/external/chromium_org/sandbox/win/src/ |
process_thread_dispatcher.cc | 5 #include "sandbox/win/src/process_thread_dispatcher.h" 9 #include "sandbox/win/src/crosscall_client.h" 10 #include "sandbox/win/src/interception.h" 11 #include "sandbox/win/src/interceptors.h" 12 #include "sandbox/win/src/ipc_tags.h" 13 #include "sandbox/win/src/policy_broker.h" 14 #include "sandbox/win/src/policy_params.h" 15 #include "sandbox/win/src/process_thread_interception.h" 16 #include "sandbox/win/src/process_thread_policy.h" 17 #include "sandbox/win/src/sandbox.h 95 namespace sandbox { namespace [all...] |
process_thread_policy.cc | 5 #include "sandbox/win/src/process_thread_policy.h" 10 #include "sandbox/win/src/ipc_tags.h" 11 #include "sandbox/win/src/nt_internals.h" 12 #include "sandbox/win/src/policy_engine_opcodes.h" 13 #include "sandbox/win/src/policy_params.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/win_utils.h" 74 namespace sandbox { namespace 242 } // namespace sandbox
|
sandbox_nt_util.h | 11 #include "sandbox/win/src/nt_internals.h" 12 #include "sandbox/win/src/sandbox_nt_types.h" 15 void* __cdecl operator new(size_t size, sandbox::AllocationType type, 17 void __cdecl operator delete(void* memory, sandbox::AllocationType type); 22 void __cdecl operator delete(void* memory, sandbox::AllocationType type, 27 sandbox::AllocationType type); 29 sandbox::AllocationType type); 52 namespace sandbox { namespace 183 } // namespace sandbox
|
sandbox_policy.h | 12 #include "sandbox/win/src/sandbox_types.h" 13 #include "sandbox/win/src/security_level.h" 15 namespace sandbox { namespace 85 // Important: most of the sandbox-provided security relies on this single 141 // Sets the integrity level of the process in the sandbox. Both the initial 143 // is set to a level higher than the current level, the sandbox will fail 147 // Sets the integrity level of the process in the sandbox. The integrity level 150 // process in the sandbox. If the integrity level is set to a level higher 151 // than the current level, the sandbox will fail to start. 225 } // namespace sandbox [all...] |
service_resolver.h | 8 #include "sandbox/win/src/nt_internals.h" 9 #include "sandbox/win/src/resolver.h" 11 namespace sandbox { namespace 148 } // namespace sandbox
|
sharedmem_ipc_client.h | 8 #include "sandbox/win/src/crosscall_params.h" 9 #include "sandbox/win/src/sandbox.h" 52 namespace sandbox { namespace 134 } // namespace sandbox
|
target_process.h | 14 #include "sandbox/win/src/crosscall_server.h" 15 #include "sandbox/win/src/sandbox_types.h" 25 namespace sandbox { namespace 130 } // namespace sandbox
|
crosscall_server.cc | 8 #include "sandbox/win/src/crosscall_server.h" 9 #include "sandbox/win/src/crosscall_params.h" 10 #include "sandbox/win/src/crosscall_client.h" 20 const size_t kMaxBufferSize = sandbox::kIPCChannelSize; 24 namespace sandbox { namespace 301 } // namespace sandbox
|
crosscall_server.h | 13 #include "sandbox/win/src/crosscall_params.h" 15 // This is the IPC server interface for CrossCall: The IPC for the Sandbox 25 // of the CrossCallParams class of /sandbox/crosscall_params.h The difference 44 namespace sandbox { namespace 223 } // namespace sandbox
|
filesystem_policy.cc | 7 #include "sandbox/win/src/filesystem_policy.h" 11 #include "sandbox/win/src/ipc_tags.h" 12 #include "sandbox/win/src/policy_engine_opcodes.h" 13 #include "sandbox/win/src/policy_params.h" 14 #include "sandbox/win/src/sandbox_utils.h" 15 #include "sandbox/win/src/sandbox_types.h" 16 #include "sandbox/win/src/win_utils.h" 43 if (!sandbox::SameObject(local_handle, obj_attributes->ObjectName->Buffer)) { 59 namespace sandbox { namespace 386 } // namespace sandbox [all...] |
handle_table.cc | 5 #include "sandbox/win/src/handle_table.h" 12 #include "sandbox/win/src/win_utils.h" 23 namespace sandbox { namespace 183 } // namespace sandbox
|
interception_agent.cc | 6 // http://dev.chromium.org/developers/design-documents/sandbox . 8 #include "sandbox/win/src/interception_agent.h" 10 #include "sandbox/win/src/interception_internal.h" 11 #include "sandbox/win/src/interceptors.h" 12 #include "sandbox/win/src/eat_resolver.h" 13 #include "sandbox/win/src/sidestep_resolver.h" 14 #include "sandbox/win/src/sandbox_nt_util.h" 26 namespace sandbox { namespace 233 } // namespace sandbox
|
interceptors.h | 9 #include "sandbox/win/src/interceptors_64.h" 12 namespace sandbox { namespace 52 } // namespace sandbox
|
policy_low_level_unittest.cc | 5 #include "sandbox/win/src/policy_engine_params.h" 6 #include "sandbox/win/src/policy_engine_processor.h" 7 #include "sandbox/win/src/policy_low_level.h" 10 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = { 11 #define POLPARAM(p) sandbox::ParamPickerMake(p), 14 namespace sandbox { namespace 617 } // namespace sandbox
|
process_policy_test.cc | 13 #include "sandbox/win/src/sandbox.h" 14 #include "sandbox/win/src/sandbox_factory.h" 15 #include "sandbox/win/src/sandbox_policy.h" 16 #include "sandbox/win/tests/common/controller.h" 38 sandbox::SboxTestResult CreateProcessHelper(const string16& exe, 52 sandbox::SboxTestResult ret1 = sandbox::SBOX_TEST_FAILED; 57 ret1 = sandbox::SBOX_TEST_SUCCEEDED; 63 ret1 = sandbox::SBOX_TEST_DENIED 103 namespace sandbox { namespace [all...] |
process_thread_interception.cc | 5 #include "sandbox/win/src/process_thread_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_params.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/sandbox_nt_util.h" 13 #include "sandbox/win/src/sharedmem_ipc_client.h" 14 #include "sandbox/win/src/target_services.h" 16 namespace sandbox { namespace [all...] |
restricted_token.cc | 5 #include "sandbox/win/src/restricted_token.h" 10 #include "sandbox/win/src/acl.h" 11 #include "sandbox/win/src/win_utils.h" 14 namespace sandbox { namespace 472 } // namespace sandbox
|
restricted_token_unittest.cc | 11 #include "sandbox/win/src/restricted_token.h" 12 #include "sandbox/win/src/sid.h" 15 namespace sandbox { namespace 593 } // namespace sandbox
|
restricted_token_utils.cc | 9 #include "sandbox/win/src/restricted_token_utils.h" 15 #include "sandbox/win/src/job.h" 16 #include "sandbox/win/src/restricted_token.h" 17 #include "sandbox/win/src/security_level.h" 18 #include "sandbox/win/src/sid.h" 20 namespace sandbox { namespace 345 } // namespace sandbox
|
sandbox_nt_types.h | 8 #include "sandbox/win/src/nt_internals.h" 10 namespace sandbox { namespace 44 } // namespace sandbox
|
/external/chromium_org/content/common/sandbox_linux/ |
sandbox_seccomp_bpf_linux.cc | 35 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h" 36 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 37 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" 38 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 39 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 40 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 41 #include "sandbox/linux/services/linux_syscalls.h" 43 using sandbox::BaselinePolicy; 44 using sandbox::SyscallSets; 50 void StartSandboxWithPolicy(sandbox::SandboxBPFPolicy* policy) 154 SandboxBPF sandbox; local [all...] |
/external/chromium_org/content/public/browser/ |
content_browser_client.h | 63 namespace sandbox { namespace 599 // is launched. It gives the embedder a chance to add loosen the sandbox 601 virtual void PreSpawnRenderer(sandbox::TargetPolicy* policy,
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
sandbox_bpf.h | 20 #include "sandbox/linux/seccomp-bpf/die.h" 21 #include "sandbox/linux/seccomp-bpf/errorcode.h" 22 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 24 namespace sandbox { namespace 51 STATUS_ENABLED // The sandbox is now active 55 // pointer in |aux|. This pointer will then be forwarded to the sandbox 68 // NOTE: Setting a policy and starting the sandbox is a one-way operation. 70 // sandbox. Strictly speaking, that means we should disallow calling 72 // this makes it needlessly complicated to operate on "Sandbox" 85 // There are a lot of reasons why the Seccomp sandbox might not be available [all...] |
trap.cc | 5 #include "sandbox/linux/seccomp-bpf/trap.h" 16 #include "sandbox/linux/seccomp-bpf/codegen.h" 17 #include "sandbox/linux/seccomp-bpf/die.h" 18 #include "sandbox/linux/seccomp-bpf/syscall.h" 22 #include "sandbox/linux/services/android_ucontext.h" 68 namespace sandbox { namespace 99 // to avoid race conditions. Normally, this is a non-issue as the sandbox 183 // evaluator registered with the sandbox. 271 // threaded while the sandbox is being set up). But we nonetheless are 332 SANDBOX_INFO("WARNING! Disabling sandbox for debugging purposes") [all...] |
/external/chromium_org/sandbox/linux/suid/client/ |
setuid_sandbox_client.cc | 15 #include "sandbox/linux/services/init_process_reaper.h" 16 #include "sandbox/linux/suid/common/sandbox.h" 17 #include "sandbox/linux/suid/common/suid_unsafe_environment_variables.h" 23 // setuid sandbox. Old versions of the sandbox will ignore this. 25 env->SetVar(sandbox::kSandboxEnvironmentApiRequest, 26 base::IntToString(sandbox::kSUIDSandboxApiNumber)); 44 // different names here so that the SUID sandbox can resolve them for the 65 if (env->GetVar(sandbox::kSandboxEnvironmentApiProvides, &api_string) & 96 namespace sandbox { namespace [all...] |