Searched defs:sandbox (Results 101 - 125 of 299) sorted by relevance

1234567891011>>

/external/chromium_org/sandbox/win/src/
H A DWow64.h11 #include "sandbox/win/src/sandbox_types.h"
13 namespace sandbox { namespace
48 } // namespace sandbox
H A Dhandle_interception.cc5 #include "sandbox/win/src/handle_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/sandbox_nt_util.h"
11 #include "sandbox/win/src/sharedmem_ipc_client.h"
12 #include "sandbox/win/src/target_services.h"
14 namespace sandbox { namespace
44 } // namespace sandbox
H A Dintegrity_level_test.cc10 #include "sandbox/win/src/sandbox.h"
11 #include "sandbox/win/src/sandbox_policy.h"
12 #include "sandbox/win/src/sandbox_factory.h"
13 #include "sandbox/win/tests/common/controller.h"
15 namespace sandbox { namespace
91 } // namespace sandbox
H A Dpolicy_broker.cc7 #include "sandbox/win/src/policy_broker.h"
12 #include "sandbox/win/src/interception.h"
13 #include "sandbox/win/src/interceptors.h"
14 #include "sandbox/win/src/policy_target.h"
15 #include "sandbox/win/src/process_thread_interception.h"
16 #include "sandbox/win/src/sandbox.h"
17 #include "sandbox/win/src/sandbox_nt_types.h"
18 #include "sandbox/win/src/sandbox_types.h"
19 #include "sandbox/wi
24 namespace sandbox { namespace
[all...]
H A Dsandbox_utils.cc5 #include "sandbox/win/src/sandbox_utils.h"
10 #include "sandbox/win/src/internal_types.h"
12 namespace sandbox { namespace
30 } // namespace sandbox
H A Dservice_resolver.cc5 #include "sandbox/win/src/service_resolver.h"
8 #include "sandbox/win/src/internal_types.h"
9 #include "sandbox/win/src/sandbox_nt_util.h"
11 namespace sandbox { namespace
46 } // namespace sandbox
H A Dsid.cc5 #include "sandbox/win/src/sid.h"
9 namespace sandbox { namespace
26 } // namespace sandbox
H A Dsid_unittest.cc11 #include "sandbox/win/src/sid.h"
14 namespace sandbox { namespace
71 } // namespace sandbox
H A Dsidestep_resolver.h9 #include "sandbox/win/src/nt_internals.h"
10 #include "sandbox/win/src/resolver.h"
12 namespace sandbox { namespace
70 } // namespace sandbox
H A Dwin2k_threadpool.h10 #include "sandbox/win/src/crosscall_server.h"
12 namespace sandbox { namespace
15 // for the sandbox IPC subsystem. See sandbox\crosscall_server.h for the details
56 } // namespace sandbox
/external/chromium_org/sandbox/win/wow_helper/
H A Dservice64_resolver.h8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/resolver.h"
11 namespace sandbox { namespace
69 } // namespace sandbox
H A Dtarget_code.h8 #include "sandbox/win/src/nt_internals.h"
10 namespace sandbox { namespace
16 // on sandbox/win/src/wow64.cc.
39 } // namespace sandbox
/external/chromium_org/components/nacl/loader/sandbox_linux/
H A Dnacl_sandbox_linux.h12 namespace sandbox { namespace
21 // layer-2 uses seccomp-bpf. It requires the layer-1 sandbox to not yet be
23 // For the layer-1 sandbox to work, the current process must be a child of
24 // the setuid sandbox. InitializeLayerOneSandbox() can only be called once
25 // per instance of the setuid sandbox.
42 // This API will only work if the layer-1 sandbox is not sealed and the
43 // layer-2 sandbox is not engaged.
48 // This API will only work if the layer-1 sandbox is not sealed and the
49 // layer-2 sandbox is not engaged.
51 // Will attempt to initialize the layer-1 sandbox, dependin
[all...]
/external/chromium_org/content/browser/
H A Dbootstrap_sandbox_mac.cc15 #include "sandbox/mac/bootstrap_sandbox.h"
27 sandbox::BootstrapSandbox* sandbox() const { function in class:content::__anon7026::BootstrapSandboxPolicy
44 scoped_ptr<sandbox::BootstrapSandbox> sandbox_;
53 sandbox()->ChildDied(data.handle);
58 sandbox()->ChildDied(data.handle);
62 : sandbox_(sandbox::BootstrapSandbox::Create()) {
82 sandbox::BootstrapSandbox* GetBootstrapSandbox() {
83 return BootstrapSandboxPolicy::GetInstance()->sandbox();
/external/chromium_org/content/gpu/
H A Dgpu_child_thread.h25 namespace sandbox { namespace
82 // Windows specific client sandbox interface.
83 sandbox::TargetServices* target_services_;
/external/chromium_org/content/public/common/
H A Dsandboxed_process_launcher_delegate.h21 namespace sandbox { namespace
28 // BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy,
37 // process (which implies no sandbox).
41 // return false if the process should be launched without a sandbox
45 // Called before the default sandbox is applied. If the default policy is too
48 //directory through the sandbox.
53 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
60 // Override this to return true to use the setuid sandbox.
71 // SANDBOX_TYPE_INVALID for no sandbox policy.
/external/chromium_org/sandbox/linux/bpf_dsl/
H A Dcons.h9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
44 } // namespace sandbox
/external/chromium_org/sandbox/linux/seccomp-bpf/
H A Dbasicblock.h10 #include "sandbox/linux/seccomp-bpf/instruction.h"
12 namespace sandbox { namespace
47 } // namespace sandbox
H A Dcodegen.h11 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
12 #include "sandbox/sandbox_export.h"
14 namespace sandbox { namespace
47 // // any C++ destructors after starting the sandbox.
150 } // namespace sandbox
H A Ddie.cc5 #include "sandbox/linux/seccomp-bpf/die.h"
18 #include "sandbox/linux/seccomp-bpf/syscall.h"
20 namespace sandbox { namespace
88 } // namespace sandbox
H A Ddie.h9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
15 #define SANDBOX_DIE(m) sandbox::Die::SandboxDie(m, __FILE__, __LINE__)
19 #define RAW_SANDBOX_DIE(m) sandbox::Die::RawSandboxDie(m)
22 #define SANDBOX_INFO(m) sandbox::Die::SandboxInfo(m, __FILE__, __LINE__)
26 // Terminate the program, even if the current sandbox policy prevents some
66 } // namespace sandbox
H A Derrorcode.cc5 #include "sandbox/linux/seccomp-bpf/errorcode.h"
7 #include "sandbox/linux/seccomp-bpf/die.h"
8 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
10 namespace sandbox { namespace
112 } // namespace sandbox
H A Derrorcode_unittest.cc5 #include "sandbox/linux/seccomp-bpf/errorcode.h"
9 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
10 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
11 #include "sandbox/linux/tests/unit_tests.h"
13 namespace sandbox { namespace
27 SandboxBPF sandbox; local
28 ErrorCode e3 = sandbox.Trap(NULL, NULL);
44 SandboxBPF sandbox; local
45 ErrorCode e0 = sandbox.Trap(NULL, "a");
46 ErrorCode e1 = sandbox
65 SandboxBPF sandbox; local
86 SandboxBPF sandbox; local
[all...]
H A Dinstruction.h10 namespace sandbox { namespace
60 } // namespace sandbox
H A Dsandbox_bpf_test_runner.cc5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_test_runner.h"
12 #include "sandbox/linux/seccomp-bpf/die.h"
13 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
14 #include "sandbox/linux/tests/unit_tests.h"
16 namespace sandbox { namespace
28 sandbox::Die::EnableSimpleExit();
33 if (sandbox::SandboxBPF::SupportsSeccompSandbox(-1) ==
34 sandbox::SandboxBPF::STATUS_AVAILABLE) {
35 // Ensure the the sandbox is actually available at this time
38 SANDBOX_ASSERT(sandbox
42 sandbox::SandboxBPF sandbox; local
60 sandbox::SandboxBPF sandbox; local
[all...]

Completed in 4950 milliseconds

1234567891011>>