/external/chromium_org/sandbox/win/src/ |
H A D | sync_policy.h | 12 #include "sandbox/win/src/crosscall_server.h" 13 #include "sandbox/win/src/nt_internals.h" 14 #include "sandbox/win/src/policy_low_level.h" 15 #include "sandbox/win/src/sandbox_policy.h" 17 namespace sandbox { namespace 49 } // namespace sandbox
|
H A D | app_container_unittest.cc | 6 #include "sandbox/win/src/app_container.h" 9 namespace sandbox { namespace 58 } // namespace sandbox
|
H A D | policy_params.h | 8 #include "sandbox/win/src/policy_engine_params.h" 10 namespace sandbox { namespace 19 typedef sandbox::ParameterSet type##Array [type::PolParamLast]; 64 } // namespace sandbox
|
H A D | process_mitigations_win32k_interception.h | 10 #include "sandbox/win/src/sandbox_types.h" 12 namespace sandbox { namespace 43 } // namespace sandbox
|
H A D | process_mitigations_win32k_policy.cc | 5 #include "sandbox/win/src/process_mitigations_win32k_policy.h" 7 namespace sandbox { namespace 23 } // namespace sandbox
|
H A D | restricted_token_utils.h | 11 #include "sandbox/win/src/restricted_token.h" 12 #include "sandbox/win/src/security_level.h" 17 namespace sandbox { namespace 85 } // namespace sandbox
|
H A D | target_services.h | 9 #include "sandbox/win/src/sandbox.h" 10 #include "sandbox/win/src/win_utils.h" 12 namespace sandbox { namespace 38 // Look in the documentation of sandbox::TargetServices for more info. 69 } // namespace sandbox
|
H A D | app_container.h | 14 #include "sandbox/win/src/sandbox_types.h" 22 namespace sandbox { namespace 67 } // namespace sandbox
|
H A D | eat_resolver.h | 9 #include "sandbox/win/src/nt_internals.h" 10 #include "sandbox/win/src/resolver.h" 12 namespace sandbox { namespace 45 } // namespace sandbox
|
H A D | filesystem_dispatcher.h | 10 #include "sandbox/win/src/crosscall_server.h" 11 #include "sandbox/win/src/sandbox_policy_base.h" 13 namespace sandbox { namespace 58 } // namespace sandbox
|
H A D | handle_dispatcher.h | 9 #include "sandbox/win/src/crosscall_server.h" 10 #include "sandbox/win/src/sandbox_policy_base.h" 12 namespace sandbox { namespace 34 } // namespace sandbox
|
/external/chromium_org/content/common/sandbox_linux/ |
H A D | sandbox_seccomp_bpf_linux.h | 13 namespace sandbox { namespace 21 // This class has two main sets of APIs. One can be used to start the sandbox 26 // This is the API to enable a seccomp-bpf sandbox for content/ 28 // Is the sandbox globally enabled, can anything use it at all ? 29 // This looks at global command line flags to see if the sandbox 32 // Should the sandbox be enabled for process_type ? 34 // Check if the kernel supports this sandbox. It's useful to "prewarm" 37 // Start the sandbox and apply the policy for process_type, depending on 41 // This is the API to enable a seccomp-bpf sandbox by using an 44 scoped_ptr<sandbox [all...] |
/external/chromium_org/content/public/common/ |
H A D | sandbox_init.h | 18 namespace sandbox { namespace 30 // Initialize the sandbox for renderer, gpu, utility, worker, nacl, and plug-in 34 // Returns true if the sandbox was initialized succesfully, false if an error 38 sandbox::SandboxInterfaceInfo* sandbox_info); 41 // that works inside the sandbox and can send handles but not retrieve 50 // Inform the current process's sandbox broker (e.g. the broker for 51 // 32-bit processes) about a process created under a different sandbox 67 // Initialize the sandbox of the given |sandbox_type|, optionally specifying a 69 // supported by the sandbox profile associated with the given |sandbox_type|. 76 // sandbox [all...] |
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
H A D | sandbox_bpf_policy.h | 9 #include "sandbox/sandbox_export.h" 11 namespace sandbox { namespace 16 // This is the interface to implement to define a BPF sandbox policy. 39 } // namespace sandbox
|
H A D | syscall_iterator.cc | 5 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h" 8 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 10 namespace sandbox { namespace 103 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/suid/client/ |
H A D | setuid_sandbox_client.h | 13 #include "sandbox/sandbox_export.h" 15 namespace sandbox { namespace 17 // Helper class to use the setuid sandbox. This class is to be used both 28 // setuid sandbox ABI. 33 // 6.b (optional) B uses sandbox::Credentials::HasOpenDirectory() to verify 35 // sandbox). 49 // Close the dummy file descriptor leftover from the sandbox ABI. 51 // Ask the setuid helper over the setuid sandbox IPC channel to chroot() us 57 // See sandbox/linux/services/init_process_reaper.h for more information 72 // The setuid sandbox ma [all...] |
/external/chromium_org/sandbox/linux/tests/ |
H A D | sandbox_test_runner_function_pointer.h | 9 #include "sandbox/linux/tests/sandbox_test_runner.h" 11 namespace sandbox { namespace 24 } // namespace sandbox
|
H A D | sandbox_test_runner.cc | 5 #include "sandbox/linux/tests/sandbox_test_runner.h" 7 namespace sandbox { namespace 19 } // namespace sandbox
|
H A D | sandbox_test_runner_function_pointer.cc | 5 #include "sandbox/linux/tests/sandbox_test_runner_function_pointer.h" 10 namespace sandbox { namespace 25 } // namespace sandbox
|
H A D | scoped_temporary_file.cc | 5 #include "sandbox/linux/tests/scoped_temporary_file.h" 15 namespace sandbox { namespace 35 } // namespace sandbox
|
H A D | unit_tests_unittest.cc | 13 #include "sandbox/linux/tests/unit_tests.h" 15 namespace sandbox { namespace 62 } // namespace sandbox
|
/external/chromium_org/chrome/app/ |
H A D | client_util.h | 16 namespace sandbox { namespace
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
H A D | baseline_policy.h | 8 #include "sandbox/linux/bpf_dsl/bpf_dsl.h" 9 #include "sandbox/sandbox_export.h" 11 namespace sandbox { namespace 13 // This is a helper to build seccomp-bpf policies, i.e. policies for a sandbox 42 } // namespace sandbox.
|
/external/chromium_org/sandbox/linux/services/ |
H A D | scoped_process.h | 11 #include "sandbox/sandbox_export.h" 13 namespace sandbox { namespace 53 } // namespace sandbox
|
/external/chromium_org/sandbox/mac/ |
H A D | dispatch_source_mach.h | 11 #include "sandbox/sandbox_export.h" 13 namespace sandbox { namespace 59 } // namespace sandbox
|