/external/chromium_org/sandbox/win/tests/integration_tests/ |
integration_tests_test.cc | 8 #include "sandbox/win/src/sandbox.h" 9 #include "sandbox/win/src/target_services.h" 10 #include "sandbox/win/src/sandbox_factory.h" 11 #include "sandbox/win/tests/common/controller.h" 13 namespace sandbox { namespace 306 } // namespace sandbox
|
/external/chromium_org/sandbox/win/tests/validation_tests/ |
suite.cc | 5 // This file contains the validation tests for the sandbox. 7 // sandbox. 13 #include "sandbox/win/tests/common/controller.h" 19 void TestProcessAccess(sandbox::TestRunner* runner, DWORD target) { 25 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 27 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 29 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 31 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 33 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 35 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)) 48 namespace sandbox { namespace [all...] |
/external/chromium_org/sandbox/win/wow_helper/ |
wow_helper.cc | 6 // sandbox a 32 bit application running on a 64 bit OS. The basic idea is to 15 #include "sandbox/win/wow_helper/service64_resolver.h" 16 #include "sandbox/win/wow_helper/target_code.h" 18 namespace sandbox { namespace 54 } // namespace sandbox 85 return sandbox::PatchNtdll(child, thunk, kPageSize);
|
/external/chromium_org/ui/views_content_client/ |
views_content_client.h | 17 namespace sandbox { namespace 34 // sandbox::SandboxInterfaceInfo sandbox_info = {0}; 53 sandbox::SandboxInterfaceInfo* sandbox_info); 71 sandbox::SandboxInterfaceInfo* sandbox_info_;
|
/external/chromium_org/content/browser/ |
bootstrap_sandbox_mac.cc | 22 #include "sandbox/mac/bootstrap_sandbox.h" 35 sandbox::BootstrapSandbox* sandbox() const { function in class:content::__anon11357::BootstrapSandboxPolicy 58 void AddBaselinePolicy(sandbox::BootstrapSandboxPolicy* policy); 62 scoped_ptr<sandbox::BootstrapSandbox> sandbox_; 71 sandbox()->ChildDied(data.handle); 76 sandbox()->ChildDied(data.handle); 84 sandbox()->ChildDied( 94 : sandbox_(sandbox::BootstrapSandbox::Create()) { 111 sandbox::BootstrapSandboxPolicy policy [all...] |
/external/chromium_org/content/public/common/ |
content_client.h | 36 namespace sandbox { namespace 126 // resource ID corresponding to the sandbox profile to use. The legal values 128 // SandboxType::SANDBOX_TYPE_AFTER_LAST_TYPE. Returns false if no sandbox 131 // the sandbox profile to use and true is returned.
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
bpf_tests.h | 10 #include "sandbox/linux/seccomp-bpf/bpf_tester_compatibility_delegate.h" 11 #include "sandbox/linux/tests/unit_tests.h" 13 namespace sandbox { namespace 34 sandbox::SandboxBPFTestRunner bpf_test_runner( \ 35 new sandbox::BPFTesterSimpleDelegate<bpf_policy_class_name>( \ 37 sandbox::UnitTests::RunTestInProcess(&bpf_test_runner, death); \ 53 sandbox::SandboxBPFTestRunner bpf_test_runner( \ 55 sandbox::UnitTests::RunTestInProcess(&bpf_test_runner, death); \ 88 sandbox::BPFTesterCompatibilityDelegate<aux>::AuxType* BPF_AUX); \ 90 sandbox::SandboxBPFTestRunner bpf_test_runner( [all...] |
bpf_tests_unittest.cc | 5 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 17 #include "sandbox/linux/services/linux_syscalls.h" 18 #include "sandbox/linux/tests/unit_tests.h" 21 namespace sandbox { namespace 36 ErrorCode EmptyPolicyTakesClass(SandboxBPF* sandbox, 139 } // namespace sandbox
|
syscall_unittest.cc | 16 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 17 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 18 #include "sandbox/linux/seccomp-bpf/syscall.h" 19 #include "sandbox/linux/tests/unit_tests.h" 22 namespace sandbox { namespace 91 ErrorCode CopyAllArgsOnUnamePolicy(SandboxBPF* sandbox, 98 return sandbox->Trap(CopySyscallArgsToAux, aux); 214 } // namespace sandbox
|
verifier.cc | 7 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 8 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 9 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h" 10 #include "sandbox/linux/seccomp-bpf/verifier.h" 13 namespace sandbox { namespace 31 uint32_t EvaluateErrorCode(SandboxBPF* sandbox, 42 return sandbox->Unexpected64bitArgument().err(); 46 return EvaluateErrorCode(sandbox, 54 return EvaluateErrorCode(sandbox, 63 return EvaluateErrorCode(sandbox, [all...] |
/external/chromium_org/sandbox/linux/services/ |
broker_process.h | 15 #include "sandbox/sandbox_export.h" 17 namespace sandbox { namespace 27 // 3. Enable sandbox. 104 } // namespace sandbox
|
yama.cc | 5 #include "sandbox/linux/services/yama.h" 27 namespace sandbox { namespace 116 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/tests/ |
unit_tests.h | 10 #include "sandbox/linux/tests/sandbox_test_runner_function_pointer.h" 13 namespace sandbox { namespace 55 #define DEATH_SUCCESS() sandbox::UnitTests::DeathSuccess, NULL 57 sandbox::UnitTests::DeathSuccessAllowNoise, NULL 59 sandbox::UnitTests::DeathMessage, \ 62 sandbox::UnitTests::DeathExitCode, \ 65 sandbox::UnitTests::DeathBySignal, \ 76 sandbox::UnitTests::RunTestInProcess(&sandbox_test_runner, death); \ 82 // changes to the system (i.e. they install a sandbox). GTest provides death 96 ((expr) ? static_cast<void>(0) : sandbox::UnitTests::AssertionFailure( [all...] |
/external/chromium_org/sandbox/mac/ |
bootstrap_sandbox.cc | 5 #include "sandbox/mac/bootstrap_sandbox.h" 14 #include "sandbox/mac/launchd_interception_server.h" 16 namespace sandbox { namespace 23 scoped_ptr<BootstrapSandbox> sandbox(new BootstrapSandbox()); 24 sandbox->server_.reset(new LaunchdInterceptionServer(sandbox.get())); 30 sandbox->server_bootstrap_name().c_str(), &port); 33 << "Failed to bootstrap_check_in the sandbox server."; 38 // Start the sandbox server. 39 if (sandbox->server_->Initialize(scoped_port.get()) [all...] |
launchd_interception_server.cc | 5 #include "sandbox/mac/launchd_interception_server.h" 11 #include "sandbox/mac/bootstrap_sandbox.h" 13 namespace sandbox { namespace 21 const BootstrapSandbox* sandbox) 22 : sandbox_(sandbox), 34 // Allocate the dummy sandbox port. 38 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port."; 44 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port send right."; 62 // No sandbox policy is in place for the sender of this message, which 70 // Filter messages sent via bootstrap_look_up to enforce the sandbox polic [all...] |
/external/chromium_org/sandbox/win/src/ |
filesystem_interception.cc | 5 #include "sandbox/win/src/filesystem_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_params.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/sandbox_nt_util.h" 13 #include "sandbox/win/src/sharedmem_ipc_client.h" 14 #include "sandbox/win/src/target_services.h" 16 namespace sandbox { namespace [all...] |
handle_closer.cc | 5 #include "sandbox/win/src/handle_closer.h" 10 #include "sandbox/win/src/interceptors.h" 11 #include "sandbox/win/src/internal_types.h" 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/process_thread_interception.h" 14 #include "sandbox/win/src/win_utils.h" 30 namespace sandbox { namespace 182 } // namespace sandbox
|
interception.h | 7 // http://dev.chromium.org/developers/design-documents/sandbox . 18 #include "sandbox/win/src/sandbox_types.h" 20 namespace sandbox { namespace 42 // sandbox::INTERCEPTION_SERVICE_CALL, &MyNtCreateFile, MY_ID_1)) 47 // sandbox::INTERCEPTION_EAT, L"MyCreateDirectoryW@12", MY_ID_2)) 62 // do not work with sandbox tests. 238 sandbox::INTERCEPTION_SERVICE_CALL, \ 251 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT, \ 264 sandbox::INTERCEPTION_SERVICE_CALL, \ 275 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT, [all...] |
job_unittest.cc | 8 #include "sandbox/win/src/job.h" 11 namespace sandbox { namespace 195 } // namespace sandbox
|
policy_engine_unittest.cc | 5 #include "sandbox/win/src/policy_engine_params.h" 6 #include "sandbox/win/src/policy_engine_processor.h" 9 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = { 10 #define POLPARAM(p) sandbox::ParamPickerMake(p), 13 namespace sandbox { namespace 102 } // namespace sandbox
|
registry_policy.cc | 7 #include "sandbox/win/src/registry_policy.h" 10 #include "sandbox/win/src/ipc_tags.h" 11 #include "sandbox/win/src/policy_engine_opcodes.h" 12 #include "sandbox/win/src/policy_params.h" 13 #include "sandbox/win/src/sandbox_utils.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/win_utils.h" 115 namespace sandbox { namespace 225 } // namespace sandbox
|
service_resolver.h | 8 #include "sandbox/win/src/nt_internals.h" 9 #include "sandbox/win/src/resolver.h" 11 namespace sandbox { namespace 136 } // namespace sandbox
|
sharedmem_ipc_server.h | 12 #include "sandbox/win/src/crosscall_params.h" 13 #include "sandbox/win/src/crosscall_server.h" 14 #include "sandbox/win/src/sharedmem_ipc_client.h" 32 namespace sandbox { namespace 56 // do not work with sandbox tests. 125 } // namespace sandbox
|
sidestep_resolver.cc | 5 #include "sandbox/win/src/sidestep_resolver.h" 8 #include "sandbox/win/src/sandbox_nt_util.h" 9 #include "sandbox/win/src/sidestep/preamble_patcher.h" 28 namespace sandbox { namespace 202 } // namespace sandbox
|
/external/chromium_org/content/common/sandbox_linux/ |
sandbox_linux.h | 23 namespace sandbox { class SetuidSandboxClient; } namespace 31 // This is a list of sandbox IPC methods which the renderer may send to the 32 // sandbox host. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC 48 // are enabled. If using the setuid sandbox, this should be called manually 49 // before the setuid sandbox is engaged. 52 // Initialize the sandbox with the given pre-built configuration. Currently 53 // seccomp-bpf and address space limitations (the setuid sandbox works 59 // Stop |thread| in a way that can be trusted by the sandbox. 62 // Returns the status of the renderer, worker and ppapi sandbox. Can only 75 // Simple accessor for our instance of the setuid sandbox. Will never retur [all...] |