HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 26 - 50 of 283) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/chromium_org/content/public/common/
sandbox_init.h 18 namespace sandbox { namespace
28 // Initialize the sandbox for renderer, gpu, utility, worker, nacl, and plug-in
32 // Returns true if the sandbox was initialized succesfully, false if an error
36 sandbox::SandboxInterfaceInfo* sandbox_info);
39 // that works inside the sandbox and can send handles but not retrieve
48 // Inform the current process's sandbox broker (e.g. the broker for
49 // 32-bit processes) about a process created under a different sandbox
65 // Initialize the sandbox of the given |sandbox_type|, optionally specifying a
67 // supported by the sandbox profile associated with the given |sandbox_type|.
74 // sandbox::SANDBOX_PROCESS_TYPE_AFTER_LAST_TYPE
    [all...]
  /external/chromium_org/sandbox/linux/seccomp-bpf/
basicblock.cc 5 #include "sandbox/linux/seccomp-bpf/basicblock.h"
7 namespace sandbox { namespace
13 } // namespace sandbox
errorcode.cc 5 #include "sandbox/linux/seccomp-bpf/die.h"
6 #include "sandbox/linux/seccomp-bpf/errorcode.h"
8 namespace sandbox { namespace
52 SANDBOX_DIE("Invalid opcode in BPF sandbox rules");
109 } // namespace sandbox
syscall.h 11 #include "sandbox/sandbox_export.h"
13 namespace sandbox { namespace
87 } // namespace sandbox
syscall_iterator_unittest.cc 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
6 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
7 #include "sandbox/linux/tests/unit_tests.h"
9 namespace sandbox { namespace
136 } // namespace sandbox
verifier.h 13 namespace sandbox { namespace
26 static bool VerifyBPF(SandboxBPF* sandbox,
37 // is used for purposes other than verifying the output of the sandbox's
47 } // namespace sandbox
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
syscall_sets.h 10 #include "sandbox/sandbox_export.h"
13 // sandbox that reduces the Linux kernel's attack surface. Given their
17 namespace sandbox { namespace
75 // These give a lot of ambient authority and bypass the setuid sandbox.
104 } // namespace sandbox.
  /external/chromium_org/sandbox/linux/services/
credentials.h 18 #include "sandbox/sandbox_export.h"
20 namespace sandbox { namespace
90 } // namespace sandbox.
thread_helpers.h 9 #include "sandbox/sandbox_export.h"
13 namespace sandbox { namespace
34 } // namespace sandbox
  /external/chromium_org/sandbox/linux/tests/
sandbox_test_runner.h 10 namespace sandbox { namespace
28 } // namespace sandbox
test_utils.cc 5 #include "sandbox/linux/tests/test_utils.h"
17 namespace sandbox { namespace
31 } // namespace sandbox
test_utils.h 10 namespace sandbox { namespace
21 } // namespace sandbox
  /external/chromium_org/sandbox/mac/
policy_unittest.cc 5 #include "sandbox/mac/policy.h"
9 namespace sandbox { namespace
98 } // namespace sandbox
  /external/chromium_org/sandbox/win/src/
Wow64_64.cc 7 #include "sandbox/win/src/wow64.h"
9 namespace sandbox { namespace
18 } // namespace sandbox
filesystem_policy.h 12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/nt_internals.h"
14 #include "sandbox/win/src/policy_low_level.h"
15 #include "sandbox/win/src/sandbox_policy.h"
17 namespace sandbox { namespace
106 } // namespace sandbox
handle_closer_agent.h 10 #include "sandbox/win/src/handle_closer.h"
11 #include "sandbox/win/src/sandbox_types.h"
13 namespace sandbox { namespace
35 } // namespace sandbox
handle_policy.h 11 #include "sandbox/win/src/crosscall_server.h"
12 #include "sandbox/win/src/policy_low_level.h"
13 #include "sandbox/win/src/sandbox_policy.h"
15 namespace sandbox { namespace
37 } // namespace sandbox
job.h 9 #include "sandbox/win/src/restricted_token_utils.h"
11 namespace sandbox { namespace
62 } // namespace sandbox
named_pipe_interception.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
34 } // namespace sandbox
named_pipe_policy.h 12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/policy_low_level.h"
14 #include "sandbox/win/src/sandbox_policy.h"
16 namespace sandbox { namespace
43 } // namespace sandbox
process_mitigations_win32k_dispatcher.cc 5 #include "sandbox/win/src/process_mitigations_win32k_dispatcher.h"
6 #include "sandbox/win/src/interception.h"
7 #include "sandbox/win/src/interceptors.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/process_mitigations_win32k_interception.h"
11 namespace sandbox { namespace
21 sandbox::MITIGATION_WIN32K_DISABLE)) {
56 } // namespace sandbox
process_mitigations_win32k_interception.cc 5 #include "sandbox/win/src/process_mitigations_win32k_interception.h"
7 namespace sandbox { namespace
28 } // namespace sandbox
process_mitigations_win32k_policy.h 9 #include "sandbox/win/src/crosscall_server.h"
10 #include "sandbox/win/src/policy_low_level.h"
11 #include "sandbox/win/src/sandbox_policy.h"
13 namespace sandbox { namespace
31 } // namespace sandbox
process_thread_policy.h 10 #include "sandbox/win/src/policy_low_level.h"
14 #include "sandbox/win/src/crosscall_server.h"
15 #include "sandbox/win/src/sandbox_policy.h"
17 namespace sandbox { namespace
80 } // namespace sandbox
registry_policy.h 12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/nt_internals.h"
14 #include "sandbox/win/src/policy_low_level.h"
15 #include "sandbox/win/src/sandbox_policy.h"
17 namespace sandbox { namespace
56 } // namespace sandbox

Completed in 409 milliseconds

12 3 4 5 6 7 8 91011>>