/external/chromium_org/sandbox/win/src/ |
sync_interception.cc | 5 #include "sandbox/win/src/sync_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_params.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/sandbox_nt_util.h" 13 #include "sandbox/win/src/sharedmem_ipc_client.h" 14 #include "sandbox/win/src/target_services.h" 16 namespace sandbox { namespace [all...] |
target_services.cc | 5 #include "sandbox/win/src/target_services.h" 10 #include "sandbox/win/src/crosscall_client.h" 11 #include "sandbox/win/src/handle_closer_agent.h" 12 #include "sandbox/win/src/handle_interception.h" 13 #include "sandbox/win/src/ipc_tags.h" 14 #include "sandbox/win/src/process_mitigations.h" 15 #include "sandbox/win/src/restricted_token_utils.h" 16 #include "sandbox/win/src/sandbox.h" 17 #include "sandbox/win/src/sandbox_types.h 61 namespace sandbox { namespace [all...] |
filesystem_dispatcher.h | 10 #include "sandbox/win/src/crosscall_server.h" 11 #include "sandbox/win/src/sandbox_policy_base.h" 13 namespace sandbox { namespace 58 } // namespace sandbox
|
filesystem_interception.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 51 } // namespace sandbox
|
policy_params.h | 8 #include "sandbox/win/src/policy_engine_params.h" 10 namespace sandbox { namespace 19 typedef sandbox::ParameterSet type##Array [type::PolParamLast]; 64 } // namespace sandbox
|
policy_target.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 43 } // namespace sandbox
|
process_mitigations.h | 11 #include "sandbox/win/src/security_level.h" 13 namespace sandbox { namespace 23 // Converts sandbox flags to the PROC_THREAD_ATTRIBUTE_SECURITY_CAPABILITIES 41 } // namespace sandbox
|
process_thread_dispatcher.h | 10 #include "sandbox/win/src/crosscall_server.h" 11 #include "sandbox/win/src/sandbox_policy_base.h" 13 namespace sandbox { namespace 49 } // namespace sandbox
|
resolver.cc | 5 #include "sandbox/win/src/resolver.h" 8 #include "sandbox/win/src/sandbox_nt_util.h" 10 namespace sandbox { namespace 62 } // namespace sandbox
|
resolver_64.cc | 5 #include "sandbox/win/src/resolver.h" 7 #include "sandbox/win/src/sandbox_nt_util.h" 44 namespace sandbox { namespace 69 } // namespace sandbox
|
target_interceptions.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 33 } // namespace sandbox
|
win2k_threadpool.cc | 5 #include "sandbox/win/src/win2k_threadpool.h" 7 #include "sandbox/win/src/win_utils.h" 9 namespace sandbox { namespace 60 } // namespace sandbox
|
/external/chromium_org/sandbox/win/tools/finder/ |
main.cc | 5 #include "sandbox/win/src/restricted_token_utils.h" 6 #include "sandbox/win/tools/finder/finder.h" 32 sandbox::TokenLevel token_type = sandbox::USER_LOCKDOWN; 48 token_type = sandbox::USER_LOCKDOWN; 50 token_type = sandbox::USER_RESTRICTED; 52 token_type = sandbox::USER_LIMITED; 54 token_type = sandbox::USER_INTERACTIVE; 56 token_type = sandbox::USER_NON_ADMIN; 58 token_type = sandbox::USER_RESTRICTED_SAME_ACCESS [all...] |
/external/chromium_org/content/common/sandbox_linux/ |
sandbox_linux.h | 23 namespace sandbox { class SetuidSandboxClient; } namespace 31 // This is a list of sandbox IPC methods which the renderer may send to the 32 // sandbox host. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC 48 // are enabled. If using the setuid sandbox, this should be called manually 49 // before the setuid sandbox is engaged. 52 // Initialize the sandbox with the given pre-built configuration. Currently 53 // seccomp-bpf and address space limitations (the setuid sandbox works 59 // Stop |thread| in a way that can be trusted by the sandbox. 62 // Returns the status of the renderer, worker and ppapi sandbox. Can only 75 // Simple accessor for our instance of the setuid sandbox. Will never retur [all...] |
/external/chromium_org/sandbox/linux/suid/client/ |
setuid_sandbox_client.h | 13 #include "sandbox/sandbox_export.h" 15 namespace sandbox { namespace 17 // Helper class to use the setuid sandbox. This class is to be used both 28 // setuid sandbox ABI. 33 // 6.b (optional) B uses sandbox::Credentials::HasOpenDirectory() to verify 35 // sandbox). 49 // Close the dummy file descriptor leftover from the sandbox ABI. 51 // Ask the setuid helper over the setuid sandbox IPC channel to chroot() us 57 // See sandbox/linux/services/init_process_reaper.h for more information 72 // The setuid sandbox may still be disabled via the environment [all...] |
/external/chromium_org/sandbox/win/tests/validation_tests/ |
suite.cc | 5 // This file contains the validation tests for the sandbox. 7 // sandbox. 13 #include "sandbox/win/tests/common/controller.h" 19 void TestProcessAccess(sandbox::TestRunner* runner, DWORD target) { 25 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 27 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 29 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 31 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 33 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)); 35 EXPECT_EQ(sandbox::SBOX_TEST_DENIED, runner->RunTest(command)) 48 namespace sandbox { namespace [all...] |
/external/chromium_org/components/nacl/loader/nonsfi/ |
DEPS | 3 "+sandbox/linux/seccomp-bpf-helpers",
|
/external/chromium_org/content/browser/resources/gpu/ |
timeline_test.html | 29 <div id="sandbox"></div> 32 var sandbox = document.getElementById('sandbox'); 40 sandbox.appendChild(timeline);
|
/external/chromium_org/content/common/ |
sandbox_init_mac.h | 10 // Initialize the sandbox for renderer, gpu, utility, worker, and plug-in 13 // Returns true if the sandbox was initialized succesfully, false if an error 20 // in the bootstrap sandbox. In child processes, the the launchd/bootstrap 21 // sandbox will have replaced the bootstrap port with one controlled by the
|
/external/chromium_org/content/public/app/ |
startup_helper_win.h | 12 namespace sandbox { namespace 22 // Initializes the sandbox code and turns on DEP. Note: This function 24 // sandbox library); it will not work correctly if it is exported from a 26 void InitializeSandboxInfo(sandbox::SandboxInterfaceInfo* sandbox_info);
|
/external/chromium_org/content/public/common/ |
sandbox_type_mac.h | 10 // Defines the Mac sandbox types known within content. Embedders can add 11 // additional sandbox types with IDs starting with SANDBOX_TYPE_AFTER_LAST_TYPE. 14 // Not a valid sandbox type. 21 // The worker process uses the most restrictive sandbox which has almost
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
sandbox_bpf_policy.h | 9 #include "sandbox/sandbox_export.h" 11 namespace sandbox { namespace 16 // This is the interface to implement to define a BPF sandbox policy. 39 } // namespace sandbox
|
/external/chromium_org/sandbox/win/sandbox_poc/ |
sandbox.cc | 8 #include "sandbox/win/sandbox_poc/sandbox.h" 10 #include "sandbox/win/sandbox_poc/main_ui_window.h" 11 #include "sandbox/win/src/sandbox.h" 12 #include "sandbox/win/src/sandbox_factory.h" 54 sandbox::BrokerServices* broker_service = 55 sandbox::SandboxFactory::GetBrokerServices(); 56 sandbox::ResultCode result; 59 // spawns an instance of itself (called a 'target') inside the sandbox [all...] |
sandbox.h | 8 #include "sandbox/win/sandbox_poc/resource.h"
|
/external/chromium_org/sandbox/win/wow_helper/ |
target_code.h | 8 #include "sandbox/win/src/nt_internals.h" 10 namespace sandbox { namespace 16 // on sandbox/win/src/wow64.cc. 39 } // namespace sandbox
|