/external/chromium_org/components/nacl/common/ |
nacl_helper_linux.h | 25 // the SUID sandbox. 37 // child processes real PID from within the SUID sandbox. See
|
/external/chromium_org/content/common/ |
OWNERS | 10 # Mac Sandbox. 20 # new sandbox escapes.
|
/external/chromium_org/content/public/app/ |
content_main.h | 15 namespace sandbox { namespace 32 sandbox::SandboxInterfaceInfo* sandbox_info,
|
content_main_runner.h | 16 namespace sandbox { namespace 38 sandbox::SandboxInterfaceInfo* sandbox_info,
|
/external/chromium_org/content/renderer/ |
renderer_main_platform_delegate_win.cc | 16 #include "sandbox/win/src/sandbox.h" 28 // Windows-only skia sandbox support 102 // cached and there's no more need to access the registry. If the sandbox 122 sandbox::TargetServices* target_services = 140 sandbox::TargetServices* target_services = 144 // Cause advapi32 to load before the sandbox is turned on. 147 // Warm up language subsystems before the sandbox is turned on.
|
/external/chromium_org/content/shell/app/ |
shell_main.cc | 8 #include "sandbox/win/src/sandbox_types.h" 21 sandbox::SandboxInterfaceInfo sandbox_info = {0};
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
syscall_unittest.cc | 15 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 17 #include "sandbox/linux/seccomp-bpf/syscall.h" 18 #include "sandbox/linux/tests/unit_tests.h" 81 ErrorCode CopyAllArgsOnUnamePolicy(Sandbox *sandbox, int sysno, void *aux) { 82 if (!Sandbox::IsValidSyscallNumber(sysno)) { 86 return sandbox->Trap(CopySyscallArgsToAux, aux);
|
/external/chromium_org/sandbox/linux/tests/ |
unit_tests.h | 12 namespace sandbox { namespace 36 #define DEATH_SUCCESS() sandbox::UnitTests::DeathSuccess, NULL 37 #define DEATH_MESSAGE(msg) sandbox::UnitTests::DeathMessage, \ 40 #define DEATH_EXIT_CODE(rc) sandbox::UnitTests::DeathExitCode, \ 42 #define DEATH_BY_SIGNAL(s) sandbox::UnitTests::DeathExitCode, \ 52 sandbox::UnitTests::RunTestInProcess(TEST_##test_name, NULL, death); \ 58 // changes to the system (i.e. they install a sandbox). GTest provides death 69 : sandbox::UnitTests::AssertionFailure(SANDBOX_STR(expr), \
|
/external/chromium_org/sandbox/win/src/ |
handle_closer.cc | 5 #include "sandbox/win/src/handle_closer.h" 10 #include "sandbox/win/src/interceptors.h" 11 #include "sandbox/win/src/internal_types.h" 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/process_thread_interception.h" 14 #include "sandbox/win/src/win_utils.h" 30 namespace sandbox { namespace 202 } // namespace sandbox
|
handle_inheritance_test.cc | 9 #include "sandbox/win/tests/common/controller.h" 12 namespace sandbox { namespace
|
internal_types.h | 8 namespace sandbox { namespace 73 } // namespace sandbox
|
sync_policy_test.cc | 5 #include "sandbox/win/src/sync_policy_test.h" 8 #include "sandbox/win/src/sandbox.h" 9 #include "sandbox/win/src/sandbox_policy.h" 10 #include "sandbox/win/src/sandbox_factory.h" 11 #include "sandbox/win/src/nt_internals.h" 14 namespace sandbox { namespace 146 } // namespace sandbox
|
interception_agent.h | 7 // http://dev.chromium.org/developers/design-documents/sandbox . 13 #include "sandbox/win/src/nt_internals.h" 14 #include "sandbox/win/src/sandbox_types.h" 16 namespace sandbox { namespace 85 } // namespace sandbox
|
registry_policy_test.cc | 8 #include "sandbox/win/src/registry_policy.h" 9 #include "sandbox/win/src/sandbox.h" 10 #include "sandbox/win/src/sandbox_policy.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/win_utils.h" 14 #include "sandbox/win/tests/common/controller.h" 43 namespace sandbox { namespace 289 } // namespace sandbox [all...] |
broker_services.cc | 5 #include "sandbox/win/src/broker_services.h" 14 #include "sandbox/win/src/app_container.h" 15 #include "sandbox/win/src/process_mitigations.h" 16 #include "sandbox/win/src/sandbox_policy_base.h" 17 #include "sandbox/win/src/sandbox.h" 18 #include "sandbox/win/src/target_process.h" 19 #include "sandbox/win/src/win2k_threadpool.h" 20 #include "sandbox/win/src/win_utils.h" 34 sandbox::ResultCode SpawnCleanup(sandbox::TargetProcess* target, DWORD error) 85 namespace sandbox { namespace [all...] |
sharedmem_ipc_client.cc | 6 #include "sandbox/win/src/sharedmem_ipc_client.h" 7 #include "sandbox/win/src/sandbox.h" 8 #include "sandbox/win/src/crosscall_client.h" 9 #include "sandbox/win/src/crosscall_params.h" 12 namespace sandbox { namespace 152 } // namespace sandbox
|
/external/chromium_org/sandbox/win/tests/validation_tests/ |
commands.cc | 8 #include "sandbox/win/tests/validation_tests/commands.h" 10 #include "sandbox/win/tests/common/controller.h" 47 return sandbox::SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; 60 return sandbox::SBOX_TEST_SUCCEEDED; 63 return sandbox::SBOX_TEST_DENIED; 65 return sandbox::SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; 72 namespace sandbox { namespace 262 } // namespace sandbox
|
commands.h | 8 namespace sandbox { namespace 35 } // namespace sandbox
|
/external/openssh/ |
sandbox-null.c | 32 #include "ssh-sandbox.h" 35 /* dummy sandbox */
|
/external/chromium_org/chrome/nacl/ |
nacl_exe_win_64.cc | 29 #include "sandbox/win/src/sandbox_types.h" 60 sandbox::SandboxInterfaceInfo sandbox_info = {0}; 82 // Initialize the sandbox for this process. 84 // Die if the sandbox can't be enabled. 85 CHECK(sandbox_initialized_ok) << "Error initializing sandbox for "
|
/external/chromium_org/components/nacl/loader/ |
nacl_sandbox_linux.cc | 15 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 16 #include "sandbox/linux/services/linux_syscalls.h" 19 using playground2::Sandbox; 52 playground2::Sandbox* sb, int sysno, void* aux) { 129 // Without the sandbox on, this ptrace call would ESRCH instead.
|
/external/chromium_org/content/browser/zygote_host/ |
zygote_host_impl_linux.cc | 36 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 37 #include "sandbox/linux/suid/common/sandbox.h" 122 // A non empty sandbox_cmd means we want a SUID sandbox. 128 LOG(FATAL) << "The SUID sandbox helper binary is missing: " 138 scoped_ptr<sandbox::SetuidSandboxClient> 139 sandbox_client(sandbox::SetuidSandboxClient::Create()); 142 LOG(FATAL) << "The SUID sandbox helper binary was found, but is not " 149 // Start up the sandbox host process and get the file descriptor for the 168 // In the SUID sandbox, the real zygote is forked from the sandbox [all...] |
/external/chromium_org/content/ppapi_plugin/ |
ppapi_plugin_main.cc | 24 #include "sandbox/win/src/sandbox.h" 36 sandbox::TargetServices* g_target_services = NULL; 91 // NSS must be initialized before enabling the sandbox below. 96 // before the sandbox is initialized.
|
/external/chromium_org/sandbox/win/sandbox_poc/ |
main_ui_window.cc | 15 #include "sandbox/win/sandbox_poc/main_ui_window.h" 17 #include "sandbox/win/sandbox_poc/resource.h" 18 #include "sandbox/win/src/acl.h" 19 #include "sandbox/win/src/sandbox.h" 20 #include "sandbox/win/src/win_utils.h" 43 sandbox::BrokerServices* broker) { 103 ::SetWindowText(window, L"Sandbox Proof of Concept"); 508 sandbox::TargetPolicy* policy = broker_->CreatePolicy(); 509 policy->SetJobLevel(sandbox::JOB_LOCKDOWN, 0) [all...] |
/external/chromium_org/sandbox/linux/ |
sandbox_linux.gypi | 34 # We have two principal targets: sandbox and sandbox_linux_unittests 36 # FIXME(jln): for historial reasons, sandbox_linux is the setuid sandbox 39 'target_name': 'sandbox', 123 # The setuid sandbox, for Linux 127 'suid/common/sandbox.h', 133 'suid/sandbox.c', 191 'suid/common/sandbox.h',
|