HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 101 - 125 of 299) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/chromium_org/sandbox/win/src/
process_mitigations_win32k_dispatcher.h 9 #include "sandbox/win/src/sandbox_policy_base.h"
11 namespace sandbox { namespace
29 } // namespace sandbox
process_thread_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
49 } // namespace sandbox
process_thread_interception.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
88 } // namespace sandbox
registry_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
38 } // namespace sandbox
resolver.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
10 #include "sandbox/win/src/nt_internals.h"
15 namespace sandbox { namespace
103 } // namespace sandbox
sandbox.cc 7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/broker_services.h"
10 #include "sandbox/win/src/target_services.h"
12 namespace sandbox { namespace
43 } // namespace sandbox
47 return sandbox::g_shared_section != NULL;
sid_unittest.cc 11 #include "sandbox/win/src/sid.h"
14 namespace sandbox { namespace
71 } // namespace sandbox
sync_dispatcher.h 10 #include "sandbox/win/src/crosscall_server.h"
11 #include "sandbox/win/src/sandbox_policy_base.h"
13 namespace sandbox { namespace
36 } // namespace sandbox
  /external/chromium_org/sandbox/win/wow_helper/
service64_resolver.h 8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/resolver.h"
11 namespace sandbox { namespace
69 } // namespace sandbox
  /external/chromium_org/content/common/sandbox_linux/
bpf_gpu_policy_linux.h 14 namespace sandbox { namespace
25 virtual sandbox::bpf_dsl::ResultExpr EvaluateSyscall(
31 // Start a broker process to handle open() inside the sandbox.
33 // suitable sandbox policy for the broker process itself.
38 sandbox::bpf_dsl::SandboxBPFDSLPolicy* (*broker_sandboxer_allocator)(
43 sandbox::BrokerProcess* broker_process() { return broker_process_; }
46 // A BrokerProcess is a helper that is started before the sandbox is engaged
48 // this runs from a SIGSYS handler triggered by the seccomp-bpf sandbox.
49 // This should never be destroyed, as after the sandbox is started it is
52 // which executes iff the sandbox is going to be enabled afterwards
    [all...]
  /external/chromium_org/content/public/app/
content_main.h 18 namespace sandbox { namespace
45 sandbox::SandboxInterfaceInfo* sandbox_info;
  /external/chromium_org/content/public/common/
main_function_params.h 7 // (e.g., POSIX doesn't need to pass any sandbox information).
16 namespace sandbox { namespace
45 sandbox::SandboxInterfaceInfo* sandbox_info;
sandboxed_process_launcher_delegate.h 21 namespace sandbox { namespace
28 // BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy,
37 // process (which implies no sandbox).
41 // return false if the process should be launched without a sandbox
45 // Called before the default sandbox is applied. If the default policy is too
48 //directory through the sandbox.
53 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
60 // Override this to return true to use the setuid sandbox.
71 // SANDBOX_TYPE_INVALID for no sandbox policy.
  /external/chromium_org/content/renderer/
renderer_main_platform_delegate_android.cc 13 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
48 sandbox::SandboxBPF sandbox; local
49 sandbox.SetSandboxPolicy(new SandboxBPFBasePolicyAndroid());
50 CHECK(sandbox.StartSandbox(sandbox::SandboxBPF::PROCESS_MULTI_THREADED));
  /external/chromium_org/sandbox/linux/seccomp-bpf/
basicblock.h 10 #include "sandbox/linux/seccomp-bpf/instruction.h"
12 namespace sandbox { namespace
47 } // namespace sandbox
bpf_tester_compatibility_delegate.h 9 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_test_runner.h"
11 namespace sandbox { namespace
52 } // namespace sandbox
die.cc 5 #include "sandbox/linux/seccomp-bpf/die.h"
18 #include "sandbox/linux/seccomp-bpf/syscall.h"
20 namespace sandbox { namespace
88 } // namespace sandbox
die.h 9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
15 #define SANDBOX_DIE(m) sandbox::Die::SandboxDie(m, __FILE__, __LINE__)
19 #define RAW_SANDBOX_DIE(m) sandbox::Die::RawSandboxDie(m)
22 #define SANDBOX_INFO(m) sandbox::Die::SandboxInfo(m, __FILE__, __LINE__)
26 // Terminate the program, even if the current sandbox policy prevents some
66 } // namespace sandbox
instruction.h 10 namespace sandbox { namespace
60 } // namespace sandbox
sandbox_bpf_test_runner.cc 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_test_runner.h"
12 #include "sandbox/linux/seccomp-bpf/die.h"
13 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
14 #include "sandbox/linux/tests/unit_tests.h"
16 namespace sandbox { namespace
28 sandbox::Die::EnableSimpleExit();
33 if (sandbox::SandboxBPF::SupportsSeccompSandbox(-1) ==
34 sandbox::SandboxBPF::STATUS_AVAILABLE) {
35 // Ensure the the sandbox is actually available at this time
38 SANDBOX_ASSERT(sandbox::SandboxBPF::SupportsSeccompSandbox(proc_fd) =
42 sandbox::SandboxBPF sandbox; local
60 sandbox::SandboxBPF sandbox; local
    [all...]
sandbox_bpf_test_runner.h 10 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
11 #include "sandbox/linux/tests/sandbox_test_runner.h"
13 namespace sandbox { namespace
28 // This will be called from a child process with the BPF sandbox turned on.
36 // initialize a seccomp-bpf sandbox (specified by |bpf_tester_delegate|) and
57 } // namespace sandbox
syscall.cc 5 #include "sandbox/linux/seccomp-bpf/syscall.h"
12 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
14 namespace sandbox { namespace
428 } // namespace sandbox
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
baseline_policy.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
16 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
17 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
18 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
19 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
20 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
21 #include "sandbox/linux/services/linux_syscalls.h"
26 using sandbox::bpf_dsl::Allow;
27 using sandbox::bpf_dsl::Arg;
28 using sandbox::bpf_dsl::Error
32 namespace sandbox { namespace
    [all...]
  /external/chromium_org/sandbox/linux/services/
yama.h 10 #include "sandbox/sandbox_export.h"
12 namespace sandbox { namespace
56 } // namespace sandbox
  /external/chromium_org/sandbox/linux/suid/client/
setuid_sandbox_client_unittest.cc 9 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
10 #include "sandbox/linux/suid/common/sandbox.h"
13 namespace sandbox { namespace
70 // Set-up a fake environment as if we went through the setuid sandbox.
100 } // namespace sandbox

Completed in 2527 milliseconds

1 2 3 45 6 7 8 91011>>