/external/chromium_org/sandbox/win/src/ |
policy_target.cc | 5 #include "sandbox/win/src/policy_target.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_engine_processor.h" 10 #include "sandbox/win/src/policy_low_level.h" 11 #include "sandbox/win/src/policy_params.h" 12 #include "sandbox/win/src/sandbox_factory.h" 13 #include "sandbox/win/src/sandbox_nt_util.h" 14 #include "sandbox/win/src/sharedmem_ipc_client.h" 15 #include "sandbox/win/src/target_services.h 17 namespace sandbox { namespace [all...] |
shared_handles.cc | 5 #include "sandbox/win/src/shared_handles.h" 7 namespace sandbox { namespace 67 } // namespace sandbox
|
sidestep_resolver.h | 9 #include "sandbox/win/src/nt_internals.h" 10 #include "sandbox/win/src/resolver.h" 12 namespace sandbox { namespace 70 } // namespace sandbox
|
target_interceptions.cc | 5 #include "sandbox/win/src/target_interceptions.h" 7 #include "sandbox/win/src/interception_agent.h" 8 #include "sandbox/win/src/sandbox_factory.h" 9 #include "sandbox/win/src/sandbox_nt_util.h" 10 #include "sandbox/win/src/target_services.h" 12 namespace sandbox { namespace 100 } // namespace sandbox
|
unload_dll_test.cc | 6 #include "sandbox/win/src/sandbox.h" 7 #include "sandbox/win/src/sandbox_factory.h" 8 #include "sandbox/win/src/target_services.h" 9 #include "sandbox/win/tests/common/controller.h" 12 namespace sandbox { namespace 64 sandbox::TargetPolicy* policy = runner.GetPolicy(); 75 sandbox::TargetPolicy* policy = runner.GetPolicy(); 96 } // namespace sandbox
|
win2k_threadpool.h | 10 #include "sandbox/win/src/crosscall_server.h" 12 namespace sandbox { namespace 15 // for the sandbox IPC subsystem. See sandbox\crosscall_server.h for the details 56 } // namespace sandbox
|
acl.cc | 5 #include "sandbox/win/src/acl.h" 12 namespace sandbox { namespace 124 } // namespace sandbox
|
app_container_test.cc | 14 #include "sandbox/win/src/sync_policy_test.h" 68 namespace sandbox { namespace 143 } // namespace sandbox
|
broker_services.h | 14 #include "sandbox/win/src/crosscall_server.h" 15 #include "sandbox/win/src/job.h" 16 #include "sandbox/win/src/sandbox.h" 17 #include "sandbox/win/src/sharedmem_ipc_server.h" 18 #include "sandbox/win/src/win2k_threadpool.h" 19 #include "sandbox/win/src/win_utils.h" 28 namespace sandbox { namespace 111 } // namespace sandbox
|
handle_closer.h | 13 #include "sandbox/win/src/interception.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/target_process.h" 17 namespace sandbox { namespace 73 } // namespace sandbox
|
handle_closer_agent.cc | 5 #include "sandbox/win/src/handle_closer_agent.h" 8 #include "sandbox/win/src/nt_internals.h" 9 #include "sandbox/win/src/win_utils.h" 35 namespace sandbox { namespace 145 } // namespace sandbox
|
handle_dispatcher.cc | 5 #include "sandbox/win/src/handle_dispatcher.h" 8 #include "sandbox/win/src/handle_interception.h" 9 #include "sandbox/win/src/handle_policy.h" 10 #include "sandbox/win/src/ipc_tags.h" 11 #include "sandbox/win/src/policy_broker.h" 12 #include "sandbox/win/src/policy_params.h" 13 #include "sandbox/win/src/sandbox.h" 14 #include "sandbox/win/src/sandbox_nt_util.h" 15 #include "sandbox/win/src/sandbox_types.h 18 namespace sandbox { namespace [all...] |
handle_inheritance_test.cc | 9 #include "sandbox/win/tests/common/controller.h" 12 namespace sandbox { namespace
|
interception_unittest.cc | 12 #include "sandbox/win/src/interception.h" 13 #include "sandbox/win/src/interceptors.h" 14 #include "sandbox/win/src/interception_internal.h" 15 #include "sandbox/win/src/target_process.h" 18 namespace sandbox { namespace 212 } // namespace sandbox
|
named_pipe_dispatcher.cc | 5 #include "sandbox/win/src/named_pipe_dispatcher.h" 10 #include "sandbox/win/src/crosscall_client.h" 11 #include "sandbox/win/src/interception.h" 12 #include "sandbox/win/src/interceptors.h" 13 #include "sandbox/win/src/ipc_tags.h" 14 #include "sandbox/win/src/named_pipe_interception.h" 15 #include "sandbox/win/src/named_pipe_policy.h" 16 #include "sandbox/win/src/policy_broker.h" 17 #include "sandbox/win/src/policy_params.h" 18 #include "sandbox/win/src/sandbox.h 21 namespace sandbox { namespace [all...] |
/external/chromium_org/sandbox/win/wow_helper/ |
target_code.h | 8 #include "sandbox/win/src/nt_internals.h" 10 namespace sandbox { namespace 16 // on sandbox/win/src/wow64.cc. 39 } // namespace sandbox
|
/external/chromium_org/content/gpu/ |
gpu_child_thread.h | 25 namespace sandbox { namespace 82 // Windows specific client sandbox interface. 83 sandbox::TargetServices* target_services_;
|
/external/chromium_org/content/public/common/ |
sandboxed_process_launcher_delegate.h | 14 namespace sandbox { namespace 21 // BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy, 29 // |in_sandbox| to false if this process should be launched without a sandbox 33 // Called before the default sandbox is applied. If the default policy is too 36 //directory through the sandbox. 41 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
codegen.h | 12 #include "sandbox/linux/seccomp-bpf/basicblock.h" 13 #include "sandbox/linux/seccomp-bpf/instruction.h" 14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 16 namespace sandbox { namespace 48 // // any C++ destructors after starting the sandbox. 157 } // namespace sandbox
|
trap.h | 16 namespace sandbox { namespace 26 // time. For the purposes of our sandbox, this assertion should always be 27 // true. Threads are incompatible with the seccomp sandbox anyway. 55 // Once unsafe traps are enabled, the sandbox is essentially compromised. 114 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
syscall_parameters_restrictions.cc | 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" 22 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 23 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 24 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 64 namespace sandbox { namespace 66 ErrorCode RestrictCloneToThreadsAndEPERMFork(SandboxBPF* sandbox) { 69 return sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, 74 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, 78 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, 81 sandbox->Trap(SIGSYSCloneFailure, NULL)))) [all...] |
/external/chromium_org/sandbox/linux/services/ |
init_process_reaper.cc | 5 #include "sandbox/linux/services/init_process_reaper.h" 18 namespace sandbox { namespace 101 } // namespace sandbox.
|
/external/chromium_org/sandbox/linux/suid/common/ |
sandbox.h | 9 namespace sandbox { namespace 13 // (e.g. Chrome) to construct a command line for the sandbox. 37 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/tests/ |
unit_tests.h | 12 namespace sandbox { namespace 36 #define DEATH_SUCCESS() sandbox::UnitTests::DeathSuccess, NULL 38 sandbox::UnitTests::DeathMessage, \ 41 sandbox::UnitTests::DeathExitCode, \ 44 sandbox::UnitTests::DeathExitCode, \ 54 sandbox::UnitTests::RunTestInProcess(TEST_##test_name, NULL, death); \ 60 // changes to the system (i.e. they install a sandbox). GTest provides death 69 ((expr) ? static_cast<void>(0) : sandbox::UnitTests::AssertionFailure( \
|
/external/chromium_org/sandbox/win/sandbox_poc/ |
main_ui_window.h | 13 namespace sandbox { namespace 23 // The purpose of this is to be able to spawn an EXE inside a SandBox, have it 25 // sandbox. This is useful for developer debugging and for security testing. 54 // BrokerService that will launch a new EXE inside the sandbox and load the 59 sandbox::BrokerServices* broker); 116 // Spawns a target EXE inside the sandbox (with the help of the 159 // The BrokerServices will be used to spawn an EXE in a sandbox and ask 161 sandbox::BrokerServices* broker_;
|