/external/chromium_org/sandbox/win/src/ |
filesystem_policy.cc | 7 #include "sandbox/win/src/filesystem_policy.h" 11 #include "sandbox/win/src/ipc_tags.h" 12 #include "sandbox/win/src/policy_engine_opcodes.h" 13 #include "sandbox/win/src/policy_params.h" 14 #include "sandbox/win/src/sandbox_utils.h" 15 #include "sandbox/win/src/sandbox_types.h" 16 #include "sandbox/win/src/win_utils.h" 43 if (!sandbox::SameObject(local_handle, obj_attributes->ObjectName->Buffer)) { 59 namespace sandbox { namespace 386 } // namespace sandbox [all...] |
policy_target_test.cc | 7 #include "sandbox/win/src/sandbox.h" 8 #include "sandbox/win/src/sandbox_factory.h" 9 #include "sandbox/win/src/sandbox_utils.h" 10 #include "sandbox/win/src/target_services.h" 11 #include "sandbox/win/tests/common/controller.h" 14 namespace sandbox { namespace 213 // Launches the app in the sandbox and ask it to wait in an 273 // Launches the app in the sandbox and ask it to wait in an 337 } // namespace sandbox [all...] |
sandbox_policy.h | 11 #include "sandbox/win/src/sandbox_types.h" 12 #include "sandbox/win/src/security_level.h" 14 namespace sandbox { namespace 84 // Important: most of the sandbox-provided security relies on this single 140 // Sets the integrity level of the process in the sandbox. Both the initial 142 // is set to a level higher than the current level, the sandbox will fail 146 // Sets the integrity level of the process in the sandbox. The integrity level 149 // process in the sandbox. If the integrity level is set to a level higher 150 // than the current level, the sandbox will fail to start. 224 } // namespace sandbox [all...] |
win_utils.cc | 5 #include "sandbox/win/src/win_utils.h" 11 #include "sandbox/win/src/internal_types.h" 12 #include "sandbox/win/src/nt_internals.h" 38 if (0 == path.compare(0, sandbox::kNTPrefixLen, sandbox::kNTPrefix)) 39 start = sandbox::kNTPrefixLen; 47 namespace sandbox { namespace 299 }; // namespace sandbox 310 static HMODULE ntdll = ::GetModuleHandle(sandbox::kNtdllName); 318 ntdll = ::GetModuleHandle(sandbox::kNtdllName) [all...] |
restricted_token_utils.cc | 9 #include "sandbox/win/src/restricted_token_utils.h" 15 #include "sandbox/win/src/job.h" 16 #include "sandbox/win/src/restricted_token.h" 17 #include "sandbox/win/src/security_level.h" 18 #include "sandbox/win/src/sid.h" 20 namespace sandbox { namespace 344 } // namespace sandbox
|
interception.cc | 6 // http://dev.chromium.org/developers/design-documents/sandbox . 10 #include "sandbox/win/src/interception.h" 16 #include "sandbox/win/src/interception_internal.h" 17 #include "sandbox/win/src/interceptors.h" 18 #include "sandbox/win/src/sandbox.h" 19 #include "sandbox/win/src/sandbox_utils.h" 20 #include "sandbox/win/src/service_resolver.h" 21 #include "sandbox/win/src/target_interceptions.h" 22 #include "sandbox/win/src/target_process.h 54 namespace sandbox { namespace [all...] |
sharedmem_ipc_server.cc | 8 #include "sandbox/win/src/sharedmem_ipc_server.h" 9 #include "sandbox/win/src/sharedmem_ipc_client.h" 10 #include "sandbox/win/src/sandbox.h" 11 #include "sandbox/win/src/sandbox_types.h" 12 #include "sandbox/win/src/crosscall_params.h" 13 #include "sandbox/win/src/crosscall_server.h" 15 namespace sandbox { namespace 410 } // namespace sandbox
|
handle_closer_agent.cc | 5 #include "sandbox/win/src/handle_closer_agent.h" 8 #include "sandbox/win/src/nt_internals.h" 9 #include "sandbox/win/src/win_utils.h" 35 namespace sandbox { namespace 145 } // namespace sandbox
|
policy_engine_params.h | 9 #include "sandbox/win/src/internal_types.h" 10 #include "sandbox/win/src/nt_internals.h" 11 #include "sandbox/win/src/sandbox_nt_util.h" 17 namespace sandbox { namespace 200 } // namespace sandbox
|
policy_low_level.h | 11 #include "sandbox/win/src/ipc_tags.h" 12 #include "sandbox/win/src/policy_engine_params.h" 13 #include "sandbox/win/src/policy_engine_opcodes.h" 39 namespace sandbox { namespace 180 } // namespace sandbox
|
sharedmem_ipc_client.h | 8 #include "sandbox/win/src/crosscall_params.h" 9 #include "sandbox/win/src/sandbox.h" 52 namespace sandbox { namespace 134 } // namespace sandbox
|
sidestep_resolver.cc | 5 #include "sandbox/win/src/sidestep_resolver.h" 8 #include "sandbox/win/src/sandbox_nt_util.h" 9 #include "sandbox/win/src/sidestep/preamble_patcher.h" 28 namespace sandbox { namespace 202 } // namespace sandbox
|
app_container_test.cc | 14 #include "sandbox/win/src/sync_policy_test.h" 68 namespace sandbox { namespace 143 } // namespace sandbox
|
handle_table.h | 13 #include "sandbox/win/src/nt_internals.h" 15 namespace sandbox { namespace 157 } // namespace sandbox
|
window.cc | 5 #include "sandbox/win/src/window.h" 33 namespace sandbox { namespace 142 } // namespace sandbox
|
crosscall_server.cc | 8 #include "sandbox/win/src/crosscall_server.h" 9 #include "sandbox/win/src/crosscall_params.h" 10 #include "sandbox/win/src/crosscall_client.h" 20 const size_t kMaxBufferSize = sandbox::kIPCChannelSize; 24 namespace sandbox { namespace 301 } // namespace sandbox
|
interception_unittest.cc | 12 #include "sandbox/win/src/interception.h" 13 #include "sandbox/win/src/interceptors.h" 14 #include "sandbox/win/src/interception_internal.h" 15 #include "sandbox/win/src/target_process.h" 18 namespace sandbox { namespace 212 } // namespace sandbox
|
process_mitigations.cc | 5 #include "sandbox/win/src/process_mitigations.h" 8 #include "sandbox/win/src/nt_internals.h" 9 #include "sandbox/win/src/sandbox_utils.h" 10 #include "sandbox/win/src/win_utils.h" 27 namespace sandbox { namespace 331 } // namespace sandbox
|
/external/chromium_org/chrome/tools/ |
chrome-process-identifier.sh | 9 # zygote, renderer). It also prints out information on whether a sandbox is 10 # active and what type of sandbox has been identified. 22 # zygote inside of the setuid sandbox, renderers are in a process tree separate 72 # The seccomp sandbox has exactly one child process that has no other 91 echo "Process $child is a $type; setuid sandbox is active" 135 # sandbox causes it to be reparented to "init". When this happens, we can 141 [ -d /proc/$i/cwd/. ] || echo -n "; setuid sandbox is active"
|
/external/chromium_org/content/browser/gpu/ |
gpu_process_host.cc | 48 #include "sandbox/win/src/sandbox_policy.h" 171 DVLOG(1) << "GPU sandbox is disabled"; 184 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy, 190 policy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS, 191 sandbox::USER_LIMITED); 192 SetJobLevel(*cmd_line_, sandbox::JOB_UNPROTECTED, 0, policy); 193 policy->SetDelayedIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW); 200 policy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS, 201 sandbox::USER_LIMITED); 204 policy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS [all...] |
/external/chromium_org/chrome/app/ |
chrome_exe_main_win.cc | 25 #include "sandbox/win/src/sandbox_factory.h" 42 // Initialize the sandbox services. 43 sandbox::SandboxInterfaceInfo sandbox_info = {0};
|
/external/chromium_org/chrome/browser/ |
DEPS | 40 "+sandbox/linux", 41 "+sandbox/win/src", # The path doesn't say it, but this is the Windows sandbox.
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
errorcode.cc | 5 #include "sandbox/linux/seccomp-bpf/die.h" 6 #include "sandbox/linux/seccomp-bpf/errorcode.h" 46 SANDBOX_DIE("Invalid opcode in BPF sandbox rules");
|
syscall_iterator_unittest.cc | 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 6 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h" 7 #include "sandbox/linux/tests/unit_tests.h"
|
/external/chromium_org/win8/metro_driver/ |
metro_driver.gyp | 59 '../../sandbox/sandbox.gyp:sandbox',
|