Searched defs:sandbox (Results 51 - 75 of 299) sorted by relevance

1234567891011>>

/external/chromium_org/sandbox/win/src/
H A Dsync_policy.h12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/nt_internals.h"
14 #include "sandbox/win/src/policy_low_level.h"
15 #include "sandbox/win/src/sandbox_policy.h"
17 namespace sandbox { namespace
49 } // namespace sandbox
H A Dapp_container_unittest.cc6 #include "sandbox/win/src/app_container.h"
9 namespace sandbox { namespace
58 } // namespace sandbox
H A Dpolicy_params.h8 #include "sandbox/win/src/policy_engine_params.h"
10 namespace sandbox { namespace
19 typedef sandbox::ParameterSet type##Array [type::PolParamLast];
64 } // namespace sandbox
H A Dprocess_mitigations_win32k_interception.h10 #include "sandbox/win/src/sandbox_types.h"
12 namespace sandbox { namespace
43 } // namespace sandbox
H A Dprocess_mitigations_win32k_policy.cc5 #include "sandbox/win/src/process_mitigations_win32k_policy.h"
7 namespace sandbox { namespace
23 } // namespace sandbox
H A Drestricted_token_utils.h11 #include "sandbox/win/src/restricted_token.h"
12 #include "sandbox/win/src/security_level.h"
17 namespace sandbox { namespace
85 } // namespace sandbox
H A Dtarget_services.h9 #include "sandbox/win/src/sandbox.h"
10 #include "sandbox/win/src/win_utils.h"
12 namespace sandbox { namespace
38 // Look in the documentation of sandbox::TargetServices for more info.
69 } // namespace sandbox
H A Dapp_container.h14 #include "sandbox/win/src/sandbox_types.h"
22 namespace sandbox { namespace
67 } // namespace sandbox
H A Deat_resolver.h9 #include "sandbox/win/src/nt_internals.h"
10 #include "sandbox/win/src/resolver.h"
12 namespace sandbox { namespace
45 } // namespace sandbox
H A Dfilesystem_dispatcher.h10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
58 } // namespace sandbox
H A Dhandle_dispatcher.h9 #include "sandbox/win/src/crosscall_server.h"
10 #include "sandbox/win/src/sandbox_policy_base.h"
12 namespace sandbox { namespace
34 } // namespace sandbox
/external/chromium_org/content/common/sandbox_linux/
H A Dsandbox_seccomp_bpf_linux.h13 namespace sandbox { namespace
21 // This class has two main sets of APIs. One can be used to start the sandbox
26 // This is the API to enable a seccomp-bpf sandbox for content/
28 // Is the sandbox globally enabled, can anything use it at all ?
29 // This looks at global command line flags to see if the sandbox
32 // Should the sandbox be enabled for process_type ?
34 // Check if the kernel supports this sandbox. It's useful to "prewarm"
37 // Start the sandbox and apply the policy for process_type, depending on
41 // This is the API to enable a seccomp-bpf sandbox by using an
44 scoped_ptr<sandbox
[all...]
/external/chromium_org/content/public/common/
H A Dsandbox_init.h18 namespace sandbox { namespace
30 // Initialize the sandbox for renderer, gpu, utility, worker, nacl, and plug-in
34 // Returns true if the sandbox was initialized succesfully, false if an error
38 sandbox::SandboxInterfaceInfo* sandbox_info);
41 // that works inside the sandbox and can send handles but not retrieve
50 // Inform the current process's sandbox broker (e.g. the broker for
51 // 32-bit processes) about a process created under a different sandbox
67 // Initialize the sandbox of the given |sandbox_type|, optionally specifying a
69 // supported by the sandbox profile associated with the given |sandbox_type|.
76 // sandbox
[all...]
/external/chromium_org/sandbox/linux/seccomp-bpf/
H A Dsandbox_bpf_policy.h9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
16 // This is the interface to implement to define a BPF sandbox policy.
39 } // namespace sandbox
H A Dsyscall_iterator.cc5 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
8 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
10 namespace sandbox { namespace
103 } // namespace sandbox
/external/chromium_org/sandbox/linux/suid/client/
H A Dsetuid_sandbox_client.h13 #include "sandbox/sandbox_export.h"
15 namespace sandbox { namespace
17 // Helper class to use the setuid sandbox. This class is to be used both
28 // setuid sandbox ABI.
33 // 6.b (optional) B uses sandbox::Credentials::HasOpenDirectory() to verify
35 // sandbox).
49 // Close the dummy file descriptor leftover from the sandbox ABI.
51 // Ask the setuid helper over the setuid sandbox IPC channel to chroot() us
57 // See sandbox/linux/services/init_process_reaper.h for more information
72 // The setuid sandbox ma
[all...]
/external/chromium_org/sandbox/linux/tests/
H A Dsandbox_test_runner_function_pointer.h9 #include "sandbox/linux/tests/sandbox_test_runner.h"
11 namespace sandbox { namespace
24 } // namespace sandbox
H A Dsandbox_test_runner.cc5 #include "sandbox/linux/tests/sandbox_test_runner.h"
7 namespace sandbox { namespace
19 } // namespace sandbox
H A Dsandbox_test_runner_function_pointer.cc5 #include "sandbox/linux/tests/sandbox_test_runner_function_pointer.h"
10 namespace sandbox { namespace
25 } // namespace sandbox
H A Dscoped_temporary_file.cc5 #include "sandbox/linux/tests/scoped_temporary_file.h"
15 namespace sandbox { namespace
35 } // namespace sandbox
H A Dunit_tests_unittest.cc13 #include "sandbox/linux/tests/unit_tests.h"
15 namespace sandbox { namespace
62 } // namespace sandbox
/external/chromium_org/chrome/app/
H A Dclient_util.h16 namespace sandbox { namespace
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
H A Dbaseline_policy.h8 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
13 // This is a helper to build seccomp-bpf policies, i.e. policies for a sandbox
42 } // namespace sandbox.
/external/chromium_org/sandbox/linux/services/
H A Dscoped_process.h11 #include "sandbox/sandbox_export.h"
13 namespace sandbox { namespace
53 } // namespace sandbox
/external/chromium_org/sandbox/mac/
H A Ddispatch_source_mach.h11 #include "sandbox/sandbox_export.h"
13 namespace sandbox { namespace
59 } // namespace sandbox

Completed in 6326 milliseconds

1234567891011>>