HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 226 - 250 of 990) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium_org/sandbox/mac/
BUILD.gn 5 component("sandbox") {
33 generate_stubs_project = "sandbox/mac"
67 ":sandbox",
launchd_interception_server.cc 5 #include "sandbox/mac/launchd_interception_server.h"
11 #include "sandbox/mac/bootstrap_sandbox.h"
13 namespace sandbox { namespace
21 const BootstrapSandbox* sandbox)
22 : sandbox_(sandbox),
34 // Allocate the dummy sandbox port.
38 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port.";
44 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port send right.";
62 // No sandbox policy is in place for the sender of this message, which
70 // Filter messages sent via bootstrap_look_up to enforce the sandbox polic
    [all...]
  /external/chromium_org/sandbox/
sandbox.target.darwin-arm.mk 7 LOCAL_MODULE_STEM := sandbox
31 .PHONY: sandbox
32 sandbox: sandbox_sandbox_gyp
sandbox.target.darwin-arm64.mk 7 LOCAL_MODULE_STEM := sandbox
29 .PHONY: sandbox
30 sandbox: sandbox_sandbox_gyp
sandbox.target.darwin-mips.mk 7 LOCAL_MODULE_STEM := sandbox
29 .PHONY: sandbox
30 sandbox: sandbox_sandbox_gyp
sandbox.target.darwin-x86.mk 7 LOCAL_MODULE_STEM := sandbox
31 .PHONY: sandbox
32 sandbox: sandbox_sandbox_gyp
sandbox.target.darwin-x86_64.mk 7 LOCAL_MODULE_STEM := sandbox
31 .PHONY: sandbox
32 sandbox: sandbox_sandbox_gyp
sandbox.target.linux-arm.mk 7 LOCAL_MODULE_STEM := sandbox
31 .PHONY: sandbox
32 sandbox: sandbox_sandbox_gyp
sandbox.target.linux-arm64.mk 7 LOCAL_MODULE_STEM := sandbox
29 .PHONY: sandbox
30 sandbox: sandbox_sandbox_gyp
sandbox.target.linux-mips.mk 7 LOCAL_MODULE_STEM := sandbox
29 .PHONY: sandbox
30 sandbox: sandbox_sandbox_gyp
sandbox.target.linux-x86.mk 7 LOCAL_MODULE_STEM := sandbox
31 .PHONY: sandbox
32 sandbox: sandbox_sandbox_gyp
sandbox.target.linux-x86_64.mk 7 LOCAL_MODULE_STEM := sandbox
31 .PHONY: sandbox
32 sandbox: sandbox_sandbox_gyp
  /external/chromium_org/sandbox/win/src/
Wow64.h 11 #include "sandbox/win/src/sandbox_types.h"
13 namespace sandbox { namespace
48 } // namespace sandbox
acl.h 12 #include "sandbox/win/src/sid.h"
14 namespace sandbox { namespace
41 } // namespace sandbox
service_resolver_unittest.cc 10 #include "sandbox/win/src/resolver.h"
11 #include "sandbox/win/src/sandbox_utils.h"
12 #include "sandbox/win/src/service_resolver.h"
58 typedef ResolverThunkTest<sandbox::ServiceResolverThunk> WinXpResolverTest;
61 typedef ResolverThunkTest<sandbox::Win8ResolverThunk> Win8ResolverTest;
62 typedef ResolverThunkTest<sandbox::Wow64ResolverThunk> Wow64ResolverTest;
63 typedef ResolverThunkTest<sandbox::Wow64W8ResolverThunk> Wow64W8ResolverTest;
90 sandbox::ServiceResolverThunk* resolver) {
132 sandbox::ServiceResolverThunk* GetTestResolver(bool relaxed) {
151 sandbox::ServiceResolverThunk* resolver = GetTestResolver(relaxed)
    [all...]
window.h 12 #include "sandbox/win/src/sandbox_types.h"
14 namespace sandbox { namespace
38 } // namespace sandbox
sandbox.h 5 // Sandbox is a sandbox library for windows processes. Use when you want a
16 // there are cases where the Sandbox library is linked against the main .exe
25 #include "sandbox/win/src/sandbox_policy.h"
26 #include "sandbox/win/src/sandbox_types.h"
28 // sandbox: Google User-Land Application Sandbox
29 namespace sandbox { namespace
58 // interface to specify the sandbox policy for new processes created by
69 // policy: This is the pointer to the policy object for the sandbox t
    [all...]
handle_closer.h 13 #include "sandbox/win/src/interception.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/target_process.h"
17 namespace sandbox { namespace
72 } // namespace sandbox
process_thread_policy.h 10 #include "sandbox/win/src/policy_low_level.h"
14 #include "sandbox/win/src/crosscall_server.h"
15 #include "sandbox/win/src/sandbox_policy.h"
17 namespace sandbox { namespace
80 } // namespace sandbox
  /external/chromium_org/ui/views/examples/
examples_with_content_main_exe.cc 12 #include "sandbox/win/src/sandbox_types.h"
28 // sandbox::InitLibcUrandomOverrides(). See http://crbug.com/374712.
39 sandbox::SandboxInterfaceInfo sandbox_info = {0};
  /external/chromium_org/components/nacl/loader/nonsfi/
nonsfi_sandbox.cc 21 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
22 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
23 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
24 #include "sandbox/linux/seccomp-bpf/trap.h"
25 #include "sandbox/linux/services/linux_syscalls.h"
32 using sandbox::ErrorCode;
33 using sandbox::SandboxBPF;
64 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL)),
72 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL),
74 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL))))
    [all...]
  /external/chromium_org/components/nacl/loader/
nacl_helper_win_64.cc 22 #include "sandbox/win/src/sandbox_types.h"
49 sandbox::SandboxInterfaceInfo sandbox_info = {0};
65 // Initialize the sandbox for this process.
67 // Die if the sandbox can't be enabled.
68 CHECK(sandbox_initialized_ok) << "Error initializing sandbox for "
  /external/chromium_org/remoting/webapp/
xhr_proxy.js 8 * The sandbox isn't allowed to make XHRs, so they have to be proxied to the
13 * creations by JS running in the sandbox.
74 console.error('Sandbox: unproxied getResponseHeader(' + header + ') called.');
78 console.error('Sandbox: unproxied getAllResponseHeaders called.');
82 console.error('Sandbox: unproxied overrideMimeType called.');
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
baseline_policy_unittest.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
26 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
27 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
28 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
29 #include "sandbox/linux/services/android_futex.h"
30 #include "sandbox/linux/services/linux_syscalls.h"
31 #include "sandbox/linux/services/thread_helpers.h"
32 #include "sandbox/linux/tests/unit_tests.h"
34 namespace sandbox { namespace
97 // Without the sandbox, this would EBADF instead
    [all...]
  /external/chromium_org/sandbox/win/
BUILD.gn 5 source_set("sandbox") {
97 "src/sandbox.cc",
98 "src/sandbox.h",
202 ":sandbox",
218 ":sandbox",
243 ":sandbox",
253 "sandbox_poc/sandbox.cc",
254 "sandbox_poc/sandbox.h",
255 "sandbox_poc/sandbox.ico",
256 "sandbox_poc/sandbox.rc",
    [all...]

Completed in 90 milliseconds

1 2 3 4 5 6 7 8 91011>>