/external/chromium_org/sandbox/win/src/ |
interception_agent.cc | 6 // http://dev.chromium.org/developers/design-documents/sandbox . 8 #include "sandbox/win/src/interception_agent.h" 10 #include "sandbox/win/src/interception_internal.h" 11 #include "sandbox/win/src/interceptors.h" 12 #include "sandbox/win/src/eat_resolver.h" 13 #include "sandbox/win/src/sidestep_resolver.h" 14 #include "sandbox/win/src/sandbox_nt_util.h" 26 namespace sandbox { namespace 233 } // namespace sandbox
|
job.cc | 5 #include "sandbox/win/src/job.h" 8 #include "sandbox/win/src/restricted_token.h" 10 namespace sandbox { namespace 118 } // namespace sandbox
|
process_thread_policy.cc | 5 #include "sandbox/win/src/process_thread_policy.h" 10 #include "sandbox/win/src/ipc_tags.h" 11 #include "sandbox/win/src/nt_internals.h" 12 #include "sandbox/win/src/policy_engine_opcodes.h" 13 #include "sandbox/win/src/policy_params.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/win_utils.h" 74 namespace sandbox { namespace 243 } // namespace sandbox
|
registry_interception.cc | 5 #include "sandbox/win/src/registry_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/sandbox_factory.h" 10 #include "sandbox/win/src/sandbox_nt_util.h" 11 #include "sandbox/win/src/sharedmem_ipc_client.h" 12 #include "sandbox/win/src/target_services.h" 14 namespace sandbox { namespace 176 } // namespace sandbox
|
registry_policy.cc | 7 #include "sandbox/win/src/registry_policy.h" 10 #include "sandbox/win/src/ipc_tags.h" 11 #include "sandbox/win/src/policy_engine_opcodes.h" 12 #include "sandbox/win/src/policy_params.h" 13 #include "sandbox/win/src/sandbox_utils.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/win_utils.h" 115 namespace sandbox { namespace 225 } // namespace sandbox
|
resolver_32.cc | 5 #include "sandbox/win/src/resolver.h" 7 #include "sandbox/win/src/sandbox_nt_util.h" 57 namespace sandbox { namespace 88 } // namespace sandbox
|
sandbox_nt_util.h | 11 #include "sandbox/win/src/nt_internals.h" 12 #include "sandbox/win/src/sandbox_nt_types.h" 15 void* __cdecl operator new(size_t size, sandbox::AllocationType type, 17 void __cdecl operator delete(void* memory, sandbox::AllocationType type); 22 void __cdecl operator delete(void* memory, sandbox::AllocationType type, 27 sandbox::AllocationType type); 29 sandbox::AllocationType type); 52 namespace sandbox { namespace 183 } // namespace sandbox
|
sandbox_policy_base.h | 16 #include "sandbox/win/src/crosscall_server.h" 17 #include "sandbox/win/src/handle_closer.h" 18 #include "sandbox/win/src/ipc_tags.h" 19 #include "sandbox/win/src/policy_engine_opcodes.h" 20 #include "sandbox/win/src/policy_engine_params.h" 21 #include "sandbox/win/src/sandbox_policy.h" 22 #include "sandbox/win/src/win_utils.h" 24 namespace sandbox { namespace 164 } // namespace sandbox
|
sandbox_types.h | 8 namespace sandbox { namespace 10 // Operation result codes returned by the sandbox API. 52 // If the sandbox cannot create a secure environment for the target, the 90 } // namespace sandbox
|
win_utils_unittest.cc | 8 #include "sandbox/win/src/win_utils.h" 9 #include "sandbox/win/tests/common/test_utils.h" 13 using sandbox::IsReparsePoint; 55 using sandbox::SameObject;
|
filesystem_interception.cc | 5 #include "sandbox/win/src/filesystem_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_params.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/sandbox_nt_util.h" 13 #include "sandbox/win/src/sharedmem_ipc_client.h" 14 #include "sandbox/win/src/target_services.h" 16 namespace sandbox { namespace [all...] |
process_thread_interception.cc | 5 #include "sandbox/win/src/process_thread_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_params.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/sandbox_nt_util.h" 13 #include "sandbox/win/src/sharedmem_ipc_client.h" 14 #include "sandbox/win/src/target_services.h" 16 namespace sandbox { namespace [all...] |
broker_services.cc | 5 #include "sandbox/win/src/broker_services.h" 16 #include "sandbox/win/src/app_container.h" 17 #include "sandbox/win/src/process_mitigations.h" 18 #include "sandbox/win/src/sandbox_policy_base.h" 19 #include "sandbox/win/src/sandbox.h" 20 #include "sandbox/win/src/target_process.h" 21 #include "sandbox/win/src/win2k_threadpool.h" 22 #include "sandbox/win/src/win_utils.h" 36 sandbox::ResultCode SpawnCleanup(sandbox::TargetProcess* target, DWORD error) 110 namespace sandbox { namespace [all...] |
handle_closer.cc | 5 #include "sandbox/win/src/handle_closer.h" 10 #include "sandbox/win/src/interceptors.h" 11 #include "sandbox/win/src/internal_types.h" 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/process_thread_interception.h" 14 #include "sandbox/win/src/win_utils.h" 30 namespace sandbox { namespace 182 } // namespace sandbox
|
handle_inheritance_test.cc | 9 #include "sandbox/win/tests/common/controller.h" 12 namespace sandbox { namespace
|
internal_types.h | 8 namespace sandbox { namespace 74 } // namespace sandbox
|
sync_policy_test.cc | 5 #include "sandbox/win/src/sync_policy_test.h" 8 #include "sandbox/win/src/sandbox.h" 9 #include "sandbox/win/src/sandbox_policy.h" 10 #include "sandbox/win/src/sandbox_factory.h" 11 #include "sandbox/win/src/nt_internals.h" 14 namespace sandbox { namespace 146 } // namespace sandbox
|
/external/chromium_org/third_party/WebKit/PerformanceTests/Parser/ |
html-parser.html | 10 iframe.sandbox = 'allow-same-origin'; // Prevent external script loads which could cause write() to return before completing the parse.
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
sandbox_bpf.cc | 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 28 #include "sandbox/linux/seccomp-bpf/codegen.h" 29 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 30 #include "sandbox/linux/seccomp-bpf/syscall.h" 31 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h" 32 #include "sandbox/linux/seccomp-bpf/verifier.h" 34 namespace sandbox { namespace 58 // We define a really simple sandbox policy. It is just good enough for us 59 // to tell that the sandbox has actually been activated. 169 // This means, we must conditionally disable the sandbox -- and that's no 177 SandboxBPF* sandbox = static_cast<SandboxBPF*>(aux); local 416 SandboxBPF sandbox; local [all...] |
sandbox_bpf_unittest.cc | 31 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 32 #include "sandbox/linux/seccomp-bpf/syscall.h" 33 #include "sandbox/linux/seccomp-bpf/trap.h" 34 #include "sandbox/linux/seccomp-bpf/verifier.h" 35 #include "sandbox/linux/services/broker_process.h" 36 #include "sandbox/linux/services/linux_syscalls.h" 37 #include "sandbox/linux/tests/unit_tests.h" 49 namespace sandbox { namespace 82 // setting up the sandbox. But it wouldn't hurt to have at least one test 95 virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox, 114 SandboxBPF sandbox; local 362 SandboxBPF sandbox; local [all...] |
/external/chromium_org/chrome_elf/blacklist/ |
blacklist_interceptions.h | 8 #include "sandbox/win/src/nt_internals.h" 9 #include "sandbox/win/src/sandbox_types.h"
|
/external/chromium_org/content/shell/app/ |
shell_main.cc | 10 #include "sandbox/win/src/sandbox_types.h" 20 sandbox::SandboxInterfaceInfo sandbox_info = {0};
|
/external/chromium_org/extensions/common/manifest_handlers/ |
sandboxed_page_info.h | 36 // Content Security Policy that should be used to enforce the sandbox used 37 // by sandboxed pages (guaranteed to have the "sandbox" directive without the
|
/external/chromium_org/sandbox/win/tests/validation_tests/ |
commands.h | 12 namespace sandbox { namespace 46 } // namespace sandbox
|
/external/chromium_org/ui/ozone/public/ |
surface_ozone_egl.h | 40 // called after we have entered the sandbox so if there are operations (e.g. 42 // outside of the sandbox, they must have been completed in
|