/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
syscall_parameters_restrictions.cc | 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" 22 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 23 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 24 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 64 namespace sandbox { namespace 66 ErrorCode RestrictCloneToThreadsAndEPERMFork(SandboxBPF* sandbox) { 69 return sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, 74 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, 78 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, 81 sandbox->Trap(SIGSYSCloneFailure, NULL)))) [all...] |
syscall_parameters_restrictions.h | 11 // sandbox that reduces the Linux kernel's attack surface. They return an 14 namespace sandbox { namespace 23 ErrorCode RestrictCloneToThreadsAndEPERMFork(SandboxBPF* sandbox); 27 ErrorCode RestrictPrctl(SandboxBPF* sandbox); 31 ErrorCode RestrictIoctl(SandboxBPF* sandbox); 37 ErrorCode RestrictMmapFlags(SandboxBPF* sandbox); 41 ErrorCode RestrictMprotectFlags(SandboxBPF* sandbox); 48 ErrorCode RestrictFcntlCommands(SandboxBPF* sandbox); 53 ErrorCode RestrictSocketcallCommand(SandboxBPF* sandbox); 56 } // namespace sandbox [all...] |
/external/chromium_org/sandbox/win/src/ |
Wow64_64.cc | 7 #include "sandbox/win/src/wow64.h" 9 namespace sandbox { namespace 18 } // namespace sandbox
|
sync_policy_test.h | 8 #include "sandbox/win/tests/common/controller.h" 10 namespace sandbox { namespace 16 } // namespace sandbox
|
named_pipe_interception.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 34 } // namespace sandbox
|
named_pipe_interception.cc | 5 #include "sandbox/win/src/named_pipe_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_params.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/sandbox_nt_util.h" 13 #include "sandbox/win/src/sharedmem_ipc_client.h" 14 #include "sandbox/win/src/target_services.h" 16 namespace sandbox { namespace [all...] |
handle_policy.h | 11 #include "sandbox/win/src/crosscall_server.h" 12 #include "sandbox/win/src/policy_low_level.h" 13 #include "sandbox/win/src/sandbox_policy.h" 15 namespace sandbox { namespace 38 } // namespace sandbox
|
handle_dispatcher.cc | 5 #include "sandbox/win/src/handle_dispatcher.h" 8 #include "sandbox/win/src/handle_interception.h" 9 #include "sandbox/win/src/handle_policy.h" 10 #include "sandbox/win/src/ipc_tags.h" 11 #include "sandbox/win/src/policy_broker.h" 12 #include "sandbox/win/src/policy_params.h" 13 #include "sandbox/win/src/sandbox.h" 14 #include "sandbox/win/src/sandbox_nt_util.h" 15 #include "sandbox/win/src/sandbox_types.h 18 namespace sandbox { namespace [all...] |
sync_dispatcher.cc | 5 #include "sandbox/win/src/sync_dispatcher.h" 8 #include "sandbox/win/src/crosscall_client.h" 9 #include "sandbox/win/src/interception.h" 10 #include "sandbox/win/src/interceptors.h" 11 #include "sandbox/win/src/ipc_tags.h" 12 #include "sandbox/win/src/policy_broker.h" 13 #include "sandbox/win/src/policy_params.h" 14 #include "sandbox/win/src/sandbox.h" 15 #include "sandbox/win/src/sync_interception.h 18 namespace sandbox { namespace [all...] |
ipc_ping_test.cc | 6 #include "sandbox/win/src/sandbox.h" 7 #include "sandbox/win/src/sandbox_factory.h" 8 #include "sandbox/win/src/target_services.h" 9 #include "sandbox/win/tests/common/controller.h" 11 namespace sandbox { namespace 58 } // namespace sandbox
|
sandbox.cc | 7 #include "sandbox/win/src/sandbox.h" 8 #include "sandbox/win/src/sandbox_factory.h" 9 #include "sandbox/win/src/broker_services.h" 10 #include "sandbox/win/src/target_services.h" 12 namespace sandbox { namespace 44 } // namespace sandbox
|
/external/chromium_org/components/breakpad/app/ |
DEPS | 2 "+sandbox",
|
/external/chromium_org/content/common/sandbox_linux/ |
bpf_gpu_policy_linux.h | 13 namespace sandbox { namespace 30 // Start a broker process to handle open() inside the sandbox. 32 // sandbox for the broker process itself. 41 sandbox::BrokerProcess* broker_process() { return broker_process_; } 44 // A BrokerProcess is a helper that is started before the sandbox is engaged 46 // this runs from a SIGSYS handler triggered by the seccomp-bpf sandbox. 47 // This should never be destroyed, as after the sandbox is started it is 50 // which executes iff the sandbox is going to be enabled afterwards. 51 sandbox::BrokerProcess* broker_process_;
|
bpf_ppapi_policy_linux.cc | 12 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" 13 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 15 #include "sandbox/linux/services/linux_syscalls.h" 17 using sandbox::SyscallSets; 36 ErrorCode PpapiProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox, 40 return sandbox::RestrictCloneToThreadsAndEPERMFork(sandbox); 66 return SandboxBPFBasePolicy::EvaluateSyscall(sandbox, sysno);
|
/external/chromium_org/content/plugin/ |
DEPS | 5 "+sandbox/win/src",
|
/external/chromium_org/content/ppapi_plugin/ |
OWNERS | 3 # Mac Sandbox profiles.
|
/external/chromium_org/content/renderer/ |
OWNERS | 3 # Mac Sandbox profiles.
|
/external/chromium_org/content/utility/ |
OWNERS | 3 # Mac Sandbox profiles.
|
/external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/ |
remove-child.html | 5 <div id="sandbox" style="display:none"></div> 7 var sandbox = document.getElementById('sandbox'); 29 observer.observe(sandbox, {childList: true}); 42 sandbox.appendChild(document.createElement('div')); 45 while (sandbox.firstChild) 46 sandbox.removeChild(sandbox.firstChild); 50 observer.observe(sandbox, {childList: true});
|
inner-html.html | 5 <div id="sandbox" style="display:none"></div> 7 var sandbox = document.getElementById('sandbox'); 10 sandbox.appendChild(document.createElement('div')); 11 var html = sandbox.innerHTML; 37 sandbox.innerHTML = html; 41 observer.observe(sandbox, {childList: true});
|
/external/chromium_org/chrome/common/extensions/docs/examples/howto/sandbox/ |
manifest.json | 15 "sandbox": { 16 "pages": ["sandbox.html"]
|
/external/chromium_org/sandbox/linux/services/ |
libc_urandom_override.h | 8 namespace sandbox { namespace 12 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
bpf_tests.h | 13 #include "sandbox/linux/tests/unit_tests.h" 14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 16 namespace sandbox { namespace 24 void BPF_TEST_##test_name(sandbox::BPFTests<aux>::AuxType& BPF_AUX); \ 26 sandbox::BPFTests<aux>::TestArgs arg(BPF_TEST_##test_name, policy); \ 27 sandbox::BPFTests<aux>::RunTestInProcess( \ 28 sandbox::BPFTests<aux>::TestWrapper, &arg, death); \ 30 void BPF_TEST_##test_name(sandbox::BPFTests<aux>::AuxType& BPF_AUX) 58 TestArgs(void (*t)(AuxType&), sandbox::SandboxBPF::EvaluateSyscall p) 62 sandbox::SandboxBPF::EvaluateSyscall policy() const { return policy_; 84 sandbox::SandboxBPF sandbox; local 101 sandbox::SandboxBPF sandbox; local [all...] |
/external/chromium_org/sandbox/win/tools/finder/ |
finder.cc | 5 #include "sandbox/win/src/restricted_token.h" 6 #include "sandbox/win/src/restricted_token_utils.h" 7 #include "sandbox/win/tools/finder/finder.h" 24 DWORD Finder::Init(sandbox::TokenLevel token_type, 38 err_code = sandbox::CreateRestrictedToken(&token_handle_, token_type, 39 sandbox::INTEGRITY_LEVEL_LAST, 40 sandbox::PRIMARY);
|
/external/chromium/chrome/common/ |
sandbox_policy.cc | 25 #include "sandbox/src/sandbox.h" 27 static sandbox::BrokerServices* g_broker_services = NULL; 125 sandbox::TargetPolicy::Semantics access, 126 sandbox::TargetPolicy* policy) { 136 sandbox::ResultCode result; 137 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, 139 if (result != sandbox::SBOX_ALL_OK) 147 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access, 149 if (result != sandbox::SBOX_ALL_OK 563 namespace sandbox { namespace [all...] |