HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 226 - 250 of 299) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium_org/sandbox/win/src/
policy_low_level.h 12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/policy_engine_params.h"
14 #include "sandbox/win/src/policy_engine_opcodes.h"
40 namespace sandbox { namespace
181 } // namespace sandbox
policy_target_test.cc 7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/sandbox_utils.h"
10 #include "sandbox/win/src/target_services.h"
11 #include "sandbox/win/tests/common/controller.h"
14 namespace sandbox { namespace
217 // Launches the app in the sandbox and ask it to wait in an
280 // Launches the app in the sandbox and ask it to wait in an
347 } // namespace sandbox
    [all...]
process_mitigations.cc 5 #include "sandbox/win/src/process_mitigations.h"
10 #include "sandbox/win/src/nt_internals.h"
11 #include "sandbox/win/src/win_utils.h"
28 namespace sandbox { namespace
321 } // namespace sandbox
process_mitigations_test.cc 9 #include "sandbox/win/src/nt_internals.h"
10 #include "sandbox/win/src/process_mitigations.h"
11 #include "sandbox/win/src/sandbox.h"
12 #include "sandbox/win/src/sandbox_factory.h"
13 #include "sandbox/win/src/target_services.h"
14 #include "sandbox/win/src/win_utils.h"
15 #include "sandbox/win/tests/common/controller.h"
84 namespace sandbox { namespace
116 sandbox::TargetPolicy* policy = runner.GetPolicy()
    [all...]
process_thread_dispatcher.cc 5 #include "sandbox/win/src/process_thread_dispatcher.h"
9 #include "sandbox/win/src/crosscall_client.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/policy_broker.h"
14 #include "sandbox/win/src/policy_params.h"
15 #include "sandbox/win/src/process_thread_interception.h"
16 #include "sandbox/win/src/process_thread_policy.h"
17 #include "sandbox/win/src/sandbox.h
95 namespace sandbox { namespace
    [all...]
process_thread_interception.cc 5 #include "sandbox/win/src/process_thread_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
process_thread_policy.cc 5 #include "sandbox/win/src/process_thread_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/nt_internals.h"
12 #include "sandbox/win/src/policy_engine_opcodes.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/win_utils.h"
74 namespace sandbox { namespace
239 } // namespace sandbox
sandbox_nt_types.h 8 #include "sandbox/win/src/nt_internals.h"
10 namespace sandbox { namespace
43 } // namespace sandbox
sandbox_nt_util.h 11 #include "sandbox/win/src/nt_internals.h"
12 #include "sandbox/win/src/sandbox_nt_types.h"
15 void* __cdecl operator new(size_t size, sandbox::AllocationType type,
17 void __cdecl operator delete(void* memory, sandbox::AllocationType type);
22 void __cdecl operator delete(void* memory, sandbox::AllocationType type,
27 sandbox::AllocationType type);
29 sandbox::AllocationType type);
52 namespace sandbox { namespace
183 } // namespace sandbox
sandbox_policy.h 12 #include "sandbox/win/src/sandbox_types.h"
13 #include "sandbox/win/src/security_level.h"
15 namespace sandbox { namespace
89 // Important: most of the sandbox-provided security relies on this single
156 // Sets the integrity level of the process in the sandbox. Both the initial
158 // is set to a level higher than the current level, the sandbox will fail
165 // Sets the integrity level of the process in the sandbox. The integrity level
168 // process in the sandbox. If the integrity level is set to a level higher
169 // than the current level, the sandbox will fail to start.
243 } // namespace sandbox
    [all...]
sharedmem_ipc_client.h 8 #include "sandbox/win/src/crosscall_params.h"
9 #include "sandbox/win/src/sandbox.h"
52 namespace sandbox { namespace
134 } // namespace sandbox
target_process.h 14 #include "sandbox/win/src/crosscall_server.h"
15 #include "sandbox/win/src/sandbox_types.h"
25 namespace sandbox { namespace
130 } // namespace sandbox
crosscall_server.cc 8 #include "sandbox/win/src/crosscall_server.h"
9 #include "sandbox/win/src/crosscall_params.h"
10 #include "sandbox/win/src/crosscall_client.h"
20 const size_t kMaxBufferSize = sandbox::kIPCChannelSize;
24 namespace sandbox { namespace
300 } // namespace sandbox
crosscall_server.h 13 #include "sandbox/win/src/crosscall_params.h"
15 // This is the IPC server interface for CrossCall: The IPC for the Sandbox
25 // of the CrossCallParams class of /sandbox/crosscall_params.h The difference
44 namespace sandbox { namespace
223 } // namespace sandbox
filesystem_policy.cc 7 #include "sandbox/win/src/filesystem_policy.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/policy_engine_opcodes.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox_utils.h"
15 #include "sandbox/win/src/sandbox_types.h"
16 #include "sandbox/win/src/win_utils.h"
43 if (!sandbox::SameObject(local_handle, obj_attributes->ObjectName->Buffer)) {
59 namespace sandbox { namespace
405 } // namespace sandbox
    [all...]
handle_table.cc 5 #include "sandbox/win/src/handle_table.h"
12 #include "sandbox/win/src/win_utils.h"
23 namespace sandbox { namespace
183 } // namespace sandbox
interception_agent.cc 6 // http://dev.chromium.org/developers/design-documents/sandbox .
8 #include "sandbox/win/src/interception_agent.h"
10 #include "sandbox/win/src/interception_internal.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/eat_resolver.h"
13 #include "sandbox/win/src/sidestep_resolver.h"
14 #include "sandbox/win/src/sandbox_nt_util.h"
26 namespace sandbox { namespace
233 } // namespace sandbox
  /external/chromium_org/content/common/sandbox_linux/
sandbox_seccomp_bpf_linux.cc 18 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
30 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
31 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
32 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
33 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
34 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
35 #include "sandbox/linux/services/linux_syscalls.h"
37 using sandbox::BaselinePolicy;
38 using sandbox::SandboxBPF;
39 using sandbox::SyscallSets
149 SandboxBPF sandbox; local
    [all...]
  /external/chromium_org/content/public/browser/
content_browser_client.h 70 namespace sandbox { namespace
629 // is launched. It gives the embedder a chance to add loosen the sandbox
631 virtual void PreSpawnRenderer(sandbox::TargetPolicy* policy,
  /external/chromium_org/sandbox/linux/bpf_dsl/
bpf_dsl.h 15 #include "sandbox/linux/bpf_dsl/cons.h"
16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
17 #include "sandbox/linux/seccomp-bpf/trap.h"
18 #include "sandbox/sandbox_export.h"
20 namespace sandbox { namespace
25 // The sandbox::bpf_dsl namespace provides a domain-specific language
34 // #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
36 // using namespace sandbox::bpf_dsl;
78 namespace sandbox { namespace
102 // User extension point for writing custom sandbox policies
    [all...]
  /external/chromium_org/sandbox/linux/seccomp-bpf/
sandbox_bpf.h 16 #include "sandbox/linux/seccomp-bpf/errorcode.h"
17 #include "sandbox/linux/seccomp-bpf/trap.h"
18 #include "sandbox/sandbox_export.h"
22 namespace sandbox { namespace
35 STATUS_ENABLED // The sandbox is now active
40 // StartSandbox(), the program should indicate whether or not the sandbox
55 // NOTE: Setting a policy and starting the sandbox is a one-way operation.
57 // sandbox. Strictly speaking, that means we should disallow calling
59 // this makes it needlessly complicated to operate on "Sandbox"
72 // There are a lot of reasons why the Seccomp sandbox might not be available
    [all...]
trap.cc 5 #include "sandbox/linux/seccomp-bpf/trap.h"
17 #include "sandbox/linux/seccomp-bpf/die.h"
18 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
19 #include "sandbox/linux/seccomp-bpf/syscall.h"
23 #include "sandbox/linux/services/android_ucontext.h"
75 namespace sandbox { namespace
109 // to avoid race conditions. Normally, this is a non-issue as the sandbox
217 // evaluator registered with the sandbox.
307 // threaded while the sandbox is being set up). But we nonetheless are
371 SANDBOX_INFO("WARNING! Disabling sandbox for debugging purposes")
    [all...]
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
baseline_policy_unittest.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
29 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
30 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
31 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
32 #include "sandbox/linux/seccomp-bpf/syscall.h"
33 #include "sandbox/linux/services/android_futex.h"
34 #include "sandbox/linux/services/linux_syscalls.h"
35 #include "sandbox/linux/services/thread_helpers.h"
36 #include "sandbox/linux/tests/unit_tests.h"
38 namespace sandbox { namespace
    [all...]
  /external/chromium_org/sandbox/linux/services/
credentials_unittest.cc 5 #include "sandbox/linux/services/credentials.h"
18 #include "sandbox/linux/tests/unit_tests.h"
21 namespace sandbox { namespace
236 } // namespace sandbox.
  /external/chromium_org/sandbox/mac/
os_compatibility.cc 5 #include "sandbox/mac/os_compatibility.h"
12 namespace sandbox { namespace
135 } // namespace sandbox

Completed in 601 milliseconds

1 2 3 4 5 6 7 8 91011>>