/external/chromium_org/sandbox/win/src/ |
sandbox_policy_base.h | 16 #include "sandbox/win/src/crosscall_server.h" 17 #include "sandbox/win/src/handle_closer.h" 18 #include "sandbox/win/src/ipc_tags.h" 19 #include "sandbox/win/src/policy_engine_opcodes.h" 20 #include "sandbox/win/src/policy_engine_params.h" 21 #include "sandbox/win/src/sandbox_policy.h" 22 #include "sandbox/win/src/win_utils.h" 24 namespace sandbox { namespace 158 } // namespace sandbox
|
security_level.h | 10 namespace sandbox { namespace 12 // List of all the integrity levels supported in the sandbox. This is used 14 // in the sandbox to a level higher than yours. 27 // provide the bulk of the security of sandbox. 135 // Some mitigations are implemented directly by the sandbox or emulated to 201 } // namespace sandbox
|
service_resolver_64.cc | 5 #include "sandbox/win/src/service_resolver.h" 8 #include "sandbox/win/src/sandbox_nt_util.h" 9 #include "sandbox/win/src/win_utils.h" 83 namespace sandbox { namespace 193 } // namespace sandbox
|
sharedmem_ipc_server.cc | 8 #include "sandbox/win/src/sharedmem_ipc_server.h" 9 #include "sandbox/win/src/sharedmem_ipc_client.h" 10 #include "sandbox/win/src/sandbox.h" 11 #include "sandbox/win/src/sandbox_types.h" 12 #include "sandbox/win/src/crosscall_params.h" 13 #include "sandbox/win/src/crosscall_server.h" 15 namespace sandbox { namespace 410 } // namespace sandbox
|
sync_policy.cc | 7 #include "sandbox/win/src/sync_policy.h" 11 #include "sandbox/win/src/ipc_tags.h" 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/policy_engine_opcodes.h" 14 #include "sandbox/win/src/policy_params.h" 15 #include "sandbox/win/src/sandbox_types.h" 16 #include "sandbox/win/src/sandbox_utils.h" 17 #include "sandbox/win/src/sync_interception.h" 18 #include "sandbox/win/src/win_utils.h" 20 namespace sandbox { namespace [all...] |
target_process.cc | 5 #include "sandbox/win/src/target_process.h" 12 #include "sandbox/win/src/crosscall_server.h" 13 #include "sandbox/win/src/crosscall_client.h" 14 #include "sandbox/win/src/policy_low_level.h" 15 #include "sandbox/win/src/sandbox_types.h" 16 #include "sandbox/win/src/sharedmem_ipc_server.h" 24 sandbox::PolicyGlobal* policy = 25 reinterpret_cast<sandbox::PolicyGlobal*>(dest); 29 for (size_t i = 0; i < sandbox::kMaxServiceCount; i++) { 33 policy->entry[i] = reinterpret_cast<sandbox::PolicyBuffer*>(buffer) 40 namespace sandbox { namespace [all...] |
target_services.cc | 5 #include "sandbox/win/src/target_services.h" 10 #include "sandbox/win/src/crosscall_client.h" 11 #include "sandbox/win/src/handle_closer_agent.h" 12 #include "sandbox/win/src/handle_interception.h" 13 #include "sandbox/win/src/ipc_tags.h" 14 #include "sandbox/win/src/process_mitigations.h" 15 #include "sandbox/win/src/restricted_token_utils.h" 16 #include "sandbox/win/src/sandbox.h" 17 #include "sandbox/win/src/sandbox_types.h 61 namespace sandbox { namespace [all...] |
Wow64.cc | 5 #include "sandbox/win/src/wow64.h" 13 #include "sandbox/win/src/target_process.h" 74 namespace sandbox { namespace 220 } // namespace sandbox
|
broker_services.cc | 5 #include "sandbox/win/src/broker_services.h" 14 #include "sandbox/win/src/app_container.h" 15 #include "sandbox/win/src/process_mitigations.h" 16 #include "sandbox/win/src/sandbox_policy_base.h" 17 #include "sandbox/win/src/sandbox.h" 18 #include "sandbox/win/src/target_process.h" 19 #include "sandbox/win/src/win2k_threadpool.h" 20 #include "sandbox/win/src/win_utils.h" 34 sandbox::ResultCode SpawnCleanup(sandbox::TargetProcess* target, DWORD error) 85 namespace sandbox { namespace [all...] |
crosscall_params.h | 14 #include "sandbox/win/src/internal_types.h" 15 #include "sandbox/win/src/sandbox_types.h" 27 // This header is part of CrossCall: the sandbox inter-process communication. 45 namespace sandbox { namespace 292 } // namespace sandbox
|
file_policy_test.cc | 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/sandbox.h" 14 #include "sandbox/win/src/sandbox_factory.h" 15 #include "sandbox/win/src/sandbox_policy.h" 16 #include "sandbox/win/src/win_utils.h" 17 #include "sandbox/win/tests/common/controller.h" 18 #include "sandbox/win/tests/common/test_utils.h" 25 namespace sandbox { namespace 599 } // namespace sandbox [all...] |
handle_table.h | 13 #include "sandbox/win/src/nt_internals.h" 15 namespace sandbox { namespace 157 } // namespace sandbox
|
interception.cc | 6 // http://dev.chromium.org/developers/design-documents/sandbox . 10 #include "sandbox/win/src/interception.h" 17 #include "sandbox/win/src/interception_internal.h" 18 #include "sandbox/win/src/interceptors.h" 19 #include "sandbox/win/src/sandbox.h" 20 #include "sandbox/win/src/sandbox_utils.h" 21 #include "sandbox/win/src/service_resolver.h" 22 #include "sandbox/win/src/target_interceptions.h" 23 #include "sandbox/win/src/target_process.h 55 namespace sandbox { namespace [all...] |
policy_engine_opcodes.cc | 5 #include "sandbox/win/src/policy_engine_opcodes.h" 8 #include "sandbox/win/src/sandbox_nt_types.h" 9 #include "sandbox/win/src/sandbox_types.h" 28 namespace sandbox { namespace 454 } // namespace sandbox
|
/external/chromium_org/sandbox/win/tests/common/ |
controller.cc | 5 #include "sandbox/win/tests/common/controller.h" 12 #include "sandbox/win/src/sandbox_factory.h" 63 namespace sandbox { namespace 216 arguments += no_sandbox_ ? L"-no-sandbox " : L" "; 329 } else if (0 != _wcsicmp(argv[1], L"-child-no-sandbox")) { 336 } // namespace sandbox
|
/external/chromium/chrome/common/ |
sandbox_policy.cc | 25 #include "sandbox/src/sandbox.h" 27 static sandbox::BrokerServices* g_broker_services = NULL; 125 sandbox::TargetPolicy::Semantics access, 126 sandbox::TargetPolicy* policy) { 136 sandbox::ResultCode result; 137 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, 139 if (result != sandbox::SBOX_ALL_OK) 147 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, 149 if (result != sandbox::SBOX_ALL_OK 563 namespace sandbox { namespace [all...] |
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
codegen.cc | 7 #include "sandbox/linux/seccomp-bpf/codegen.h" 12 void TraverseRecursively(std::set<sandbox::Instruction*>* visited, 13 sandbox::Instruction* instruction) { 34 namespace sandbox { namespace 750 } // namespace sandbox
|
codegen_unittest.cc | 11 #include "sandbox/linux/seccomp-bpf/codegen.h" 12 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 13 #include "sandbox/linux/tests/unit_tests.h" 15 namespace sandbox { namespace 447 } // namespace sandbox
|
demo.cc | 30 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 31 #include "sandbox/linux/services/linux_syscalls.h" 33 using sandbox::ErrorCode; 34 using sandbox::SandboxBPF; 35 using sandbox::arch_seccomp_data; 39 // We don't expect our sandbox to do anything useful yet. So, we will fail 41 // following line should be removed as soon as the sandbox is starting to 216 // log the system call and then deny it. More elaborate sandbox policies 240 ErrorCode Evaluator(SandboxBPF* sandbox, int sysno, void *) { 329 return sandbox->Cond(1, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL 421 SandboxBPF sandbox; local [all...] |
errorcode.h | 8 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 9 #include "sandbox/linux/seccomp-bpf/trap.h" 11 namespace sandbox { namespace 15 // This class holds all the possible values that can be returned by a sandbox 54 // interpreted as an attempt at breaking the sandbox and results in the 175 bool safe_; // Keep sandbox active while calling fnc_() 195 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
syscall_sets.cc | 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 8 #include "sandbox/linux/services/linux_syscalls.h" 10 namespace sandbox { namespace 770 // These give a lot of ambient authority and bypass the setuid sandbox. 981 } // namespace sandbox.
|
/external/chromium_org/sandbox/linux/services/ |
broker_process.cc | 5 #include "sandbox/linux/services/broker_process.h" 26 #include "sandbox/linux/services/linux_syscalls.h" 115 namespace sandbox { namespace 176 // Enable the sandbox if provided. 520 } // namespace sandbox.
|
broker_process_unittest.cc | 5 #include "sandbox/linux/services/broker_process.h" 22 #include "sandbox/linux/tests/unit_tests.h" 27 namespace sandbox { namespace 444 } // namespace sandbox
|
credentials.cc | 5 #include "sandbox/linux/services/credentials.h" 151 namespace sandbox { namespace 272 } // namespace sandbox.
|
/external/chromium_org/sandbox/linux/tests/ |
unit_tests.cc | 16 #include "sandbox/linux/tests/unit_tests.h" 42 namespace sandbox { namespace 102 // in the BPF sandbox, as it potentially makes global state changes and as 120 ASSERT_EQ(1, num_threads) << "Running sandbox tests with multiple threads " 186 // run (e.g. when testing sandbox features on a kernel that doesn't
|