HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 76 - 100 of 523) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/libchrome/sandbox/mac/
BUILD.gn 12 generate_stubs_project = "sandbox/mac"
47 component("sandbox") {
98 ":sandbox",
  /external/libchrome/sandbox/win/
sandbox_win.gypi 14 # of the Windows sandbox library.
112 'src/sandbox.cc',
113 'src/sandbox.h',
177 'target_name': 'sandbox',
210 'sandbox',
244 'sandbox',
261 'sandbox',
288 'sandbox',
295 'sandbox_poc/sandbox.cc',
296 'sandbox_poc/sandbox.h'
    [all...]
BUILD.gn 11 static_library("sandbox") {
96 "src/sandbox.cc",
97 "src/sandbox.h",
223 ":sandbox",
240 ":sandbox",
267 ":sandbox",
278 "sandbox_poc/sandbox.cc",
279 "sandbox_poc/sandbox.h",
280 "sandbox_poc/sandbox.ico",
281 "sandbox_poc/sandbox.rc"
    [all...]
  /external/autotest/client/site_tests/graphics_WebGLPerformance/
README 12 https://sandbox.google.com/storage/?arg=chromeos-localmirror/&pli=1#chromeos-localmirror%2Fdistfiles
  /external/libchrome/sandbox/linux/bpf_dsl/
trap_registry.h 11 #include "sandbox/sandbox_export.h"
13 namespace sandbox { namespace
54 // guarantees provided by the sandbox policy. TrapRegistry
71 } // namespace sandbox
dump_bpf.cc 5 #include "sandbox/linux/bpf_dsl/dump_bpf.h"
15 #include "sandbox/linux/bpf_dsl/codegen.h"
16 #include "sandbox/linux/bpf_dsl/seccomp_macros.h"
17 #include "sandbox/linux/bpf_dsl/trap_registry.h"
18 #include "sandbox/linux/system_headers/linux_filter.h"
19 #include "sandbox/linux/system_headers/linux_seccomp.h"
21 namespace sandbox { namespace
159 } // namespace sandbox
bpf_dsl_unittest.cc 5 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
22 #include "sandbox/linux/bpf_dsl/bpf_dsl_impl.h"
23 #include "sandbox/linux/bpf_dsl/codegen.h"
24 #include "sandbox/linux/bpf_dsl/dump_bpf.h"
25 #include "sandbox/linux/bpf_dsl/golden/golden_files.h"
26 #include "sandbox/linux/bpf_dsl/policy.h"
27 #include "sandbox/linux/bpf_dsl/policy_compiler.h"
28 #include "sandbox/linux/bpf_dsl/seccomp_macros.h"
29 #include "sandbox/linux/bpf_dsl/test_trap_registry.h"
30 #include "sandbox/linux/bpf_dsl/verifier.h
36 namespace sandbox { namespace
    [all...]
policy_compiler.h 14 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h"
15 #include "sandbox/linux/bpf_dsl/codegen.h"
16 #include "sandbox/linux/bpf_dsl/trap_registry.h"
17 #include "sandbox/sandbox_export.h"
19 namespace sandbox { namespace
65 // If it is outside this range, the sandbox treats the system call just
151 } // namespace sandbox
verifier.cc 5 #include "sandbox/linux/bpf_dsl/verifier.h"
11 #include "sandbox/linux/bpf_dsl/seccomp_macros.h"
12 #include "sandbox/linux/bpf_dsl/trap_registry.h"
13 #include "sandbox/linux/system_headers/linux_filter.h"
14 #include "sandbox/linux/system_headers/linux_seccomp.h"
16 namespace sandbox { namespace
225 } // namespace sandbox
  /external/libchrome/sandbox/linux/syscall_broker/
broker_client.h 9 #include "sandbox/linux/syscall_broker/broker_channel.h"
10 #include "sandbox/linux/syscall_broker/broker_common.h"
12 namespace sandbox { namespace
73 } // namespace sandbox
broker_common.h 11 namespace sandbox { namespace
39 } // namespace sandbox
broker_process.h 16 #include "sandbox/linux/syscall_broker/broker_policy.h"
17 #include "sandbox/sandbox_export.h"
19 namespace sandbox { namespace
34 // 3. Enable sandbox.
92 } // namespace sandbox
  /external/libchrome/sandbox/linux/system_headers/
arm64_linux_ucontext.h 12 // We also need greg_t for the sandbox, include it in this header as well.
  /external/libchrome/sandbox/win/sandbox_poc/
resource.h 3 // Used by sandbox.rc
sandbox_poc.vcproj 160 RelativePath=".\sandbox.cc"
164 RelativePath=".\sandbox.h"
168 RelativePath=".\sandbox.ico"
172 RelativePath=".\sandbox.rc"
  /external/libchrome/sandbox/win/src/
sandbox_types.h 8 namespace sandbox { namespace
10 // Operation result codes returned by the sandbox API.
54 // If the sandbox cannot create a secure environment for the target, the
93 } // namespace sandbox
internal_types.h 10 namespace sandbox { namespace
74 } // namespace sandbox
  /external/libchrome/sandbox/linux/seccomp-bpf/
syscall_unittest.cc 5 #include "sandbox/linux/seccomp-bpf/syscall.h"
22 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
23 #include "sandbox/linux/bpf_dsl/policy.h"
24 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
25 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
26 #include "sandbox/linux/tests/unit_tests.h"
29 using sandbox::bpf_dsl::Allow;
30 using sandbox::bpf_dsl::ResultExpr;
31 using sandbox::bpf_dsl::Trap;
33 namespace sandbox { namespace
    [all...]
  /external/compiler-rt/test/asan/TestCases/Darwin/
dladdr-demangling.cc 1 // In a non-forking sandbox, we fallback to dladdr(). Test that we provide
6 // RUN: %env_asan_opts=verbosity=2 not %run sandbox-exec -p '(version 1)(allow default)(deny process-fork)' %t 2>&1 | FileCheck %s --check-prefix=CHECK --check-prefix=CHECK-DLADDR
suppressions-sandbox.cc 5 // Check that suppressing a function name works within a no-fork sandbox
8 // RUN: sandbox-exec -p '(version 1)(allow default)(deny process-fork)' \
  /external/selinux/policycoreutils/sandbox/
sandboxX.sh 4 export TITLE="Sandbox $context -- `grep ^#TITLE: ~/.sandboxrc | /usr/bin/cut -b8-80`"
30 /usr/share/sandbox/start $HOME/.sandboxrc
  /external/libchrome/sandbox/linux/seccomp-bpf-helpers/
sigsys_handlers.h 11 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h"
12 #include "sandbox/sandbox_export.h"
16 // See sandbox/linux/seccomp-bpf/trap.h to see how they work.
18 namespace sandbox { namespace
80 } // namespace sandbox.
syscall_parameters_restrictions.h 11 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h"
12 #include "sandbox/sandbox_export.h"
15 // sandbox that reduces the Linux kernel's attack surface. They return a
18 namespace sandbox { namespace
97 } // namespace sandbox.
syscall_sets.h 10 #include "sandbox/sandbox_export.h"
13 // sandbox that reduces the Linux kernel's attack surface. Given their
17 namespace sandbox { namespace
77 // These give a lot of ambient authority and bypass the setuid sandbox.
110 } // namespace sandbox.
  /external/libchrome/sandbox/linux/services/
scoped_process.cc 5 #include "sandbox/linux/services/scoped_process.h"
19 #include "sandbox/linux/services/syscall_wrappers.h"
20 #include "sandbox/linux/services/thread_helpers.h"
22 namespace sandbox { namespace
119 } // namespace sandbox

Completed in 327 milliseconds

1 2 34 5 6 7 8 91011>>