/external/chromium_org/sandbox/ |
H A D | seccomp_bpf.target.darwin-x86_64.mk | 27 sandbox/linux/bpf_dsl/bpf_dsl.cc \ 28 sandbox/linux/seccomp-bpf/basicblock.cc \ 29 sandbox/linux/seccomp-bpf/codegen.cc \ 30 sandbox/linux/seccomp-bpf/die.cc \ 31 sandbox/linux/seccomp-bpf/errorcode.cc \ 32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \ 33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \ 34 sandbox/linux/seccomp-bpf/syscall.cc \ 35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \ 36 sandbox/linu [all...] |
H A D | seccomp_bpf.target.linux-arm.mk | 27 sandbox/linux/bpf_dsl/bpf_dsl.cc \ 28 sandbox/linux/seccomp-bpf/basicblock.cc \ 29 sandbox/linux/seccomp-bpf/codegen.cc \ 30 sandbox/linux/seccomp-bpf/die.cc \ 31 sandbox/linux/seccomp-bpf/errorcode.cc \ 32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \ 33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \ 34 sandbox/linux/seccomp-bpf/syscall.cc \ 35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \ 36 sandbox/linu [all...] |
H A D | seccomp_bpf.target.linux-arm64.mk | 27 sandbox/linux/bpf_dsl/bpf_dsl.cc \ 28 sandbox/linux/seccomp-bpf/basicblock.cc \ 29 sandbox/linux/seccomp-bpf/codegen.cc \ 30 sandbox/linux/seccomp-bpf/die.cc \ 31 sandbox/linux/seccomp-bpf/errorcode.cc \ 32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \ 33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \ 34 sandbox/linux/seccomp-bpf/syscall.cc \ 35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \ 36 sandbox/linu [all...] |
H A D | seccomp_bpf.target.linux-mips.mk | 27 sandbox/linux/bpf_dsl/bpf_dsl.cc \ 28 sandbox/linux/seccomp-bpf/basicblock.cc \ 29 sandbox/linux/seccomp-bpf/codegen.cc \ 30 sandbox/linux/seccomp-bpf/die.cc \ 31 sandbox/linux/seccomp-bpf/errorcode.cc \ 32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \ 33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \ 34 sandbox/linux/seccomp-bpf/syscall.cc \ 35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \ 36 sandbox/linu [all...] |
H A D | seccomp_bpf.target.linux-x86.mk | 27 sandbox/linux/bpf_dsl/bpf_dsl.cc \ 28 sandbox/linux/seccomp-bpf/basicblock.cc \ 29 sandbox/linux/seccomp-bpf/codegen.cc \ 30 sandbox/linux/seccomp-bpf/die.cc \ 31 sandbox/linux/seccomp-bpf/errorcode.cc \ 32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \ 33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \ 34 sandbox/linux/seccomp-bpf/syscall.cc \ 35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \ 36 sandbox/linu [all...] |
H A D | seccomp_bpf.target.linux-x86_64.mk | 27 sandbox/linux/bpf_dsl/bpf_dsl.cc \ 28 sandbox/linux/seccomp-bpf/basicblock.cc \ 29 sandbox/linux/seccomp-bpf/codegen.cc \ 30 sandbox/linux/seccomp-bpf/die.cc \ 31 sandbox/linux/seccomp-bpf/errorcode.cc \ 32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \ 33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \ 34 sandbox/linux/seccomp-bpf/syscall.cc \ 35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \ 36 sandbox/linu [all...] |
/external/chromium_org/content/gpu/ |
H A D | gpu_child_thread.h | 25 namespace sandbox { namespace 82 // Windows specific client sandbox interface. 83 sandbox::TargetServices* target_services_;
|
/external/chromium_org/sandbox/win/src/ |
H A D | policy_params.h | 8 #include "sandbox/win/src/policy_engine_params.h" 10 namespace sandbox { namespace 19 typedef sandbox::ParameterSet type##Array [type::PolParamLast]; 64 } // namespace sandbox
|
H A D | process_policy_test.cc | 13 #include "sandbox/win/src/sandbox.h" 14 #include "sandbox/win/src/sandbox_factory.h" 15 #include "sandbox/win/src/sandbox_policy.h" 16 #include "sandbox/win/tests/common/controller.h" 38 sandbox::SboxTestResult CreateProcessHelper(const base::string16& exe, 50 sandbox::SboxTestResult ret1 = sandbox::SBOX_TEST_FAILED; 63 ret1 = sandbox::SBOX_TEST_SUCCEEDED; 69 ret1 = sandbox 108 namespace sandbox { namespace [all...] |
H A D | sandbox_nt_util.cc | 5 #include "sandbox/win/src/sandbox_nt_util.h" 8 #include "sandbox/win/src/sandbox_factory.h" 9 #include "sandbox/win/src/target_services.h" 11 namespace sandbox { namespace 16 } // namespace sandbox 22 using sandbox::g_nt; 76 using sandbox::g_nt; 105 namespace sandbox { namespace 544 } // namespace sandbox 546 void* operator new(size_t size, sandbox [all...] |
H A D | unload_dll_test.cc | 6 #include "sandbox/win/src/sandbox.h" 7 #include "sandbox/win/src/sandbox_factory.h" 8 #include "sandbox/win/src/target_services.h" 9 #include "sandbox/win/tests/common/controller.h" 12 namespace sandbox { namespace 64 sandbox::TargetPolicy* policy = runner.GetPolicy(); 75 sandbox::TargetPolicy* policy = runner.GetPolicy(); 96 } // namespace sandbox
|
/external/chromium_org/sandbox/win/wow_helper/ |
H A D | wow_helper.cc | 6 // sandbox a 32 bit application running on a 64 bit OS. The basic idea is to 15 #include "sandbox/win/wow_helper/service64_resolver.h" 16 #include "sandbox/win/wow_helper/target_code.h" 18 namespace sandbox { namespace 54 } // namespace sandbox 85 return sandbox::PatchNtdll(child, thunk, kPageSize);
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
H A D | syscall_parameters_restrictions.cc | 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" 29 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 30 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 31 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 32 #include "sandbox/linux/services/linux_syscalls.h" 36 #include "sandbox/linux/services/android_futex.h" 89 using sandbox::bpf_dsl::Allow; 90 using sandbox::bpf_dsl::Arg; 91 using sandbox::bpf_dsl::BoolExpr; 92 using sandbox 96 namespace sandbox { namespace [all...] |
H A D | syscall_parameters_restrictions.h | 11 #include "sandbox/linux/bpf_dsl/bpf_dsl.h" 12 #include "sandbox/sandbox_export.h" 15 // sandbox that reduces the Linux kernel's attack surface. They return a 18 namespace sandbox { namespace 89 } // namespace sandbox.
|
/external/chromium_org/sandbox/mac/ |
H A D | launchd_interception_server.cc | 5 #include "sandbox/mac/launchd_interception_server.h" 11 #include "sandbox/mac/bootstrap_sandbox.h" 12 #include "sandbox/mac/mach_message_server.h" 14 namespace sandbox { namespace 22 const BootstrapSandbox* sandbox) 23 : sandbox_(sandbox), 35 // Allocate the dummy sandbox port. 39 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port."; 45 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port send right."; 63 // No sandbox polic 21 LaunchdInterceptionServer( const BootstrapSandbox* sandbox) argument [all...] |
H A D | bootstrap_sandbox.h | 17 #include "sandbox/mac/policy.h" 18 #include "sandbox/sandbox_export.h" 20 namespace sandbox { namespace 24 // The BootstrapSandbox is a second-layer sandbox for Mac. It is used to limit 29 // With this sandbox, the parent process must replace the bootstrap port prior 35 // launchd for servicing. If it is not, then the sandbox will reply with a 38 // Clients that which to use the sandbox must inform it of the creation and 39 // death of child processes for which the sandbox should be enforced. The 40 // client of the sandbox is intended to be an unsandboxed parent process that 43 // When the parent is ready to fork a new child process with this sandbox [all...] |
H A D | dispatch_source_mach.cc | 5 #include "sandbox/mac/dispatch_source_mach.h" 7 namespace sandbox { namespace 62 } // namespace sandbox
|
H A D | message_server.h | 11 #include "sandbox/mac/xpc.h" 13 namespace sandbox { namespace 69 } // namespace sandbox
|
H A D | policy.cc | 5 #include "sandbox/mac/policy.h" 7 namespace sandbox { namespace 56 } // namespace sandbox
|
H A D | xpc_message_server.h | 10 #include "sandbox/mac/message_server.h" 11 #include "sandbox/mac/xpc.h" 12 #include "sandbox/sandbox_export.h" 14 namespace sandbox { namespace 60 } // namespace sandbox
|
/external/chromium_org/components/nacl/broker/ |
H A D | nacl_broker_listener.h | 29 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
|
/external/chromium_org/content/browser/gpu/ |
H A D | gpu_process_host.cc | 50 #include "sandbox/win/src/sandbox_policy.h" 160 bool sandbox = !cmd_line_->HasSwitch(switches::kDisableGpuSandbox); variable 161 if(! sandbox) { 162 DVLOG(1) << "GPU sandbox is disabled"; 164 return sandbox; 176 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy, 182 policy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS, 183 sandbox::USER_LIMITED); 184 SetJobLevel(*cmd_line_, sandbox::JOB_UNPROTECTED, 0, policy); 185 policy->SetDelayedIntegrityLevel(sandbox [all...] |
/external/chromium_org/content/shell/app/ |
H A D | shell_main.cc | 10 #include "sandbox/win/src/sandbox_types.h" 27 sandbox::SandboxInterfaceInfo sandbox_info = {0};
|
/external/chromium_org/sandbox/linux/bpf_dsl/ |
H A D | cons.h | 9 #include "sandbox/sandbox_export.h" 11 namespace sandbox { namespace 44 } // namespace sandbox
|
H A D | cons_unittest.cc | 5 #include "sandbox/linux/bpf_dsl/cons.h" 11 namespace sandbox { namespace 34 } // namespace sandbox
|