Searched refs:sandbox (Results 276 - 300 of 471) sorted by relevance

<<111213141516171819

/external/chromium_org/sandbox/
H A Dseccomp_bpf_helpers.target.darwin-mips.mk26 sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc \
27 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc \
28 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc \
29 sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc
H A Dseccomp_bpf_helpers.target.darwin-x86.mk26 sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc \
27 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc \
28 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc \
29 sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc
H A Dseccomp_bpf_helpers.target.darwin-x86_64.mk26 sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc \
27 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc \
28 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc \
29 sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc
H A Dseccomp_bpf_helpers.target.linux-arm.mk26 sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc \
27 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc \
28 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc \
29 sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc
H A Dseccomp_bpf_helpers.target.linux-arm64.mk26 sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc \
27 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc \
28 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc \
29 sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc
H A Dseccomp_bpf_helpers.target.linux-mips.mk26 sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc \
27 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc \
28 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc \
29 sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc
H A Dseccomp_bpf_helpers.target.linux-x86.mk26 sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc \
27 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc \
28 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc \
29 sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc
H A Dseccomp_bpf_helpers.target.linux-x86_64.mk26 sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc \
27 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc \
28 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc \
29 sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc
/external/chromium_org/sandbox/win/src/
H A Dregistry_dispatcher.cc5 #include "sandbox/win/src/registry_dispatcher.h"
9 #include "sandbox/win/src/crosscall_client.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/sandbox_nt_util.h"
14 #include "sandbox/win/src/policy_broker.h"
15 #include "sandbox/win/src/policy_params.h"
16 #include "sandbox/win/src/sandbox
40 namespace sandbox { namespace
[all...]
H A Dhandle_dispatcher.cc5 #include "sandbox/win/src/handle_dispatcher.h"
8 #include "sandbox/win/src/handle_interception.h"
9 #include "sandbox/win/src/handle_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/policy_broker.h"
12 #include "sandbox/win/src/policy_params.h"
13 #include "sandbox/win/src/sandbox.h"
14 #include "sandbox/win/src/sandbox_nt_util.h"
15 #include "sandbox/wi
18 namespace sandbox { namespace
[all...]
H A Dintegrity_level_test.cc10 #include "sandbox/win/src/sandbox.h"
11 #include "sandbox/win/src/sandbox_policy.h"
12 #include "sandbox/win/src/sandbox_factory.h"
13 #include "sandbox/win/tests/common/controller.h"
15 namespace sandbox { namespace
91 } // namespace sandbox
H A Djob.cc5 #include "sandbox/win/src/job.h"
8 #include "sandbox/win/src/restricted_token.h"
10 namespace sandbox { namespace
118 } // namespace sandbox
H A Dnamed_pipe_dispatcher.cc5 #include "sandbox/win/src/named_pipe_dispatcher.h"
10 #include "sandbox/win/src/crosscall_client.h"
11 #include "sandbox/win/src/interception.h"
12 #include "sandbox/win/src/interceptors.h"
13 #include "sandbox/win/src/ipc_tags.h"
14 #include "sandbox/win/src/named_pipe_interception.h"
15 #include "sandbox/win/src/named_pipe_policy.h"
16 #include "sandbox/win/src/policy_broker.h"
17 #include "sandbox/win/src/policy_params.h"
18 #include "sandbox/wi
21 namespace sandbox { namespace
[all...]
H A Dpolicy_broker.cc7 #include "sandbox/win/src/policy_broker.h"
12 #include "sandbox/win/src/interception.h"
13 #include "sandbox/win/src/interceptors.h"
14 #include "sandbox/win/src/policy_target.h"
15 #include "sandbox/win/src/process_thread_interception.h"
16 #include "sandbox/win/src/sandbox.h"
17 #include "sandbox/win/src/sandbox_nt_types.h"
18 #include "sandbox/win/src/sandbox_types.h"
19 #include "sandbox/wi
24 namespace sandbox { namespace
[all...]
H A Dsandbox_policy.h12 #include "sandbox/win/src/sandbox_types.h"
13 #include "sandbox/win/src/security_level.h"
15 namespace sandbox { namespace
89 // Important: most of the sandbox-provided security relies on this single
156 // Sets the integrity level of the process in the sandbox. Both the initial
158 // is set to a level higher than the current level, the sandbox will fail
165 // Sets the integrity level of the process in the sandbox. The integrity level
168 // process in the sandbox. If the integrity level is set to a level higher
169 // than the current level, the sandbox will fail to start.
243 } // namespace sandbox
[all...]
H A Dservice_resolver.h8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/resolver.h"
11 namespace sandbox { namespace
136 } // namespace sandbox
H A Dsid_unittest.cc11 #include "sandbox/win/src/sid.h"
14 namespace sandbox { namespace
71 } // namespace sandbox
H A Dsync_dispatcher.cc5 #include "sandbox/win/src/sync_dispatcher.h"
8 #include "sandbox/win/src/crosscall_client.h"
9 #include "sandbox/win/src/interception.h"
10 #include "sandbox/win/src/interceptors.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/policy_broker.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox.h"
15 #include "sandbox/wi
18 namespace sandbox { namespace
[all...]
/external/chromium_org/content/ppapi_plugin/
H A Dppapi_plugin_main.cc28 #include "sandbox/win/src/sandbox.h"
45 sandbox::TargetServices* g_target_services = NULL;
55 // Windows-only skia sandbox support
120 // NSS must be initialized before enabling the sandbox below.
125 // before the sandbox is initialized.
/external/chromium_org/sandbox/linux/seccomp-bpf/
H A Dcodegen.h11 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
12 #include "sandbox/sandbox_export.h"
14 namespace sandbox { namespace
47 // // any C++ destructors after starting the sandbox.
150 } // namespace sandbox
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
H A Dsyscall_sets.h10 #include "sandbox/sandbox_export.h"
13 // sandbox that reduces the Linux kernel's attack surface. Given their
17 namespace sandbox { namespace
77 // These give a lot of ambient authority and bypass the setuid sandbox.
110 } // namespace sandbox.
/external/chromium_org/sandbox/linux/services/
H A Dinit_process_reaper.cc5 #include "sandbox/linux/services/init_process_reaper.h"
18 namespace sandbox { namespace
101 } // namespace sandbox.
H A Dscoped_process.cc5 #include "sandbox/linux/services/scoped_process.h"
20 #include "sandbox/linux/services/thread_helpers.h"
22 namespace sandbox { namespace
119 } // namespace sandbox
H A Dthread_helpers_unittests.cc5 #include "sandbox/linux/services/thread_helpers.h"
21 #include "sandbox/linux/tests/unit_tests.h"
26 namespace sandbox { namespace
111 } // namespace sandbox
/external/chromium_org/sandbox/linux/suid/client/
H A Dsetuid_sandbox_client_unittest.cc9 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
10 #include "sandbox/linux/suid/common/sandbox.h"
13 namespace sandbox { namespace
70 // Set-up a fake environment as if we went through the setuid sandbox.
100 } // namespace sandbox

Completed in 233 milliseconds

<<111213141516171819