HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 276 - 299 of 299) sorted by null

<<1112

  /external/chromium_org/sandbox/linux/tests/
unit_tests.cc 19 #include "sandbox/linux/tests/unit_tests.h"
45 namespace sandbox { namespace
111 // in the BPF sandbox, as it potentially makes global state changes and as
146 << "Running sandbox tests with multiple threads "
216 // run (e.g. when testing sandbox features on a kernel that doesn't
  /external/chromium_org/sandbox/win/src/
Wow64.cc 5 #include "sandbox/win/src/wow64.h"
13 #include "sandbox/win/src/target_process.h"
74 namespace sandbox { namespace
221 } // namespace sandbox
crosscall_params.h 14 #include "sandbox/win/src/internal_types.h"
15 #include "sandbox/win/src/sandbox_types.h"
27 // This header is part of CrossCall: the sandbox inter-process communication.
45 namespace sandbox { namespace
292 } // namespace sandbox
file_policy_test.cc 12 #include "sandbox/win/src/filesystem_policy.h"
13 #include "sandbox/win/src/nt_internals.h"
14 #include "sandbox/win/src/sandbox.h"
15 #include "sandbox/win/src/sandbox_factory.h"
16 #include "sandbox/win/src/sandbox_policy.h"
17 #include "sandbox/win/src/win_utils.h"
18 #include "sandbox/win/tests/common/controller.h"
19 #include "sandbox/win/tests/common/test_utils.h"
26 namespace sandbox { namespace
    [all...]
handle_table.h 13 #include "sandbox/win/src/nt_internals.h"
15 namespace sandbox { namespace
157 } // namespace sandbox
interception.cc 6 // http://dev.chromium.org/developers/design-documents/sandbox .
10 #include "sandbox/win/src/interception.h"
17 #include "sandbox/win/src/interception_internal.h"
18 #include "sandbox/win/src/interceptors.h"
19 #include "sandbox/win/src/sandbox.h"
20 #include "sandbox/win/src/service_resolver.h"
21 #include "sandbox/win/src/target_interceptions.h"
22 #include "sandbox/win/src/target_process.h"
23 #include "sandbox/win/src/wow64.h
54 namespace sandbox { namespace
    [all...]
policy_engine_opcodes.cc 5 #include "sandbox/win/src/policy_engine_opcodes.h"
8 #include "sandbox/win/src/sandbox_nt_types.h"
9 #include "sandbox/win/src/sandbox_types.h"
28 namespace sandbox { namespace
454 } // namespace sandbox
policy_low_level.cc 8 #include "sandbox/win/src/policy_low_level.h"
32 namespace sandbox { namespace
348 } // namespace sandbox
policy_opcodes_unittest.cc 5 #include "sandbox/win/src/sandbox_types.h"
6 #include "sandbox/win/src/sandbox_nt_types.h"
7 #include "sandbox/win/src/policy_engine_params.h"
8 #include "sandbox/win/src/policy_engine_opcodes.h"
18 namespace sandbox { namespace
343 } // namespace sandbox
sandbox_types.h 8 namespace sandbox { namespace
10 // Operation result codes returned by the sandbox API.
52 // If the sandbox cannot create a secure environment for the target, the
90 } // namespace sandbox
win_utils.cc 5 #include "sandbox/win/src/win_utils.h"
11 #include "sandbox/win/src/internal_types.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/sandbox_nt_util.h"
39 if (0 == path.compare(0, sandbox::kNTPrefixLen, sandbox::kNTPrefix))
40 start = sandbox::kNTPrefixLen;
48 namespace sandbox { namespace
301 }; // namespace sandbox
307 HMODULE ntdll_local = ::GetModuleHandle(sandbox::kNtdllName)
    [all...]
broker_services.cc 5 #include "sandbox/win/src/broker_services.h"
16 #include "sandbox/win/src/app_container.h"
17 #include "sandbox/win/src/process_mitigations.h"
18 #include "sandbox/win/src/sandbox_policy_base.h"
19 #include "sandbox/win/src/sandbox.h"
20 #include "sandbox/win/src/target_process.h"
21 #include "sandbox/win/src/win2k_threadpool.h"
22 #include "sandbox/win/src/win_utils.h"
36 sandbox::ResultCode SpawnCleanup(sandbox::TargetProcess* target, DWORD error)
110 namespace sandbox { namespace
    [all...]
ipc_unittest.cc 6 #include "sandbox/win/src/crosscall_client.h"
7 #include "sandbox/win/src/crosscall_server.h"
8 #include "sandbox/win/src/sharedmem_ipc_client.h"
9 #include "sandbox/win/src/sharedmem_ipc_server.h"
12 namespace sandbox { namespace
623 sandbox::SharedMemIPCServer::ServerControl srv_control = {
628 sandbox::CrossCallReturn call_return = {0};
639 } // namespace sandbox
policy_engine_opcodes.h 8 #include "sandbox/win/src/policy_engine_params.h"
46 namespace sandbox { namespace
378 } // namespace sandbox
sandbox_nt_util.cc 5 #include "sandbox/win/src/sandbox_nt_util.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/target_services.h"
11 namespace sandbox { namespace
16 } // namespace sandbox
22 using sandbox::g_nt;
76 using sandbox::g_nt;
105 namespace sandbox { namespace
544 } // namespace sandbox
546 void* operator new(size_t size, sandbox::AllocationType type
    [all...]
sandbox_policy_base.cc 5 #include "sandbox/win/src/sandbox_policy_base.h"
13 #include "sandbox/win/src/app_container.h"
14 #include "sandbox/win/src/filesystem_dispatcher.h"
15 #include "sandbox/win/src/filesystem_policy.h"
16 #include "sandbox/win/src/handle_dispatcher.h"
17 #include "sandbox/win/src/handle_policy.h"
18 #include "sandbox/win/src/job.h"
19 #include "sandbox/win/src/interception.h"
20 #include "sandbox/win/src/process_mitigations.h"
21 #include "sandbox/win/src/named_pipe_dispatcher.h
72 namespace sandbox { namespace
    [all...]
service_resolver_32.cc 5 #include "sandbox/win/src/service_resolver.h"
8 #include "sandbox/win/src/win_utils.h"
144 namespace sandbox { namespace
426 } // namespace sandbox
  /external/chromium_org/sandbox/win/tests/common/
controller.h 13 #include "sandbox/win/src/sandbox.h"
15 namespace sandbox { namespace
24 // the sandbox.
70 // Class to facilitate the launch of a test inside the sandbox.
81 // function in the sandbox.
95 // Starts a child process in the sandbox and ask it to run |command|. Returns
157 } // namespace sandbox
  /external/chromium_org/sandbox/win/tests/validation_tests/
commands.cc 9 #include "sandbox/win/tests/validation_tests/commands.h"
11 #include "sandbox/win/tests/common/controller.h"
48 return sandbox::SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
61 return sandbox::SBOX_TEST_SUCCEEDED;
64 return sandbox::SBOX_TEST_DENIED;
66 return sandbox::SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
73 namespace sandbox { namespace
333 } // namespace sandbox
  /external/chromium_org/sandbox/linux/bpf_dsl/
bpf_dsl.cc 5 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
13 #include "sandbox/linux/seccomp-bpf/errorcode.h"
14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
16 namespace sandbox { namespace
384 } // namespace sandbox
bpf_dsl_more_unittest.cc 5 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
35 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
36 #include "sandbox/linux/seccomp-bpf/die.h"
37 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
38 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
39 #include "sandbox/linux/seccomp-bpf/syscall.h"
40 #include "sandbox/linux/seccomp-bpf/trap.h"
41 #include "sandbox/linux/services/broker_process.h"
42 #include "sandbox/linux/services/linux_syscalls.h"
43 #include "sandbox/linux/tests/scoped_temporary_file.h
56 namespace sandbox { namespace
135 SandboxBPF sandbox; local
396 SandboxBPF sandbox; local
    [all...]
  /external/chromium_org/sandbox/win/wow_helper/
service64_resolver.cc 5 #include "sandbox/win/wow_helper/service64_resolver.h"
8 #include "sandbox/win/wow_helper/target_code.h"
97 sandbox::PatchInfo patch_info;
135 NTSTATUS ResolveNtdll(sandbox::PatchInfo* patch_info) {
153 namespace sandbox { namespace
342 } // namespace sandbox
  /external/chromium_org/content/browser/gpu/
gpu_process_host.cc 50 #include "sandbox/win/src/sandbox_policy.h"
160 bool sandbox = !cmd_line_->HasSwitch(switches::kDisableGpuSandbox); variable
161 if(! sandbox) {
162 DVLOG(1) << "GPU sandbox is disabled";
164 return sandbox;
176 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
182 policy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS,
183 sandbox::USER_LIMITED);
184 SetJobLevel(*cmd_line_, sandbox::JOB_UNPROTECTED, 0, policy);
185 policy->SetDelayedIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW)
    [all...]
  /external/chromium_org/sandbox/linux/seccomp-bpf/
sandbox_bpf.cc 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
33 #include "sandbox/linux/seccomp-bpf/codegen.h"
34 #include "sandbox/linux/seccomp-bpf/die.h"
35 #include "sandbox/linux/seccomp-bpf/errorcode.h"
36 #include "sandbox/linux/seccomp-bpf/instruction.h"
37 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
38 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
39 #include "sandbox/linux/seccomp-bpf/syscall.h"
40 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
41 #include "sandbox/linux/seccomp-bpf/trap.h
45 namespace sandbox { namespace
209 SandboxBPF* sandbox = static_cast<SandboxBPF*>(aux); local
470 SandboxBPF sandbox; local
    [all...]

Completed in 351 milliseconds

<<1112