HomeSort by relevance Sort by last modified time
    Searched defs:sandbox (Results 201 - 225 of 299) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/chromium_org/sandbox/win/src/
interception.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
18 #include "sandbox/win/src/sandbox_types.h"
20 namespace sandbox { namespace
42 // sandbox::INTERCEPTION_SERVICE_CALL, &MyNtCreateFile, MY_ID_1))
47 // sandbox::INTERCEPTION_EAT, L"MyCreateDirectoryW@12", MY_ID_2))
62 // do not work with sandbox tests.
238 sandbox::INTERCEPTION_SERVICE_CALL, \
251 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT, \
264 sandbox::INTERCEPTION_SERVICE_CALL, \
275 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT,
    [all...]
job_unittest.cc 8 #include "sandbox/win/src/job.h"
11 namespace sandbox { namespace
195 } // namespace sandbox
policy_engine_unittest.cc 5 #include "sandbox/win/src/policy_engine_params.h"
6 #include "sandbox/win/src/policy_engine_processor.h"
9 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = {
10 #define POLPARAM(p) sandbox::ParamPickerMake(p),
13 namespace sandbox { namespace
102 } // namespace sandbox
registry_policy.cc 7 #include "sandbox/win/src/registry_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/policy_engine_opcodes.h"
12 #include "sandbox/win/src/policy_params.h"
13 #include "sandbox/win/src/sandbox_utils.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/win_utils.h"
115 namespace sandbox { namespace
225 } // namespace sandbox
service_resolver.h 8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/resolver.h"
11 namespace sandbox { namespace
136 } // namespace sandbox
sharedmem_ipc_server.h 12 #include "sandbox/win/src/crosscall_params.h"
13 #include "sandbox/win/src/crosscall_server.h"
14 #include "sandbox/win/src/sharedmem_ipc_client.h"
32 namespace sandbox { namespace
56 // do not work with sandbox tests.
125 } // namespace sandbox
sidestep_resolver.cc 5 #include "sandbox/win/src/sidestep_resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
9 #include "sandbox/win/src/sidestep/preamble_patcher.h"
28 namespace sandbox { namespace
202 } // namespace sandbox
app_container.cc 5 #include "sandbox/win/src/app_container.h"
13 #include "sandbox/win/src/internal_types.h"
28 HMODULE module = GetModuleHandle(sandbox::kKerneldllName);
31 module = GetModuleHandle(sandbox::kKernelBasedllName);
39 namespace sandbox { namespace
183 } // namespace sandbox
crosscall_client.h 8 #include "sandbox/win/src/crosscall_params.h"
9 #include "sandbox/win/src/sandbox.h"
39 namespace sandbox { namespace
481 } // namespace sandbox
filesystem_dispatcher.cc 5 #include "sandbox/win/src/filesystem_dispatcher.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/filesystem_interception.h"
9 #include "sandbox/win/src/filesystem_policy.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/policy_broker.h"
14 #include "sandbox/win/src/policy_params.h"
15 #include "sandbox/win/src/sandbox.h
18 namespace sandbox { namespace
    [all...]
handle_closer.cc 5 #include "sandbox/win/src/handle_closer.h"
10 #include "sandbox/win/src/interceptors.h"
11 #include "sandbox/win/src/internal_types.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/process_thread_interception.h"
14 #include "sandbox/win/src/win_utils.h"
30 namespace sandbox { namespace
190 } // namespace sandbox
handle_closer_test.cc 7 #include "sandbox/win/src/handle_closer_agent.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/target_services.h"
11 #include "sandbox/win/tests/common/controller.h"
51 namespace sandbox { namespace
111 sandbox::TargetPolicy* policy = runner.GetPolicy();
118 CHECK(sandbox::GetHandleName(marker.Get(), &handle_name));
131 sandbox::TargetPolicy* policy = runner.GetPolicy()
    [all...]
interception_internal.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
12 #include "sandbox/win/src/sandbox_types.h"
14 namespace sandbox { namespace
74 } // namespace sandbox
internal_types.h 8 namespace sandbox { namespace
74 } // namespace sandbox
ipc_tags.h 8 namespace sandbox { namespace
38 } // namespace sandbox
  /external/chromium_org/content/common/sandbox_linux/
sandbox_linux.h 23 namespace sandbox { class SetuidSandboxClient; } namespace
31 // This is a list of sandbox IPC methods which the renderer may send to the
32 // sandbox host. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC
48 // are enabled. If using the setuid sandbox, this should be called manually
49 // before the setuid sandbox is engaged.
52 // Initialize the sandbox with the given pre-built configuration. Currently
53 // seccomp-bpf and address space limitations (the setuid sandbox works
59 // Stop |thread| in a way that can be trusted by the sandbox.
62 // Returns the status of the renderer, worker and ppapi sandbox. Can only
75 // Simple accessor for our instance of the setuid sandbox. Will never retur
    [all...]
  /external/chromium_org/sandbox/linux/seccomp-bpf/
bpf_tests_unittest.cc 5 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
17 #include "sandbox/linux/services/linux_syscalls.h"
18 #include "sandbox/linux/tests/unit_tests.h"
21 namespace sandbox { namespace
44 virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox,
151 } // namespace sandbox
syscall_unittest.cc 5 #include "sandbox/linux/seccomp-bpf/syscall.h"
19 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
20 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
21 #include "sandbox/linux/tests/unit_tests.h"
24 namespace sandbox { namespace
107 virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox,
111 return sandbox->Trap(CopySyscallArgsToAux, aux_);
236 } // namespace sandbox
verifier.cc 5 #include "sandbox/linux/seccomp-bpf/verifier.h"
11 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
12 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
13 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
14 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
16 namespace sandbox { namespace
38 uint32_t EvaluateErrorCode(SandboxBPF* sandbox,
49 return sandbox->Unexpected64bitArgument().err();
53 sandbox, equal ? *code.passed() : *code.failed(), data);
59 bool VerifyErrorCode(SandboxBPF* sandbox,
    [all...]
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
syscall_parameters_restrictions.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
29 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
30 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
31 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
32 #include "sandbox/linux/services/linux_syscalls.h"
36 #include "sandbox/linux/services/android_futex.h"
89 using sandbox::bpf_dsl::Allow;
90 using sandbox::bpf_dsl::Arg;
91 using sandbox::bpf_dsl::BoolExpr;
92 using sandbox::bpf_dsl::Error
96 namespace sandbox { namespace
    [all...]
syscall_parameters_restrictions_unittests.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
19 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
20 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
21 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
22 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
23 #include "sandbox/linux/seccomp-bpf/syscall.h"
24 #include "sandbox/linux/services/linux_syscalls.h"
25 #include "sandbox/linux/tests/unit_tests.h"
31 namespace sandbox { namespace
38 using sandbox::bpf_dsl::Allow
    [all...]
  /external/chromium_org/sandbox/linux/services/
libc_urandom_override.cc 5 #include "sandbox/linux/services/libc_urandom_override.h"
23 namespace sandbox { namespace
unix_domain_socket_unittest.cc 21 #include "sandbox/linux/tests/unit_tests.h"
27 namespace sandbox { namespace
267 } // namespace sandbox
  /external/chromium_org/sandbox/mac/
mach_message_server.cc 5 #include "sandbox/mac/mach_message_server.h"
15 #include "sandbox/mac/dispatch_source_mach.h"
17 namespace sandbox { namespace
71 "org.chromium.sandbox.MachMessageServer.%p", demuxer_);
184 // forwarded message was sent from the process hosting this sandbox server,
193 } // namespace sandbox
xpc_message_server.cc 5 #include "sandbox/mac/xpc_message_server.h"
13 #include "sandbox/mac/dispatch_source_mach.h"
14 #include "sandbox/mac/xpc.h"
16 namespace sandbox { namespace
43 "org.chromium.sandbox.XPCMessageServer.%p", demuxer_);
116 } // namespace sandbox

Completed in 256 milliseconds

1 2 3 4 5 6 7 891011>>