HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 251 - 275 of 299) sorted by null

<<1112

  /external/chromium_org/sandbox/win/src/
interceptors.h 9 #include "sandbox/win/src/interceptors_64.h"
12 namespace sandbox { namespace
53 } // namespace sandbox
interceptors_64.cc 5 #include "sandbox/win/src/interceptors_64.h"
7 #include "sandbox/win/src/interceptors.h"
8 #include "sandbox/win/src/filesystem_interception.h"
9 #include "sandbox/win/src/named_pipe_interception.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/process_mitigations_win32k_interception.h"
12 #include "sandbox/win/src/process_thread_interception.h"
13 #include "sandbox/win/src/registry_interception.h"
14 #include "sandbox/win/src/sandbox_nt_types.h"
15 #include "sandbox/win/src/sandbox_types.h
19 namespace sandbox { namespace
    [all...]
policy_low_level_unittest.cc 5 #include "sandbox/win/src/policy_engine_params.h"
6 #include "sandbox/win/src/policy_engine_processor.h"
7 #include "sandbox/win/src/policy_low_level.h"
10 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = {
11 #define POLPARAM(p) sandbox::ParamPickerMake(p),
14 namespace sandbox { namespace
617 } // namespace sandbox
process_policy_test.cc 13 #include "sandbox/win/src/sandbox.h"
14 #include "sandbox/win/src/sandbox_factory.h"
15 #include "sandbox/win/src/sandbox_policy.h"
16 #include "sandbox/win/tests/common/controller.h"
38 sandbox::SboxTestResult CreateProcessHelper(const base::string16& exe,
50 sandbox::SboxTestResult ret1 = sandbox::SBOX_TEST_FAILED;
63 ret1 = sandbox::SBOX_TEST_SUCCEEDED;
69 ret1 = sandbox::SBOX_TEST_DENIED
108 namespace sandbox { namespace
    [all...]
restricted_token.cc 5 #include "sandbox/win/src/restricted_token.h"
10 #include "sandbox/win/src/acl.h"
11 #include "sandbox/win/src/win_utils.h"
14 namespace sandbox { namespace
471 } // namespace sandbox
restricted_token_unittest.cc 11 #include "sandbox/win/src/restricted_token.h"
12 #include "sandbox/win/src/sid.h"
15 namespace sandbox { namespace
588 } // namespace sandbox
restricted_token_utils.cc 9 #include "sandbox/win/src/restricted_token_utils.h"
15 #include "sandbox/win/src/job.h"
16 #include "sandbox/win/src/restricted_token.h"
17 #include "sandbox/win/src/security_level.h"
18 #include "sandbox/win/src/sid.h"
20 namespace sandbox { namespace
345 } // namespace sandbox
sandbox_policy_base.h 16 #include "sandbox/win/src/crosscall_server.h"
17 #include "sandbox/win/src/handle_closer.h"
18 #include "sandbox/win/src/ipc_tags.h"
19 #include "sandbox/win/src/policy_engine_opcodes.h"
20 #include "sandbox/win/src/policy_engine_params.h"
21 #include "sandbox/win/src/sandbox_policy.h"
22 #include "sandbox/win/src/win_utils.h"
24 namespace sandbox { namespace
169 } // namespace sandbox
security_level.h 10 namespace sandbox { namespace
12 // List of all the integrity levels supported in the sandbox. This is used
14 // in the sandbox to a level higher than yours.
27 // provide the bulk of the security of sandbox.
136 // Some mitigations are implemented directly by the sandbox or emulated to
202 } // namespace sandbox
service_resolver_64.cc 5 #include "sandbox/win/src/service_resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
9 #include "sandbox/win/src/win_utils.h"
83 namespace sandbox { namespace
212 } // namespace sandbox
sharedmem_ipc_server.cc 8 #include "sandbox/win/src/sharedmem_ipc_server.h"
9 #include "sandbox/win/src/sharedmem_ipc_client.h"
10 #include "sandbox/win/src/sandbox.h"
11 #include "sandbox/win/src/sandbox_types.h"
12 #include "sandbox/win/src/crosscall_params.h"
13 #include "sandbox/win/src/crosscall_server.h"
20 namespace sandbox { namespace
420 } // namespace sandbox
sync_policy.cc 7 #include "sandbox/win/src/sync_policy.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/policy_engine_opcodes.h"
14 #include "sandbox/win/src/policy_params.h"
15 #include "sandbox/win/src/sandbox_types.h"
16 #include "sandbox/win/src/sandbox_utils.h"
17 #include "sandbox/win/src/sync_interception.h"
18 #include "sandbox/win/src/win_utils.h"
20 namespace sandbox { namespace
    [all...]
target_process.cc 5 #include "sandbox/win/src/target_process.h"
12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/crosscall_client.h"
14 #include "sandbox/win/src/policy_low_level.h"
15 #include "sandbox/win/src/sandbox_types.h"
16 #include "sandbox/win/src/sharedmem_ipc_server.h"
24 sandbox::PolicyGlobal* policy =
25 reinterpret_cast<sandbox::PolicyGlobal*>(dest);
29 for (size_t i = 0; i < sandbox::kMaxServiceCount; i++) {
33 policy->entry[i] = reinterpret_cast<sandbox::PolicyBuffer*>(buffer)
40 namespace sandbox { namespace
    [all...]
target_services.cc 5 #include "sandbox/win/src/target_services.h"
10 #include "sandbox/win/src/crosscall_client.h"
11 #include "sandbox/win/src/handle_closer_agent.h"
12 #include "sandbox/win/src/handle_interception.h"
13 #include "sandbox/win/src/ipc_tags.h"
14 #include "sandbox/win/src/process_mitigations.h"
15 #include "sandbox/win/src/restricted_token_utils.h"
16 #include "sandbox/win/src/sandbox.h"
17 #include "sandbox/win/src/sandbox_types.h
61 namespace sandbox { namespace
    [all...]
  /external/chromium_org/sandbox/win/tests/common/
controller.cc 5 #include "sandbox/win/tests/common/controller.h"
12 #include "sandbox/win/src/sandbox_factory.h"
63 namespace sandbox { namespace
216 arguments += no_sandbox_ ? L"-no-sandbox " : L" ";
329 } else if (0 != _wcsicmp(argv[1], L"-child-no-sandbox")) {
336 } // namespace sandbox
  /external/chromium_org/sandbox/linux/bpf_dsl/
bpf_dsl_unittest.cc 5 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
18 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
19 #include "sandbox/linux/seccomp-bpf/errorcode.h"
20 #include "sandbox/linux/seccomp-bpf/syscall.h"
30 namespace sandbox { namespace
332 } // namespace sandbox
  /external/chromium_org/sandbox/linux/seccomp-bpf/
codegen.cc 5 #include "sandbox/linux/seccomp-bpf/codegen.h"
12 #include "sandbox/linux/seccomp-bpf/basicblock.h"
13 #include "sandbox/linux/seccomp-bpf/die.h"
14 #include "sandbox/linux/seccomp-bpf/instruction.h"
15 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
20 void TraverseRecursively(std::set<sandbox::Instruction*>* visited,
21 sandbox::Instruction* instruction) {
42 namespace sandbox { namespace
735 } // namespace sandbox
codegen_unittest.cc 5 #include "sandbox/linux/seccomp-bpf/codegen.h"
14 #include "sandbox/linux/seccomp-bpf/basicblock.h"
15 #include "sandbox/linux/seccomp-bpf/errorcode.h"
16 #include "sandbox/linux/seccomp-bpf/instruction.h"
17 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
18 #include "sandbox/linux/tests/unit_tests.h"
20 namespace sandbox { namespace
539 } // namespace sandbox
errorcode.h 8 #include "sandbox/linux/seccomp-bpf/trap.h"
9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
13 // This class holds all the possible values that can be returned by a sandbox
63 // interpreted as an attempt at breaking the sandbox and results in the
173 bool safe_; // Keep sandbox active while calling fnc_()
193 } // namespace sandbox
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
sigsys_handlers.cc 7 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
17 #include "sandbox/linux/seccomp-bpf/syscall.h"
18 #include "sandbox/linux/services/linux_syscalls.h"
107 namespace sandbox { namespace
299 } // namespace sandbox.
syscall_sets.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
8 #include "sandbox/linux/services/linux_syscalls.h"
10 namespace sandbox { namespace
819 // These give a lot of ambient authority and bypass the setuid sandbox.
1060 } // namespace sandbox.
  /external/chromium_org/sandbox/linux/services/
broker_process.cc 5 #include "sandbox/linux/services/broker_process.h"
32 #include "sandbox/linux/services/linux_syscalls.h"
44 // process' system calls profile to be able to loosely sandbox it.
137 namespace sandbox { namespace
545 } // namespace sandbox.
broker_process_unittest.cc 5 #include "sandbox/linux/services/broker_process.h"
27 #include "sandbox/linux/tests/scoped_temporary_file.h"
28 #include "sandbox/linux/tests/test_utils.h"
29 #include "sandbox/linux/tests/unit_tests.h"
32 namespace sandbox { namespace
477 } // namespace sandbox
credentials.cc 5 #include "sandbox/linux/services/credentials.h"
168 namespace sandbox { namespace
347 } // namespace sandbox.
  /external/chromium_org/sandbox/linux/suid/client/
setuid_sandbox_client.cc 5 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
28 #include "sandbox/linux/services/init_process_reaper.h"
29 #include "sandbox/linux/suid/common/sandbox.h"
30 #include "sandbox/linux/suid/common/suid_unsafe_environment_variables.h"
40 // setuid sandbox. Old versions of the sandbox will ignore this.
42 env->SetVar(sandbox::kSandboxEnvironmentApiRequest,
43 base::IntToString(sandbox::kSUIDSandboxApiNumber));
47 // sandbox. This is to allow nesting of one instance of the SUID sandbo
137 namespace sandbox { namespace
    [all...]

Completed in 406 milliseconds

<<1112