Searched defs:sandbox (Results 226 - 250 of 299) sorted by relevance

1234567891011>>

/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
H A Dsyscall_parameters_restrictions.cc5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
29 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
30 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
31 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
32 #include "sandbox/linux/services/linux_syscalls.h"
36 #include "sandbox/linux/services/android_futex.h"
89 using sandbox::bpf_dsl::Allow;
90 using sandbox::bpf_dsl::Arg;
91 using sandbox::bpf_dsl::BoolExpr;
92 using sandbox
96 namespace sandbox { namespace
[all...]
/external/chromium_org/sandbox/linux/services/
H A Dcredentials_unittest.cc5 #include "sandbox/linux/services/credentials.h"
18 #include "sandbox/linux/tests/unit_tests.h"
21 namespace sandbox { namespace
236 } // namespace sandbox.
H A Dlibc_urandom_override.cc5 #include "sandbox/linux/services/libc_urandom_override.h"
23 namespace sandbox { namespace
/external/chromium_org/sandbox/mac/
H A Dmach_message_server.cc5 #include "sandbox/mac/mach_message_server.h"
15 #include "sandbox/mac/dispatch_source_mach.h"
17 namespace sandbox { namespace
71 "org.chromium.sandbox.MachMessageServer.%p", demuxer_);
184 // forwarded message was sent from the process hosting this sandbox server,
193 } // namespace sandbox
H A Dos_compatibility.cc5 #include "sandbox/mac/os_compatibility.h"
12 namespace sandbox { namespace
135 } // namespace sandbox
/external/chromium_org/sandbox/win/src/
H A Dapp_container.cc5 #include "sandbox/win/src/app_container.h"
13 #include "sandbox/win/src/internal_types.h"
28 HMODULE module = GetModuleHandle(sandbox::kKerneldllName);
31 module = GetModuleHandle(sandbox::kKernelBasedllName);
39 namespace sandbox { namespace
183 } // namespace sandbox
H A Dcrosscall_client.h8 #include "sandbox/win/src/crosscall_params.h"
9 #include "sandbox/win/src/sandbox.h"
39 namespace sandbox { namespace
481 } // namespace sandbox
H A Dcrosscall_server.h13 #include "sandbox/win/src/crosscall_params.h"
25 // of the CrossCallParams class of /sandbox/crosscall_params.h The difference
44 namespace sandbox { namespace
223 } // namespace sandbox
H A Dfilesystem_dispatcher.cc5 #include "sandbox/win/src/filesystem_dispatcher.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/filesystem_interception.h"
9 #include "sandbox/win/src/filesystem_policy.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/policy_broker.h"
14 #include "sandbox/win/src/policy_params.h"
15 #include "sandbox/wi
18 namespace sandbox { namespace
[all...]
H A Dfilesystem_interception.cc5 #include "sandbox/win/src/filesystem_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
[all...]
H A Dhandle_closer_test.cc7 #include "sandbox/win/src/handle_closer_agent.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/target_services.h"
11 #include "sandbox/win/tests/common/controller.h"
51 namespace sandbox { namespace
111 sandbox::TargetPolicy* policy = runner.GetPolicy();
118 CHECK(sandbox::GetHandleName(marker.Get(), &handle_name));
131 sandbox
[all...]
H A Dinterception_agent.cc6 // http://dev.chromium.org/developers/design-documents/sandbox .
8 #include "sandbox/win/src/interception_agent.h"
10 #include "sandbox/win/src/interception_internal.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/eat_resolver.h"
13 #include "sandbox/win/src/sidestep_resolver.h"
14 #include "sandbox/win/src/sandbox_nt_util.h"
26 namespace sandbox { namespace
233 } // namespace sandbox
H A Dinterceptors.h9 #include "sandbox/win/src/interceptors_64.h"
12 namespace sandbox { namespace
53 } // namespace sandbox
H A Dpolicy_low_level_unittest.cc5 #include "sandbox/win/src/policy_engine_params.h"
6 #include "sandbox/win/src/policy_engine_processor.h"
7 #include "sandbox/win/src/policy_low_level.h"
10 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = {
11 #define POLPARAM(p) sandbox::ParamPickerMake(p),
14 namespace sandbox { namespace
617 } // namespace sandbox
H A Dpolicy_target_test.cc7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/sandbox_utils.h"
10 #include "sandbox/win/src/target_services.h"
11 #include "sandbox/win/tests/common/controller.h"
14 namespace sandbox { namespace
217 // Launches the app in the sandbox and ask it to wait in an
280 // Launches the app in the sandbox and ask it to wait in an
347 } // namespace sandbox
[all...]
H A Dprocess_mitigations.cc5 #include "sandbox/win/src/process_mitigations.h"
10 #include "sandbox/win/src/nt_internals.h"
11 #include "sandbox/win/src/win_utils.h"
28 namespace sandbox { namespace
321 } // namespace sandbox
H A Dprocess_policy_test.cc13 #include "sandbox/win/src/sandbox.h"
14 #include "sandbox/win/src/sandbox_factory.h"
15 #include "sandbox/win/src/sandbox_policy.h"
16 #include "sandbox/win/tests/common/controller.h"
38 sandbox::SboxTestResult CreateProcessHelper(const base::string16& exe,
50 sandbox::SboxTestResult ret1 = sandbox::SBOX_TEST_FAILED;
63 ret1 = sandbox::SBOX_TEST_SUCCEEDED;
69 ret1 = sandbox
108 namespace sandbox { namespace
[all...]
H A Dregistry_policy.cc7 #include "sandbox/win/src/registry_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/policy_engine_opcodes.h"
12 #include "sandbox/win/src/policy_params.h"
13 #include "sandbox/win/src/sandbox_utils.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/win_utils.h"
115 namespace sandbox { namespace
225 } // namespace sandbox
H A Drestricted_token.cc5 #include "sandbox/win/src/restricted_token.h"
10 #include "sandbox/win/src/acl.h"
11 #include "sandbox/win/src/win_utils.h"
14 namespace sandbox { namespace
471 } // namespace sandbox
H A Drestricted_token_unittest.cc11 #include "sandbox/win/src/restricted_token.h"
12 #include "sandbox/win/src/sid.h"
15 namespace sandbox { namespace
588 } // namespace sandbox
H A Dsandbox_policy_base.h16 #include "sandbox/win/src/crosscall_server.h"
17 #include "sandbox/win/src/handle_closer.h"
18 #include "sandbox/win/src/ipc_tags.h"
19 #include "sandbox/win/src/policy_engine_opcodes.h"
20 #include "sandbox/win/src/policy_engine_params.h"
21 #include "sandbox/win/src/sandbox_policy.h"
22 #include "sandbox/win/src/win_utils.h"
24 namespace sandbox { namespace
169 } // namespace sandbox
H A Dsecurity_level.h10 namespace sandbox { namespace
12 // List of all the integrity levels supported in the sandbox. This is used
14 // in the sandbox to a level higher than yours.
27 // provide the bulk of the security of sandbox.
136 // Some mitigations are implemented directly by the sandbox or emulated to
202 } // namespace sandbox
H A Dsidestep_resolver.cc5 #include "sandbox/win/src/sidestep_resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
9 #include "sandbox/win/src/sidestep/preamble_patcher.h"
28 namespace sandbox { namespace
202 } // namespace sandbox
/external/chromium_org/sandbox/linux/bpf_dsl/
H A Dbpf_dsl.h15 #include "sandbox/linux/bpf_dsl/cons.h"
16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
17 #include "sandbox/linux/seccomp-bpf/trap.h"
18 #include "sandbox/sandbox_export.h"
20 namespace sandbox { namespace
25 // The sandbox::bpf_dsl namespace provides a domain-specific language
34 // #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
36 // using namespace sandbox::bpf_dsl;
78 namespace sandbox { namespace
102 // User extension point for writing custom sandbox policie
[all...]
H A Dbpf_dsl_unittest.cc5 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
18 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
19 #include "sandbox/linux/seccomp-bpf/errorcode.h"
20 #include "sandbox/linux/seccomp-bpf/syscall.h"
30 namespace sandbox { namespace
332 } // namespace sandbox

Completed in 3789 milliseconds

1234567891011>>