HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 351 - 375 of 851) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/win/src/
sandbox_policy.h 12 #include "sandbox/win/src/sandbox_types.h"
13 #include "sandbox/win/src/security_level.h"
15 namespace sandbox { namespace
85 // Important: most of the sandbox-provided security relies on this single
141 // Sets the integrity level of the process in the sandbox. Both the initial
143 // is set to a level higher than the current level, the sandbox will fail
147 // Sets the integrity level of the process in the sandbox. The integrity level
150 // process in the sandbox. If the integrity level is set to a level higher
151 // than the current level, the sandbox will fail to start.
225 } // namespace sandbox
    [all...]
restricted_token_utils.cc 9 #include "sandbox/win/src/restricted_token_utils.h"
15 #include "sandbox/win/src/job.h"
16 #include "sandbox/win/src/restricted_token.h"
17 #include "sandbox/win/src/security_level.h"
18 #include "sandbox/win/src/sid.h"
20 namespace sandbox { namespace
345 } // namespace sandbox
interception.cc 6 // http://dev.chromium.org/developers/design-documents/sandbox .
10 #include "sandbox/win/src/interception.h"
17 #include "sandbox/win/src/interception_internal.h"
18 #include "sandbox/win/src/interceptors.h"
19 #include "sandbox/win/src/sandbox.h"
20 #include "sandbox/win/src/sandbox_utils.h"
21 #include "sandbox/win/src/service_resolver.h"
22 #include "sandbox/win/src/target_interceptions.h"
23 #include "sandbox/win/src/target_process.h
55 namespace sandbox { namespace
    [all...]
sharedmem_ipc_server.cc 8 #include "sandbox/win/src/sharedmem_ipc_server.h"
9 #include "sandbox/win/src/sharedmem_ipc_client.h"
10 #include "sandbox/win/src/sandbox.h"
11 #include "sandbox/win/src/sandbox_types.h"
12 #include "sandbox/win/src/crosscall_params.h"
13 #include "sandbox/win/src/crosscall_server.h"
15 namespace sandbox { namespace
410 } // namespace sandbox
handle_closer_agent.cc 5 #include "sandbox/win/src/handle_closer_agent.h"
8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/win_utils.h"
35 namespace sandbox { namespace
145 } // namespace sandbox
policy_engine_params.h 9 #include "sandbox/win/src/internal_types.h"
10 #include "sandbox/win/src/nt_internals.h"
11 #include "sandbox/win/src/sandbox_nt_util.h"
17 namespace sandbox { namespace
200 } // namespace sandbox
policy_low_level.h 12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/policy_engine_params.h"
14 #include "sandbox/win/src/policy_engine_opcodes.h"
40 namespace sandbox { namespace
181 } // namespace sandbox
service_resolver_64.cc 5 #include "sandbox/win/src/service_resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
9 #include "sandbox/win/src/win_utils.h"
83 namespace sandbox { namespace
193 } // namespace sandbox
sharedmem_ipc_client.h 8 #include "sandbox/win/src/crosscall_params.h"
9 #include "sandbox/win/src/sandbox.h"
52 namespace sandbox { namespace
134 } // namespace sandbox
sidestep_resolver.cc 5 #include "sandbox/win/src/sidestep_resolver.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
9 #include "sandbox/win/src/sidestep/preamble_patcher.h"
28 namespace sandbox { namespace
202 } // namespace sandbox
app_container_test.cc 14 #include "sandbox/win/src/sync_policy_test.h"
68 namespace sandbox { namespace
143 } // namespace sandbox
handle_table.h 13 #include "sandbox/win/src/nt_internals.h"
15 namespace sandbox { namespace
157 } // namespace sandbox
crosscall_server.cc 8 #include "sandbox/win/src/crosscall_server.h"
9 #include "sandbox/win/src/crosscall_params.h"
10 #include "sandbox/win/src/crosscall_client.h"
20 const size_t kMaxBufferSize = sandbox::kIPCChannelSize;
24 namespace sandbox { namespace
301 } // namespace sandbox
  /external/chromium_org/chrome/tools/
chrome-process-identifier.sh 9 # zygote, renderer). It also prints out information on whether a sandbox is
10 # active and what type of sandbox has been identified.
22 # zygote inside of the setuid sandbox, renderers are in a process tree separate
72 # The seccomp sandbox has exactly one child process that has no other
91 echo "Process $child is a $type; setuid sandbox is active"
135 # sandbox causes it to be reparented to "init". When this happens, we can
141 [ -d /proc/$i/cwd/. ] || echo -n "; setuid sandbox is active"
  /external/chromium_org/sandbox/linux/seccomp-bpf/
errorcode.h 8 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
9 #include "sandbox/linux/seccomp-bpf/trap.h"
11 namespace sandbox { namespace
15 // This class holds all the possible values that can be returned by a sandbox
54 // interpreted as an attempt at breaking the sandbox and results in the
175 bool safe_; // Keep sandbox active while calling fnc_()
195 } // namespace sandbox
trap.h 16 namespace sandbox { namespace
26 // time. For the purposes of our sandbox, this assertion should always be
27 // true. Threads are incompatible with the seccomp sandbox anyway.
55 // Once unsafe traps are enabled, the sandbox is essentially compromised.
114 } // namespace sandbox
trap.cc 5 #include "sandbox/linux/seccomp-bpf/trap.h"
16 #include "sandbox/linux/seccomp-bpf/codegen.h"
17 #include "sandbox/linux/seccomp-bpf/die.h"
18 #include "sandbox/linux/seccomp-bpf/syscall.h"
22 #include "sandbox/linux/services/android_ucontext.h"
68 namespace sandbox { namespace
99 // to avoid race conditions. Normally, this is a non-issue as the sandbox
183 // evaluator registered with the sandbox.
271 // threaded while the sandbox is being set up). But we nonetheless are
332 SANDBOX_INFO("WARNING! Disabling sandbox for debugging purposes")
    [all...]
  /external/chromium_org/content/zygote/
zygote_linux.h 51 // Returns true if the SUID sandbox is active.
64 // appears outside of the sandbox.
75 // This is equivalent to fork(), except that, when using the SUID sandbox, it
77 // sandbox, rather than returning the PID inside the sandbox. Optionally, it
  /external/chromium_org/sandbox/
sandbox_services.target.darwin-mips.mk 26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/thread_helpers.cc
95 $(LOCAL_PATH)/sandbox \
179 $(LOCAL_PATH)/sandbox \
sandbox_services.target.linux-mips.mk 26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/thread_helpers.cc
95 $(LOCAL_PATH)/sandbox \
179 $(LOCAL_PATH)/sandbox \
  /external/chromium_org/components/nacl/loader/
nacl_helper_linux.cc 37 #include "sandbox/linux/services/libc_urandom_override.h"
58 << "layer sandbox (seccomp-bpf).";
82 // sandbox does) until then, because that can interfere with the
137 // First, close the dummy_fd so the sandbox won't find me when
234 // the setuid sandbox.
236 LOG(ERROR) << "NaCl helper process running without a sandbox!\n"
237 << "Most likely you need to configure your SUID sandbox "
307 // sandbox memory.
310 // and returns the amount of prereserved sandbox memory.
347 base::RandUint64(); // acquire /dev/urandom fd before sandbox is raise
    [all...]
  /external/chromium_org/tools/perf/page_sets/data/
key_mobile_sites.json 5 "http://mobile-news.sandbox.google.com/news/pt1",
6 "http://mobile-news.sandbox.google.com/news/pt0"
9 "http://mobile-news.sandbox.google.com/news/p#2"
  /external/chromium_org/win8/metro_driver/
metro_driver.gyp 60 '../../sandbox/sandbox.gyp:sandbox',
  /external/chromium_org/content/browser/gpu/
gpu_process_host.cc 47 #include "sandbox/win/src/sandbox_policy.h"
183 DVLOG(1) << "GPU sandbox is disabled";
196 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
202 policy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS,
203 sandbox::USER_LIMITED);
204 SetJobLevel(*cmd_line_, sandbox::JOB_UNPROTECTED, 0, policy);
205 policy->SetDelayedIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW);
207 policy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS,
208 sandbox::USER_LIMITED);
217 sandbox::JOB_LIMITED_USER
    [all...]
  /external/chromium_org/remoting/webapp/
wcs_sandbox_container.js 8 * The application side of the application/sandbox WCS interface, used by the
9 * application to exchange messages with the sandbox.
18 * @param {Window} sandbox The Javascript Window object representing the
22 remoting.WcsSandboxContainer = function(sandbox) {
24 this.sandbox_ = sandbox;
130 * Event handler to process messages from the sandbox.

Completed in 495 milliseconds

<<11121314151617181920>>