/external/chromium/chrome/common/ |
sandbox_policy.h | 14 namespace sandbox { namespace 18 void InitBrokerServices(sandbox::BrokerServices* broker_services); 25 } // namespace sandbox
|
/external/chromium_org/content/common/sandbox_linux/ |
sandbox_init_linux.cc | 9 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 13 bool InitializeSandbox(scoped_ptr<sandbox::SandboxBPFPolicy> policy) { 17 scoped_ptr<sandbox::SandboxBPFPolicy> GetBPFSandboxBaselinePolicy() {
|
/external/chromium_org/sandbox/linux/services/ |
linux_syscalls.h | 13 #include "sandbox/linux/services/x86_64_linux_syscalls.h" 17 #include "sandbox/linux/services/x86_32_linux_syscalls.h" 21 #include "sandbox/linux/services/arm_linux_syscalls.h"
|
/external/chromium_org/sandbox/win/src/ |
policy_broker.cc | 7 #include "sandbox/win/src/policy_broker.h" 12 #include "sandbox/win/src/interception.h" 13 #include "sandbox/win/src/interceptors.h" 14 #include "sandbox/win/src/policy_target.h" 15 #include "sandbox/win/src/process_thread_interception.h" 16 #include "sandbox/win/src/sandbox.h" 17 #include "sandbox/win/src/sandbox_nt_types.h" 18 #include "sandbox/win/src/sandbox_types.h" 19 #include "sandbox/win/src/target_process.h 24 namespace sandbox { namespace [all...] |
policy_broker.h | 8 #include "sandbox/win/src/interception.h" 10 namespace sandbox { namespace 21 } // namespace sandbox
|
sandbox_utils.h | 13 #include "sandbox/win/src/nt_internals.h" 15 namespace sandbox { namespace 26 } // namespace sandbox
|
sid.cc | 5 #include "sandbox/win/src/sid.h" 9 namespace sandbox { namespace 26 } // namespace sandbox
|
eat_resolver.h | 9 #include "sandbox/win/src/nt_internals.h" 10 #include "sandbox/win/src/resolver.h" 12 namespace sandbox { namespace 45 } // namespace sandbox
|
handle_closer_agent.h | 10 #include "sandbox/win/src/handle_closer.h" 11 #include "sandbox/win/src/sandbox_types.h" 13 namespace sandbox { namespace 35 } // namespace sandbox
|
handle_dispatcher.h | 9 #include "sandbox/win/src/crosscall_server.h" 10 #include "sandbox/win/src/sandbox_policy_base.h" 12 namespace sandbox { namespace 34 } // namespace sandbox
|
named_pipe_dispatcher.h | 10 #include "sandbox/win/src/crosscall_server.h" 11 #include "sandbox/win/src/sandbox_policy_base.h" 13 namespace sandbox { namespace 36 } // namespace sandbox
|
registry_dispatcher.h | 10 #include "sandbox/win/src/crosscall_server.h" 11 #include "sandbox/win/src/sandbox_policy_base.h" 13 namespace sandbox { namespace 38 } // namespace sandbox
|
registry_interception.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 36 } // namespace sandbox
|
sync_dispatcher.h | 10 #include "sandbox/win/src/crosscall_server.h" 11 #include "sandbox/win/src/sandbox_policy_base.h" 13 namespace sandbox { namespace 36 } // namespace sandbox
|
sync_interception.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 44 } // namespace sandbox
|
registry_policy.h | 12 #include "sandbox/win/src/crosscall_server.h" 13 #include "sandbox/win/src/nt_internals.h" 14 #include "sandbox/win/src/policy_low_level.h" 15 #include "sandbox/win/src/sandbox_policy.h" 17 namespace sandbox { namespace 56 } // namespace sandbox
|
sync_policy.h | 12 #include "sandbox/win/src/crosscall_server.h" 13 #include "sandbox/win/src/nt_internals.h" 14 #include "sandbox/win/src/policy_low_level.h" 15 #include "sandbox/win/src/sandbox_policy.h" 17 namespace sandbox { namespace 49 } // namespace sandbox
|
/external/chromium_org/sandbox/win/tests/integration_tests/ |
integration_tests.cc | 6 #include "sandbox/win/tests/common/controller.h" 11 0 == _wcsicmp(argv[1], L"-child-no-sandbox")) 13 return sandbox::DispatchCall(argc, argv);
|
/external/chromium_org/chrome/nacl/ |
DEPS | 8 "+sandbox/win/src",
|
/external/chromium_org/chrome/test/security_tests/ |
security_tests.gyp | 14 '../../../sandbox/win/tests/validation_tests/commands.cc', 15 '../../../sandbox/win/tests/validation_tests/commands.h',
|
/external/chromium_org/content/app/ |
startup_helper_win.cc | 13 #include "sandbox/win/src/process_mitigations.h" 14 #include "sandbox/win/src/sandbox_factory.h" 38 void InitializeSandboxInfo(sandbox::SandboxInterfaceInfo* info) { 39 info->broker_services = sandbox::SandboxFactory::GetBrokerServices(); 41 info->target_services = sandbox::SandboxFactory::GetTargetServices(); 44 sandbox::ApplyProcessMitigationsToCurrentProcess( 45 sandbox::MITIGATION_DEP | 46 sandbox::MITIGATION_DEP_NO_ATL_THUNK);
|
/external/chromium_org/content/public/common/ |
sandboxed_process_launcher_delegate.h | 14 namespace sandbox { namespace 21 // BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy, 29 // |in_sandbox| to false if this process should be launched without a sandbox 33 // Called before the default sandbox is applied. If the default policy is too 36 //directory through the sandbox. 41 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
|
sandbox_init.h | 19 namespace sandbox { namespace 29 // Initialize the sandbox for renderer, gpu, utility, worker, nacl, and plug-in 33 // Returns true if the sandbox was initialized succesfully, false if an error 37 sandbox::SandboxInterfaceInfo* sandbox_info); 40 // that works inside the sandbox and can send handles but not retrieve 49 // Inform the current process's sandbox broker (e.g. the broker for 50 // 32-bit processes) about a process created under a different sandbox 66 // Initialize the sandbox of the given |sandbox_type|, optionally specifying a 68 // supported by the sandbox profile associated with the given |sandbox_type|. 75 // sandbox::SANDBOX_PROCESS_TYPE_AFTER_LAST_TYPE [all...] |
/external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/ |
append-child.html | 5 <div id="sandbox" style="display:none"></div> 7 var sandbox = document.getElementById('sandbox'); 37 sandbox.innerHTML = ''; 39 observer.observe(sandbox, {childList: true}); 42 sandbox.appendChild(elems[i]);
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
baseline_policy.cc | 5 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h" 14 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 15 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" 16 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 17 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 18 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 19 #include "sandbox/linux/services/linux_syscalls.h" 24 namespace sandbox { namespace 84 ErrorCode EvaluateSyscallImpl(int fs_denied_errno, SandboxBPF* sandbox, 94 return sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, AF_UNIX [all...] |