OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
defs:sandbox
(Results
26 - 50
of
283
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/chromium_org/content/public/common/
sandbox_init.h
18
namespace
sandbox
{
namespace
28
// Initialize the
sandbox
for renderer, gpu, utility, worker, nacl, and plug-in
32
// Returns true if the
sandbox
was initialized succesfully, false if an error
36
sandbox
::SandboxInterfaceInfo* sandbox_info);
39
// that works inside the
sandbox
and can send handles but not retrieve
48
// Inform the current process's
sandbox
broker (e.g. the broker for
49
// 32-bit processes) about a process created under a different
sandbox
65
// Initialize the
sandbox
of the given |sandbox_type|, optionally specifying a
67
// supported by the
sandbox
profile associated with the given |sandbox_type|.
74
//
sandbox
::SANDBOX_PROCESS_TYPE_AFTER_LAST_TYPE
[
all
...]
/external/chromium_org/sandbox/linux/seccomp-bpf/
basicblock.cc
5
#include "
sandbox
/linux/seccomp-bpf/basicblock.h"
7
namespace
sandbox
{
namespace
13
} // namespace
sandbox
errorcode.cc
5
#include "
sandbox
/linux/seccomp-bpf/die.h"
6
#include "
sandbox
/linux/seccomp-bpf/errorcode.h"
8
namespace
sandbox
{
namespace
52
SANDBOX_DIE("Invalid opcode in BPF
sandbox
rules");
109
} // namespace
sandbox
syscall.h
11
#include "
sandbox
/sandbox_export.h"
13
namespace
sandbox
{
namespace
87
} // namespace
sandbox
syscall_iterator_unittest.cc
5
#include "
sandbox
/linux/seccomp-bpf/sandbox_bpf.h"
6
#include "
sandbox
/linux/seccomp-bpf/syscall_iterator.h"
7
#include "
sandbox
/linux/tests/unit_tests.h"
9
namespace
sandbox
{
namespace
136
} // namespace
sandbox
verifier.h
13
namespace
sandbox
{
namespace
26
static bool VerifyBPF(SandboxBPF*
sandbox
,
37
// is used for purposes other than verifying the output of the
sandbox
's
47
} // namespace
sandbox
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
syscall_sets.h
10
#include "
sandbox
/sandbox_export.h"
13
//
sandbox
that reduces the Linux kernel's attack surface. Given their
17
namespace
sandbox
{
namespace
75
// These give a lot of ambient authority and bypass the setuid
sandbox
.
104
} // namespace
sandbox
.
/external/chromium_org/sandbox/linux/services/
credentials.h
18
#include "
sandbox
/sandbox_export.h"
20
namespace
sandbox
{
namespace
90
} // namespace
sandbox
.
thread_helpers.h
9
#include "
sandbox
/sandbox_export.h"
13
namespace
sandbox
{
namespace
34
} // namespace
sandbox
/external/chromium_org/sandbox/linux/tests/
sandbox_test_runner.h
10
namespace
sandbox
{
namespace
28
} // namespace
sandbox
test_utils.cc
5
#include "
sandbox
/linux/tests/test_utils.h"
17
namespace
sandbox
{
namespace
31
} // namespace
sandbox
test_utils.h
10
namespace
sandbox
{
namespace
21
} // namespace
sandbox
/external/chromium_org/sandbox/mac/
policy_unittest.cc
5
#include "
sandbox
/mac/policy.h"
9
namespace
sandbox
{
namespace
98
} // namespace
sandbox
/external/chromium_org/sandbox/win/src/
Wow64_64.cc
7
#include "
sandbox
/win/src/wow64.h"
9
namespace
sandbox
{
namespace
18
} // namespace
sandbox
filesystem_policy.h
12
#include "
sandbox
/win/src/crosscall_server.h"
13
#include "
sandbox
/win/src/nt_internals.h"
14
#include "
sandbox
/win/src/policy_low_level.h"
15
#include "
sandbox
/win/src/sandbox_policy.h"
17
namespace
sandbox
{
namespace
106
} // namespace
sandbox
handle_closer_agent.h
10
#include "
sandbox
/win/src/handle_closer.h"
11
#include "
sandbox
/win/src/sandbox_types.h"
13
namespace
sandbox
{
namespace
35
} // namespace
sandbox
handle_policy.h
11
#include "
sandbox
/win/src/crosscall_server.h"
12
#include "
sandbox
/win/src/policy_low_level.h"
13
#include "
sandbox
/win/src/sandbox_policy.h"
15
namespace
sandbox
{
namespace
37
} // namespace
sandbox
job.h
9
#include "
sandbox
/win/src/restricted_token_utils.h"
11
namespace
sandbox
{
namespace
62
} // namespace
sandbox
named_pipe_interception.h
5
#include "
sandbox
/win/src/nt_internals.h"
6
#include "
sandbox
/win/src/sandbox_types.h"
11
namespace
sandbox
{
namespace
34
} // namespace
sandbox
named_pipe_policy.h
12
#include "
sandbox
/win/src/crosscall_server.h"
13
#include "
sandbox
/win/src/policy_low_level.h"
14
#include "
sandbox
/win/src/sandbox_policy.h"
16
namespace
sandbox
{
namespace
43
} // namespace
sandbox
process_mitigations_win32k_dispatcher.cc
5
#include "
sandbox
/win/src/process_mitigations_win32k_dispatcher.h"
6
#include "
sandbox
/win/src/interception.h"
7
#include "
sandbox
/win/src/interceptors.h"
8
#include "
sandbox
/win/src/ipc_tags.h"
9
#include "
sandbox
/win/src/process_mitigations_win32k_interception.h"
11
namespace
sandbox
{
namespace
21
sandbox
::MITIGATION_WIN32K_DISABLE)) {
56
} // namespace
sandbox
process_mitigations_win32k_interception.cc
5
#include "
sandbox
/win/src/process_mitigations_win32k_interception.h"
7
namespace
sandbox
{
namespace
28
} // namespace
sandbox
process_mitigations_win32k_policy.h
9
#include "
sandbox
/win/src/crosscall_server.h"
10
#include "
sandbox
/win/src/policy_low_level.h"
11
#include "
sandbox
/win/src/sandbox_policy.h"
13
namespace
sandbox
{
namespace
31
} // namespace
sandbox
process_thread_policy.h
10
#include "
sandbox
/win/src/policy_low_level.h"
14
#include "
sandbox
/win/src/crosscall_server.h"
15
#include "
sandbox
/win/src/sandbox_policy.h"
17
namespace
sandbox
{
namespace
80
} // namespace
sandbox
registry_policy.h
12
#include "
sandbox
/win/src/crosscall_server.h"
13
#include "
sandbox
/win/src/nt_internals.h"
14
#include "
sandbox
/win/src/policy_low_level.h"
15
#include "
sandbox
/win/src/sandbox_policy.h"
17
namespace
sandbox
{
namespace
56
} // namespace
sandbox
Completed in 409 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>