HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 26 - 50 of 851) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
syscall_parameters_restrictions.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
22 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
23 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
24 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
64 namespace sandbox { namespace
66 ErrorCode RestrictCloneToThreadsAndEPERMFork(SandboxBPF* sandbox) {
69 return sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL,
74 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL,
78 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL,
81 sandbox->Trap(SIGSYSCloneFailure, NULL))))
    [all...]
syscall_parameters_restrictions.h 11 // sandbox that reduces the Linux kernel's attack surface. They return an
14 namespace sandbox { namespace
23 ErrorCode RestrictCloneToThreadsAndEPERMFork(SandboxBPF* sandbox);
27 ErrorCode RestrictPrctl(SandboxBPF* sandbox);
31 ErrorCode RestrictIoctl(SandboxBPF* sandbox);
37 ErrorCode RestrictMmapFlags(SandboxBPF* sandbox);
41 ErrorCode RestrictMprotectFlags(SandboxBPF* sandbox);
48 ErrorCode RestrictFcntlCommands(SandboxBPF* sandbox);
53 ErrorCode RestrictSocketcallCommand(SandboxBPF* sandbox);
56 } // namespace sandbox
    [all...]
  /external/chromium_org/sandbox/win/src/
Wow64_64.cc 7 #include "sandbox/win/src/wow64.h"
9 namespace sandbox { namespace
18 } // namespace sandbox
sync_policy_test.h 8 #include "sandbox/win/tests/common/controller.h"
10 namespace sandbox { namespace
16 } // namespace sandbox
named_pipe_interception.h 5 #include "sandbox/win/src/nt_internals.h"
6 #include "sandbox/win/src/sandbox_types.h"
11 namespace sandbox { namespace
34 } // namespace sandbox
named_pipe_interception.cc 5 #include "sandbox/win/src/named_pipe_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
handle_policy.h 11 #include "sandbox/win/src/crosscall_server.h"
12 #include "sandbox/win/src/policy_low_level.h"
13 #include "sandbox/win/src/sandbox_policy.h"
15 namespace sandbox { namespace
38 } // namespace sandbox
handle_dispatcher.cc 5 #include "sandbox/win/src/handle_dispatcher.h"
8 #include "sandbox/win/src/handle_interception.h"
9 #include "sandbox/win/src/handle_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/policy_broker.h"
12 #include "sandbox/win/src/policy_params.h"
13 #include "sandbox/win/src/sandbox.h"
14 #include "sandbox/win/src/sandbox_nt_util.h"
15 #include "sandbox/win/src/sandbox_types.h
18 namespace sandbox { namespace
    [all...]
sync_dispatcher.cc 5 #include "sandbox/win/src/sync_dispatcher.h"
8 #include "sandbox/win/src/crosscall_client.h"
9 #include "sandbox/win/src/interception.h"
10 #include "sandbox/win/src/interceptors.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/policy_broker.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox.h"
15 #include "sandbox/win/src/sync_interception.h
18 namespace sandbox { namespace
    [all...]
ipc_ping_test.cc 6 #include "sandbox/win/src/sandbox.h"
7 #include "sandbox/win/src/sandbox_factory.h"
8 #include "sandbox/win/src/target_services.h"
9 #include "sandbox/win/tests/common/controller.h"
11 namespace sandbox { namespace
58 } // namespace sandbox
sandbox.cc 7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/broker_services.h"
10 #include "sandbox/win/src/target_services.h"
12 namespace sandbox { namespace
44 } // namespace sandbox
  /external/chromium_org/components/breakpad/app/
DEPS 2 "+sandbox",
  /external/chromium_org/content/common/sandbox_linux/
bpf_gpu_policy_linux.h 13 namespace sandbox { namespace
30 // Start a broker process to handle open() inside the sandbox.
32 // sandbox for the broker process itself.
41 sandbox::BrokerProcess* broker_process() { return broker_process_; }
44 // A BrokerProcess is a helper that is started before the sandbox is engaged
46 // this runs from a SIGSYS handler triggered by the seccomp-bpf sandbox.
47 // This should never be destroyed, as after the sandbox is started it is
50 // which executes iff the sandbox is going to be enabled afterwards.
51 sandbox::BrokerProcess* broker_process_;
bpf_ppapi_policy_linux.cc 12 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
13 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
15 #include "sandbox/linux/services/linux_syscalls.h"
17 using sandbox::SyscallSets;
36 ErrorCode PpapiProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
40 return sandbox::RestrictCloneToThreadsAndEPERMFork(sandbox);
66 return SandboxBPFBasePolicy::EvaluateSyscall(sandbox, sysno);
  /external/chromium_org/content/plugin/
DEPS 5 "+sandbox/win/src",
  /external/chromium_org/content/ppapi_plugin/
OWNERS 3 # Mac Sandbox profiles.
  /external/chromium_org/content/renderer/
OWNERS 3 # Mac Sandbox profiles.
  /external/chromium_org/content/utility/
OWNERS 3 # Mac Sandbox profiles.
  /external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/
remove-child.html 5 <div id="sandbox" style="display:none"></div>
7 var sandbox = document.getElementById('sandbox');
29 observer.observe(sandbox, {childList: true});
42 sandbox.appendChild(document.createElement('div'));
45 while (sandbox.firstChild)
46 sandbox.removeChild(sandbox.firstChild);
50 observer.observe(sandbox, {childList: true});
inner-html.html 5 <div id="sandbox" style="display:none"></div>
7 var sandbox = document.getElementById('sandbox');
10 sandbox.appendChild(document.createElement('div'));
11 var html = sandbox.innerHTML;
37 sandbox.innerHTML = html;
41 observer.observe(sandbox, {childList: true});
  /external/chromium_org/chrome/common/extensions/docs/examples/howto/sandbox/
manifest.json 15 "sandbox": {
16 "pages": ["sandbox.html"]
  /external/chromium_org/sandbox/linux/services/
libc_urandom_override.h 8 namespace sandbox { namespace
12 } // namespace sandbox
  /external/chromium_org/sandbox/linux/seccomp-bpf/
bpf_tests.h 13 #include "sandbox/linux/tests/unit_tests.h"
14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
16 namespace sandbox { namespace
24 void BPF_TEST_##test_name(sandbox::BPFTests<aux>::AuxType& BPF_AUX); \
26 sandbox::BPFTests<aux>::TestArgs arg(BPF_TEST_##test_name, policy); \
27 sandbox::BPFTests<aux>::RunTestInProcess( \
28 sandbox::BPFTests<aux>::TestWrapper, &arg, death); \
30 void BPF_TEST_##test_name(sandbox::BPFTests<aux>::AuxType& BPF_AUX)
58 TestArgs(void (*t)(AuxType&), sandbox::SandboxBPF::EvaluateSyscall p)
62 sandbox::SandboxBPF::EvaluateSyscall policy() const { return policy_;
84 sandbox::SandboxBPF sandbox; local
101 sandbox::SandboxBPF sandbox; local
    [all...]
  /external/chromium_org/sandbox/win/tools/finder/
finder.cc 5 #include "sandbox/win/src/restricted_token.h"
6 #include "sandbox/win/src/restricted_token_utils.h"
7 #include "sandbox/win/tools/finder/finder.h"
24 DWORD Finder::Init(sandbox::TokenLevel token_type,
38 err_code = sandbox::CreateRestrictedToken(&token_handle_, token_type,
39 sandbox::INTEGRITY_LEVEL_LAST,
40 sandbox::PRIMARY);
  /external/chromium/chrome/common/
sandbox_policy.cc 25 #include "sandbox/src/sandbox.h"
27 static sandbox::BrokerServices* g_broker_services = NULL;
125 sandbox::TargetPolicy::Semantics access,
126 sandbox::TargetPolicy* policy) {
136 sandbox::ResultCode result;
137 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access,
139 if (result != sandbox::SBOX_ALL_OK)
147 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, access,
149 if (result != sandbox::SBOX_ALL_OK
563 namespace sandbox { namespace
    [all...]

Completed in 108 milliseconds

12 3 4 5 6 7 8 91011>>