OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
defs:sandbox
(Results
1 - 25
of
283
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/chromium_org/chrome_elf/
ntdll_cache.h
10
namespace
sandbox
{
namespace
19
extern
sandbox
::ThunkData g_nt_thunk_storage;
thunk_getter.h
8
namespace
sandbox
{
namespace
14
sandbox
::ServiceResolverThunk* GetThunk(bool relaxed);
/external/chromium_org/sandbox/linux/seccomp-bpf/
sandbox_bpf_policy.cc
5
#include "
sandbox
/linux/seccomp-bpf/sandbox_bpf_policy.h"
9
#include "
sandbox
/linux/seccomp-bpf/errorcode.h"
11
namespace
sandbox
{
namespace
17
} // namespace
sandbox
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
sigsys_handlers.h
10
#include "
sandbox
/sandbox_export.h"
14
// See
sandbox
/linux/seccomp-bpf/trap.h to see how they work.
16
namespace
sandbox
{
namespace
59
} // namespace
sandbox
.
syscall_parameters_restrictions.h
11
#include "
sandbox
/sandbox_export.h"
14
//
sandbox
that reduces the Linux kernel's attack surface. They return an
17
namespace
sandbox
{
namespace
27
RestrictCloneToThreadsAndEPERMFork(SandboxBPF*
sandbox
);
31
SANDBOX_EXPORT ErrorCode RestrictPrctl(SandboxBPF*
sandbox
);
35
SANDBOX_EXPORT ErrorCode RestrictIoctl(SandboxBPF*
sandbox
);
41
SANDBOX_EXPORT ErrorCode RestrictMmapFlags(SandboxBPF*
sandbox
);
45
SANDBOX_EXPORT ErrorCode RestrictMprotectFlags(SandboxBPF*
sandbox
);
52
SANDBOX_EXPORT ErrorCode RestrictFcntlCommands(SandboxBPF*
sandbox
);
57
SANDBOX_EXPORT ErrorCode RestrictSocketcallCommand(SandboxBPF*
sandbox
);
[
all
...]
/external/chromium_org/sandbox/linux/services/
init_process_reaper.h
9
#include "
sandbox
/sandbox_export.h"
11
namespace
sandbox
{
namespace
23
} // namespace
sandbox
.
libc_urandom_override.h
8
namespace
sandbox
{
namespace
12
} // namespace
sandbox
/external/chromium_org/sandbox/win/src/
acl.h
12
#include "
sandbox
/win/src/sid.h"
14
namespace
sandbox
{
namespace
41
} // namespace
sandbox
filesystem_interception.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
51
} // namespace
sandbox
handle_interception.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
21
} // namespace
sandbox
interceptors_64.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
173
} // namespace
sandbox
policy_broker.h
8
#include "
sandbox
/win/src/interception.h"
10
namespace
sandbox
{
namespace
21
} // namespace
sandbox
policy_target.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
43
} // namespace
sandbox
process_mitigations.h
11
#include "
sandbox
/win/src/security_level.h"
13
namespace
sandbox
{
namespace
23
// Converts
sandbox
flags to the PROC_THREAD_ATTRIBUTE_SECURITY_CAPABILITIES
41
} // namespace
sandbox
process_mitigations_win32k_policy.cc
5
#include "
sandbox
/win/src/process_mitigations_win32k_policy.h"
7
namespace
sandbox
{
namespace
23
} // namespace
sandbox
registry_interception.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
36
} // namespace
sandbox
sandbox_utils.h
13
#include "
sandbox
/win/src/nt_internals.h"
15
namespace
sandbox
{
namespace
23
} // namespace
sandbox
sync_policy_test.h
8
#include "
sandbox
/win/tests/common/controller.h"
10
namespace
sandbox
{
namespace
16
} // namespace
sandbox
target_interceptions.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
33
} // namespace
sandbox
window.h
12
#include "
sandbox
/win/src/sandbox_types.h"
14
namespace
sandbox
{
namespace
38
} // namespace
sandbox
/external/chromium_org/sandbox/win/tests/validation_tests/
commands.h
12
namespace
sandbox
{
namespace
46
} // namespace
sandbox
/external/chromium_org/content/browser/
bootstrap_sandbox_mac.h
8
namespace
sandbox
{
namespace
14
// Whether or not the bootstrap
sandbox
should be enabled.
19
// On the first call to this function, the
sandbox
will be created and all
21
sandbox
::BootstrapSandbox* GetBootstrapSandbox();
/external/chromium_org/content/common/sandbox_linux/
sandbox_seccomp_bpf_linux.h
13
namespace
sandbox
{
namespace
19
// This class has two main sets of APIs. One can be used to start the
sandbox
24
// This is the API to enable a seccomp-bpf
sandbox
for content/
26
// Is the
sandbox
globally enabled, can anything use it at all ?
27
// This looks at global command line flags to see if the
sandbox
30
// Should the
sandbox
be enabled for process_type ?
32
// Check if the kernel supports this
sandbox
. It's useful to "prewarm"
35
// Start the
sandbox
and apply the policy for process_type, depending on
39
// This is the API to enable a seccomp-bpf
sandbox
by using an
42
scoped_ptr<
sandbox
::SandboxBPFPolicy> policy)
[
all
...]
/external/chromium_org/content/common/
sandbox_win.h
9
#include "
sandbox
/win/src/security_level.h"
15
namespace
sandbox
{
namespace
23
// Wrapper around
sandbox
::TargetPolicy::SetJobLevel that checks if the
sandbox
26
sandbox
::JobLevel job_level,
28
sandbox
::TargetPolicy* policy);
31
void AddBaseHandleClosePolicy(
sandbox
::TargetPolicy* policy);
33
bool InitBrokerServices(
sandbox
::BrokerServices* broker_services);
35
bool InitTargetServices(
sandbox
::TargetServices* target_services);
/external/chromium_org/content/public/app/
startup_helper_win.h
12
namespace
sandbox
{
namespace
22
// Initializes the
sandbox
code and turns on DEP. Note: This function
24
//
sandbox
library); it will not work correctly if it is exported from a
26
void InitializeSandboxInfo(
sandbox
::SandboxInterfaceInfo* sandbox_info);
Completed in 437 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>