HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 76 - 100 of 990) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/chromium_org/sandbox/win/src/
sandbox_utils.h 13 #include "sandbox/win/src/nt_internals.h"
15 namespace sandbox { namespace
23 } // namespace sandbox
sid.cc 5 #include "sandbox/win/src/sid.h"
9 namespace sandbox { namespace
26 } // namespace sandbox
eat_resolver.h 9 #include "sandbox/win/src/nt_internals.h"
10 #include "sandbox/win/src/resolver.h"
12 namespace sandbox { namespace
45 } // namespace sandbox
handle_closer_agent.h 10 #include "sandbox/win/src/handle_closer.h"
11 #include "sandbox/win/src/sandbox_types.h"
13 namespace sandbox { namespace
35 } // namespace sandbox
handle_dispatcher.h 9 #include "sandbox/win/src/crosscall_server.h"
10 #include "sandbox/win/src/sandbox_policy_base.h"
12 namespace sandbox { namespace
34 } // namespace sandbox
named_pipe_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
36 } // namespace sandbox
registry_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
38 } // namespace sandbox
registry_interception.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
36 } // namespace sandbox
sync_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
36 } // namespace sandbox
sync_interception.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
44 } // namespace sandbox
registry_policy.h 12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/nt_internals.h"
14 #include "sandbox/win/src/policy_low_level.h"
15 #include "sandbox/win/src/sandbox_policy.h"
17 namespace sandbox { namespace
56 } // namespace sandbox
sync_policy.h 12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/nt_internals.h"
14 #include "sandbox/win/src/policy_low_level.h"
15 #include "sandbox/win/src/sandbox_policy.h"
17 namespace sandbox { namespace
49 } // namespace sandbox
  /external/chromium_org/components/nacl/loader/nonsfi/
nonsfi_sandbox_unittest.cc 36 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
37 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
38 #include "sandbox/linux/services/linux_syscalls.h"
59 sandbox::SandboxBPF::SupportsSeccompSandbox(-1) ==
60 sandbox::SandboxBPF::STATUS_AVAILABLE);
69 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()),
82 // mmap. We just disable this test not to complicate the sandbox.
102 // The sanity check for DoFork without the sandbox.
112 // Then, try this in the sandbox.
115 DEATH_MESSAGE(sandbox::GetCloneErrorMessageContentForTests())
    [all...]
  /external/chromium_org/apps/shell/app/
DEPS 11 "+sandbox",
  /external/chromium_org/chrome/nacl/
DEPS 8 "+sandbox/win/src",
  /external/chromium_org/components/nacl/loader/
DEPS 5 "+sandbox/linux/seccomp-bpf",
6 "+sandbox/linux/services",
7 "+sandbox/linux/suid",
8 "+sandbox/win/src",
  /external/chromium_org/content/common/sandbox_linux/android/
sandbox_bpf_base_policy_android.h 9 #include "sandbox/linux/seccomp-bpf/errorcode.h"
21 // sandbox::SandboxBPFPolicy:
22 virtual sandbox::ErrorCode EvaluateSyscall(
23 sandbox::SandboxBPF* sandbox_compiler,
  /external/chromium_org/sandbox/linux/seccomp-bpf/
sandbox_bpf_compatibility_policy.h 11 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
12 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
14 namespace sandbox { namespace
41 } // namespace sandbox
  /external/chromium_org/chrome_elf/
ntdll_cache.h 10 namespace sandbox { namespace
19 extern sandbox::ThunkData g_nt_thunk_storage;
thunk_getter.h 8 namespace sandbox { namespace
14 sandbox::ServiceResolverThunk* GetThunk(bool relaxed);
  /external/chromium_org/content/app/
startup_helper_win.cc 13 #include "sandbox/win/src/process_mitigations.h"
14 #include "sandbox/win/src/sandbox_factory.h"
38 void InitializeSandboxInfo(sandbox::SandboxInterfaceInfo* info) {
39 info->broker_services = sandbox::SandboxFactory::GetBrokerServices();
41 info->target_services = sandbox::SandboxFactory::GetTargetServices();
44 sandbox::ApplyProcessMitigationsToCurrentProcess(
45 sandbox::MITIGATION_DEP |
46 sandbox::MITIGATION_DEP_NO_ATL_THUNK);
  /external/chromium_org/sandbox/linux/tests/
test_utils.h 10 namespace sandbox { namespace
21 } // namespace sandbox
  /external/chromium_org/content/renderer/
renderer_main_platform_delegate_android.cc 13 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
48 sandbox::SandboxBPF sandbox; local
49 sandbox.SetSandboxPolicy(new SandboxBPFBasePolicyAndroid());
50 CHECK(sandbox.StartSandbox(sandbox::SandboxBPF::PROCESS_MULTI_THREADED));
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
baseline_policy.h 8 #include "sandbox/linux/seccomp-bpf/errorcode.h"
9 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
10 #include "sandbox/sandbox_export.h"
12 namespace sandbox { namespace
17 // This is a helper to build seccomp-bpf policies, i.e. policies for a sandbox
45 } // namespace sandbox.
  /external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/
append-child.html 5 <div id="sandbox" style="display:none"></div>
7 var sandbox = document.getElementById('sandbox');
37 sandbox.innerHTML = '';
39 observer.observe(sandbox, {childList: true});
42 sandbox.appendChild(elems[i]);

Completed in 201 milliseconds

1 2 34 5 6 7 8 91011>>