HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 176 - 200 of 240) sorted by null

1 2 3 4 5 6 78 910

  /external/chromium_org/sandbox/win/src/
process_thread_dispatcher.cc 5 #include "sandbox/win/src/process_thread_dispatcher.h"
9 #include "sandbox/win/src/crosscall_client.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/policy_broker.h"
14 #include "sandbox/win/src/policy_params.h"
15 #include "sandbox/win/src/process_thread_interception.h"
16 #include "sandbox/win/src/process_thread_policy.h"
17 #include "sandbox/win/src/sandbox.h
95 namespace sandbox { namespace
    [all...]
process_thread_policy.cc 5 #include "sandbox/win/src/process_thread_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/nt_internals.h"
12 #include "sandbox/win/src/policy_engine_opcodes.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/win_utils.h"
74 namespace sandbox { namespace
242 } // namespace sandbox
sandbox_nt_util.h 11 #include "sandbox/win/src/nt_internals.h"
12 #include "sandbox/win/src/sandbox_nt_types.h"
15 void* __cdecl operator new(size_t size, sandbox::AllocationType type,
17 void __cdecl operator delete(void* memory, sandbox::AllocationType type);
22 void __cdecl operator delete(void* memory, sandbox::AllocationType type,
27 sandbox::AllocationType type);
29 sandbox::AllocationType type);
52 namespace sandbox { namespace
183 } // namespace sandbox
sandbox_policy.h 12 #include "sandbox/win/src/sandbox_types.h"
13 #include "sandbox/win/src/security_level.h"
15 namespace sandbox { namespace
85 // Important: most of the sandbox-provided security relies on this single
141 // Sets the integrity level of the process in the sandbox. Both the initial
143 // is set to a level higher than the current level, the sandbox will fail
147 // Sets the integrity level of the process in the sandbox. The integrity level
150 // process in the sandbox. If the integrity level is set to a level higher
151 // than the current level, the sandbox will fail to start.
225 } // namespace sandbox
    [all...]
service_resolver.h 8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/resolver.h"
11 namespace sandbox { namespace
148 } // namespace sandbox
sharedmem_ipc_client.h 8 #include "sandbox/win/src/crosscall_params.h"
9 #include "sandbox/win/src/sandbox.h"
52 namespace sandbox { namespace
134 } // namespace sandbox
target_process.h 14 #include "sandbox/win/src/crosscall_server.h"
15 #include "sandbox/win/src/sandbox_types.h"
25 namespace sandbox { namespace
130 } // namespace sandbox
crosscall_server.cc 8 #include "sandbox/win/src/crosscall_server.h"
9 #include "sandbox/win/src/crosscall_params.h"
10 #include "sandbox/win/src/crosscall_client.h"
20 const size_t kMaxBufferSize = sandbox::kIPCChannelSize;
24 namespace sandbox { namespace
301 } // namespace sandbox
crosscall_server.h 13 #include "sandbox/win/src/crosscall_params.h"
15 // This is the IPC server interface for CrossCall: The IPC for the Sandbox
25 // of the CrossCallParams class of /sandbox/crosscall_params.h The difference
44 namespace sandbox { namespace
223 } // namespace sandbox
filesystem_policy.cc 7 #include "sandbox/win/src/filesystem_policy.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/policy_engine_opcodes.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox_utils.h"
15 #include "sandbox/win/src/sandbox_types.h"
16 #include "sandbox/win/src/win_utils.h"
43 if (!sandbox::SameObject(local_handle, obj_attributes->ObjectName->Buffer)) {
59 namespace sandbox { namespace
386 } // namespace sandbox
    [all...]
handle_table.cc 5 #include "sandbox/win/src/handle_table.h"
12 #include "sandbox/win/src/win_utils.h"
23 namespace sandbox { namespace
183 } // namespace sandbox
interception_agent.cc 6 // http://dev.chromium.org/developers/design-documents/sandbox .
8 #include "sandbox/win/src/interception_agent.h"
10 #include "sandbox/win/src/interception_internal.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/eat_resolver.h"
13 #include "sandbox/win/src/sidestep_resolver.h"
14 #include "sandbox/win/src/sandbox_nt_util.h"
26 namespace sandbox { namespace
233 } // namespace sandbox
interceptors.h 9 #include "sandbox/win/src/interceptors_64.h"
12 namespace sandbox { namespace
52 } // namespace sandbox
policy_low_level_unittest.cc 5 #include "sandbox/win/src/policy_engine_params.h"
6 #include "sandbox/win/src/policy_engine_processor.h"
7 #include "sandbox/win/src/policy_low_level.h"
10 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = {
11 #define POLPARAM(p) sandbox::ParamPickerMake(p),
14 namespace sandbox { namespace
617 } // namespace sandbox
process_policy_test.cc 13 #include "sandbox/win/src/sandbox.h"
14 #include "sandbox/win/src/sandbox_factory.h"
15 #include "sandbox/win/src/sandbox_policy.h"
16 #include "sandbox/win/tests/common/controller.h"
38 sandbox::SboxTestResult CreateProcessHelper(const string16& exe,
52 sandbox::SboxTestResult ret1 = sandbox::SBOX_TEST_FAILED;
57 ret1 = sandbox::SBOX_TEST_SUCCEEDED;
63 ret1 = sandbox::SBOX_TEST_DENIED
103 namespace sandbox { namespace
    [all...]
process_thread_interception.cc 5 #include "sandbox/win/src/process_thread_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
restricted_token.cc 5 #include "sandbox/win/src/restricted_token.h"
10 #include "sandbox/win/src/acl.h"
11 #include "sandbox/win/src/win_utils.h"
14 namespace sandbox { namespace
472 } // namespace sandbox
restricted_token_unittest.cc 11 #include "sandbox/win/src/restricted_token.h"
12 #include "sandbox/win/src/sid.h"
15 namespace sandbox { namespace
593 } // namespace sandbox
restricted_token_utils.cc 9 #include "sandbox/win/src/restricted_token_utils.h"
15 #include "sandbox/win/src/job.h"
16 #include "sandbox/win/src/restricted_token.h"
17 #include "sandbox/win/src/security_level.h"
18 #include "sandbox/win/src/sid.h"
20 namespace sandbox { namespace
345 } // namespace sandbox
sandbox_nt_types.h 8 #include "sandbox/win/src/nt_internals.h"
10 namespace sandbox { namespace
44 } // namespace sandbox
  /external/chromium_org/content/common/sandbox_linux/
sandbox_seccomp_bpf_linux.cc 35 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
36 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
37 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
38 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
39 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
40 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
41 #include "sandbox/linux/services/linux_syscalls.h"
43 using sandbox::BaselinePolicy;
44 using sandbox::SyscallSets;
50 void StartSandboxWithPolicy(sandbox::SandboxBPFPolicy* policy)
154 SandboxBPF sandbox; local
    [all...]
  /external/chromium_org/content/public/browser/
content_browser_client.h 63 namespace sandbox { namespace
599 // is launched. It gives the embedder a chance to add loosen the sandbox
601 virtual void PreSpawnRenderer(sandbox::TargetPolicy* policy,
  /external/chromium_org/sandbox/linux/seccomp-bpf/
sandbox_bpf.h 20 #include "sandbox/linux/seccomp-bpf/die.h"
21 #include "sandbox/linux/seccomp-bpf/errorcode.h"
22 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
24 namespace sandbox { namespace
51 STATUS_ENABLED // The sandbox is now active
55 // pointer in |aux|. This pointer will then be forwarded to the sandbox
68 // NOTE: Setting a policy and starting the sandbox is a one-way operation.
70 // sandbox. Strictly speaking, that means we should disallow calling
72 // this makes it needlessly complicated to operate on "Sandbox"
85 // There are a lot of reasons why the Seccomp sandbox might not be available
    [all...]
trap.cc 5 #include "sandbox/linux/seccomp-bpf/trap.h"
16 #include "sandbox/linux/seccomp-bpf/codegen.h"
17 #include "sandbox/linux/seccomp-bpf/die.h"
18 #include "sandbox/linux/seccomp-bpf/syscall.h"
22 #include "sandbox/linux/services/android_ucontext.h"
68 namespace sandbox { namespace
99 // to avoid race conditions. Normally, this is a non-issue as the sandbox
183 // evaluator registered with the sandbox.
271 // threaded while the sandbox is being set up). But we nonetheless are
332 SANDBOX_INFO("WARNING! Disabling sandbox for debugging purposes")
    [all...]
  /external/chromium_org/sandbox/linux/suid/client/
setuid_sandbox_client.cc 15 #include "sandbox/linux/services/init_process_reaper.h"
16 #include "sandbox/linux/suid/common/sandbox.h"
17 #include "sandbox/linux/suid/common/suid_unsafe_environment_variables.h"
23 // setuid sandbox. Old versions of the sandbox will ignore this.
25 env->SetVar(sandbox::kSandboxEnvironmentApiRequest,
26 base::IntToString(sandbox::kSUIDSandboxApiNumber));
44 // different names here so that the SUID sandbox can resolve them for the
65 if (env->GetVar(sandbox::kSandboxEnvironmentApiProvides, &api_string) &
96 namespace sandbox { namespace
    [all...]

Completed in 796 milliseconds

1 2 3 4 5 6 78 910