/external/chromium_org/sandbox/linux/services/ |
broker_process.h | 15 namespace sandbox { namespace 25 // 3. Enable sandbox. 46 // sandbox in the broker. 100 } // namespace sandbox
|
credentials_unittest.cc | 5 #include "sandbox/linux/services/credentials.h" 17 #include "sandbox/linux/tests/unit_tests.h" 22 namespace sandbox { namespace 215 } // namespace sandbox.
|
libc_urandom_override.cc | 5 #include "sandbox/linux/services/libc_urandom_override.h" 23 namespace sandbox { namespace
|
/external/chromium_org/sandbox/win/src/ |
filesystem_interception.cc | 5 #include "sandbox/win/src/filesystem_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_params.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/sandbox_nt_util.h" 13 #include "sandbox/win/src/sharedmem_ipc_client.h" 14 #include "sandbox/win/src/target_services.h" 16 namespace sandbox { namespace [all...] |
interception.h | 7 // http://dev.chromium.org/developers/design-documents/sandbox . 18 #include "sandbox/win/src/sandbox_types.h" 20 namespace sandbox { namespace 42 // sandbox::INTERCEPTION_SERVICE_CALL, &MyNtCreateFile, MY_ID_1)) 47 // sandbox::INTERCEPTION_EAT, L"MyCreateDirectoryW@12", MY_ID_2)) 62 // do not work with sandbox tests. 238 sandbox::INTERCEPTION_SERVICE_CALL, \ 251 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT, \ 264 sandbox::INTERCEPTION_SERVICE_CALL, \ 275 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT, [all...] |
job_unittest.cc | 8 #include "sandbox/win/src/job.h" 11 namespace sandbox { namespace 194 } // namespace sandbox
|
policy_engine_unittest.cc | 5 #include "sandbox/win/src/policy_engine_params.h" 6 #include "sandbox/win/src/policy_engine_processor.h" 9 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = { 10 #define POLPARAM(p) sandbox::ParamPickerMake(p), 13 namespace sandbox { namespace 102 } // namespace sandbox
|
registry_policy.cc | 7 #include "sandbox/win/src/registry_policy.h" 10 #include "sandbox/win/src/ipc_tags.h" 11 #include "sandbox/win/src/policy_engine_opcodes.h" 12 #include "sandbox/win/src/policy_params.h" 13 #include "sandbox/win/src/sandbox_utils.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/win_utils.h" 115 namespace sandbox { namespace 225 } // namespace sandbox
|
sharedmem_ipc_server.h | 12 #include "sandbox/win/src/crosscall_params.h" 13 #include "sandbox/win/src/crosscall_server.h" 14 #include "sandbox/win/src/sharedmem_ipc_client.h" 32 namespace sandbox { namespace 56 // do not work with sandbox tests. 125 } // namespace sandbox
|
sidestep_resolver.cc | 5 #include "sandbox/win/src/sidestep_resolver.h" 8 #include "sandbox/win/src/sandbox_nt_util.h" 9 #include "sandbox/win/src/sidestep/preamble_patcher.h" 28 namespace sandbox { namespace 202 } // namespace sandbox
|
app_container.cc | 5 #include "sandbox/win/src/app_container.h" 13 #include "sandbox/win/src/internal_types.h" 28 HMODULE module = GetModuleHandle(sandbox::kKerneldllName); 31 module = GetModuleHandle(sandbox::kKernelBasedllName); 39 namespace sandbox { namespace 182 } // namespace sandbox
|
crosscall_client.h | 8 #include "sandbox/win/src/crosscall_params.h" 9 #include "sandbox/win/src/sandbox.h" 39 namespace sandbox { namespace 481 } // namespace sandbox
|
filesystem_dispatcher.cc | 5 #include "sandbox/win/src/filesystem_dispatcher.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/filesystem_interception.h" 9 #include "sandbox/win/src/filesystem_policy.h" 10 #include "sandbox/win/src/interception.h" 11 #include "sandbox/win/src/interceptors.h" 12 #include "sandbox/win/src/ipc_tags.h" 13 #include "sandbox/win/src/policy_broker.h" 14 #include "sandbox/win/src/policy_params.h" 15 #include "sandbox/win/src/sandbox.h 18 namespace sandbox { namespace [all...] |
handle_closer.cc | 5 #include "sandbox/win/src/handle_closer.h" 10 #include "sandbox/win/src/interceptors.h" 11 #include "sandbox/win/src/internal_types.h" 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/process_thread_interception.h" 14 #include "sandbox/win/src/win_utils.h" 30 namespace sandbox { namespace 202 } // namespace sandbox
|
handle_closer_test.cc | 7 #include "sandbox/win/src/handle_closer_agent.h" 8 #include "sandbox/win/src/sandbox.h" 9 #include "sandbox/win/src/sandbox_factory.h" 10 #include "sandbox/win/src/target_services.h" 11 #include "sandbox/win/tests/common/controller.h" 51 namespace sandbox { namespace 111 sandbox::TargetPolicy* policy = runner.GetPolicy(); 118 CHECK(sandbox::GetHandleName(marker, &handle_name)); 131 sandbox::TargetPolicy* policy = runner.GetPolicy() [all...] |
interception_internal.h | 7 // http://dev.chromium.org/developers/design-documents/sandbox . 12 #include "sandbox/win/src/sandbox_types.h" 14 namespace sandbox { namespace 74 } // namespace sandbox
|
interceptors_64.cc | 5 #include "sandbox/win/src/interceptors_64.h" 7 #include "sandbox/win/src/interceptors.h" 8 #include "sandbox/win/src/filesystem_interception.h" 9 #include "sandbox/win/src/named_pipe_interception.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/process_thread_interception.h" 12 #include "sandbox/win/src/registry_interception.h" 13 #include "sandbox/win/src/sandbox_nt_types.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/sync_interception.h 18 namespace sandbox { namespace [all...] |
internal_types.h | 8 namespace sandbox { namespace 74 } // namespace sandbox
|
ipc_tags.h | 8 namespace sandbox { namespace 35 } // namespace sandbox
|
policy_low_level.h | 12 #include "sandbox/win/src/ipc_tags.h" 13 #include "sandbox/win/src/policy_engine_params.h" 14 #include "sandbox/win/src/policy_engine_opcodes.h" 40 namespace sandbox { namespace 181 } // namespace sandbox
|
policy_target_test.cc | 7 #include "sandbox/win/src/sandbox.h" 8 #include "sandbox/win/src/sandbox_factory.h" 9 #include "sandbox/win/src/sandbox_utils.h" 10 #include "sandbox/win/src/target_services.h" 11 #include "sandbox/win/tests/common/controller.h" 14 namespace sandbox { namespace 214 // Launches the app in the sandbox and ask it to wait in an 277 // Launches the app in the sandbox and ask it to wait in an 344 } // namespace sandbox [all...] |
process_mitigations.cc | 5 #include "sandbox/win/src/process_mitigations.h" 10 #include "sandbox/win/src/nt_internals.h" 11 #include "sandbox/win/src/sandbox_utils.h" 12 #include "sandbox/win/src/win_utils.h" 29 namespace sandbox { namespace 333 } // namespace sandbox
|
process_mitigations_test.cc | 9 #include "sandbox/win/src/nt_internals.h" 10 #include "sandbox/win/src/process_mitigations.h" 11 #include "sandbox/win/src/sandbox.h" 12 #include "sandbox/win/src/sandbox_factory.h" 13 #include "sandbox/win/src/sandbox_utils.h" 14 #include "sandbox/win/src/target_services.h" 15 #include "sandbox/win/src/win_utils.h" 16 #include "sandbox/win/tests/common/controller.h" 85 namespace sandbox { namespace [all...] |
/external/chromium_org/sandbox/win/wow_helper/ |
wow_helper.cc | 6 // sandbox a 32 bit application running on a 64 bit OS. The basic idea is to 15 #include "sandbox/win/wow_helper/service64_resolver.h" 16 #include "sandbox/win/wow_helper/target_code.h" 55 namespace sandbox { namespace 91 } // namespace sandbox 122 return sandbox::PatchNtdll(child, thunk, kPageSize);
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
verifier.cc | 7 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 8 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 9 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h" 10 #include "sandbox/linux/seccomp-bpf/verifier.h" 13 namespace sandbox { namespace 31 uint32_t EvaluateErrorCode(SandboxBPF* sandbox, 42 return sandbox->Unexpected64bitArgument().err(); 46 return EvaluateErrorCode(sandbox, 54 return EvaluateErrorCode(sandbox, 63 return EvaluateErrorCode(sandbox, [all...] |