/external/chromium_org/sandbox/win/src/ |
sandbox_policy.h | 12 #include "sandbox/win/src/sandbox_types.h" 13 #include "sandbox/win/src/security_level.h" 15 namespace sandbox { namespace 85 // Important: most of the sandbox-provided security relies on this single 141 // Sets the integrity level of the process in the sandbox. Both the initial 143 // is set to a level higher than the current level, the sandbox will fail 147 // Sets the integrity level of the process in the sandbox. The integrity level 150 // process in the sandbox. If the integrity level is set to a level higher 151 // than the current level, the sandbox will fail to start. 225 } // namespace sandbox [all...] |
restricted_token_utils.cc | 9 #include "sandbox/win/src/restricted_token_utils.h" 15 #include "sandbox/win/src/job.h" 16 #include "sandbox/win/src/restricted_token.h" 17 #include "sandbox/win/src/security_level.h" 18 #include "sandbox/win/src/sid.h" 20 namespace sandbox { namespace 345 } // namespace sandbox
|
interception.cc | 6 // http://dev.chromium.org/developers/design-documents/sandbox . 10 #include "sandbox/win/src/interception.h" 17 #include "sandbox/win/src/interception_internal.h" 18 #include "sandbox/win/src/interceptors.h" 19 #include "sandbox/win/src/sandbox.h" 20 #include "sandbox/win/src/sandbox_utils.h" 21 #include "sandbox/win/src/service_resolver.h" 22 #include "sandbox/win/src/target_interceptions.h" 23 #include "sandbox/win/src/target_process.h 55 namespace sandbox { namespace [all...] |
sharedmem_ipc_server.cc | 8 #include "sandbox/win/src/sharedmem_ipc_server.h" 9 #include "sandbox/win/src/sharedmem_ipc_client.h" 10 #include "sandbox/win/src/sandbox.h" 11 #include "sandbox/win/src/sandbox_types.h" 12 #include "sandbox/win/src/crosscall_params.h" 13 #include "sandbox/win/src/crosscall_server.h" 15 namespace sandbox { namespace 410 } // namespace sandbox
|
handle_closer_agent.cc | 5 #include "sandbox/win/src/handle_closer_agent.h" 8 #include "sandbox/win/src/nt_internals.h" 9 #include "sandbox/win/src/win_utils.h" 35 namespace sandbox { namespace 145 } // namespace sandbox
|
policy_engine_params.h | 9 #include "sandbox/win/src/internal_types.h" 10 #include "sandbox/win/src/nt_internals.h" 11 #include "sandbox/win/src/sandbox_nt_util.h" 17 namespace sandbox { namespace 200 } // namespace sandbox
|
policy_low_level.h | 12 #include "sandbox/win/src/ipc_tags.h" 13 #include "sandbox/win/src/policy_engine_params.h" 14 #include "sandbox/win/src/policy_engine_opcodes.h" 40 namespace sandbox { namespace 181 } // namespace sandbox
|
service_resolver_64.cc | 5 #include "sandbox/win/src/service_resolver.h" 8 #include "sandbox/win/src/sandbox_nt_util.h" 9 #include "sandbox/win/src/win_utils.h" 83 namespace sandbox { namespace 193 } // namespace sandbox
|
sharedmem_ipc_client.h | 8 #include "sandbox/win/src/crosscall_params.h" 9 #include "sandbox/win/src/sandbox.h" 52 namespace sandbox { namespace 134 } // namespace sandbox
|
sidestep_resolver.cc | 5 #include "sandbox/win/src/sidestep_resolver.h" 8 #include "sandbox/win/src/sandbox_nt_util.h" 9 #include "sandbox/win/src/sidestep/preamble_patcher.h" 28 namespace sandbox { namespace 202 } // namespace sandbox
|
app_container_test.cc | 14 #include "sandbox/win/src/sync_policy_test.h" 68 namespace sandbox { namespace 143 } // namespace sandbox
|
handle_table.h | 13 #include "sandbox/win/src/nt_internals.h" 15 namespace sandbox { namespace 157 } // namespace sandbox
|
crosscall_server.cc | 8 #include "sandbox/win/src/crosscall_server.h" 9 #include "sandbox/win/src/crosscall_params.h" 10 #include "sandbox/win/src/crosscall_client.h" 20 const size_t kMaxBufferSize = sandbox::kIPCChannelSize; 24 namespace sandbox { namespace 301 } // namespace sandbox
|
/external/chromium_org/chrome/tools/ |
chrome-process-identifier.sh | 9 # zygote, renderer). It also prints out information on whether a sandbox is 10 # active and what type of sandbox has been identified. 22 # zygote inside of the setuid sandbox, renderers are in a process tree separate 72 # The seccomp sandbox has exactly one child process that has no other 91 echo "Process $child is a $type; setuid sandbox is active" 135 # sandbox causes it to be reparented to "init". When this happens, we can 141 [ -d /proc/$i/cwd/. ] || echo -n "; setuid sandbox is active"
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
errorcode.h | 8 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 9 #include "sandbox/linux/seccomp-bpf/trap.h" 11 namespace sandbox { namespace 15 // This class holds all the possible values that can be returned by a sandbox 54 // interpreted as an attempt at breaking the sandbox and results in the 175 bool safe_; // Keep sandbox active while calling fnc_() 195 } // namespace sandbox
|
trap.h | 16 namespace sandbox { namespace 26 // time. For the purposes of our sandbox, this assertion should always be 27 // true. Threads are incompatible with the seccomp sandbox anyway. 55 // Once unsafe traps are enabled, the sandbox is essentially compromised. 114 } // namespace sandbox
|
trap.cc | 5 #include "sandbox/linux/seccomp-bpf/trap.h" 16 #include "sandbox/linux/seccomp-bpf/codegen.h" 17 #include "sandbox/linux/seccomp-bpf/die.h" 18 #include "sandbox/linux/seccomp-bpf/syscall.h" 22 #include "sandbox/linux/services/android_ucontext.h" 68 namespace sandbox { namespace 99 // to avoid race conditions. Normally, this is a non-issue as the sandbox 183 // evaluator registered with the sandbox. 271 // threaded while the sandbox is being set up). But we nonetheless are 332 SANDBOX_INFO("WARNING! Disabling sandbox for debugging purposes") [all...] |
/external/chromium_org/content/zygote/ |
zygote_linux.h | 51 // Returns true if the SUID sandbox is active. 64 // appears outside of the sandbox. 75 // This is equivalent to fork(), except that, when using the SUID sandbox, it 77 // sandbox, rather than returning the PID inside the sandbox. Optionally, it
|
/external/chromium_org/sandbox/ |
sandbox_services.target.darwin-mips.mk | 26 sandbox/linux/services/broker_process.cc \ 27 sandbox/linux/services/init_process_reaper.cc \ 28 sandbox/linux/services/thread_helpers.cc 95 $(LOCAL_PATH)/sandbox \ 179 $(LOCAL_PATH)/sandbox \
|
sandbox_services.target.linux-mips.mk | 26 sandbox/linux/services/broker_process.cc \ 27 sandbox/linux/services/init_process_reaper.cc \ 28 sandbox/linux/services/thread_helpers.cc 95 $(LOCAL_PATH)/sandbox \ 179 $(LOCAL_PATH)/sandbox \
|
/external/chromium_org/components/nacl/loader/ |
nacl_helper_linux.cc | 37 #include "sandbox/linux/services/libc_urandom_override.h" 58 << "layer sandbox (seccomp-bpf)."; 82 // sandbox does) until then, because that can interfere with the 137 // First, close the dummy_fd so the sandbox won't find me when 234 // the setuid sandbox. 236 LOG(ERROR) << "NaCl helper process running without a sandbox!\n" 237 << "Most likely you need to configure your SUID sandbox " 307 // sandbox memory. 310 // and returns the amount of prereserved sandbox memory. 347 base::RandUint64(); // acquire /dev/urandom fd before sandbox is raise [all...] |
/external/chromium_org/tools/perf/page_sets/data/ |
key_mobile_sites.json | 5 "http://mobile-news.sandbox.google.com/news/pt1", 6 "http://mobile-news.sandbox.google.com/news/pt0" 9 "http://mobile-news.sandbox.google.com/news/p#2"
|
/external/chromium_org/win8/metro_driver/ |
metro_driver.gyp | 60 '../../sandbox/sandbox.gyp:sandbox',
|
/external/chromium_org/content/browser/gpu/ |
gpu_process_host.cc | 47 #include "sandbox/win/src/sandbox_policy.h" 183 DVLOG(1) << "GPU sandbox is disabled"; 196 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy, 202 policy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS, 203 sandbox::USER_LIMITED); 204 SetJobLevel(*cmd_line_, sandbox::JOB_UNPROTECTED, 0, policy); 205 policy->SetDelayedIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW); 207 policy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS, 208 sandbox::USER_LIMITED); 217 sandbox::JOB_LIMITED_USER [all...] |
/external/chromium_org/remoting/webapp/ |
wcs_sandbox_container.js | 8 * The application side of the application/sandbox WCS interface, used by the 9 * application to exchange messages with the sandbox. 18 * @param {Window} sandbox The Javascript Window object representing the 22 remoting.WcsSandboxContainer = function(sandbox) { 24 this.sandbox_ = sandbox; 130 * Event handler to process messages from the sandbox.
|