/external/chromium_org/sandbox/win/src/ |
interception_agent.h | 7 // http://dev.chromium.org/developers/design-documents/sandbox . 13 #include "sandbox/win/src/nt_internals.h" 14 #include "sandbox/win/src/sandbox_types.h" 16 namespace sandbox { namespace 85 } // namespace sandbox
|
named_pipe_dispatcher.h | 10 #include "sandbox/win/src/crosscall_server.h" 11 #include "sandbox/win/src/sandbox_policy_base.h" 13 namespace sandbox { namespace 36 } // namespace sandbox
|
named_pipe_interception.cc | 5 #include "sandbox/win/src/named_pipe_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_params.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/sandbox_nt_util.h" 13 #include "sandbox/win/src/sharedmem_ipc_client.h" 14 #include "sandbox/win/src/target_services.h" 16 namespace sandbox { namespace [all...] |
process_thread_dispatcher.h | 10 #include "sandbox/win/src/crosscall_server.h" 11 #include "sandbox/win/src/sandbox_policy_base.h" 13 namespace sandbox { namespace 49 } // namespace sandbox
|
process_thread_interception.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 99 } // namespace sandbox
|
registry_dispatcher.h | 10 #include "sandbox/win/src/crosscall_server.h" 11 #include "sandbox/win/src/sandbox_policy_base.h" 13 namespace sandbox { namespace 38 } // namespace sandbox
|
resolver.h | 7 // http://dev.chromium.org/developers/design-documents/sandbox . 10 #include "sandbox/win/src/nt_internals.h" 15 namespace sandbox { namespace 103 } // namespace sandbox
|
sandbox_utils.cc | 5 #include "sandbox/win/src/sandbox_utils.h" 11 #include "sandbox/win/src/internal_types.h" 13 namespace sandbox { namespace 38 } // namespace sandbox
|
sid_unittest.cc | 11 #include "sandbox/win/src/sid.h" 14 namespace sandbox { namespace 71 } // namespace sandbox
|
sync_dispatcher.h | 10 #include "sandbox/win/src/crosscall_server.h" 11 #include "sandbox/win/src/sandbox_policy_base.h" 13 namespace sandbox { namespace 36 } // namespace sandbox
|
handle_policy_test.cc | 6 #include "sandbox/win/src/handle_policy.h" 7 #include "sandbox/win/src/nt_internals.h" 8 #include "sandbox/win/src/sandbox.h" 9 #include "sandbox/win/src/sandbox_factory.h" 10 #include "sandbox/win/src/sandbox_policy.h" 11 #include "sandbox/win/src/win_utils.h" 12 #include "sandbox/win/tests/common/controller.h" 15 namespace sandbox { namespace 113 } // namespace sandbox [all...] |
job.cc | 5 #include "sandbox/win/src/job.h" 8 #include "sandbox/win/src/restricted_token.h" 10 namespace sandbox { namespace 116 } // namespace sandbox
|
named_pipe_policy_test.cc | 6 #include "sandbox/win/src/handle_closer.h" 7 #include "sandbox/win/src/sandbox.h" 8 #include "sandbox/win/src/sandbox_policy.h" 9 #include "sandbox/win/src/sandbox_factory.h" 10 #include "sandbox/win/tests/common/controller.h" 13 namespace sandbox { namespace 62 // Tests if we can create a pipe in the sandbox. 74 // On XP, the sandbox can create a pipe without any help but it fails on 82 // Tests if we can create a pipe with a path traversal in the sandbox [all...] |
policy_broker.cc | 7 #include "sandbox/win/src/policy_broker.h" 12 #include "sandbox/win/src/interception.h" 13 #include "sandbox/win/src/interceptors.h" 14 #include "sandbox/win/src/policy_target.h" 15 #include "sandbox/win/src/process_thread_interception.h" 16 #include "sandbox/win/src/sandbox.h" 17 #include "sandbox/win/src/sandbox_nt_types.h" 18 #include "sandbox/win/src/sandbox_types.h" 19 #include "sandbox/win/src/target_process.h 24 namespace sandbox { namespace [all...] |
/external/chromium_org/sandbox/win/wow_helper/ |
service64_resolver.h | 8 #include "sandbox/win/src/nt_internals.h" 9 #include "sandbox/win/src/resolver.h" 11 namespace sandbox { namespace 69 } // namespace sandbox
|
/external/chromium_org/content/public/common/ |
main_function_params.h | 7 // (e.g., POSIX doesn't need to pass any sandbox information). 16 namespace sandbox { namespace 40 sandbox::SandboxInterfaceInfo* sandbox_info;
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
basicblock.h | 10 #include "sandbox/linux/seccomp-bpf/instruction.h" 12 namespace sandbox { namespace 47 } // namespace sandbox
|
die.cc | 14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 15 #include "sandbox/linux/seccomp-bpf/syscall.h" 17 namespace sandbox { namespace 85 } // namespace sandbox
|
die.h | 10 namespace sandbox { namespace 14 #define SANDBOX_DIE(m) sandbox::Die::SandboxDie(m, __FILE__, __LINE__) 18 #define RAW_SANDBOX_DIE(m) sandbox::Die::RawSandboxDie(m) 21 #define SANDBOX_INFO(m) sandbox::Die::SandboxInfo(m, __FILE__, __LINE__) 25 // Terminate the program, even if the current sandbox policy prevents some 65 } // namespace sandbox
|
errorcode_unittest.cc | 7 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 8 #include "sandbox/linux/tests/unit_tests.h" 10 namespace sandbox { namespace 24 SandboxBPF sandbox; local 25 ErrorCode e3 = sandbox.Trap(NULL, NULL); 30 SandboxBPF sandbox; local 31 ErrorCode e0 = sandbox.Trap(NULL, "a"); 32 ErrorCode e1 = sandbox.Trap(NULL, "b"); 36 ErrorCode e2 = sandbox.Trap(NULL, "a"); 51 SandboxBPF sandbox; local 72 SandboxBPF sandbox; local [all...] |
instruction.h | 10 namespace sandbox { namespace 60 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
baseline_policy.cc | 5 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h" 14 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 15 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" 16 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 17 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 18 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 19 #include "sandbox/linux/services/linux_syscalls.h" 24 namespace sandbox { namespace 84 ErrorCode EvaluateSyscallImpl(int fs_denied_errno, SandboxBPF* sandbox, 94 return sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, AF_UNIX [all...] |
/external/chromium_org/sandbox/linux/services/ |
thread_helpers.cc | 5 #include "sandbox/linux/services/thread_helpers.h" 22 namespace sandbox { namespace 84 } // namespace sandbox
|
thread_helpers_unittests.cc | 5 #include "sandbox/linux/services/thread_helpers.h" 20 #include "sandbox/linux/tests/unit_tests.h" 25 namespace sandbox { namespace 93 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/suid/client/ |
setuid_sandbox_client_unittest.cc | 11 #include "sandbox/linux/suid/common/sandbox.h" 14 namespace sandbox { namespace 71 // Set-up a fake environment as if we went through the setuid sandbox. 93 } // namespace sandbox
|