HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 101 - 125 of 240) sorted by null

1 2 3 45 6 7 8 910

  /external/chromium_org/sandbox/win/src/
policy_target.cc 5 #include "sandbox/win/src/policy_target.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_engine_processor.h"
10 #include "sandbox/win/src/policy_low_level.h"
11 #include "sandbox/win/src/policy_params.h"
12 #include "sandbox/win/src/sandbox_factory.h"
13 #include "sandbox/win/src/sandbox_nt_util.h"
14 #include "sandbox/win/src/sharedmem_ipc_client.h"
15 #include "sandbox/win/src/target_services.h
17 namespace sandbox { namespace
    [all...]
shared_handles.cc 5 #include "sandbox/win/src/shared_handles.h"
7 namespace sandbox { namespace
67 } // namespace sandbox
sidestep_resolver.h 9 #include "sandbox/win/src/nt_internals.h"
10 #include "sandbox/win/src/resolver.h"
12 namespace sandbox { namespace
70 } // namespace sandbox
target_interceptions.cc 5 #include "sandbox/win/src/target_interceptions.h"
7 #include "sandbox/win/src/interception_agent.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/sandbox_nt_util.h"
10 #include "sandbox/win/src/target_services.h"
12 namespace sandbox { namespace
100 } // namespace sandbox
unload_dll_test.cc 6 #include "sandbox/win/src/sandbox.h"
7 #include "sandbox/win/src/sandbox_factory.h"
8 #include "sandbox/win/src/target_services.h"
9 #include "sandbox/win/tests/common/controller.h"
12 namespace sandbox { namespace
64 sandbox::TargetPolicy* policy = runner.GetPolicy();
75 sandbox::TargetPolicy* policy = runner.GetPolicy();
96 } // namespace sandbox
win2k_threadpool.h 10 #include "sandbox/win/src/crosscall_server.h"
12 namespace sandbox { namespace
15 // for the sandbox IPC subsystem. See sandbox\crosscall_server.h for the details
56 } // namespace sandbox
acl.cc 5 #include "sandbox/win/src/acl.h"
12 namespace sandbox { namespace
124 } // namespace sandbox
app_container_test.cc 14 #include "sandbox/win/src/sync_policy_test.h"
68 namespace sandbox { namespace
143 } // namespace sandbox
broker_services.h 14 #include "sandbox/win/src/crosscall_server.h"
15 #include "sandbox/win/src/job.h"
16 #include "sandbox/win/src/sandbox.h"
17 #include "sandbox/win/src/sharedmem_ipc_server.h"
18 #include "sandbox/win/src/win2k_threadpool.h"
19 #include "sandbox/win/src/win_utils.h"
28 namespace sandbox { namespace
111 } // namespace sandbox
handle_closer.h 13 #include "sandbox/win/src/interception.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/target_process.h"
17 namespace sandbox { namespace
73 } // namespace sandbox
handle_closer_agent.cc 5 #include "sandbox/win/src/handle_closer_agent.h"
8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/win_utils.h"
35 namespace sandbox { namespace
145 } // namespace sandbox
handle_dispatcher.cc 5 #include "sandbox/win/src/handle_dispatcher.h"
8 #include "sandbox/win/src/handle_interception.h"
9 #include "sandbox/win/src/handle_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/policy_broker.h"
12 #include "sandbox/win/src/policy_params.h"
13 #include "sandbox/win/src/sandbox.h"
14 #include "sandbox/win/src/sandbox_nt_util.h"
15 #include "sandbox/win/src/sandbox_types.h
18 namespace sandbox { namespace
    [all...]
handle_inheritance_test.cc 9 #include "sandbox/win/tests/common/controller.h"
12 namespace sandbox { namespace
interception_unittest.cc 12 #include "sandbox/win/src/interception.h"
13 #include "sandbox/win/src/interceptors.h"
14 #include "sandbox/win/src/interception_internal.h"
15 #include "sandbox/win/src/target_process.h"
18 namespace sandbox { namespace
212 } // namespace sandbox
named_pipe_dispatcher.cc 5 #include "sandbox/win/src/named_pipe_dispatcher.h"
10 #include "sandbox/win/src/crosscall_client.h"
11 #include "sandbox/win/src/interception.h"
12 #include "sandbox/win/src/interceptors.h"
13 #include "sandbox/win/src/ipc_tags.h"
14 #include "sandbox/win/src/named_pipe_interception.h"
15 #include "sandbox/win/src/named_pipe_policy.h"
16 #include "sandbox/win/src/policy_broker.h"
17 #include "sandbox/win/src/policy_params.h"
18 #include "sandbox/win/src/sandbox.h
21 namespace sandbox { namespace
    [all...]
  /external/chromium_org/sandbox/win/wow_helper/
target_code.h 8 #include "sandbox/win/src/nt_internals.h"
10 namespace sandbox { namespace
16 // on sandbox/win/src/wow64.cc.
39 } // namespace sandbox
  /external/chromium_org/content/gpu/
gpu_child_thread.h 25 namespace sandbox { namespace
82 // Windows specific client sandbox interface.
83 sandbox::TargetServices* target_services_;
  /external/chromium_org/content/public/common/
sandboxed_process_launcher_delegate.h 14 namespace sandbox { namespace
21 // BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy,
29 // |in_sandbox| to false if this process should be launched without a sandbox
33 // Called before the default sandbox is applied. If the default policy is too
36 //directory through the sandbox.
41 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
  /external/chromium_org/sandbox/linux/seccomp-bpf/
codegen.h 12 #include "sandbox/linux/seccomp-bpf/basicblock.h"
13 #include "sandbox/linux/seccomp-bpf/instruction.h"
14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
16 namespace sandbox { namespace
48 // // any C++ destructors after starting the sandbox.
157 } // namespace sandbox
trap.h 16 namespace sandbox { namespace
26 // time. For the purposes of our sandbox, this assertion should always be
27 // true. Threads are incompatible with the seccomp sandbox anyway.
55 // Once unsafe traps are enabled, the sandbox is essentially compromised.
114 } // namespace sandbox
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
syscall_parameters_restrictions.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
22 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
23 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
24 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
64 namespace sandbox { namespace
66 ErrorCode RestrictCloneToThreadsAndEPERMFork(SandboxBPF* sandbox) {
69 return sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL,
74 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL,
78 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL,
81 sandbox->Trap(SIGSYSCloneFailure, NULL))))
    [all...]
  /external/chromium_org/sandbox/linux/services/
init_process_reaper.cc 5 #include "sandbox/linux/services/init_process_reaper.h"
18 namespace sandbox { namespace
101 } // namespace sandbox.
  /external/chromium_org/sandbox/linux/suid/common/
sandbox.h 9 namespace sandbox { namespace
13 // (e.g. Chrome) to construct a command line for the sandbox.
37 } // namespace sandbox
  /external/chromium_org/sandbox/linux/tests/
unit_tests.h 12 namespace sandbox { namespace
36 #define DEATH_SUCCESS() sandbox::UnitTests::DeathSuccess, NULL
38 sandbox::UnitTests::DeathMessage, \
41 sandbox::UnitTests::DeathExitCode, \
44 sandbox::UnitTests::DeathExitCode, \
54 sandbox::UnitTests::RunTestInProcess(TEST_##test_name, NULL, death); \
60 // changes to the system (i.e. they install a sandbox). GTest provides death
69 ((expr) ? static_cast<void>(0) : sandbox::UnitTests::AssertionFailure( \
  /external/chromium_org/sandbox/win/sandbox_poc/
main_ui_window.h 13 namespace sandbox { namespace
23 // The purpose of this is to be able to spawn an EXE inside a SandBox, have it
25 // sandbox. This is useful for developer debugging and for security testing.
54 // BrokerService that will launch a new EXE inside the sandbox and load the
59 sandbox::BrokerServices* broker);
116 // Spawns a target EXE inside the sandbox (with the help of the
159 // The BrokerServices will be used to spawn an EXE in a sandbox and ask
161 sandbox::BrokerServices* broker_;

Completed in 929 milliseconds

1 2 3 45 6 7 8 910