Searched refs:sandbox (Results 226 - 250 of 471) sorted by relevance

1234567891011>>

/external/chromium_org/sandbox/
H A Dsandbox_services.target.darwin-arm64.mk26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/scoped_process.cc \
29 sandbox/linux/services/thread_helpers.cc \
30 sandbox/linux/services/yama.cc
106 $(LOCAL_PATH)/sandbox \
200 $(LOCAL_PATH)/sandbox \
H A Dsandbox_services.target.darwin-mips.mk26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/scoped_process.cc \
29 sandbox/linux/services/thread_helpers.cc \
30 sandbox/linux/services/yama.cc
109 $(LOCAL_PATH)/sandbox \
207 $(LOCAL_PATH)/sandbox \
H A Dsandbox_services.target.darwin-mips64.mk26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/scoped_process.cc \
29 sandbox/linux/services/thread_helpers.cc \
30 sandbox/linux/services/yama.cc
109 $(LOCAL_PATH)/sandbox \
207 $(LOCAL_PATH)/sandbox \
H A Dsandbox_services.target.darwin-x86.mk26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/scoped_process.cc \
29 sandbox/linux/services/thread_helpers.cc \
30 sandbox/linux/services/yama.cc
112 $(LOCAL_PATH)/sandbox \
212 $(LOCAL_PATH)/sandbox \
H A Dsandbox_services.target.darwin-x86_64.mk26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/scoped_process.cc \
29 sandbox/linux/services/thread_helpers.cc \
30 sandbox/linux/services/yama.cc
111 $(LOCAL_PATH)/sandbox \
210 $(LOCAL_PATH)/sandbox \
H A Dsandbox_services.target.linux-arm.mk26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/scoped_process.cc \
29 sandbox/linux/services/thread_helpers.cc \
30 sandbox/linux/services/yama.cc
117 $(LOCAL_PATH)/sandbox \
223 $(LOCAL_PATH)/sandbox \
H A Dsandbox_services.target.linux-arm64.mk26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/scoped_process.cc \
29 sandbox/linux/services/thread_helpers.cc \
30 sandbox/linux/services/yama.cc
106 $(LOCAL_PATH)/sandbox \
200 $(LOCAL_PATH)/sandbox \
H A Dsandbox_services.target.linux-mips.mk26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/scoped_process.cc \
29 sandbox/linux/services/thread_helpers.cc \
30 sandbox/linux/services/yama.cc
109 $(LOCAL_PATH)/sandbox \
207 $(LOCAL_PATH)/sandbox \
H A Dsandbox_services.target.linux-mips64.mk26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/scoped_process.cc \
29 sandbox/linux/services/thread_helpers.cc \
30 sandbox/linux/services/yama.cc
109 $(LOCAL_PATH)/sandbox \
207 $(LOCAL_PATH)/sandbox \
H A Dsandbox_services.target.linux-x86.mk26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/scoped_process.cc \
29 sandbox/linux/services/thread_helpers.cc \
30 sandbox/linux/services/yama.cc
112 $(LOCAL_PATH)/sandbox \
212 $(LOCAL_PATH)/sandbox \
H A Dsandbox_services.target.linux-x86_64.mk26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/scoped_process.cc \
29 sandbox/linux/services/thread_helpers.cc \
30 sandbox/linux/services/yama.cc
111 $(LOCAL_PATH)/sandbox \
210 $(LOCAL_PATH)/sandbox \
/external/chromium_org/sandbox/win/src/
H A Dbroker_services.cc5 #include "sandbox/win/src/broker_services.h"
16 #include "sandbox/win/src/app_container.h"
17 #include "sandbox/win/src/process_mitigations.h"
18 #include "sandbox/win/src/sandbox_policy_base.h"
19 #include "sandbox/win/src/sandbox.h"
20 #include "sandbox/win/src/target_process.h"
21 #include "sandbox/win/src/win2k_threadpool.h"
22 #include "sandbox/win/src/win_utils.h"
36 sandbox
110 namespace sandbox { namespace
[all...]
H A Dtarget_process.cc5 #include "sandbox/win/src/target_process.h"
12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/crosscall_client.h"
14 #include "sandbox/win/src/policy_low_level.h"
15 #include "sandbox/win/src/sandbox_types.h"
16 #include "sandbox/win/src/sharedmem_ipc_server.h"
24 sandbox::PolicyGlobal* policy =
25 reinterpret_cast<sandbox::PolicyGlobal*>(dest);
29 for (size_t i = 0; i < sandbox::kMaxServiceCount; i++) {
33 policy->entry[i] = reinterpret_cast<sandbox
40 namespace sandbox { namespace
[all...]
H A Dapp_container.cc5 #include "sandbox/win/src/app_container.h"
13 #include "sandbox/win/src/internal_types.h"
28 HMODULE module = GetModuleHandle(sandbox::kKerneldllName);
31 module = GetModuleHandle(sandbox::kKernelBasedllName);
39 namespace sandbox { namespace
183 } // namespace sandbox
H A Dwin_utils_unittest.cc8 #include "sandbox/win/src/win_utils.h"
9 #include "sandbox/win/tests/common/test_utils.h"
13 using sandbox::IsReparsePoint;
55 using sandbox::SameObject;
/external/chromium_org/chrome_elf/blacklist/
H A Dblacklist_interceptions.cc21 #include "sandbox/win/src/internal_types.h"
22 #include "sandbox/win/src/nt_internals.h"
23 #include "sandbox/win/src/sandbox_nt_util.h"
24 #include "sandbox/win/src/sandbox_types.h"
34 HMODULE ntdll = ::GetModuleHandle(sandbox::kNtdllName);
133 *flags |= sandbox::MODULE_IS_PE_IMAGE;
147 *flags |= sandbox::MODULE_HAS_ENTRY_POINT;
149 *flags |= sandbox::MODULE_HAS_CODE;
201 if (module_name.empty() && (image_flags & sandbox::MODULE_HAS_CODE)) {
/external/chromium_org/sandbox/win/tests/validation_tests/
H A Dcommands.cc9 #include "sandbox/win/tests/validation_tests/commands.h"
11 #include "sandbox/win/tests/common/controller.h"
48 return sandbox::SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
61 return sandbox::SBOX_TEST_SUCCEEDED;
64 return sandbox::SBOX_TEST_DENIED;
66 return sandbox::SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
73 namespace sandbox { namespace
333 } // namespace sandbox
/external/chromium_org/sandbox/linux/seccomp-bpf/
H A Dbpf_tests_unittest.cc5 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
17 #include "sandbox/linux/services/linux_syscalls.h"
18 #include "sandbox/linux/tests/unit_tests.h"
21 namespace sandbox { namespace
44 virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox,
151 } // namespace sandbox
H A Ddie.cc5 #include "sandbox/linux/seccomp-bpf/die.h"
18 #include "sandbox/linux/seccomp-bpf/syscall.h"
20 namespace sandbox { namespace
88 } // namespace sandbox
H A Derrorcode.h8 #include "sandbox/linux/seccomp-bpf/trap.h"
9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
13 // This class holds all the possible values that can be returned by a sandbox
63 // interpreted as an attempt at breaking the sandbox and results in the
173 bool safe_; // Keep sandbox active while calling fnc_()
193 } // namespace sandbox
H A Dsyscall_iterator.cc5 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
8 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
10 namespace sandbox { namespace
103 } // namespace sandbox
H A Dtrap.h14 #include "sandbox/sandbox_export.h"
16 namespace sandbox { namespace
32 // time. For the purposes of our sandbox, this assertion should always be
33 // true. Threads are incompatible with the seccomp sandbox anyway.
61 // Once unsafe traps are enabled, the sandbox is essentially compromised.
124 } // namespace sandbox
/external/chromium_org/sandbox/win/sandbox_poc/
H A Dmain_ui_window.cc15 #include "sandbox/win/sandbox_poc/main_ui_window.h"
17 #include "sandbox/win/sandbox_poc/resource.h"
18 #include "sandbox/win/src/acl.h"
19 #include "sandbox/win/src/sandbox.h"
20 #include "sandbox/win/src/win_utils.h"
43 sandbox::BrokerServices* broker) {
508 sandbox::TargetPolicy* policy = broker_->CreatePolicy();
509 policy->SetJobLevel(sandbox::JOB_LOCKDOWN, 0);
510 policy->SetTokenLevel(sandbox
[all...]
/external/chromium_org/components/nacl/loader/
H A Dnacl_helper_win_64.cc22 #include "sandbox/win/src/sandbox_types.h"
49 sandbox::SandboxInterfaceInfo sandbox_info = {0};
65 // Initialize the sandbox for this process.
67 // Die if the sandbox can't be enabled.
68 CHECK(sandbox_initialized_ok) << "Error initializing sandbox for "
/external/chromium_org/content/renderer/
H A Drenderer_main_platform_delegate_win.cc20 #include "sandbox/win/src/sandbox.h"
39 // Windows-only skia sandbox support
97 // cached and there's no more need to access the registry. If the sandbox
120 sandbox::TargetServices* target_services =
124 // Cause advapi32 to load before the sandbox is turned on.
127 // Warm up language subsystems before the sandbox is turned on.

Completed in 740 milliseconds

1234567891011>>