HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 201 - 225 of 240) sorted by null

1 2 3 4 5 6 7 8910

  /external/chromium_org/sandbox/win/src/
sandbox_policy_base.h 16 #include "sandbox/win/src/crosscall_server.h"
17 #include "sandbox/win/src/handle_closer.h"
18 #include "sandbox/win/src/ipc_tags.h"
19 #include "sandbox/win/src/policy_engine_opcodes.h"
20 #include "sandbox/win/src/policy_engine_params.h"
21 #include "sandbox/win/src/sandbox_policy.h"
22 #include "sandbox/win/src/win_utils.h"
24 namespace sandbox { namespace
158 } // namespace sandbox
security_level.h 10 namespace sandbox { namespace
12 // List of all the integrity levels supported in the sandbox. This is used
14 // in the sandbox to a level higher than yours.
27 // provide the bulk of the security of sandbox.
135 // Some mitigations are implemented directly by the sandbox or emulated to
201 } // namespace sandbox
service_resolver_64.cc 5 #include "sandbox/win/src/service_resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
9 #include "sandbox/win/src/win_utils.h"
83 namespace sandbox { namespace
193 } // namespace sandbox
sharedmem_ipc_server.cc 8 #include "sandbox/win/src/sharedmem_ipc_server.h"
9 #include "sandbox/win/src/sharedmem_ipc_client.h"
10 #include "sandbox/win/src/sandbox.h"
11 #include "sandbox/win/src/sandbox_types.h"
12 #include "sandbox/win/src/crosscall_params.h"
13 #include "sandbox/win/src/crosscall_server.h"
15 namespace sandbox { namespace
410 } // namespace sandbox
sync_policy.cc 7 #include "sandbox/win/src/sync_policy.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/policy_engine_opcodes.h"
14 #include "sandbox/win/src/policy_params.h"
15 #include "sandbox/win/src/sandbox_types.h"
16 #include "sandbox/win/src/sandbox_utils.h"
17 #include "sandbox/win/src/sync_interception.h"
18 #include "sandbox/win/src/win_utils.h"
20 namespace sandbox { namespace
    [all...]
target_process.cc 5 #include "sandbox/win/src/target_process.h"
12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/crosscall_client.h"
14 #include "sandbox/win/src/policy_low_level.h"
15 #include "sandbox/win/src/sandbox_types.h"
16 #include "sandbox/win/src/sharedmem_ipc_server.h"
24 sandbox::PolicyGlobal* policy =
25 reinterpret_cast<sandbox::PolicyGlobal*>(dest);
29 for (size_t i = 0; i < sandbox::kMaxServiceCount; i++) {
33 policy->entry[i] = reinterpret_cast<sandbox::PolicyBuffer*>(buffer)
40 namespace sandbox { namespace
    [all...]
target_services.cc 5 #include "sandbox/win/src/target_services.h"
10 #include "sandbox/win/src/crosscall_client.h"
11 #include "sandbox/win/src/handle_closer_agent.h"
12 #include "sandbox/win/src/handle_interception.h"
13 #include "sandbox/win/src/ipc_tags.h"
14 #include "sandbox/win/src/process_mitigations.h"
15 #include "sandbox/win/src/restricted_token_utils.h"
16 #include "sandbox/win/src/sandbox.h"
17 #include "sandbox/win/src/sandbox_types.h
61 namespace sandbox { namespace
    [all...]
Wow64.cc 5 #include "sandbox/win/src/wow64.h"
13 #include "sandbox/win/src/target_process.h"
74 namespace sandbox { namespace
220 } // namespace sandbox
broker_services.cc 5 #include "sandbox/win/src/broker_services.h"
14 #include "sandbox/win/src/app_container.h"
15 #include "sandbox/win/src/process_mitigations.h"
16 #include "sandbox/win/src/sandbox_policy_base.h"
17 #include "sandbox/win/src/sandbox.h"
18 #include "sandbox/win/src/target_process.h"
19 #include "sandbox/win/src/win2k_threadpool.h"
20 #include "sandbox/win/src/win_utils.h"
34 sandbox::ResultCode SpawnCleanup(sandbox::TargetProcess* target, DWORD error)
85 namespace sandbox { namespace
    [all...]
crosscall_params.h 14 #include "sandbox/win/src/internal_types.h"
15 #include "sandbox/win/src/sandbox_types.h"
27 // This header is part of CrossCall: the sandbox inter-process communication.
45 namespace sandbox { namespace
292 } // namespace sandbox
file_policy_test.cc 12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/sandbox.h"
14 #include "sandbox/win/src/sandbox_factory.h"
15 #include "sandbox/win/src/sandbox_policy.h"
16 #include "sandbox/win/src/win_utils.h"
17 #include "sandbox/win/tests/common/controller.h"
18 #include "sandbox/win/tests/common/test_utils.h"
25 namespace sandbox { namespace
599 } // namespace sandbox
    [all...]
handle_table.h 13 #include "sandbox/win/src/nt_internals.h"
15 namespace sandbox { namespace
157 } // namespace sandbox
interception.cc 6 // http://dev.chromium.org/developers/design-documents/sandbox .
10 #include "sandbox/win/src/interception.h"
17 #include "sandbox/win/src/interception_internal.h"
18 #include "sandbox/win/src/interceptors.h"
19 #include "sandbox/win/src/sandbox.h"
20 #include "sandbox/win/src/sandbox_utils.h"
21 #include "sandbox/win/src/service_resolver.h"
22 #include "sandbox/win/src/target_interceptions.h"
23 #include "sandbox/win/src/target_process.h
55 namespace sandbox { namespace
    [all...]
policy_engine_opcodes.cc 5 #include "sandbox/win/src/policy_engine_opcodes.h"
8 #include "sandbox/win/src/sandbox_nt_types.h"
9 #include "sandbox/win/src/sandbox_types.h"
28 namespace sandbox { namespace
454 } // namespace sandbox
  /external/chromium_org/sandbox/win/tests/common/
controller.cc 5 #include "sandbox/win/tests/common/controller.h"
12 #include "sandbox/win/src/sandbox_factory.h"
63 namespace sandbox { namespace
216 arguments += no_sandbox_ ? L"-no-sandbox " : L" ";
329 } else if (0 != _wcsicmp(argv[1], L"-child-no-sandbox")) {
336 } // namespace sandbox
  /external/chromium/chrome/common/
sandbox_policy.cc 25 #include "sandbox/src/sandbox.h"
27 static sandbox::BrokerServices* g_broker_services = NULL;
125 sandbox::TargetPolicy::Semantics access,
126 sandbox::TargetPolicy* policy) {
136 sandbox::ResultCode result;
137 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access,
139 if (result != sandbox::SBOX_ALL_OK)
147 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access,
149 if (result != sandbox::SBOX_ALL_OK
563 namespace sandbox { namespace
    [all...]
  /external/chromium_org/sandbox/linux/seccomp-bpf/
codegen.cc 7 #include "sandbox/linux/seccomp-bpf/codegen.h"
12 void TraverseRecursively(std::set<sandbox::Instruction*>* visited,
13 sandbox::Instruction* instruction) {
34 namespace sandbox { namespace
750 } // namespace sandbox
codegen_unittest.cc 11 #include "sandbox/linux/seccomp-bpf/codegen.h"
12 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
13 #include "sandbox/linux/tests/unit_tests.h"
15 namespace sandbox { namespace
447 } // namespace sandbox
demo.cc 30 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
31 #include "sandbox/linux/services/linux_syscalls.h"
33 using sandbox::ErrorCode;
34 using sandbox::SandboxBPF;
35 using sandbox::arch_seccomp_data;
39 // We don't expect our sandbox to do anything useful yet. So, we will fail
41 // following line should be removed as soon as the sandbox is starting to
216 // log the system call and then deny it. More elaborate sandbox policies
240 ErrorCode Evaluator(SandboxBPF* sandbox, int sysno, void *) {
329 return sandbox->Cond(1, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL
421 SandboxBPF sandbox; local
    [all...]
errorcode.h 8 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
9 #include "sandbox/linux/seccomp-bpf/trap.h"
11 namespace sandbox { namespace
15 // This class holds all the possible values that can be returned by a sandbox
54 // interpreted as an attempt at breaking the sandbox and results in the
175 bool safe_; // Keep sandbox active while calling fnc_()
195 } // namespace sandbox
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
syscall_sets.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
8 #include "sandbox/linux/services/linux_syscalls.h"
10 namespace sandbox { namespace
770 // These give a lot of ambient authority and bypass the setuid sandbox.
981 } // namespace sandbox.
  /external/chromium_org/sandbox/linux/services/
broker_process.cc 5 #include "sandbox/linux/services/broker_process.h"
26 #include "sandbox/linux/services/linux_syscalls.h"
115 namespace sandbox { namespace
176 // Enable the sandbox if provided.
520 } // namespace sandbox.
broker_process_unittest.cc 5 #include "sandbox/linux/services/broker_process.h"
22 #include "sandbox/linux/tests/unit_tests.h"
27 namespace sandbox { namespace
444 } // namespace sandbox
credentials.cc 5 #include "sandbox/linux/services/credentials.h"
151 namespace sandbox { namespace
272 } // namespace sandbox.
  /external/chromium_org/sandbox/linux/tests/
unit_tests.cc 16 #include "sandbox/linux/tests/unit_tests.h"
42 namespace sandbox { namespace
102 // in the BPF sandbox, as it potentially makes global state changes and as
120 ASSERT_EQ(1, num_threads) << "Running sandbox tests with multiple threads "
186 // run (e.g. when testing sandbox features on a kernel that doesn't

Completed in 311 milliseconds

1 2 3 4 5 6 7 8910