Searched defs:sandbox (Results 176 - 200 of 299) sorted by relevance

1234567891011>>

/external/chromium_org/sandbox/win/src/
H A Djob_unittest.cc8 #include "sandbox/win/src/job.h"
11 namespace sandbox { namespace
195 } // namespace sandbox
H A Dnamed_pipe_policy.cc5 #include "sandbox/win/src/named_pipe_policy.h"
9 #include "sandbox/win/src/ipc_tags.h"
10 #include "sandbox/win/src/policy_engine_opcodes.h"
11 #include "sandbox/win/src/policy_params.h"
12 #include "sandbox/win/src/sandbox_types.h"
43 namespace sandbox { namespace
86 } // namespace sandbox
H A Dpolicy_engine_processor.cc5 #include "sandbox/win/src/policy_engine_processor.h"
7 namespace sandbox { namespace
107 } // namespace sandbox
H A Dpolicy_engine_unittest.cc5 #include "sandbox/win/src/policy_engine_params.h"
6 #include "sandbox/win/src/policy_engine_processor.h"
9 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = {
10 #define POLPARAM(p) sandbox::ParamPickerMake(p),
13 namespace sandbox { namespace
102 } // namespace sandbox
H A Dregistry_policy_test.cc8 #include "sandbox/win/src/registry_policy.h"
9 #include "sandbox/win/src/sandbox.h"
10 #include "sandbox/win/src/sandbox_policy.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/win_utils.h"
14 #include "sandbox/win/tests/common/controller.h"
43 namespace sandbox { namespace
289 } // namespace sandbox
[all...]
H A Dservice_resolver.h8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/resolver.h"
11 namespace sandbox { namespace
136 } // namespace sandbox
H A Dsharedmem_ipc_client.cc6 #include "sandbox/win/src/sharedmem_ipc_client.h"
7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/crosscall_client.h"
9 #include "sandbox/win/src/crosscall_params.h"
12 namespace sandbox { namespace
152 } // namespace sandbox
H A Dsharedmem_ipc_server.h12 #include "sandbox/win/src/crosscall_params.h"
13 #include "sandbox/win/src/crosscall_server.h"
14 #include "sandbox/win/src/sharedmem_ipc_client.h"
32 namespace sandbox { namespace
56 // do not work with sandbox tests.
125 } // namespace sandbox
H A Dsync_dispatcher.cc5 #include "sandbox/win/src/sync_dispatcher.h"
8 #include "sandbox/win/src/crosscall_client.h"
9 #include "sandbox/win/src/interception.h"
10 #include "sandbox/win/src/interceptors.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/policy_broker.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox.h"
15 #include "sandbox/wi
18 namespace sandbox { namespace
[all...]
H A Dwindow.cc5 #include "sandbox/win/src/window.h"
11 #include "sandbox/win/src/acl.h"
12 #include "sandbox/win/src/sid.h"
35 namespace sandbox { namespace
157 } // namespace sandbox
H A Dacl.cc5 #include "sandbox/win/src/acl.h"
12 namespace sandbox { namespace
125 } // namespace sandbox
H A Dhandle_closer.cc5 #include "sandbox/win/src/handle_closer.h"
10 #include "sandbox/win/src/interceptors.h"
11 #include "sandbox/win/src/internal_types.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/process_thread_interception.h"
14 #include "sandbox/win/src/win_utils.h"
30 namespace sandbox { namespace
190 } // namespace sandbox
/external/chromium_org/sandbox/win/tests/integration_tests/
H A Dintegration_tests_test.cc8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/target_services.h"
10 #include "sandbox/win/src/sandbox_factory.h"
11 #include "sandbox/win/tests/common/controller.h"
13 namespace sandbox { namespace
306 } // namespace sandbox
/external/chromium_org/content/common/sandbox_linux/
H A Dsandbox_linux.h23 namespace sandbox { class SetuidSandboxClient; } namespace
31 // This is a list of sandbox IPC methods which the renderer may send to the
32 // sandbox host. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC
48 // are enabled. If using the setuid sandbox, this should be called manually
49 // before the setuid sandbox is engaged.
52 // Initialize the sandbox with the given pre-built configuration. Currently
53 // seccomp-bpf and address space limitations (the setuid sandbox works
59 // Stop |thread| in a way that can be trusted by the sandbox.
62 // Returns the status of the renderer, worker and ppapi sandbox. Can only
75 // Simple accessor for our instance of the setuid sandbox
[all...]
/external/chromium_org/content/public/common/
H A Dcontent_client.h36 namespace sandbox { namespace
126 // resource ID corresponding to the sandbox profile to use. The legal values
128 // SandboxType::SANDBOX_TYPE_AFTER_LAST_TYPE. Returns false if no sandbox
131 // the sandbox profile to use and true is returned.
/external/chromium_org/sandbox/linux/seccomp-bpf/
H A Dbpf_tests_unittest.cc5 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
17 #include "sandbox/linux/services/linux_syscalls.h"
18 #include "sandbox/linux/tests/unit_tests.h"
21 namespace sandbox { namespace
44 virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox,
151 } // namespace sandbox
H A Dsyscall.cc5 #include "sandbox/linux/seccomp-bpf/syscall.h"
12 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
14 namespace sandbox { namespace
428 } // namespace sandbox
H A Dsyscall_unittest.cc5 #include "sandbox/linux/seccomp-bpf/syscall.h"
19 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
20 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
21 #include "sandbox/linux/tests/unit_tests.h"
24 namespace sandbox { namespace
107 virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox,
111 return sandbox->Trap(CopySyscallArgsToAux, aux_);
236 } // namespace sandbox
H A Dtrap.h14 #include "sandbox/sandbox_export.h"
16 namespace sandbox { namespace
32 // time. For the purposes of our sandbox, this assertion should always be
33 // true. Threads are incompatible with the seccomp sandbox anyway.
61 // Once unsafe traps are enabled, the sandbox is essentially compromised.
124 } // namespace sandbox
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
H A Dsyscall_parameters_restrictions_unittests.cc5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
19 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
20 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
21 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
22 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
23 #include "sandbox/linux/seccomp-bpf/syscall.h"
24 #include "sandbox/linux/services/linux_syscalls.h"
25 #include "sandbox/linux/tests/unit_tests.h"
31 namespace sandbox { namespace
38 using sandbox
[all...]
/external/chromium_org/sandbox/linux/services/
H A Dunix_domain_socket_unittest.cc21 #include "sandbox/linux/tests/unit_tests.h"
27 namespace sandbox { namespace
267 } // namespace sandbox
H A Dyama_unittests.cc17 #include "sandbox/linux/services/scoped_process.h"
18 #include "sandbox/linux/services/yama.h"
19 #include "sandbox/linux/tests/unit_tests.h"
22 namespace sandbox { namespace
172 } // namespace sandbox
/external/chromium_org/sandbox/mac/
H A Dbootstrap_sandbox.cc5 #include "sandbox/mac/bootstrap_sandbox.h"
14 #include "sandbox/mac/launchd_interception_server.h"
16 namespace sandbox { namespace
23 scoped_ptr<BootstrapSandbox> sandbox(new BootstrapSandbox());
24 sandbox->server_.reset(new LaunchdInterceptionServer(sandbox.get()));
30 sandbox->server_bootstrap_name().c_str(), &port);
33 << "Failed to bootstrap_check_in the sandbox server.";
38 // Start the sandbox server.
39 if (sandbox
[all...]
H A Dlaunchd_interception_server.cc5 #include "sandbox/mac/launchd_interception_server.h"
11 #include "sandbox/mac/bootstrap_sandbox.h"
12 #include "sandbox/mac/mach_message_server.h"
14 namespace sandbox { namespace
22 const BootstrapSandbox* sandbox)
23 : sandbox_(sandbox),
35 // Allocate the dummy sandbox port.
39 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port.";
45 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port send right.";
63 // No sandbox polic
21 LaunchdInterceptionServer( const BootstrapSandbox* sandbox) argument
[all...]
H A Dxpc_message_server.cc5 #include "sandbox/mac/xpc_message_server.h"
13 #include "sandbox/mac/dispatch_source_mach.h"
14 #include "sandbox/mac/xpc.h"
16 namespace sandbox { namespace
43 "org.chromium.sandbox.XPCMessageServer.%p", demuxer_);
116 } // namespace sandbox

Completed in 671 milliseconds

1234567891011>>