/external/chromium_org/sandbox/win/src/ |
H A D | Wow64.h | 11 #include "sandbox/win/src/sandbox_types.h" 13 namespace sandbox { namespace 48 } // namespace sandbox
|
H A D | handle_interception.cc | 5 #include "sandbox/win/src/handle_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/sandbox_factory.h" 10 #include "sandbox/win/src/sandbox_nt_util.h" 11 #include "sandbox/win/src/sharedmem_ipc_client.h" 12 #include "sandbox/win/src/target_services.h" 14 namespace sandbox { namespace 44 } // namespace sandbox
|
H A D | integrity_level_test.cc | 10 #include "sandbox/win/src/sandbox.h" 11 #include "sandbox/win/src/sandbox_policy.h" 12 #include "sandbox/win/src/sandbox_factory.h" 13 #include "sandbox/win/tests/common/controller.h" 15 namespace sandbox { namespace 91 } // namespace sandbox
|
H A D | policy_broker.cc | 7 #include "sandbox/win/src/policy_broker.h" 12 #include "sandbox/win/src/interception.h" 13 #include "sandbox/win/src/interceptors.h" 14 #include "sandbox/win/src/policy_target.h" 15 #include "sandbox/win/src/process_thread_interception.h" 16 #include "sandbox/win/src/sandbox.h" 17 #include "sandbox/win/src/sandbox_nt_types.h" 18 #include "sandbox/win/src/sandbox_types.h" 19 #include "sandbox/wi 24 namespace sandbox { namespace [all...] |
H A D | sandbox_utils.cc | 5 #include "sandbox/win/src/sandbox_utils.h" 10 #include "sandbox/win/src/internal_types.h" 12 namespace sandbox { namespace 30 } // namespace sandbox
|
H A D | service_resolver.cc | 5 #include "sandbox/win/src/service_resolver.h" 8 #include "sandbox/win/src/internal_types.h" 9 #include "sandbox/win/src/sandbox_nt_util.h" 11 namespace sandbox { namespace 46 } // namespace sandbox
|
H A D | sid.cc | 5 #include "sandbox/win/src/sid.h" 9 namespace sandbox { namespace 26 } // namespace sandbox
|
H A D | sid_unittest.cc | 11 #include "sandbox/win/src/sid.h" 14 namespace sandbox { namespace 71 } // namespace sandbox
|
H A D | sidestep_resolver.h | 9 #include "sandbox/win/src/nt_internals.h" 10 #include "sandbox/win/src/resolver.h" 12 namespace sandbox { namespace 70 } // namespace sandbox
|
H A D | win2k_threadpool.h | 10 #include "sandbox/win/src/crosscall_server.h" 12 namespace sandbox { namespace 15 // for the sandbox IPC subsystem. See sandbox\crosscall_server.h for the details 56 } // namespace sandbox
|
/external/chromium_org/sandbox/win/wow_helper/ |
H A D | service64_resolver.h | 8 #include "sandbox/win/src/nt_internals.h" 9 #include "sandbox/win/src/resolver.h" 11 namespace sandbox { namespace 69 } // namespace sandbox
|
H A D | target_code.h | 8 #include "sandbox/win/src/nt_internals.h" 10 namespace sandbox { namespace 16 // on sandbox/win/src/wow64.cc. 39 } // namespace sandbox
|
/external/chromium_org/components/nacl/loader/sandbox_linux/ |
H A D | nacl_sandbox_linux.h | 12 namespace sandbox { namespace 21 // layer-2 uses seccomp-bpf. It requires the layer-1 sandbox to not yet be 23 // For the layer-1 sandbox to work, the current process must be a child of 24 // the setuid sandbox. InitializeLayerOneSandbox() can only be called once 25 // per instance of the setuid sandbox. 42 // This API will only work if the layer-1 sandbox is not sealed and the 43 // layer-2 sandbox is not engaged. 48 // This API will only work if the layer-1 sandbox is not sealed and the 49 // layer-2 sandbox is not engaged. 51 // Will attempt to initialize the layer-1 sandbox, dependin [all...] |
/external/chromium_org/content/browser/ |
H A D | bootstrap_sandbox_mac.cc | 15 #include "sandbox/mac/bootstrap_sandbox.h" 27 sandbox::BootstrapSandbox* sandbox() const { function in class:content::__anon7026::BootstrapSandboxPolicy 44 scoped_ptr<sandbox::BootstrapSandbox> sandbox_; 53 sandbox()->ChildDied(data.handle); 58 sandbox()->ChildDied(data.handle); 62 : sandbox_(sandbox::BootstrapSandbox::Create()) { 82 sandbox::BootstrapSandbox* GetBootstrapSandbox() { 83 return BootstrapSandboxPolicy::GetInstance()->sandbox();
|
/external/chromium_org/content/gpu/ |
H A D | gpu_child_thread.h | 25 namespace sandbox { namespace 82 // Windows specific client sandbox interface. 83 sandbox::TargetServices* target_services_;
|
/external/chromium_org/content/public/common/ |
H A D | sandboxed_process_launcher_delegate.h | 21 namespace sandbox { namespace 28 // BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy, 37 // process (which implies no sandbox). 41 // return false if the process should be launched without a sandbox 45 // Called before the default sandbox is applied. If the default policy is too 48 //directory through the sandbox. 53 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy, 60 // Override this to return true to use the setuid sandbox. 71 // SANDBOX_TYPE_INVALID for no sandbox policy.
|
/external/chromium_org/sandbox/linux/bpf_dsl/ |
H A D | cons.h | 9 #include "sandbox/sandbox_export.h" 11 namespace sandbox { namespace 44 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
H A D | basicblock.h | 10 #include "sandbox/linux/seccomp-bpf/instruction.h" 12 namespace sandbox { namespace 47 } // namespace sandbox
|
H A D | codegen.h | 11 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 12 #include "sandbox/sandbox_export.h" 14 namespace sandbox { namespace 47 // // any C++ destructors after starting the sandbox. 150 } // namespace sandbox
|
H A D | die.cc | 5 #include "sandbox/linux/seccomp-bpf/die.h" 18 #include "sandbox/linux/seccomp-bpf/syscall.h" 20 namespace sandbox { namespace 88 } // namespace sandbox
|
H A D | die.h | 9 #include "sandbox/sandbox_export.h" 11 namespace sandbox { namespace 15 #define SANDBOX_DIE(m) sandbox::Die::SandboxDie(m, __FILE__, __LINE__) 19 #define RAW_SANDBOX_DIE(m) sandbox::Die::RawSandboxDie(m) 22 #define SANDBOX_INFO(m) sandbox::Die::SandboxInfo(m, __FILE__, __LINE__) 26 // Terminate the program, even if the current sandbox policy prevents some 66 } // namespace sandbox
|
H A D | errorcode.cc | 5 #include "sandbox/linux/seccomp-bpf/errorcode.h" 7 #include "sandbox/linux/seccomp-bpf/die.h" 8 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 10 namespace sandbox { namespace 112 } // namespace sandbox
|
H A D | errorcode_unittest.cc | 5 #include "sandbox/linux/seccomp-bpf/errorcode.h" 9 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 10 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 11 #include "sandbox/linux/tests/unit_tests.h" 13 namespace sandbox { namespace 27 SandboxBPF sandbox; local 28 ErrorCode e3 = sandbox.Trap(NULL, NULL); 44 SandboxBPF sandbox; local 45 ErrorCode e0 = sandbox.Trap(NULL, "a"); 46 ErrorCode e1 = sandbox 65 SandboxBPF sandbox; local 86 SandboxBPF sandbox; local [all...] |
H A D | instruction.h | 10 namespace sandbox { namespace 60 } // namespace sandbox
|
H A D | sandbox_bpf_test_runner.cc | 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_test_runner.h" 12 #include "sandbox/linux/seccomp-bpf/die.h" 13 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 14 #include "sandbox/linux/tests/unit_tests.h" 16 namespace sandbox { namespace 28 sandbox::Die::EnableSimpleExit(); 33 if (sandbox::SandboxBPF::SupportsSeccompSandbox(-1) == 34 sandbox::SandboxBPF::STATUS_AVAILABLE) { 35 // Ensure the the sandbox is actually available at this time 38 SANDBOX_ASSERT(sandbox 42 sandbox::SandboxBPF sandbox; local 60 sandbox::SandboxBPF sandbox; local [all...] |