/external/chromium_org/sandbox/win/src/ |
H A D | ipc_tags.h | 8 namespace sandbox { namespace 38 } // namespace sandbox
|
H A D | process_mitigations.h | 11 #include "sandbox/win/src/security_level.h" 13 namespace sandbox { namespace 23 // Converts sandbox flags to the PROC_THREAD_ATTRIBUTE_SECURITY_CAPABILITIES 41 } // namespace sandbox
|
H A D | process_mitigations_win32k_dispatcher.h | 9 #include "sandbox/win/src/sandbox_policy_base.h" 11 namespace sandbox { namespace 29 } // namespace sandbox
|
H A D | process_mitigations_win32k_interception.cc | 5 #include "sandbox/win/src/process_mitigations_win32k_interception.h" 7 namespace sandbox { namespace 28 } // namespace sandbox
|
H A D | process_mitigations_win32k_policy.cc | 5 #include "sandbox/win/src/process_mitigations_win32k_policy.h" 7 namespace sandbox { namespace 23 } // namespace sandbox
|
H A D | sid.h | 10 namespace sandbox { namespace 27 } // namespace sandbox
|
H A D | window.h | 12 #include "sandbox/win/src/sandbox_types.h" 14 namespace sandbox { namespace 38 } // namespace sandbox
|
H A D | process_mitigations_test.cc | 9 #include "sandbox/win/src/nt_internals.h" 10 #include "sandbox/win/src/process_mitigations.h" 11 #include "sandbox/win/src/sandbox.h" 12 #include "sandbox/win/src/sandbox_factory.h" 13 #include "sandbox/win/src/target_services.h" 14 #include "sandbox/win/src/win_utils.h" 15 #include "sandbox/win/tests/common/controller.h" 84 namespace sandbox { namespace 116 sandbox [all...] |
H A D | sandbox_nt_util.h | 11 #include "sandbox/win/src/nt_internals.h" 12 #include "sandbox/win/src/sandbox_nt_types.h" 15 void* __cdecl operator new(size_t size, sandbox::AllocationType type, 17 void __cdecl operator delete(void* memory, sandbox::AllocationType type); 22 void __cdecl operator delete(void* memory, sandbox::AllocationType type, 27 sandbox::AllocationType type); 29 sandbox::AllocationType type); 52 namespace sandbox { namespace 183 } // namespace sandbox
|
/external/chromium_org/sandbox/win/tests/integration_tests/ |
H A D | integration_tests.cc | 9 #include "sandbox/win/tests/common/controller.h" 14 0 == _wcsicmp(argv[1], L"-child-no-sandbox")) 16 return sandbox::DispatchCall(argc, argv);
|
/external/chromium_org/sandbox/win/tests/validation_tests/ |
H A D | unit_tests.cc | 9 #include "sandbox/win/tests/common/controller.h" 14 return sandbox::DispatchCall(argc, argv);
|
/external/chromium_org/sandbox/win/tools/finder/ |
H A D | finder.cc | 5 #include "sandbox/win/src/restricted_token.h" 6 #include "sandbox/win/src/restricted_token_utils.h" 7 #include "sandbox/win/tools/finder/finder.h" 24 DWORD Finder::Init(sandbox::TokenLevel token_type, 38 err_code = sandbox::CreateRestrictedToken(&token_handle_, token_type, 39 sandbox::INTEGRITY_LEVEL_LAST, 40 sandbox::PRIMARY);
|
/external/chromium_org/chrome_elf/ |
H A D | thunk_getter.cc | 9 #include "sandbox/win/src/interception_internal.h" 10 #include "sandbox/win/src/internal_types.h" 11 #include "sandbox/win/src/sandbox_utils.h" 12 #include "sandbox/win/src/service_resolver.h" 112 sandbox::ServiceResolverThunk* GetThunk(bool relaxed) { 114 sandbox::ServiceResolverThunk* thunk = NULL; 127 thunk = new sandbox::ServiceResolverThunk(current_process, relaxed); 131 thunk = new sandbox::Wow64W8ResolverThunk(current_process, relaxed); 133 thunk = new sandbox::Wow64ResolverThunk(current_process, relaxed); 135 thunk = new sandbox [all...] |
/external/chromium_org/content/common/sandbox_linux/ |
H A D | bpf_cros_arm_gpu_policy_linux.cc | 25 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 26 #include "sandbox/linux/services/linux_syscalls.h" 28 using sandbox::SyscallSets; 29 using sandbox::bpf_dsl::Allow; 30 using sandbox::bpf_dsl::Arg; 31 using sandbox::bpf_dsl::Error; 32 using sandbox::bpf_dsl::If; 33 using sandbox::bpf_dsl::ResultExpr; 80 // On ARM we're enabling the sandbox before the X connection is made, 99 static sandbox [all...] |
H A D | bpf_gpu_policy_linux.cc | 28 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 29 #include "sandbox/linux/seccomp-bpf/trap.h" 30 #include "sandbox/linux/services/broker_process.h" 31 #include "sandbox/linux/services/linux_syscalls.h" 33 using sandbox::BrokerProcess; 34 using sandbox::SyscallSets; 35 using sandbox::arch_seccomp_data; 36 using sandbox::bpf_dsl::Allow; 37 using sandbox::bpf_dsl::ResultExpr; 120 static sandbox [all...] |
/external/chromium_org/sandbox/mac/ |
H A D | bootstrap_sandbox.cc | 5 #include "sandbox/mac/bootstrap_sandbox.h" 14 #include "sandbox/mac/launchd_interception_server.h" 16 namespace sandbox { namespace 23 scoped_ptr<BootstrapSandbox> sandbox(new BootstrapSandbox()); 24 sandbox->server_.reset(new LaunchdInterceptionServer(sandbox.get())); 30 sandbox->server_bootstrap_name().c_str(), &port); 33 << "Failed to bootstrap_check_in the sandbox server."; 38 // Start the sandbox server. 39 if (sandbox [all...] |
H A D | launchd_interception_server.h | 12 #include "sandbox/mac/message_server.h" 13 #include "sandbox/mac/os_compatibility.h" 15 namespace sandbox { namespace 27 explicit LaunchdInterceptionServer(const BootstrapSandbox* sandbox); 41 // Given a look_up2 request message, this looks up the appropriate sandbox 53 // The sandbox for which this message server is running. 71 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
H A D | verifier.cc | 5 #include "sandbox/linux/seccomp-bpf/verifier.h" 11 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 12 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 13 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 14 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h" 16 namespace sandbox { namespace 38 uint32_t EvaluateErrorCode(SandboxBPF* sandbox, argument 49 return sandbox->Unexpected64bitArgument().err(); 53 sandbox, equal ? *code.passed() : *code.failed(), data); 59 bool VerifyErrorCode(SandboxBPF* sandbox, argument 312 VerifyBPF(SandboxBPF* sandbox, const std::vector<struct sock_filter>& program, const SandboxBPFPolicy& policy, const char** err) argument [all...] |
/external/chromium_org/sandbox/ |
H A D | sandbox.target.darwin-mips64.mk | 7 LOCAL_MODULE_STEM := sandbox 28 .PHONY: sandbox 29 sandbox: sandbox_sandbox_gyp
|
H A D | sandbox.target.linux-mips64.mk | 7 LOCAL_MODULE_STEM := sandbox 28 .PHONY: sandbox 29 sandbox: sandbox_sandbox_gyp
|
/external/chromium_org/sandbox/win/sandbox_poc/ |
H A D | sandbox.cc | 8 #include "sandbox/win/sandbox_poc/sandbox.h" 10 #include "sandbox/win/sandbox_poc/main_ui_window.h" 11 #include "sandbox/win/src/sandbox.h" 12 #include "sandbox/win/src/sandbox_factory.h" 54 sandbox::BrokerServices* broker_service = 55 sandbox::SandboxFactory::GetBrokerServices(); 56 sandbox::ResultCode result; 59 // spawns an instance of itself (called a 'target') inside the sandbox [all...] |
/external/chromium_org/chrome/app/ |
H A D | chrome_main.cc | 19 sandbox::SandboxInterfaceInfo* sandbox_info); 30 sandbox::SandboxInterfaceInfo* sandbox_info) {
|
/external/chromium_org/content/public/app/ |
H A D | content_main.h | 18 namespace sandbox { namespace 45 sandbox::SandboxInterfaceInfo* sandbox_info;
|
/external/chromium_org/content/public/common/ |
H A D | main_function_params.h | 7 // (e.g., POSIX doesn't need to pass any sandbox information). 16 namespace sandbox { namespace 45 sandbox::SandboxInterfaceInfo* sandbox_info;
|
/external/chromium_org/ash/shell/ |
H A D | shell_main.cc | 10 #include "sandbox/win/src/sandbox_types.h" 22 sandbox::SandboxInterfaceInfo sandbox_info = {0};
|