Searched refs:sandbox (Results 76 - 100 of 471) sorted by relevance

1234567891011>>

/external/chromium_org/sandbox/win/src/
H A Dipc_tags.h8 namespace sandbox { namespace
38 } // namespace sandbox
H A Dprocess_mitigations.h11 #include "sandbox/win/src/security_level.h"
13 namespace sandbox { namespace
23 // Converts sandbox flags to the PROC_THREAD_ATTRIBUTE_SECURITY_CAPABILITIES
41 } // namespace sandbox
H A Dprocess_mitigations_win32k_dispatcher.h9 #include "sandbox/win/src/sandbox_policy_base.h"
11 namespace sandbox { namespace
29 } // namespace sandbox
H A Dprocess_mitigations_win32k_interception.cc5 #include "sandbox/win/src/process_mitigations_win32k_interception.h"
7 namespace sandbox { namespace
28 } // namespace sandbox
H A Dprocess_mitigations_win32k_policy.cc5 #include "sandbox/win/src/process_mitigations_win32k_policy.h"
7 namespace sandbox { namespace
23 } // namespace sandbox
H A Dsid.h10 namespace sandbox { namespace
27 } // namespace sandbox
H A Dwindow.h12 #include "sandbox/win/src/sandbox_types.h"
14 namespace sandbox { namespace
38 } // namespace sandbox
H A Dprocess_mitigations_test.cc9 #include "sandbox/win/src/nt_internals.h"
10 #include "sandbox/win/src/process_mitigations.h"
11 #include "sandbox/win/src/sandbox.h"
12 #include "sandbox/win/src/sandbox_factory.h"
13 #include "sandbox/win/src/target_services.h"
14 #include "sandbox/win/src/win_utils.h"
15 #include "sandbox/win/tests/common/controller.h"
84 namespace sandbox { namespace
116 sandbox
[all...]
H A Dsandbox_nt_util.h11 #include "sandbox/win/src/nt_internals.h"
12 #include "sandbox/win/src/sandbox_nt_types.h"
15 void* __cdecl operator new(size_t size, sandbox::AllocationType type,
17 void __cdecl operator delete(void* memory, sandbox::AllocationType type);
22 void __cdecl operator delete(void* memory, sandbox::AllocationType type,
27 sandbox::AllocationType type);
29 sandbox::AllocationType type);
52 namespace sandbox { namespace
183 } // namespace sandbox
/external/chromium_org/sandbox/win/tests/integration_tests/
H A Dintegration_tests.cc9 #include "sandbox/win/tests/common/controller.h"
14 0 == _wcsicmp(argv[1], L"-child-no-sandbox"))
16 return sandbox::DispatchCall(argc, argv);
/external/chromium_org/sandbox/win/tests/validation_tests/
H A Dunit_tests.cc9 #include "sandbox/win/tests/common/controller.h"
14 return sandbox::DispatchCall(argc, argv);
/external/chromium_org/sandbox/win/tools/finder/
H A Dfinder.cc5 #include "sandbox/win/src/restricted_token.h"
6 #include "sandbox/win/src/restricted_token_utils.h"
7 #include "sandbox/win/tools/finder/finder.h"
24 DWORD Finder::Init(sandbox::TokenLevel token_type,
38 err_code = sandbox::CreateRestrictedToken(&token_handle_, token_type,
39 sandbox::INTEGRITY_LEVEL_LAST,
40 sandbox::PRIMARY);
/external/chromium_org/chrome_elf/
H A Dthunk_getter.cc9 #include "sandbox/win/src/interception_internal.h"
10 #include "sandbox/win/src/internal_types.h"
11 #include "sandbox/win/src/sandbox_utils.h"
12 #include "sandbox/win/src/service_resolver.h"
112 sandbox::ServiceResolverThunk* GetThunk(bool relaxed) {
114 sandbox::ServiceResolverThunk* thunk = NULL;
127 thunk = new sandbox::ServiceResolverThunk(current_process, relaxed);
131 thunk = new sandbox::Wow64W8ResolverThunk(current_process, relaxed);
133 thunk = new sandbox::Wow64ResolverThunk(current_process, relaxed);
135 thunk = new sandbox
[all...]
/external/chromium_org/content/common/sandbox_linux/
H A Dbpf_cros_arm_gpu_policy_linux.cc25 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
26 #include "sandbox/linux/services/linux_syscalls.h"
28 using sandbox::SyscallSets;
29 using sandbox::bpf_dsl::Allow;
30 using sandbox::bpf_dsl::Arg;
31 using sandbox::bpf_dsl::Error;
32 using sandbox::bpf_dsl::If;
33 using sandbox::bpf_dsl::ResultExpr;
80 // On ARM we're enabling the sandbox before the X connection is made,
99 static sandbox
[all...]
H A Dbpf_gpu_policy_linux.cc28 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
29 #include "sandbox/linux/seccomp-bpf/trap.h"
30 #include "sandbox/linux/services/broker_process.h"
31 #include "sandbox/linux/services/linux_syscalls.h"
33 using sandbox::BrokerProcess;
34 using sandbox::SyscallSets;
35 using sandbox::arch_seccomp_data;
36 using sandbox::bpf_dsl::Allow;
37 using sandbox::bpf_dsl::ResultExpr;
120 static sandbox
[all...]
/external/chromium_org/sandbox/mac/
H A Dbootstrap_sandbox.cc5 #include "sandbox/mac/bootstrap_sandbox.h"
14 #include "sandbox/mac/launchd_interception_server.h"
16 namespace sandbox { namespace
23 scoped_ptr<BootstrapSandbox> sandbox(new BootstrapSandbox());
24 sandbox->server_.reset(new LaunchdInterceptionServer(sandbox.get()));
30 sandbox->server_bootstrap_name().c_str(), &port);
33 << "Failed to bootstrap_check_in the sandbox server.";
38 // Start the sandbox server.
39 if (sandbox
[all...]
H A Dlaunchd_interception_server.h12 #include "sandbox/mac/message_server.h"
13 #include "sandbox/mac/os_compatibility.h"
15 namespace sandbox { namespace
27 explicit LaunchdInterceptionServer(const BootstrapSandbox* sandbox);
41 // Given a look_up2 request message, this looks up the appropriate sandbox
53 // The sandbox for which this message server is running.
71 } // namespace sandbox
/external/chromium_org/sandbox/linux/seccomp-bpf/
H A Dverifier.cc5 #include "sandbox/linux/seccomp-bpf/verifier.h"
11 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
12 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
13 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
14 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
16 namespace sandbox { namespace
38 uint32_t EvaluateErrorCode(SandboxBPF* sandbox, argument
49 return sandbox->Unexpected64bitArgument().err();
53 sandbox, equal ? *code.passed() : *code.failed(), data);
59 bool VerifyErrorCode(SandboxBPF* sandbox, argument
312 VerifyBPF(SandboxBPF* sandbox, const std::vector<struct sock_filter>& program, const SandboxBPFPolicy& policy, const char** err) argument
[all...]
/external/chromium_org/sandbox/
H A Dsandbox.target.darwin-mips64.mk7 LOCAL_MODULE_STEM := sandbox
28 .PHONY: sandbox
29 sandbox: sandbox_sandbox_gyp
H A Dsandbox.target.linux-mips64.mk7 LOCAL_MODULE_STEM := sandbox
28 .PHONY: sandbox
29 sandbox: sandbox_sandbox_gyp
/external/chromium_org/sandbox/win/sandbox_poc/
H A Dsandbox.cc8 #include "sandbox/win/sandbox_poc/sandbox.h"
10 #include "sandbox/win/sandbox_poc/main_ui_window.h"
11 #include "sandbox/win/src/sandbox.h"
12 #include "sandbox/win/src/sandbox_factory.h"
54 sandbox::BrokerServices* broker_service =
55 sandbox::SandboxFactory::GetBrokerServices();
56 sandbox::ResultCode result;
59 // spawns an instance of itself (called a 'target') inside the sandbox
[all...]
/external/chromium_org/chrome/app/
H A Dchrome_main.cc19 sandbox::SandboxInterfaceInfo* sandbox_info);
30 sandbox::SandboxInterfaceInfo* sandbox_info) {
/external/chromium_org/content/public/app/
H A Dcontent_main.h18 namespace sandbox { namespace
45 sandbox::SandboxInterfaceInfo* sandbox_info;
/external/chromium_org/content/public/common/
H A Dmain_function_params.h7 // (e.g., POSIX doesn't need to pass any sandbox information).
16 namespace sandbox { namespace
45 sandbox::SandboxInterfaceInfo* sandbox_info;
/external/chromium_org/ash/shell/
H A Dshell_main.cc10 #include "sandbox/win/src/sandbox_types.h"
22 sandbox::SandboxInterfaceInfo sandbox_info = {0};

Completed in 432 milliseconds

1234567891011>>