/external/chromium_org/sandbox/ |
sandbox_services.target.linux-arm64.mk | 27 sandbox/linux/services/broker_process.cc \ 28 sandbox/linux/services/init_process_reaper.cc \ 29 sandbox/linux/services/scoped_process.cc \ 30 sandbox/linux/services/thread_helpers.cc \ 31 sandbox/linux/services/yama.cc 107 $(LOCAL_PATH)/sandbox \ 200 $(LOCAL_PATH)/sandbox \
|
sandbox_services.target.linux-mips.mk | 27 sandbox/linux/services/broker_process.cc \ 28 sandbox/linux/services/init_process_reaper.cc \ 29 sandbox/linux/services/scoped_process.cc \ 30 sandbox/linux/services/thread_helpers.cc \ 31 sandbox/linux/services/yama.cc 112 $(LOCAL_PATH)/sandbox \ 211 $(LOCAL_PATH)/sandbox \
|
sandbox_services.target.linux-x86.mk | 27 sandbox/linux/services/broker_process.cc \ 28 sandbox/linux/services/init_process_reaper.cc \ 29 sandbox/linux/services/scoped_process.cc \ 30 sandbox/linux/services/thread_helpers.cc \ 31 sandbox/linux/services/yama.cc 113 $(LOCAL_PATH)/sandbox \ 212 $(LOCAL_PATH)/sandbox \
|
sandbox_services.target.linux-x86_64.mk | 27 sandbox/linux/services/broker_process.cc \ 28 sandbox/linux/services/init_process_reaper.cc \ 29 sandbox/linux/services/scoped_process.cc \ 30 sandbox/linux/services/thread_helpers.cc \ 31 sandbox/linux/services/yama.cc 112 $(LOCAL_PATH)/sandbox \ 210 $(LOCAL_PATH)/sandbox \
|
/external/chromium_org/sandbox/win/src/ |
restricted_token_utils.cc | 9 #include "sandbox/win/src/restricted_token_utils.h" 15 #include "sandbox/win/src/job.h" 16 #include "sandbox/win/src/restricted_token.h" 17 #include "sandbox/win/src/security_level.h" 18 #include "sandbox/win/src/sid.h" 20 namespace sandbox { namespace 345 } // namespace sandbox
|
handle_closer_agent.cc | 5 #include "sandbox/win/src/handle_closer_agent.h" 8 #include "sandbox/win/src/nt_internals.h" 9 #include "sandbox/win/src/win_utils.h" 35 namespace sandbox { namespace 145 } // namespace sandbox
|
policy_engine_params.h | 9 #include "sandbox/win/src/internal_types.h" 10 #include "sandbox/win/src/nt_internals.h" 11 #include "sandbox/win/src/sandbox_nt_util.h" 17 namespace sandbox { namespace 200 } // namespace sandbox
|
policy_low_level.h | 12 #include "sandbox/win/src/ipc_tags.h" 13 #include "sandbox/win/src/policy_engine_params.h" 14 #include "sandbox/win/src/policy_engine_opcodes.h" 40 namespace sandbox { namespace 181 } // namespace sandbox
|
service_resolver_64.cc | 5 #include "sandbox/win/src/service_resolver.h" 8 #include "sandbox/win/src/sandbox_nt_util.h" 9 #include "sandbox/win/src/win_utils.h" 83 namespace sandbox { namespace 212 } // namespace sandbox
|
sharedmem_ipc_client.h | 8 #include "sandbox/win/src/crosscall_params.h" 9 #include "sandbox/win/src/sandbox.h" 52 namespace sandbox { namespace 134 } // namespace sandbox
|
sidestep_resolver.cc | 5 #include "sandbox/win/src/sidestep_resolver.h" 8 #include "sandbox/win/src/sandbox_nt_util.h" 9 #include "sandbox/win/src/sidestep/preamble_patcher.h" 28 namespace sandbox { namespace 202 } // namespace sandbox
|
/external/chromium_org/content/browser/gpu/ |
gpu_process_host.cc | 49 #include "sandbox/win/src/sandbox_policy.h" 109 bool sandbox = !cmd_line_->HasSwitch(switches::kDisableGpuSandbox); variable 110 if(! sandbox) { 111 DVLOG(1) << "GPU sandbox is disabled"; 113 return sandbox; 125 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy, 131 policy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS, 132 sandbox::USER_LIMITED); 133 SetJobLevel(*cmd_line_, sandbox::JOB_UNPROTECTED, 0, policy); 134 policy->SetDelayedIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW) [all...] |
/external/chromium_org/chrome_elf/blacklist/ |
blacklist.cc | 17 #include "sandbox/win/src/interception_internal.h" 18 #include "sandbox/win/src/internal_types.h" 19 #include "sandbox/win/src/service_resolver.h" 68 __declspec(allocate(".crthunk")) sandbox::ThunkData g_thunk_storage; 324 sandbox::ServiceResolverThunk* thunk = GetThunk(kRelaxed); 350 NTSTATUS ret = thunk->Setup(::GetModuleHandle(sandbox::kNtdllName), 356 sizeof(sandbox::ThunkData), 370 NTSTATUS ret = thunk->Setup(::GetModuleHandle(sandbox::kNtdllName), 376 sizeof(sandbox::ThunkData),
|
/external/chromium_org/components/ |
nacl.gyp | 147 '../sandbox/sandbox.gyp:suid_sandbox_client', 224 '../sandbox/sandbox.gyp:sandbox_linux_test_utils', 309 '../sandbox/sandbox.gyp:libc_urandom_override', 310 '../sandbox/sandbox.gyp:sandbox',
|
breakpad.gypi | 64 '../sandbox/sandbox.gyp:sandbox', 149 '../sandbox/sandbox.gyp:sandbox_win64',
|
/external/chromium_org/content/zygote/ |
zygote_linux.h | 54 // Returns true if the SUID sandbox is active. 67 // appears outside of the sandbox. 78 // This is equivalent to fork(), except that, when using the SUID sandbox, it 80 // sandbox, rather than returning the PID inside the sandbox. The child's
|
/external/chromium_org/native_client_sdk/src/doc/ |
_book.yaml | 80 - title: "Sandbox Internals" 82 - title "ARM 32-bit Sandbox" 83 path: /native-client/dev/reference/sandbox_internals/arm-32-bit-sandbox 84 - title "x86-64 Sandbox" 85 path: /native-client/dev/reference/sandbox_internals/x86-64-sandbox
|
/external/chromium_org/sandbox/mac/ |
mach_message_server.cc | 5 #include "sandbox/mac/mach_message_server.h" 16 namespace sandbox { namespace 78 "org.chromium.sandbox.MachMessageServer.%p", demuxer_); 175 // forwarded message was sent from the process hosting this sandbox server, 184 } // namespace sandbox
|
/external/chromium_org/components/nacl/loader/ |
nacl_helper_linux.cc | 45 #include "sandbox/linux/services/libc_urandom_override.h" 99 // Finish layer-1 sandbox initialization and initialize the layer-2 sandbox. 186 // First, close the dummy_fd so the sandbox won't find me when 275 // the setuid sandbox. 277 LOG(ERROR) << "NaCl helper process running without a sandbox!\n" 278 << "Most likely you need to configure your SUID sandbox " 352 // sandbox memory. 355 // and returns the amount of prereserved sandbox memory. 396 base::RandUint64(); // acquire /dev/urandom fd before sandbox is raise [all...] |
/external/chromium_org/content/public/renderer/ |
render_font_warmup_win.cc | 82 // fonts installed on the system etc. This works well outside the sandbox and 83 // within the sandbox as long as the lpc connection maintained by the current 130 // before sandbox lock down to allow Skia access to the Font Manager service.
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
syscall.h | 11 #include "sandbox/sandbox_export.h" 13 namespace sandbox { namespace 87 } // namespace sandbox
|
trap.cc | 5 #include "sandbox/linux/seccomp-bpf/trap.h" 16 #include "sandbox/linux/seccomp-bpf/codegen.h" 17 #include "sandbox/linux/seccomp-bpf/die.h" 18 #include "sandbox/linux/seccomp-bpf/syscall.h" 22 #include "sandbox/linux/services/android_ucontext.h" 68 namespace sandbox { namespace 102 // to avoid race conditions. Normally, this is a non-issue as the sandbox 186 // evaluator registered with the sandbox. 274 // threaded while the sandbox is being set up). But we nonetheless are 335 SANDBOX_INFO("WARNING! Disabling sandbox for debugging purposes") [all...] |
/external/chromium_org/sandbox/linux/services/ |
credentials.h | 18 #include "sandbox/sandbox_export.h" 20 namespace sandbox { namespace 90 } // namespace sandbox.
|
thread_helpers.cc | 5 #include "sandbox/linux/services/thread_helpers.h" 23 namespace sandbox { namespace 102 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/suid/ |
sandbox.c | 7 #include "sandbox/linux/suid/common/sandbox.h" 32 #include "sandbox/linux/suid/common/suid_unsafe_environment_variables.h" 33 #include "sandbox/linux/suid/linux_util.h" 34 #include "sandbox/linux/suid/process_util.h" 62 const char msg[] = "\nThe setuid sandbox got signaled, exiting.\n"; 398 "The setuid sandbox provides API version %ld, " 408 // use an old sandbox. 436 // In the SUID sandbox, if we succeed in calling MoveToNewNamespaces() 442 // a dummy socket, which has a unique inode number. Then it asks the sandbox [all...] |