/external/libchrome/sandbox/mac/ |
BUILD.gn | 12 generate_stubs_project = "sandbox/mac" 47 component("sandbox") { 98 ":sandbox",
|
/external/libchrome/sandbox/win/ |
sandbox_win.gypi | 14 # of the Windows sandbox library. 112 'src/sandbox.cc', 113 'src/sandbox.h', 177 'target_name': 'sandbox', 210 'sandbox', 244 'sandbox', 261 'sandbox', 288 'sandbox', 295 'sandbox_poc/sandbox.cc', 296 'sandbox_poc/sandbox.h' [all...] |
BUILD.gn | 11 static_library("sandbox") { 96 "src/sandbox.cc", 97 "src/sandbox.h", 223 ":sandbox", 240 ":sandbox", 267 ":sandbox", 278 "sandbox_poc/sandbox.cc", 279 "sandbox_poc/sandbox.h", 280 "sandbox_poc/sandbox.ico", 281 "sandbox_poc/sandbox.rc" [all...] |
/external/autotest/client/site_tests/graphics_WebGLPerformance/ |
README | 12 https://sandbox.google.com/storage/?arg=chromeos-localmirror/&pli=1#chromeos-localmirror%2Fdistfiles
|
/external/libchrome/sandbox/linux/bpf_dsl/ |
trap_registry.h | 11 #include "sandbox/sandbox_export.h" 13 namespace sandbox { namespace 54 // guarantees provided by the sandbox policy. TrapRegistry 71 } // namespace sandbox
|
dump_bpf.cc | 5 #include "sandbox/linux/bpf_dsl/dump_bpf.h" 15 #include "sandbox/linux/bpf_dsl/codegen.h" 16 #include "sandbox/linux/bpf_dsl/seccomp_macros.h" 17 #include "sandbox/linux/bpf_dsl/trap_registry.h" 18 #include "sandbox/linux/system_headers/linux_filter.h" 19 #include "sandbox/linux/system_headers/linux_seccomp.h" 21 namespace sandbox { namespace 159 } // namespace sandbox
|
bpf_dsl_unittest.cc | 5 #include "sandbox/linux/bpf_dsl/bpf_dsl.h" 22 #include "sandbox/linux/bpf_dsl/bpf_dsl_impl.h" 23 #include "sandbox/linux/bpf_dsl/codegen.h" 24 #include "sandbox/linux/bpf_dsl/dump_bpf.h" 25 #include "sandbox/linux/bpf_dsl/golden/golden_files.h" 26 #include "sandbox/linux/bpf_dsl/policy.h" 27 #include "sandbox/linux/bpf_dsl/policy_compiler.h" 28 #include "sandbox/linux/bpf_dsl/seccomp_macros.h" 29 #include "sandbox/linux/bpf_dsl/test_trap_registry.h" 30 #include "sandbox/linux/bpf_dsl/verifier.h 36 namespace sandbox { namespace [all...] |
policy_compiler.h | 14 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h" 15 #include "sandbox/linux/bpf_dsl/codegen.h" 16 #include "sandbox/linux/bpf_dsl/trap_registry.h" 17 #include "sandbox/sandbox_export.h" 19 namespace sandbox { namespace 65 // If it is outside this range, the sandbox treats the system call just 151 } // namespace sandbox
|
verifier.cc | 5 #include "sandbox/linux/bpf_dsl/verifier.h" 11 #include "sandbox/linux/bpf_dsl/seccomp_macros.h" 12 #include "sandbox/linux/bpf_dsl/trap_registry.h" 13 #include "sandbox/linux/system_headers/linux_filter.h" 14 #include "sandbox/linux/system_headers/linux_seccomp.h" 16 namespace sandbox { namespace 225 } // namespace sandbox
|
/external/libchrome/sandbox/linux/syscall_broker/ |
broker_client.h | 9 #include "sandbox/linux/syscall_broker/broker_channel.h" 10 #include "sandbox/linux/syscall_broker/broker_common.h" 12 namespace sandbox { namespace 73 } // namespace sandbox
|
broker_common.h | 11 namespace sandbox { namespace 39 } // namespace sandbox
|
broker_process.h | 16 #include "sandbox/linux/syscall_broker/broker_policy.h" 17 #include "sandbox/sandbox_export.h" 19 namespace sandbox { namespace 34 // 3. Enable sandbox. 92 } // namespace sandbox
|
/external/libchrome/sandbox/linux/system_headers/ |
arm64_linux_ucontext.h | 12 // We also need greg_t for the sandbox, include it in this header as well.
|
/external/libchrome/sandbox/win/sandbox_poc/ |
resource.h | 3 // Used by sandbox.rc
|
sandbox_poc.vcproj | 160 RelativePath=".\sandbox.cc" 164 RelativePath=".\sandbox.h" 168 RelativePath=".\sandbox.ico" 172 RelativePath=".\sandbox.rc"
|
/external/libchrome/sandbox/win/src/ |
sandbox_types.h | 8 namespace sandbox { namespace 10 // Operation result codes returned by the sandbox API. 54 // If the sandbox cannot create a secure environment for the target, the 93 } // namespace sandbox
|
internal_types.h | 10 namespace sandbox { namespace 74 } // namespace sandbox
|
/external/libchrome/sandbox/linux/seccomp-bpf/ |
syscall_unittest.cc | 5 #include "sandbox/linux/seccomp-bpf/syscall.h" 22 #include "sandbox/linux/bpf_dsl/bpf_dsl.h" 23 #include "sandbox/linux/bpf_dsl/policy.h" 24 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 25 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 26 #include "sandbox/linux/tests/unit_tests.h" 29 using sandbox::bpf_dsl::Allow; 30 using sandbox::bpf_dsl::ResultExpr; 31 using sandbox::bpf_dsl::Trap; 33 namespace sandbox { namespace [all...] |
/external/compiler-rt/test/asan/TestCases/Darwin/ |
dladdr-demangling.cc | 1 // In a non-forking sandbox, we fallback to dladdr(). Test that we provide 6 // RUN: %env_asan_opts=verbosity=2 not %run sandbox-exec -p '(version 1)(allow default)(deny process-fork)' %t 2>&1 | FileCheck %s --check-prefix=CHECK --check-prefix=CHECK-DLADDR
|
suppressions-sandbox.cc | 5 // Check that suppressing a function name works within a no-fork sandbox 8 // RUN: sandbox-exec -p '(version 1)(allow default)(deny process-fork)' \
|
/external/selinux/policycoreutils/sandbox/ |
sandboxX.sh | 4 export TITLE="Sandbox $context -- `grep ^#TITLE: ~/.sandboxrc | /usr/bin/cut -b8-80`" 30 /usr/share/sandbox/start $HOME/.sandboxrc
|
/external/libchrome/sandbox/linux/seccomp-bpf-helpers/ |
sigsys_handlers.h | 11 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h" 12 #include "sandbox/sandbox_export.h" 16 // See sandbox/linux/seccomp-bpf/trap.h to see how they work. 18 namespace sandbox { namespace 80 } // namespace sandbox.
|
syscall_parameters_restrictions.h | 11 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h" 12 #include "sandbox/sandbox_export.h" 15 // sandbox that reduces the Linux kernel's attack surface. They return a 18 namespace sandbox { namespace 97 } // namespace sandbox.
|
syscall_sets.h | 10 #include "sandbox/sandbox_export.h" 13 // sandbox that reduces the Linux kernel's attack surface. Given their 17 namespace sandbox { namespace 77 // These give a lot of ambient authority and bypass the setuid sandbox. 110 } // namespace sandbox.
|
/external/libchrome/sandbox/linux/services/ |
scoped_process.cc | 5 #include "sandbox/linux/services/scoped_process.h" 19 #include "sandbox/linux/services/syscall_wrappers.h" 20 #include "sandbox/linux/services/thread_helpers.h" 22 namespace sandbox { namespace 119 } // namespace sandbox
|