HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 251 - 275 of 851) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/win/src/
registry_interception.cc 5 #include "sandbox/win/src/registry_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/sandbox_nt_util.h"
11 #include "sandbox/win/src/sharedmem_ipc_client.h"
12 #include "sandbox/win/src/target_services.h"
14 namespace sandbox { namespace
176 } // namespace sandbox
registry_policy.cc 7 #include "sandbox/win/src/registry_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/policy_engine_opcodes.h"
12 #include "sandbox/win/src/policy_params.h"
13 #include "sandbox/win/src/sandbox_utils.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/win_utils.h"
115 namespace sandbox { namespace
225 } // namespace sandbox
resolver_32.cc 5 #include "sandbox/win/src/resolver.h"
7 #include "sandbox/win/src/sandbox_nt_util.h"
57 namespace sandbox { namespace
88 } // namespace sandbox
sandbox_nt_util.h 11 #include "sandbox/win/src/nt_internals.h"
12 #include "sandbox/win/src/sandbox_nt_types.h"
15 void* __cdecl operator new(size_t size, sandbox::AllocationType type,
17 void __cdecl operator delete(void* memory, sandbox::AllocationType type);
22 void __cdecl operator delete(void* memory, sandbox::AllocationType type,
27 sandbox::AllocationType type);
29 sandbox::AllocationType type);
52 namespace sandbox { namespace
183 } // namespace sandbox
sandbox_policy_base.h 16 #include "sandbox/win/src/crosscall_server.h"
17 #include "sandbox/win/src/handle_closer.h"
18 #include "sandbox/win/src/ipc_tags.h"
19 #include "sandbox/win/src/policy_engine_opcodes.h"
20 #include "sandbox/win/src/policy_engine_params.h"
21 #include "sandbox/win/src/sandbox_policy.h"
22 #include "sandbox/win/src/win_utils.h"
24 namespace sandbox { namespace
158 } // namespace sandbox
sandbox_types.h 8 namespace sandbox { namespace
10 // Operation result codes returned by the sandbox API.
52 // If the sandbox cannot create a secure environment for the target, the
89 } // namespace sandbox
win_utils_unittest.cc 8 #include "sandbox/win/src/win_utils.h"
9 #include "sandbox/win/tests/common/test_utils.h"
13 using sandbox::IsReparsePoint;
55 using sandbox::SameObject;
filesystem_interception.cc 5 #include "sandbox/win/src/filesystem_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
handle_closer.cc 5 #include "sandbox/win/src/handle_closer.h"
10 #include "sandbox/win/src/interceptors.h"
11 #include "sandbox/win/src/internal_types.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/process_thread_interception.h"
14 #include "sandbox/win/src/win_utils.h"
30 namespace sandbox { namespace
202 } // namespace sandbox
  /external/chromium_org/third_party/WebKit/PerformanceTests/Parser/
html-parser.html 10 iframe.sandbox = 'allow-same-origin'; // Prevent external script loads which could cause write() to return before completing the parse.
  /external/chromium_org/ui/metro_viewer/
OWNERS 2 # new sandbox escapes.
  /external/chromium_org/webkit/child/
webkit_child_helpers.h 16 // computed inside the sandbox and thus its not always accurate.
  /external/openssh/
sandbox-rlimit.c 1 /* $OpenBSD: sandbox-rlimit.c,v 1.3 2011/06/23 09:34:13 djm Exp $ */
35 #include "ssh-sandbox.h"
38 /* Minimal sandbox that sets zero nfiles, nprocs and filesize rlimits */
53 debug3("%s: preparing rlimit sandbox", __func__);
  /external/chromium_org/sandbox/linux/seccomp-bpf/
sandbox_bpf.h 20 #include "sandbox/linux/seccomp-bpf/die.h"
21 #include "sandbox/linux/seccomp-bpf/errorcode.h"
22 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
24 namespace sandbox { namespace
51 STATUS_ENABLED // The sandbox is now active
55 // pointer in |aux|. This pointer will then be forwarded to the sandbox
68 // NOTE: Setting a policy and starting the sandbox is a one-way operation.
70 // sandbox. Strictly speaking, that means we should disallow calling
72 // this makes it needlessly complicated to operate on "Sandbox"
85 // There are a lot of reasons why the Seccomp sandbox might not be available
    [all...]
sandbox_bpf.cc 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
27 #include "sandbox/linux/seccomp-bpf/codegen.h"
28 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
29 #include "sandbox/linux/seccomp-bpf/syscall.h"
30 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
31 #include "sandbox/linux/seccomp-bpf/verifier.h"
33 namespace sandbox { namespace
57 // We define a really simple sandbox policy. It is just good enough for us
58 // to tell that the sandbox has actually been activated.
157 // This means, we must conditionally disable the sandbox -- and that's no
165 SandboxBPF* sandbox = static_cast<SandboxBPF*>(aux); local
411 SandboxBPF sandbox; local
    [all...]
demo.cc 30 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
31 #include "sandbox/linux/services/linux_syscalls.h"
33 using sandbox::ErrorCode;
34 using sandbox::SandboxBPF;
35 using sandbox::arch_seccomp_data;
39 // We don't expect our sandbox to do anything useful yet. So, we will fail
41 // following line should be removed as soon as the sandbox is starting to
216 // log the system call and then deny it. More elaborate sandbox policies
240 ErrorCode Evaluator(SandboxBPF* sandbox, int sysno, void *) {
329 return sandbox->Cond(1, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL
421 SandboxBPF sandbox; local
    [all...]
syscall_unittest.cc 15 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
17 #include "sandbox/linux/seccomp-bpf/syscall.h"
18 #include "sandbox/linux/tests/unit_tests.h"
21 namespace sandbox { namespace
81 ErrorCode CopyAllArgsOnUnamePolicy(SandboxBPF* sandbox, int sysno, void* aux) {
86 return sandbox->Trap(CopySyscallArgsToAux, aux);
201 } // namespace sandbox
  /external/chromium_org/ash/shell/
shell_main.cc 7 #include "sandbox/win/src/sandbox_types.h"
26 sandbox::SandboxInterfaceInfo sandbox_info = {0};
  /external/chromium_org/chrome/app/
chrome_main.cc 17 sandbox::SandboxInterfaceInfo* sandbox_info);
28 sandbox::SandboxInterfaceInfo* sandbox_info) {
  /external/chromium_org/content/public/app/
content_main.h 15 namespace sandbox { namespace
32 sandbox::SandboxInterfaceInfo* sandbox_info,
content_main_runner.h 16 namespace sandbox { namespace
38 sandbox::SandboxInterfaceInfo* sandbox_info,
  /external/chromium_org/content/shell/app/
shell_main.cc 8 #include "sandbox/win/src/sandbox_types.h"
21 sandbox::SandboxInterfaceInfo sandbox_info = {0};
  /external/chromium_org/extensions/common/manifest_handlers/
sandboxed_page_info.h 36 // Content Security Policy that should be used to enforce the sandbox used
37 // by sandboxed pages (guaranteed to have the "sandbox" directive without the
  /external/chromium_org/sandbox/linux/
sandbox_linux.gypi 41 # We have two principal targets: sandbox and sandbox_linux_unittests
43 # FIXME(jln): for historial reasons, sandbox_linux is the setuid sandbox
46 'target_name': 'sandbox',
149 # A demonstration program for the seccomp-bpf sandbox.
169 # The setuid sandbox, for Linux
173 'suid/common/sandbox.h',
179 'suid/sandbox.c',
253 'suid/common/sandbox.h',
  /external/chromium_org/sandbox/linux/tests/
unit_tests.h 12 namespace sandbox { namespace
36 #define DEATH_SUCCESS() sandbox::UnitTests::DeathSuccess, NULL
38 sandbox::UnitTests::DeathMessage, \
41 sandbox::UnitTests::DeathExitCode, \
44 sandbox::UnitTests::DeathExitCode, \
54 sandbox::UnitTests::RunTestInProcess(TEST_##test_name, NULL, death); \
60 // changes to the system (i.e. they install a sandbox). GTest provides death
69 ((expr) ? static_cast<void>(0) : sandbox::UnitTests::AssertionFailure( \

Completed in 191 milliseconds

<<11121314151617181920>>