HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 176 - 200 of 283) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/chromium_org/sandbox/win/tests/integration_tests/
integration_tests_test.cc 8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/target_services.h"
10 #include "sandbox/win/src/sandbox_factory.h"
11 #include "sandbox/win/tests/common/controller.h"
13 namespace sandbox { namespace
306 } // namespace sandbox
  /external/chromium_org/sandbox/win/tests/validation_tests/
suite.cc 5 // This file contains the validation tests for the sandbox.
7 // sandbox.
13 #include "sandbox/win/tests/common/controller.h"
19 void TestProcessAccess(sandbox::TestRunner* runner, DWORD target) {
25 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
27 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
29 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
31 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
33 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command));
35 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command))
48 namespace sandbox { namespace
    [all...]
  /external/chromium_org/sandbox/win/wow_helper/
wow_helper.cc 6 // sandbox a 32 bit application running on a 64 bit OS. The basic idea is to
15 #include "sandbox/win/wow_helper/service64_resolver.h"
16 #include "sandbox/win/wow_helper/target_code.h"
18 namespace sandbox { namespace
54 } // namespace sandbox
85 return sandbox::PatchNtdll(child, thunk, kPageSize);
  /external/chromium_org/ui/views_content_client/
views_content_client.h 17 namespace sandbox { namespace
34 // sandbox::SandboxInterfaceInfo sandbox_info = {0};
53 sandbox::SandboxInterfaceInfo* sandbox_info);
71 sandbox::SandboxInterfaceInfo* sandbox_info_;
  /external/chromium_org/content/browser/
bootstrap_sandbox_mac.cc 22 #include "sandbox/mac/bootstrap_sandbox.h"
35 sandbox::BootstrapSandbox* sandbox() const { function in class:content::__anon11357::BootstrapSandboxPolicy
58 void AddBaselinePolicy(sandbox::BootstrapSandboxPolicy* policy);
62 scoped_ptr<sandbox::BootstrapSandbox> sandbox_;
71 sandbox()->ChildDied(data.handle);
76 sandbox()->ChildDied(data.handle);
84 sandbox()->ChildDied(
94 : sandbox_(sandbox::BootstrapSandbox::Create()) {
111 sandbox::BootstrapSandboxPolicy policy
    [all...]
  /external/chromium_org/content/public/common/
content_client.h 36 namespace sandbox { namespace
126 // resource ID corresponding to the sandbox profile to use. The legal values
128 // SandboxType::SANDBOX_TYPE_AFTER_LAST_TYPE. Returns false if no sandbox
131 // the sandbox profile to use and true is returned.
  /external/chromium_org/sandbox/linux/seccomp-bpf/
bpf_tests.h 10 #include "sandbox/linux/seccomp-bpf/bpf_tester_compatibility_delegate.h"
11 #include "sandbox/linux/tests/unit_tests.h"
13 namespace sandbox { namespace
34 sandbox::SandboxBPFTestRunner bpf_test_runner( \
35 new sandbox::BPFTesterSimpleDelegate<bpf_policy_class_name>( \
37 sandbox::UnitTests::RunTestInProcess(&bpf_test_runner, death); \
53 sandbox::SandboxBPFTestRunner bpf_test_runner( \
55 sandbox::UnitTests::RunTestInProcess(&bpf_test_runner, death); \
88 sandbox::BPFTesterCompatibilityDelegate<aux>::AuxType* BPF_AUX); \
90 sandbox::SandboxBPFTestRunner bpf_test_runner(
    [all...]
bpf_tests_unittest.cc 5 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
17 #include "sandbox/linux/services/linux_syscalls.h"
18 #include "sandbox/linux/tests/unit_tests.h"
21 namespace sandbox { namespace
36 ErrorCode EmptyPolicyTakesClass(SandboxBPF* sandbox,
139 } // namespace sandbox
syscall_unittest.cc 16 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
17 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
18 #include "sandbox/linux/seccomp-bpf/syscall.h"
19 #include "sandbox/linux/tests/unit_tests.h"
22 namespace sandbox { namespace
91 ErrorCode CopyAllArgsOnUnamePolicy(SandboxBPF* sandbox,
98 return sandbox->Trap(CopySyscallArgsToAux, aux);
214 } // namespace sandbox
verifier.cc 7 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
8 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
9 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
10 #include "sandbox/linux/seccomp-bpf/verifier.h"
13 namespace sandbox { namespace
31 uint32_t EvaluateErrorCode(SandboxBPF* sandbox,
42 return sandbox->Unexpected64bitArgument().err();
46 return EvaluateErrorCode(sandbox,
54 return EvaluateErrorCode(sandbox,
63 return EvaluateErrorCode(sandbox,
    [all...]
  /external/chromium_org/sandbox/linux/services/
broker_process.h 15 #include "sandbox/sandbox_export.h"
17 namespace sandbox { namespace
27 // 3. Enable sandbox.
104 } // namespace sandbox
yama.cc 5 #include "sandbox/linux/services/yama.h"
27 namespace sandbox { namespace
116 } // namespace sandbox
  /external/chromium_org/sandbox/linux/tests/
unit_tests.h 10 #include "sandbox/linux/tests/sandbox_test_runner_function_pointer.h"
13 namespace sandbox { namespace
55 #define DEATH_SUCCESS() sandbox::UnitTests::DeathSuccess, NULL
57 sandbox::UnitTests::DeathSuccessAllowNoise, NULL
59 sandbox::UnitTests::DeathMessage, \
62 sandbox::UnitTests::DeathExitCode, \
65 sandbox::UnitTests::DeathBySignal, \
76 sandbox::UnitTests::RunTestInProcess(&sandbox_test_runner, death); \
82 // changes to the system (i.e. they install a sandbox). GTest provides death
96 ((expr) ? static_cast<void>(0) : sandbox::UnitTests::AssertionFailure(
    [all...]
  /external/chromium_org/sandbox/mac/
bootstrap_sandbox.cc 5 #include "sandbox/mac/bootstrap_sandbox.h"
14 #include "sandbox/mac/launchd_interception_server.h"
16 namespace sandbox { namespace
23 scoped_ptr<BootstrapSandbox> sandbox(new BootstrapSandbox());
24 sandbox->server_.reset(new LaunchdInterceptionServer(sandbox.get()));
30 sandbox->server_bootstrap_name().c_str(), &port);
33 << "Failed to bootstrap_check_in the sandbox server.";
38 // Start the sandbox server.
39 if (sandbox->server_->Initialize(scoped_port.get())
    [all...]
launchd_interception_server.cc 5 #include "sandbox/mac/launchd_interception_server.h"
11 #include "sandbox/mac/bootstrap_sandbox.h"
13 namespace sandbox { namespace
21 const BootstrapSandbox* sandbox)
22 : sandbox_(sandbox),
34 // Allocate the dummy sandbox port.
38 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port.";
44 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port send right.";
62 // No sandbox policy is in place for the sender of this message, which
70 // Filter messages sent via bootstrap_look_up to enforce the sandbox polic
    [all...]
  /external/chromium_org/sandbox/win/src/
filesystem_interception.cc 5 #include "sandbox/win/src/filesystem_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
handle_closer.cc 5 #include "sandbox/win/src/handle_closer.h"
10 #include "sandbox/win/src/interceptors.h"
11 #include "sandbox/win/src/internal_types.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/process_thread_interception.h"
14 #include "sandbox/win/src/win_utils.h"
30 namespace sandbox { namespace
182 } // namespace sandbox
interception.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
18 #include "sandbox/win/src/sandbox_types.h"
20 namespace sandbox { namespace
42 // sandbox::INTERCEPTION_SERVICE_CALL, &MyNtCreateFile, MY_ID_1))
47 // sandbox::INTERCEPTION_EAT, L"MyCreateDirectoryW@12", MY_ID_2))
62 // do not work with sandbox tests.
238 sandbox::INTERCEPTION_SERVICE_CALL, \
251 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT, \
264 sandbox::INTERCEPTION_SERVICE_CALL, \
275 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT,
    [all...]
job_unittest.cc 8 #include "sandbox/win/src/job.h"
11 namespace sandbox { namespace
195 } // namespace sandbox
policy_engine_unittest.cc 5 #include "sandbox/win/src/policy_engine_params.h"
6 #include "sandbox/win/src/policy_engine_processor.h"
9 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = {
10 #define POLPARAM(p) sandbox::ParamPickerMake(p),
13 namespace sandbox { namespace
102 } // namespace sandbox
registry_policy.cc 7 #include "sandbox/win/src/registry_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/policy_engine_opcodes.h"
12 #include "sandbox/win/src/policy_params.h"
13 #include "sandbox/win/src/sandbox_utils.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/win_utils.h"
115 namespace sandbox { namespace
225 } // namespace sandbox
service_resolver.h 8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/resolver.h"
11 namespace sandbox { namespace
136 } // namespace sandbox
sharedmem_ipc_server.h 12 #include "sandbox/win/src/crosscall_params.h"
13 #include "sandbox/win/src/crosscall_server.h"
14 #include "sandbox/win/src/sharedmem_ipc_client.h"
32 namespace sandbox { namespace
56 // do not work with sandbox tests.
125 } // namespace sandbox
sidestep_resolver.cc 5 #include "sandbox/win/src/sidestep_resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
9 #include "sandbox/win/src/sidestep/preamble_patcher.h"
28 namespace sandbox { namespace
202 } // namespace sandbox
  /external/chromium_org/content/common/sandbox_linux/
sandbox_linux.h 23 namespace sandbox { class SetuidSandboxClient; } namespace
31 // This is a list of sandbox IPC methods which the renderer may send to the
32 // sandbox host. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC
48 // are enabled. If using the setuid sandbox, this should be called manually
49 // before the setuid sandbox is engaged.
52 // Initialize the sandbox with the given pre-built configuration. Currently
53 // seccomp-bpf and address space limitations (the setuid sandbox works
59 // Stop |thread| in a way that can be trusted by the sandbox.
62 // Returns the status of the renderer, worker and ppapi sandbox. Can only
75 // Simple accessor for our instance of the setuid sandbox. Will never retur
    [all...]

Completed in 851 milliseconds

1 2 3 4 5 6 78 91011>>