HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 426 - 450 of 990) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/
sandbox_services.target.linux-arm64.mk 27 sandbox/linux/services/broker_process.cc \
28 sandbox/linux/services/init_process_reaper.cc \
29 sandbox/linux/services/scoped_process.cc \
30 sandbox/linux/services/thread_helpers.cc \
31 sandbox/linux/services/yama.cc
107 $(LOCAL_PATH)/sandbox \
200 $(LOCAL_PATH)/sandbox \
sandbox_services.target.linux-mips.mk 27 sandbox/linux/services/broker_process.cc \
28 sandbox/linux/services/init_process_reaper.cc \
29 sandbox/linux/services/scoped_process.cc \
30 sandbox/linux/services/thread_helpers.cc \
31 sandbox/linux/services/yama.cc
112 $(LOCAL_PATH)/sandbox \
211 $(LOCAL_PATH)/sandbox \
sandbox_services.target.linux-x86.mk 27 sandbox/linux/services/broker_process.cc \
28 sandbox/linux/services/init_process_reaper.cc \
29 sandbox/linux/services/scoped_process.cc \
30 sandbox/linux/services/thread_helpers.cc \
31 sandbox/linux/services/yama.cc
113 $(LOCAL_PATH)/sandbox \
212 $(LOCAL_PATH)/sandbox \
sandbox_services.target.linux-x86_64.mk 27 sandbox/linux/services/broker_process.cc \
28 sandbox/linux/services/init_process_reaper.cc \
29 sandbox/linux/services/scoped_process.cc \
30 sandbox/linux/services/thread_helpers.cc \
31 sandbox/linux/services/yama.cc
112 $(LOCAL_PATH)/sandbox \
210 $(LOCAL_PATH)/sandbox \
  /external/chromium_org/sandbox/win/src/
restricted_token_utils.cc 9 #include "sandbox/win/src/restricted_token_utils.h"
15 #include "sandbox/win/src/job.h"
16 #include "sandbox/win/src/restricted_token.h"
17 #include "sandbox/win/src/security_level.h"
18 #include "sandbox/win/src/sid.h"
20 namespace sandbox { namespace
345 } // namespace sandbox
handle_closer_agent.cc 5 #include "sandbox/win/src/handle_closer_agent.h"
8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/win_utils.h"
35 namespace sandbox { namespace
145 } // namespace sandbox
policy_engine_params.h 9 #include "sandbox/win/src/internal_types.h"
10 #include "sandbox/win/src/nt_internals.h"
11 #include "sandbox/win/src/sandbox_nt_util.h"
17 namespace sandbox { namespace
200 } // namespace sandbox
policy_low_level.h 12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/policy_engine_params.h"
14 #include "sandbox/win/src/policy_engine_opcodes.h"
40 namespace sandbox { namespace
181 } // namespace sandbox
service_resolver_64.cc 5 #include "sandbox/win/src/service_resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
9 #include "sandbox/win/src/win_utils.h"
83 namespace sandbox { namespace
212 } // namespace sandbox
sharedmem_ipc_client.h 8 #include "sandbox/win/src/crosscall_params.h"
9 #include "sandbox/win/src/sandbox.h"
52 namespace sandbox { namespace
134 } // namespace sandbox
sidestep_resolver.cc 5 #include "sandbox/win/src/sidestep_resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
9 #include "sandbox/win/src/sidestep/preamble_patcher.h"
28 namespace sandbox { namespace
202 } // namespace sandbox
  /external/chromium_org/content/browser/gpu/
gpu_process_host.cc 49 #include "sandbox/win/src/sandbox_policy.h"
109 bool sandbox = !cmd_line_->HasSwitch(switches::kDisableGpuSandbox); variable
110 if(! sandbox) {
111 DVLOG(1) << "GPU sandbox is disabled";
113 return sandbox;
125 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
131 policy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS,
132 sandbox::USER_LIMITED);
133 SetJobLevel(*cmd_line_, sandbox::JOB_UNPROTECTED, 0, policy);
134 policy->SetDelayedIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW)
    [all...]
  /external/chromium_org/chrome_elf/blacklist/
blacklist.cc 17 #include "sandbox/win/src/interception_internal.h"
18 #include "sandbox/win/src/internal_types.h"
19 #include "sandbox/win/src/service_resolver.h"
68 __declspec(allocate(".crthunk")) sandbox::ThunkData g_thunk_storage;
324 sandbox::ServiceResolverThunk* thunk = GetThunk(kRelaxed);
350 NTSTATUS ret = thunk->Setup(::GetModuleHandle(sandbox::kNtdllName),
356 sizeof(sandbox::ThunkData),
370 NTSTATUS ret = thunk->Setup(::GetModuleHandle(sandbox::kNtdllName),
376 sizeof(sandbox::ThunkData),
  /external/chromium_org/components/
nacl.gyp 147 '../sandbox/sandbox.gyp:suid_sandbox_client',
224 '../sandbox/sandbox.gyp:sandbox_linux_test_utils',
309 '../sandbox/sandbox.gyp:libc_urandom_override',
310 '../sandbox/sandbox.gyp:sandbox',
breakpad.gypi 64 '../sandbox/sandbox.gyp:sandbox',
149 '../sandbox/sandbox.gyp:sandbox_win64',
  /external/chromium_org/content/zygote/
zygote_linux.h 54 // Returns true if the SUID sandbox is active.
67 // appears outside of the sandbox.
78 // This is equivalent to fork(), except that, when using the SUID sandbox, it
80 // sandbox, rather than returning the PID inside the sandbox. The child's
  /external/chromium_org/native_client_sdk/src/doc/
_book.yaml 80 - title: "Sandbox Internals"
82 - title "ARM 32-bit Sandbox"
83 path: /native-client/dev/reference/sandbox_internals/arm-32-bit-sandbox
84 - title "x86-64 Sandbox"
85 path: /native-client/dev/reference/sandbox_internals/x86-64-sandbox
  /external/chromium_org/sandbox/mac/
mach_message_server.cc 5 #include "sandbox/mac/mach_message_server.h"
16 namespace sandbox { namespace
78 "org.chromium.sandbox.MachMessageServer.%p", demuxer_);
175 // forwarded message was sent from the process hosting this sandbox server,
184 } // namespace sandbox
  /external/chromium_org/components/nacl/loader/
nacl_helper_linux.cc 45 #include "sandbox/linux/services/libc_urandom_override.h"
99 // Finish layer-1 sandbox initialization and initialize the layer-2 sandbox.
186 // First, close the dummy_fd so the sandbox won't find me when
275 // the setuid sandbox.
277 LOG(ERROR) << "NaCl helper process running without a sandbox!\n"
278 << "Most likely you need to configure your SUID sandbox "
352 // sandbox memory.
355 // and returns the amount of prereserved sandbox memory.
396 base::RandUint64(); // acquire /dev/urandom fd before sandbox is raise
    [all...]
  /external/chromium_org/content/public/renderer/
render_font_warmup_win.cc 82 // fonts installed on the system etc. This works well outside the sandbox and
83 // within the sandbox as long as the lpc connection maintained by the current
130 // before sandbox lock down to allow Skia access to the Font Manager service.
  /external/chromium_org/sandbox/linux/seccomp-bpf/
syscall.h 11 #include "sandbox/sandbox_export.h"
13 namespace sandbox { namespace
87 } // namespace sandbox
trap.cc 5 #include "sandbox/linux/seccomp-bpf/trap.h"
16 #include "sandbox/linux/seccomp-bpf/codegen.h"
17 #include "sandbox/linux/seccomp-bpf/die.h"
18 #include "sandbox/linux/seccomp-bpf/syscall.h"
22 #include "sandbox/linux/services/android_ucontext.h"
68 namespace sandbox { namespace
102 // to avoid race conditions. Normally, this is a non-issue as the sandbox
186 // evaluator registered with the sandbox.
274 // threaded while the sandbox is being set up). But we nonetheless are
335 SANDBOX_INFO("WARNING! Disabling sandbox for debugging purposes")
    [all...]
  /external/chromium_org/sandbox/linux/services/
credentials.h 18 #include "sandbox/sandbox_export.h"
20 namespace sandbox { namespace
90 } // namespace sandbox.
thread_helpers.cc 5 #include "sandbox/linux/services/thread_helpers.h"
23 namespace sandbox { namespace
102 } // namespace sandbox
  /external/chromium_org/sandbox/linux/suid/
sandbox.c 7 #include "sandbox/linux/suid/common/sandbox.h"
32 #include "sandbox/linux/suid/common/suid_unsafe_environment_variables.h"
33 #include "sandbox/linux/suid/linux_util.h"
34 #include "sandbox/linux/suid/process_util.h"
62 const char msg[] = "\nThe setuid sandbox got signaled, exiting.\n";
398 "The setuid sandbox provides API version %ld, "
408 // use an old sandbox.
436 // In the SUID sandbox, if we succeed in calling MoveToNewNamespaces()
442 // a dummy socket, which has a unique inode number. Then it asks the sandbox
    [all...]

Completed in 5369 milliseconds

<<11121314151617181920>>