HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 251 - 275 of 795) sorted by null

<<11121314151617181920>>

  /external/chromium_org/components/nacl/common/
nacl_helper_linux.h 25 // the SUID sandbox.
37 // child processes real PID from within the SUID sandbox. See
  /external/chromium_org/content/common/
OWNERS 10 # Mac Sandbox.
20 # new sandbox escapes.
  /external/chromium_org/content/public/app/
content_main.h 15 namespace sandbox { namespace
32 sandbox::SandboxInterfaceInfo* sandbox_info,
content_main_runner.h 16 namespace sandbox { namespace
38 sandbox::SandboxInterfaceInfo* sandbox_info,
  /external/chromium_org/content/renderer/
renderer_main_platform_delegate_win.cc 16 #include "sandbox/win/src/sandbox.h"
28 // Windows-only skia sandbox support
102 // cached and there's no more need to access the registry. If the sandbox
122 sandbox::TargetServices* target_services =
140 sandbox::TargetServices* target_services =
144 // Cause advapi32 to load before the sandbox is turned on.
147 // Warm up language subsystems before the sandbox is turned on.
  /external/chromium_org/content/shell/app/
shell_main.cc 8 #include "sandbox/win/src/sandbox_types.h"
21 sandbox::SandboxInterfaceInfo sandbox_info = {0};
  /external/chromium_org/sandbox/linux/seccomp-bpf/
syscall_unittest.cc 15 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
17 #include "sandbox/linux/seccomp-bpf/syscall.h"
18 #include "sandbox/linux/tests/unit_tests.h"
81 ErrorCode CopyAllArgsOnUnamePolicy(Sandbox *sandbox, int sysno, void *aux) {
82 if (!Sandbox::IsValidSyscallNumber(sysno)) {
86 return sandbox->Trap(CopySyscallArgsToAux, aux);
  /external/chromium_org/sandbox/linux/tests/
unit_tests.h 12 namespace sandbox { namespace
36 #define DEATH_SUCCESS() sandbox::UnitTests::DeathSuccess, NULL
37 #define DEATH_MESSAGE(msg) sandbox::UnitTests::DeathMessage, \
40 #define DEATH_EXIT_CODE(rc) sandbox::UnitTests::DeathExitCode, \
42 #define DEATH_BY_SIGNAL(s) sandbox::UnitTests::DeathExitCode, \
52 sandbox::UnitTests::RunTestInProcess(TEST_##test_name, NULL, death); \
58 // changes to the system (i.e. they install a sandbox). GTest provides death
69 : sandbox::UnitTests::AssertionFailure(SANDBOX_STR(expr), \
  /external/chromium_org/sandbox/win/src/
handle_closer.cc 5 #include "sandbox/win/src/handle_closer.h"
10 #include "sandbox/win/src/interceptors.h"
11 #include "sandbox/win/src/internal_types.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/process_thread_interception.h"
14 #include "sandbox/win/src/win_utils.h"
30 namespace sandbox { namespace
202 } // namespace sandbox
handle_inheritance_test.cc 9 #include "sandbox/win/tests/common/controller.h"
12 namespace sandbox { namespace
internal_types.h 8 namespace sandbox { namespace
73 } // namespace sandbox
sync_policy_test.cc 5 #include "sandbox/win/src/sync_policy_test.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_policy.h"
10 #include "sandbox/win/src/sandbox_factory.h"
11 #include "sandbox/win/src/nt_internals.h"
14 namespace sandbox { namespace
146 } // namespace sandbox
interception_agent.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
13 #include "sandbox/win/src/nt_internals.h"
14 #include "sandbox/win/src/sandbox_types.h"
16 namespace sandbox { namespace
85 } // namespace sandbox
registry_policy_test.cc 8 #include "sandbox/win/src/registry_policy.h"
9 #include "sandbox/win/src/sandbox.h"
10 #include "sandbox/win/src/sandbox_policy.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/win_utils.h"
14 #include "sandbox/win/tests/common/controller.h"
43 namespace sandbox { namespace
289 } // namespace sandbox
    [all...]
broker_services.cc 5 #include "sandbox/win/src/broker_services.h"
14 #include "sandbox/win/src/app_container.h"
15 #include "sandbox/win/src/process_mitigations.h"
16 #include "sandbox/win/src/sandbox_policy_base.h"
17 #include "sandbox/win/src/sandbox.h"
18 #include "sandbox/win/src/target_process.h"
19 #include "sandbox/win/src/win2k_threadpool.h"
20 #include "sandbox/win/src/win_utils.h"
34 sandbox::ResultCode SpawnCleanup(sandbox::TargetProcess* target, DWORD error)
85 namespace sandbox { namespace
    [all...]
sharedmem_ipc_client.cc 6 #include "sandbox/win/src/sharedmem_ipc_client.h"
7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/crosscall_client.h"
9 #include "sandbox/win/src/crosscall_params.h"
12 namespace sandbox { namespace
152 } // namespace sandbox
  /external/chromium_org/sandbox/win/tests/validation_tests/
commands.cc 8 #include "sandbox/win/tests/validation_tests/commands.h"
10 #include "sandbox/win/tests/common/controller.h"
47 return sandbox::SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
60 return sandbox::SBOX_TEST_SUCCEEDED;
63 return sandbox::SBOX_TEST_DENIED;
65 return sandbox::SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
72 namespace sandbox { namespace
262 } // namespace sandbox
commands.h 8 namespace sandbox { namespace
35 } // namespace sandbox
  /external/openssh/
sandbox-null.c 32 #include "ssh-sandbox.h"
35 /* dummy sandbox */
  /external/chromium_org/chrome/nacl/
nacl_exe_win_64.cc 29 #include "sandbox/win/src/sandbox_types.h"
60 sandbox::SandboxInterfaceInfo sandbox_info = {0};
82 // Initialize the sandbox for this process.
84 // Die if the sandbox can't be enabled.
85 CHECK(sandbox_initialized_ok) << "Error initializing sandbox for "
  /external/chromium_org/components/nacl/loader/
nacl_sandbox_linux.cc 15 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
16 #include "sandbox/linux/services/linux_syscalls.h"
19 using playground2::Sandbox;
52 playground2::Sandbox* sb, int sysno, void* aux) {
129 // Without the sandbox on, this ptrace call would ESRCH instead.
  /external/chromium_org/content/browser/zygote_host/
zygote_host_impl_linux.cc 36 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
37 #include "sandbox/linux/suid/common/sandbox.h"
122 // A non empty sandbox_cmd means we want a SUID sandbox.
128 LOG(FATAL) << "The SUID sandbox helper binary is missing: "
138 scoped_ptr<sandbox::SetuidSandboxClient>
139 sandbox_client(sandbox::SetuidSandboxClient::Create());
142 LOG(FATAL) << "The SUID sandbox helper binary was found, but is not "
149 // Start up the sandbox host process and get the file descriptor for the
168 // In the SUID sandbox, the real zygote is forked from the sandbox
    [all...]
  /external/chromium_org/content/ppapi_plugin/
ppapi_plugin_main.cc 24 #include "sandbox/win/src/sandbox.h"
36 sandbox::TargetServices* g_target_services = NULL;
91 // NSS must be initialized before enabling the sandbox below.
96 // before the sandbox is initialized.
  /external/chromium_org/sandbox/win/sandbox_poc/
main_ui_window.cc 15 #include "sandbox/win/sandbox_poc/main_ui_window.h"
17 #include "sandbox/win/sandbox_poc/resource.h"
18 #include "sandbox/win/src/acl.h"
19 #include "sandbox/win/src/sandbox.h"
20 #include "sandbox/win/src/win_utils.h"
43 sandbox::BrokerServices* broker) {
103 ::SetWindowText(window, L"Sandbox Proof of Concept");
508 sandbox::TargetPolicy* policy = broker_->CreatePolicy();
509 policy->SetJobLevel(sandbox::JOB_LOCKDOWN, 0)
    [all...]
  /external/chromium_org/sandbox/linux/
sandbox_linux.gypi 34 # We have two principal targets: sandbox and sandbox_linux_unittests
36 # FIXME(jln): for historial reasons, sandbox_linux is the setuid sandbox
39 'target_name': 'sandbox',
123 # The setuid sandbox, for Linux
127 'suid/common/sandbox.h',
133 'suid/sandbox.c',
191 'suid/common/sandbox.h',

Completed in 570 milliseconds

<<11121314151617181920>>