Searched refs:sandbox (Results 176 - 200 of 471) sorted by relevance

1234567891011>>

/external/chromium_org/sandbox/
H A Dseccomp_bpf.target.darwin-x86_64.mk27 sandbox/linux/bpf_dsl/bpf_dsl.cc \
28 sandbox/linux/seccomp-bpf/basicblock.cc \
29 sandbox/linux/seccomp-bpf/codegen.cc \
30 sandbox/linux/seccomp-bpf/die.cc \
31 sandbox/linux/seccomp-bpf/errorcode.cc \
32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \
33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \
34 sandbox/linux/seccomp-bpf/syscall.cc \
35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \
36 sandbox/linu
[all...]
H A Dseccomp_bpf.target.linux-arm.mk27 sandbox/linux/bpf_dsl/bpf_dsl.cc \
28 sandbox/linux/seccomp-bpf/basicblock.cc \
29 sandbox/linux/seccomp-bpf/codegen.cc \
30 sandbox/linux/seccomp-bpf/die.cc \
31 sandbox/linux/seccomp-bpf/errorcode.cc \
32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \
33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \
34 sandbox/linux/seccomp-bpf/syscall.cc \
35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \
36 sandbox/linu
[all...]
H A Dseccomp_bpf.target.linux-arm64.mk27 sandbox/linux/bpf_dsl/bpf_dsl.cc \
28 sandbox/linux/seccomp-bpf/basicblock.cc \
29 sandbox/linux/seccomp-bpf/codegen.cc \
30 sandbox/linux/seccomp-bpf/die.cc \
31 sandbox/linux/seccomp-bpf/errorcode.cc \
32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \
33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \
34 sandbox/linux/seccomp-bpf/syscall.cc \
35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \
36 sandbox/linu
[all...]
H A Dseccomp_bpf.target.linux-mips.mk27 sandbox/linux/bpf_dsl/bpf_dsl.cc \
28 sandbox/linux/seccomp-bpf/basicblock.cc \
29 sandbox/linux/seccomp-bpf/codegen.cc \
30 sandbox/linux/seccomp-bpf/die.cc \
31 sandbox/linux/seccomp-bpf/errorcode.cc \
32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \
33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \
34 sandbox/linux/seccomp-bpf/syscall.cc \
35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \
36 sandbox/linu
[all...]
H A Dseccomp_bpf.target.linux-x86.mk27 sandbox/linux/bpf_dsl/bpf_dsl.cc \
28 sandbox/linux/seccomp-bpf/basicblock.cc \
29 sandbox/linux/seccomp-bpf/codegen.cc \
30 sandbox/linux/seccomp-bpf/die.cc \
31 sandbox/linux/seccomp-bpf/errorcode.cc \
32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \
33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \
34 sandbox/linux/seccomp-bpf/syscall.cc \
35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \
36 sandbox/linu
[all...]
H A Dseccomp_bpf.target.linux-x86_64.mk27 sandbox/linux/bpf_dsl/bpf_dsl.cc \
28 sandbox/linux/seccomp-bpf/basicblock.cc \
29 sandbox/linux/seccomp-bpf/codegen.cc \
30 sandbox/linux/seccomp-bpf/die.cc \
31 sandbox/linux/seccomp-bpf/errorcode.cc \
32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \
33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \
34 sandbox/linux/seccomp-bpf/syscall.cc \
35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \
36 sandbox/linu
[all...]
/external/chromium_org/content/gpu/
H A Dgpu_child_thread.h25 namespace sandbox { namespace
82 // Windows specific client sandbox interface.
83 sandbox::TargetServices* target_services_;
/external/chromium_org/sandbox/win/src/
H A Dpolicy_params.h8 #include "sandbox/win/src/policy_engine_params.h"
10 namespace sandbox { namespace
19 typedef sandbox::ParameterSet type##Array [type::PolParamLast];
64 } // namespace sandbox
H A Dprocess_policy_test.cc13 #include "sandbox/win/src/sandbox.h"
14 #include "sandbox/win/src/sandbox_factory.h"
15 #include "sandbox/win/src/sandbox_policy.h"
16 #include "sandbox/win/tests/common/controller.h"
38 sandbox::SboxTestResult CreateProcessHelper(const base::string16& exe,
50 sandbox::SboxTestResult ret1 = sandbox::SBOX_TEST_FAILED;
63 ret1 = sandbox::SBOX_TEST_SUCCEEDED;
69 ret1 = sandbox
108 namespace sandbox { namespace
[all...]
H A Dsandbox_nt_util.cc5 #include "sandbox/win/src/sandbox_nt_util.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/target_services.h"
11 namespace sandbox { namespace
16 } // namespace sandbox
22 using sandbox::g_nt;
76 using sandbox::g_nt;
105 namespace sandbox { namespace
544 } // namespace sandbox
546 void* operator new(size_t size, sandbox
[all...]
H A Dunload_dll_test.cc6 #include "sandbox/win/src/sandbox.h"
7 #include "sandbox/win/src/sandbox_factory.h"
8 #include "sandbox/win/src/target_services.h"
9 #include "sandbox/win/tests/common/controller.h"
12 namespace sandbox { namespace
64 sandbox::TargetPolicy* policy = runner.GetPolicy();
75 sandbox::TargetPolicy* policy = runner.GetPolicy();
96 } // namespace sandbox
/external/chromium_org/sandbox/win/wow_helper/
H A Dwow_helper.cc6 // sandbox a 32 bit application running on a 64 bit OS. The basic idea is to
15 #include "sandbox/win/wow_helper/service64_resolver.h"
16 #include "sandbox/win/wow_helper/target_code.h"
18 namespace sandbox { namespace
54 } // namespace sandbox
85 return sandbox::PatchNtdll(child, thunk, kPageSize);
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
H A Dsyscall_parameters_restrictions.cc5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
29 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
30 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
31 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
32 #include "sandbox/linux/services/linux_syscalls.h"
36 #include "sandbox/linux/services/android_futex.h"
89 using sandbox::bpf_dsl::Allow;
90 using sandbox::bpf_dsl::Arg;
91 using sandbox::bpf_dsl::BoolExpr;
92 using sandbox
96 namespace sandbox { namespace
[all...]
H A Dsyscall_parameters_restrictions.h11 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
12 #include "sandbox/sandbox_export.h"
15 // sandbox that reduces the Linux kernel's attack surface. They return a
18 namespace sandbox { namespace
89 } // namespace sandbox.
/external/chromium_org/sandbox/mac/
H A Dlaunchd_interception_server.cc5 #include "sandbox/mac/launchd_interception_server.h"
11 #include "sandbox/mac/bootstrap_sandbox.h"
12 #include "sandbox/mac/mach_message_server.h"
14 namespace sandbox { namespace
22 const BootstrapSandbox* sandbox)
23 : sandbox_(sandbox),
35 // Allocate the dummy sandbox port.
39 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port.";
45 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port send right.";
63 // No sandbox polic
21 LaunchdInterceptionServer( const BootstrapSandbox* sandbox) argument
[all...]
H A Dbootstrap_sandbox.h17 #include "sandbox/mac/policy.h"
18 #include "sandbox/sandbox_export.h"
20 namespace sandbox { namespace
24 // The BootstrapSandbox is a second-layer sandbox for Mac. It is used to limit
29 // With this sandbox, the parent process must replace the bootstrap port prior
35 // launchd for servicing. If it is not, then the sandbox will reply with a
38 // Clients that which to use the sandbox must inform it of the creation and
39 // death of child processes for which the sandbox should be enforced. The
40 // client of the sandbox is intended to be an unsandboxed parent process that
43 // When the parent is ready to fork a new child process with this sandbox
[all...]
H A Ddispatch_source_mach.cc5 #include "sandbox/mac/dispatch_source_mach.h"
7 namespace sandbox { namespace
62 } // namespace sandbox
H A Dmessage_server.h11 #include "sandbox/mac/xpc.h"
13 namespace sandbox { namespace
69 } // namespace sandbox
H A Dpolicy.cc5 #include "sandbox/mac/policy.h"
7 namespace sandbox { namespace
56 } // namespace sandbox
H A Dxpc_message_server.h10 #include "sandbox/mac/message_server.h"
11 #include "sandbox/mac/xpc.h"
12 #include "sandbox/sandbox_export.h"
14 namespace sandbox { namespace
60 } // namespace sandbox
/external/chromium_org/components/nacl/broker/
H A Dnacl_broker_listener.h29 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
/external/chromium_org/content/browser/gpu/
H A Dgpu_process_host.cc50 #include "sandbox/win/src/sandbox_policy.h"
160 bool sandbox = !cmd_line_->HasSwitch(switches::kDisableGpuSandbox); variable
161 if(! sandbox) {
162 DVLOG(1) << "GPU sandbox is disabled";
164 return sandbox;
176 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
182 policy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS,
183 sandbox::USER_LIMITED);
184 SetJobLevel(*cmd_line_, sandbox::JOB_UNPROTECTED, 0, policy);
185 policy->SetDelayedIntegrityLevel(sandbox
[all...]
/external/chromium_org/content/shell/app/
H A Dshell_main.cc10 #include "sandbox/win/src/sandbox_types.h"
27 sandbox::SandboxInterfaceInfo sandbox_info = {0};
/external/chromium_org/sandbox/linux/bpf_dsl/
H A Dcons.h9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
44 } // namespace sandbox
H A Dcons_unittest.cc5 #include "sandbox/linux/bpf_dsl/cons.h"
11 namespace sandbox { namespace
34 } // namespace sandbox

Completed in 621 milliseconds

1234567891011>>