HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 326 - 350 of 795) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/win/src/
filesystem_policy.cc 7 #include "sandbox/win/src/filesystem_policy.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/policy_engine_opcodes.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox_utils.h"
15 #include "sandbox/win/src/sandbox_types.h"
16 #include "sandbox/win/src/win_utils.h"
43 if (!sandbox::SameObject(local_handle, obj_attributes->ObjectName->Buffer)) {
59 namespace sandbox { namespace
386 } // namespace sandbox
    [all...]
policy_target_test.cc 7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/sandbox_utils.h"
10 #include "sandbox/win/src/target_services.h"
11 #include "sandbox/win/tests/common/controller.h"
14 namespace sandbox { namespace
213 // Launches the app in the sandbox and ask it to wait in an
273 // Launches the app in the sandbox and ask it to wait in an
337 } // namespace sandbox
    [all...]
sandbox_policy.h 11 #include "sandbox/win/src/sandbox_types.h"
12 #include "sandbox/win/src/security_level.h"
14 namespace sandbox { namespace
84 // Important: most of the sandbox-provided security relies on this single
140 // Sets the integrity level of the process in the sandbox. Both the initial
142 // is set to a level higher than the current level, the sandbox will fail
146 // Sets the integrity level of the process in the sandbox. The integrity level
149 // process in the sandbox. If the integrity level is set to a level higher
150 // than the current level, the sandbox will fail to start.
224 } // namespace sandbox
    [all...]
win_utils.cc 5 #include "sandbox/win/src/win_utils.h"
11 #include "sandbox/win/src/internal_types.h"
12 #include "sandbox/win/src/nt_internals.h"
38 if (0 == path.compare(0, sandbox::kNTPrefixLen, sandbox::kNTPrefix))
39 start = sandbox::kNTPrefixLen;
47 namespace sandbox { namespace
299 }; // namespace sandbox
310 static HMODULE ntdll = ::GetModuleHandle(sandbox::kNtdllName);
318 ntdll = ::GetModuleHandle(sandbox::kNtdllName)
    [all...]
restricted_token_utils.cc 9 #include "sandbox/win/src/restricted_token_utils.h"
15 #include "sandbox/win/src/job.h"
16 #include "sandbox/win/src/restricted_token.h"
17 #include "sandbox/win/src/security_level.h"
18 #include "sandbox/win/src/sid.h"
20 namespace sandbox { namespace
344 } // namespace sandbox
interception.cc 6 // http://dev.chromium.org/developers/design-documents/sandbox .
10 #include "sandbox/win/src/interception.h"
16 #include "sandbox/win/src/interception_internal.h"
17 #include "sandbox/win/src/interceptors.h"
18 #include "sandbox/win/src/sandbox.h"
19 #include "sandbox/win/src/sandbox_utils.h"
20 #include "sandbox/win/src/service_resolver.h"
21 #include "sandbox/win/src/target_interceptions.h"
22 #include "sandbox/win/src/target_process.h
54 namespace sandbox { namespace
    [all...]
sharedmem_ipc_server.cc 8 #include "sandbox/win/src/sharedmem_ipc_server.h"
9 #include "sandbox/win/src/sharedmem_ipc_client.h"
10 #include "sandbox/win/src/sandbox.h"
11 #include "sandbox/win/src/sandbox_types.h"
12 #include "sandbox/win/src/crosscall_params.h"
13 #include "sandbox/win/src/crosscall_server.h"
15 namespace sandbox { namespace
410 } // namespace sandbox
handle_closer_agent.cc 5 #include "sandbox/win/src/handle_closer_agent.h"
8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/win_utils.h"
35 namespace sandbox { namespace
145 } // namespace sandbox
policy_engine_params.h 9 #include "sandbox/win/src/internal_types.h"
10 #include "sandbox/win/src/nt_internals.h"
11 #include "sandbox/win/src/sandbox_nt_util.h"
17 namespace sandbox { namespace
200 } // namespace sandbox
policy_low_level.h 11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/policy_engine_params.h"
13 #include "sandbox/win/src/policy_engine_opcodes.h"
39 namespace sandbox { namespace
180 } // namespace sandbox
sharedmem_ipc_client.h 8 #include "sandbox/win/src/crosscall_params.h"
9 #include "sandbox/win/src/sandbox.h"
52 namespace sandbox { namespace
134 } // namespace sandbox
sidestep_resolver.cc 5 #include "sandbox/win/src/sidestep_resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
9 #include "sandbox/win/src/sidestep/preamble_patcher.h"
28 namespace sandbox { namespace
202 } // namespace sandbox
app_container_test.cc 14 #include "sandbox/win/src/sync_policy_test.h"
68 namespace sandbox { namespace
143 } // namespace sandbox
handle_table.h 13 #include "sandbox/win/src/nt_internals.h"
15 namespace sandbox { namespace
157 } // namespace sandbox
window.cc 5 #include "sandbox/win/src/window.h"
33 namespace sandbox { namespace
142 } // namespace sandbox
crosscall_server.cc 8 #include "sandbox/win/src/crosscall_server.h"
9 #include "sandbox/win/src/crosscall_params.h"
10 #include "sandbox/win/src/crosscall_client.h"
20 const size_t kMaxBufferSize = sandbox::kIPCChannelSize;
24 namespace sandbox { namespace
301 } // namespace sandbox
interception_unittest.cc 12 #include "sandbox/win/src/interception.h"
13 #include "sandbox/win/src/interceptors.h"
14 #include "sandbox/win/src/interception_internal.h"
15 #include "sandbox/win/src/target_process.h"
18 namespace sandbox { namespace
212 } // namespace sandbox
process_mitigations.cc 5 #include "sandbox/win/src/process_mitigations.h"
8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/sandbox_utils.h"
10 #include "sandbox/win/src/win_utils.h"
27 namespace sandbox { namespace
331 } // namespace sandbox
  /external/chromium_org/chrome/tools/
chrome-process-identifier.sh 9 # zygote, renderer). It also prints out information on whether a sandbox is
10 # active and what type of sandbox has been identified.
22 # zygote inside of the setuid sandbox, renderers are in a process tree separate
72 # The seccomp sandbox has exactly one child process that has no other
91 echo "Process $child is a $type; setuid sandbox is active"
135 # sandbox causes it to be reparented to "init". When this happens, we can
141 [ -d /proc/$i/cwd/. ] || echo -n "; setuid sandbox is active"
  /external/chromium_org/content/browser/gpu/
gpu_process_host.cc 48 #include "sandbox/win/src/sandbox_policy.h"
171 DVLOG(1) << "GPU sandbox is disabled";
184 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
190 policy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS,
191 sandbox::USER_LIMITED);
192 SetJobLevel(*cmd_line_, sandbox::JOB_UNPROTECTED, 0, policy);
193 policy->SetDelayedIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW);
200 policy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS,
201 sandbox::USER_LIMITED);
204 policy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS
    [all...]
  /external/chromium_org/chrome/app/
chrome_exe_main_win.cc 25 #include "sandbox/win/src/sandbox_factory.h"
42 // Initialize the sandbox services.
43 sandbox::SandboxInterfaceInfo sandbox_info = {0};
  /external/chromium_org/chrome/browser/
DEPS 40 "+sandbox/linux",
41 "+sandbox/win/src", # The path doesn't say it, but this is the Windows sandbox.
  /external/chromium_org/sandbox/linux/seccomp-bpf/
errorcode.cc 5 #include "sandbox/linux/seccomp-bpf/die.h"
6 #include "sandbox/linux/seccomp-bpf/errorcode.h"
46 SANDBOX_DIE("Invalid opcode in BPF sandbox rules");
syscall_iterator_unittest.cc 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
6 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
7 #include "sandbox/linux/tests/unit_tests.h"
  /external/chromium_org/win8/metro_driver/
metro_driver.gyp 59 '../../sandbox/sandbox.gyp:sandbox',

Completed in 253 milliseconds

<<11121314151617181920>>