HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 401 - 425 of 990) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/linux/seccomp-bpf/
errorcode.h 8 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
9 #include "sandbox/linux/seccomp-bpf/trap.h"
10 #include "sandbox/sandbox_export.h"
12 namespace sandbox { namespace
16 // This class holds all the possible values that can be returned by a sandbox
61 // interpreted as an attempt at breaking the sandbox and results in the
182 bool safe_; // Keep sandbox active while calling fnc_()
202 } // namespace sandbox
syscall_unittest.cc 16 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
17 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
18 #include "sandbox/linux/seccomp-bpf/syscall.h"
19 #include "sandbox/linux/tests/unit_tests.h"
22 namespace sandbox { namespace
91 ErrorCode CopyAllArgsOnUnamePolicy(SandboxBPF* sandbox,
98 return sandbox->Trap(CopySyscallArgsToAux, aux);
214 } // namespace sandbox
trap.h 15 #include "sandbox/sandbox_export.h"
17 namespace sandbox { namespace
27 // time. For the purposes of our sandbox, this assertion should always be
28 // true. Threads are incompatible with the seccomp sandbox anyway.
56 // Once unsafe traps are enabled, the sandbox is essentially compromised.
117 } // namespace sandbox
  /external/chromium_org/sandbox/win/sandbox_poc/
main_ui_window.h 13 namespace sandbox { namespace
23 // The purpose of this is to be able to spawn an EXE inside a SandBox, have it
25 // sandbox. This is useful for developer debugging and for security testing.
54 // BrokerService that will launch a new EXE inside the sandbox and load the
59 sandbox::BrokerServices* broker);
116 // Spawns a target EXE inside the sandbox (with the help of the
159 // The BrokerServices will be used to spawn an EXE in a sandbox and ask
161 sandbox::BrokerServices* broker_;
  /external/chromium_org/sandbox/win/sandbox_poc/pocdll/
fs.cc 5 #include "sandbox/win/sandbox_poc/pocdll/exports.h"
6 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
network.cc 5 #include "sandbox/win/sandbox_poc/pocdll/exports.h"
6 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
registry.cc 5 #include "sandbox/win/sandbox_poc/pocdll/exports.h"
6 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
spyware.cc 8 #include "sandbox/win/sandbox_poc/pocdll/exports.h"
9 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
  /external/chromium_org/sandbox/win/tests/validation_tests/
commands.cc 9 #include "sandbox/win/tests/validation_tests/commands.h"
11 #include "sandbox/win/tests/common/controller.h"
48 return sandbox::SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
61 return sandbox::SBOX_TEST_SUCCEEDED;
64 return sandbox::SBOX_TEST_DENIED;
66 return sandbox::SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
73 namespace sandbox { namespace
333 } // namespace sandbox
  /external/chromium_org/third_party/WebKit/Source/platform/fonts/mac/
MemoryActivatedFont.mm 26 // font loading being blocked by the sandbox, we need a mechnasim to both
59 // from inside the sandbox).
83 // the sandbox to construct a key which we hope will be as unique as possible
118 // font due to being blocked by the sandbox.
119 // This by definition shouldn't happen if there is no sandbox support.
168 // parameter. If loading is blocked by the sandbox, the font may be loaded
170 // If sandbox loading also fails, a fallback font is loaded.
192 // Font loading was blocked by the Sandbox.
  /external/chromium_org/ui/ozone/public/
surface_ozone_canvas.h 47 // called after we have entered the sandbox so if there are operations (e.g.
49 // outside of the sandbox, they must have been completed in
  /external/chromium_org/content/ppapi_plugin/
ppapi_plugin_main.cc 28 #include "sandbox/win/src/sandbox.h"
45 sandbox::TargetServices* g_target_services = NULL;
55 // Windows-only skia sandbox support
120 // NSS must be initialized before enabling the sandbox below.
125 // before the sandbox is initialized.
  /external/chromium_org/sandbox/win/src/
sharedmem_ipc_server.h 12 #include "sandbox/win/src/crosscall_params.h"
13 #include "sandbox/win/src/crosscall_server.h"
14 #include "sandbox/win/src/sharedmem_ipc_client.h"
32 namespace sandbox { namespace
56 // do not work with sandbox tests.
125 } // namespace sandbox
filesystem_policy.cc 7 #include "sandbox/win/src/filesystem_policy.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/policy_engine_opcodes.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox_utils.h"
15 #include "sandbox/win/src/sandbox_types.h"
16 #include "sandbox/win/src/win_utils.h"
43 if (!sandbox::SameObject(local_handle, obj_attributes->ObjectName->Buffer)) {
59 namespace sandbox { namespace
386 } // namespace sandbox
    [all...]
policy_target_test.cc 7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/sandbox_utils.h"
10 #include "sandbox/win/src/target_services.h"
11 #include "sandbox/win/tests/common/controller.h"
14 namespace sandbox { namespace
214 // Launches the app in the sandbox and ask it to wait in an
277 // Launches the app in the sandbox and ask it to wait in an
344 } // namespace sandbox
    [all...]
win_utils.cc 5 #include "sandbox/win/src/win_utils.h"
11 #include "sandbox/win/src/internal_types.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/sandbox_nt_util.h"
39 if (0 == path.compare(0, sandbox::kNTPrefixLen, sandbox::kNTPrefix))
40 start = sandbox::kNTPrefixLen;
48 namespace sandbox { namespace
301 }; // namespace sandbox
307 HMODULE ntdll_local = ::GetModuleHandle(sandbox::kNtdllName)
    [all...]
  /external/chromium_org/sandbox/
seccomp_bpf.target.darwin-arm.mk 28 sandbox/linux/seccomp-bpf/basicblock.cc \
29 sandbox/linux/seccomp-bpf/codegen.cc \
30 sandbox/linux/seccomp-bpf/die.cc \
31 sandbox/linux/seccomp-bpf/errorcode.cc \
32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \
33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \
34 sandbox/linux/seccomp-bpf/syscall.cc \
35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \
36 sandbox/linux/seccomp-bpf/trap.cc \
37 sandbox/linux/seccomp-bpf/verifier.c
    [all...]
seccomp_bpf.target.linux-arm.mk 28 sandbox/linux/seccomp-bpf/basicblock.cc \
29 sandbox/linux/seccomp-bpf/codegen.cc \
30 sandbox/linux/seccomp-bpf/die.cc \
31 sandbox/linux/seccomp-bpf/errorcode.cc \
32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \
33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \
34 sandbox/linux/seccomp-bpf/syscall.cc \
35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \
36 sandbox/linux/seccomp-bpf/trap.cc \
37 sandbox/linux/seccomp-bpf/verifier.c
    [all...]
sandbox_services.target.darwin-arm.mk 27 sandbox/linux/services/broker_process.cc \
28 sandbox/linux/services/init_process_reaper.cc \
29 sandbox/linux/services/scoped_process.cc \
30 sandbox/linux/services/thread_helpers.cc \
31 sandbox/linux/services/yama.cc
118 $(LOCAL_PATH)/sandbox \
223 $(LOCAL_PATH)/sandbox \
sandbox_services.target.darwin-arm64.mk 27 sandbox/linux/services/broker_process.cc \
28 sandbox/linux/services/init_process_reaper.cc \
29 sandbox/linux/services/scoped_process.cc \
30 sandbox/linux/services/thread_helpers.cc \
31 sandbox/linux/services/yama.cc
107 $(LOCAL_PATH)/sandbox \
200 $(LOCAL_PATH)/sandbox \
sandbox_services.target.darwin-mips.mk 27 sandbox/linux/services/broker_process.cc \
28 sandbox/linux/services/init_process_reaper.cc \
29 sandbox/linux/services/scoped_process.cc \
30 sandbox/linux/services/thread_helpers.cc \
31 sandbox/linux/services/yama.cc
112 $(LOCAL_PATH)/sandbox \
211 $(LOCAL_PATH)/sandbox \
sandbox_services.target.darwin-x86.mk 27 sandbox/linux/services/broker_process.cc \
28 sandbox/linux/services/init_process_reaper.cc \
29 sandbox/linux/services/scoped_process.cc \
30 sandbox/linux/services/thread_helpers.cc \
31 sandbox/linux/services/yama.cc
113 $(LOCAL_PATH)/sandbox \
212 $(LOCAL_PATH)/sandbox \
sandbox_services.target.darwin-x86_64.mk 27 sandbox/linux/services/broker_process.cc \
28 sandbox/linux/services/init_process_reaper.cc \
29 sandbox/linux/services/scoped_process.cc \
30 sandbox/linux/services/thread_helpers.cc \
31 sandbox/linux/services/yama.cc
112 $(LOCAL_PATH)/sandbox \
210 $(LOCAL_PATH)/sandbox \
sandbox_services.target.linux-arm.mk 27 sandbox/linux/services/broker_process.cc \
28 sandbox/linux/services/init_process_reaper.cc \
29 sandbox/linux/services/scoped_process.cc \
30 sandbox/linux/services/thread_helpers.cc \
31 sandbox/linux/services/yama.cc
118 $(LOCAL_PATH)/sandbox \
223 $(LOCAL_PATH)/sandbox \
  /external/chromium_org/chrome/tools/
chrome-process-identifier.sh 9 # zygote, renderer). It also prints out information on whether a sandbox is
10 # active and what type of sandbox has been identified.
22 # zygote inside of the setuid sandbox, renderers are in a process tree separate
72 # The seccomp sandbox has exactly one child process that has no other
91 echo "Process $child is a $type; setuid sandbox is active"
135 # sandbox causes it to be reparented to "init". When this happens, we can
141 [ -d /proc/$i/cwd/. ] || echo -n "; setuid sandbox is active"

Completed in 136 milliseconds

<<11121314151617181920>>