/external/chromium_org/sandbox/win/src/ |
H A D | job_unittest.cc | 8 #include "sandbox/win/src/job.h" 11 namespace sandbox { namespace 195 } // namespace sandbox
|
H A D | named_pipe_policy.cc | 5 #include "sandbox/win/src/named_pipe_policy.h" 9 #include "sandbox/win/src/ipc_tags.h" 10 #include "sandbox/win/src/policy_engine_opcodes.h" 11 #include "sandbox/win/src/policy_params.h" 12 #include "sandbox/win/src/sandbox_types.h" 43 namespace sandbox { namespace 86 } // namespace sandbox
|
H A D | policy_engine_processor.cc | 5 #include "sandbox/win/src/policy_engine_processor.h" 7 namespace sandbox { namespace 107 } // namespace sandbox
|
H A D | policy_engine_unittest.cc | 5 #include "sandbox/win/src/policy_engine_params.h" 6 #include "sandbox/win/src/policy_engine_processor.h" 9 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = { 10 #define POLPARAM(p) sandbox::ParamPickerMake(p), 13 namespace sandbox { namespace 102 } // namespace sandbox
|
H A D | registry_policy_test.cc | 8 #include "sandbox/win/src/registry_policy.h" 9 #include "sandbox/win/src/sandbox.h" 10 #include "sandbox/win/src/sandbox_policy.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/win_utils.h" 14 #include "sandbox/win/tests/common/controller.h" 43 namespace sandbox { namespace 289 } // namespace sandbox [all...] |
H A D | service_resolver.h | 8 #include "sandbox/win/src/nt_internals.h" 9 #include "sandbox/win/src/resolver.h" 11 namespace sandbox { namespace 136 } // namespace sandbox
|
H A D | sharedmem_ipc_client.cc | 6 #include "sandbox/win/src/sharedmem_ipc_client.h" 7 #include "sandbox/win/src/sandbox.h" 8 #include "sandbox/win/src/crosscall_client.h" 9 #include "sandbox/win/src/crosscall_params.h" 12 namespace sandbox { namespace 152 } // namespace sandbox
|
H A D | sharedmem_ipc_server.h | 12 #include "sandbox/win/src/crosscall_params.h" 13 #include "sandbox/win/src/crosscall_server.h" 14 #include "sandbox/win/src/sharedmem_ipc_client.h" 32 namespace sandbox { namespace 56 // do not work with sandbox tests. 125 } // namespace sandbox
|
H A D | sync_dispatcher.cc | 5 #include "sandbox/win/src/sync_dispatcher.h" 8 #include "sandbox/win/src/crosscall_client.h" 9 #include "sandbox/win/src/interception.h" 10 #include "sandbox/win/src/interceptors.h" 11 #include "sandbox/win/src/ipc_tags.h" 12 #include "sandbox/win/src/policy_broker.h" 13 #include "sandbox/win/src/policy_params.h" 14 #include "sandbox/win/src/sandbox.h" 15 #include "sandbox/wi 18 namespace sandbox { namespace [all...] |
H A D | window.cc | 5 #include "sandbox/win/src/window.h" 11 #include "sandbox/win/src/acl.h" 12 #include "sandbox/win/src/sid.h" 35 namespace sandbox { namespace 157 } // namespace sandbox
|
H A D | acl.cc | 5 #include "sandbox/win/src/acl.h" 12 namespace sandbox { namespace 125 } // namespace sandbox
|
H A D | handle_closer.cc | 5 #include "sandbox/win/src/handle_closer.h" 10 #include "sandbox/win/src/interceptors.h" 11 #include "sandbox/win/src/internal_types.h" 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/process_thread_interception.h" 14 #include "sandbox/win/src/win_utils.h" 30 namespace sandbox { namespace 190 } // namespace sandbox
|
/external/chromium_org/sandbox/win/tests/integration_tests/ |
H A D | integration_tests_test.cc | 8 #include "sandbox/win/src/sandbox.h" 9 #include "sandbox/win/src/target_services.h" 10 #include "sandbox/win/src/sandbox_factory.h" 11 #include "sandbox/win/tests/common/controller.h" 13 namespace sandbox { namespace 306 } // namespace sandbox
|
/external/chromium_org/content/common/sandbox_linux/ |
H A D | sandbox_linux.h | 23 namespace sandbox { class SetuidSandboxClient; } namespace 31 // This is a list of sandbox IPC methods which the renderer may send to the 32 // sandbox host. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC 48 // are enabled. If using the setuid sandbox, this should be called manually 49 // before the setuid sandbox is engaged. 52 // Initialize the sandbox with the given pre-built configuration. Currently 53 // seccomp-bpf and address space limitations (the setuid sandbox works 59 // Stop |thread| in a way that can be trusted by the sandbox. 62 // Returns the status of the renderer, worker and ppapi sandbox. Can only 75 // Simple accessor for our instance of the setuid sandbox [all...] |
/external/chromium_org/content/public/common/ |
H A D | content_client.h | 36 namespace sandbox { namespace 126 // resource ID corresponding to the sandbox profile to use. The legal values 128 // SandboxType::SANDBOX_TYPE_AFTER_LAST_TYPE. Returns false if no sandbox 131 // the sandbox profile to use and true is returned.
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
H A D | bpf_tests_unittest.cc | 5 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 17 #include "sandbox/linux/services/linux_syscalls.h" 18 #include "sandbox/linux/tests/unit_tests.h" 21 namespace sandbox { namespace 44 virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox, 151 } // namespace sandbox
|
H A D | syscall.cc | 5 #include "sandbox/linux/seccomp-bpf/syscall.h" 12 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 14 namespace sandbox { namespace 428 } // namespace sandbox
|
H A D | syscall_unittest.cc | 5 #include "sandbox/linux/seccomp-bpf/syscall.h" 19 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 20 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 21 #include "sandbox/linux/tests/unit_tests.h" 24 namespace sandbox { namespace 107 virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox, 111 return sandbox->Trap(CopySyscallArgsToAux, aux_); 236 } // namespace sandbox
|
H A D | trap.h | 14 #include "sandbox/sandbox_export.h" 16 namespace sandbox { namespace 32 // time. For the purposes of our sandbox, this assertion should always be 33 // true. Threads are incompatible with the seccomp sandbox anyway. 61 // Once unsafe traps are enabled, the sandbox is essentially compromised. 124 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
H A D | syscall_parameters_restrictions_unittests.cc | 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" 19 #include "sandbox/linux/bpf_dsl/bpf_dsl.h" 20 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 21 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 22 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 23 #include "sandbox/linux/seccomp-bpf/syscall.h" 24 #include "sandbox/linux/services/linux_syscalls.h" 25 #include "sandbox/linux/tests/unit_tests.h" 31 namespace sandbox { namespace 38 using sandbox [all...] |
/external/chromium_org/sandbox/linux/services/ |
H A D | unix_domain_socket_unittest.cc | 21 #include "sandbox/linux/tests/unit_tests.h" 27 namespace sandbox { namespace 267 } // namespace sandbox
|
H A D | yama_unittests.cc | 17 #include "sandbox/linux/services/scoped_process.h" 18 #include "sandbox/linux/services/yama.h" 19 #include "sandbox/linux/tests/unit_tests.h" 22 namespace sandbox { namespace 172 } // namespace sandbox
|
/external/chromium_org/sandbox/mac/ |
H A D | bootstrap_sandbox.cc | 5 #include "sandbox/mac/bootstrap_sandbox.h" 14 #include "sandbox/mac/launchd_interception_server.h" 16 namespace sandbox { namespace 23 scoped_ptr<BootstrapSandbox> sandbox(new BootstrapSandbox()); 24 sandbox->server_.reset(new LaunchdInterceptionServer(sandbox.get())); 30 sandbox->server_bootstrap_name().c_str(), &port); 33 << "Failed to bootstrap_check_in the sandbox server."; 38 // Start the sandbox server. 39 if (sandbox [all...] |
H A D | launchd_interception_server.cc | 5 #include "sandbox/mac/launchd_interception_server.h" 11 #include "sandbox/mac/bootstrap_sandbox.h" 12 #include "sandbox/mac/mach_message_server.h" 14 namespace sandbox { namespace 22 const BootstrapSandbox* sandbox) 23 : sandbox_(sandbox), 35 // Allocate the dummy sandbox port. 39 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port."; 45 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port send right."; 63 // No sandbox polic 21 LaunchdInterceptionServer( const BootstrapSandbox* sandbox) argument [all...] |
H A D | xpc_message_server.cc | 5 #include "sandbox/mac/xpc_message_server.h" 13 #include "sandbox/mac/dispatch_source_mach.h" 14 #include "sandbox/mac/xpc.h" 16 namespace sandbox { namespace 43 "org.chromium.sandbox.XPCMessageServer.%p", demuxer_); 116 } // namespace sandbox
|