandbox_info);
40 // that works inside the sandbox and can send handles but not retrieve
49 // Inform the current process's sandbox broker (e.g. the broker for
50 // 32-bit processes) about a process created under a different sandbox
66 // Initialize the sandbox of the given |sandbox_type|, optionally specifying a
68 // supported by the sandbox profile associated with the given |sandbox_type|.
75 // sandbox::SANDBOX_PROCESS_TYPE_AFTER_LAST_TYPE
    [all...]
  /external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/
append-child.html 5 <div id="sandbox" style="display:none"></div>
7 var sandbox = document.getElementById('sandbox');
37 sandbox.innerHTML = '';
39 observer.observe(sandbox, {childList: true});
42 sandbox.appendChild(elems[i]);
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
baseline_policy.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
14 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
15 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
16 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
17 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
18 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
19 #include "sandbox/linux/services/linux_syscalls.h"
24 namespace sandbox { namespace
84 ErrorCode EvaluateSyscallImpl(int fs_denied_errno, SandboxBPF* sandbox,
94 return sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, AF_UNIX
    [all...]

Completed in 654 milliseconds

1 23 4 5 6 7 8 91011>>