/external/chromium_org/sandbox/linux/seccomp-bpf/ |
errorcode.h | 8 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 9 #include "sandbox/linux/seccomp-bpf/trap.h" 10 #include "sandbox/sandbox_export.h" 12 namespace sandbox { namespace 16 // This class holds all the possible values that can be returned by a sandbox 61 // interpreted as an attempt at breaking the sandbox and results in the 182 bool safe_; // Keep sandbox active while calling fnc_() 202 } // namespace sandbox
|
syscall_unittest.cc | 16 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 17 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 18 #include "sandbox/linux/seccomp-bpf/syscall.h" 19 #include "sandbox/linux/tests/unit_tests.h" 22 namespace sandbox { namespace 91 ErrorCode CopyAllArgsOnUnamePolicy(SandboxBPF* sandbox, 98 return sandbox->Trap(CopySyscallArgsToAux, aux); 214 } // namespace sandbox
|
trap.h | 15 #include "sandbox/sandbox_export.h" 17 namespace sandbox { namespace 27 // time. For the purposes of our sandbox, this assertion should always be 28 // true. Threads are incompatible with the seccomp sandbox anyway. 56 // Once unsafe traps are enabled, the sandbox is essentially compromised. 117 } // namespace sandbox
|
/external/chromium_org/sandbox/win/sandbox_poc/ |
main_ui_window.h | 13 namespace sandbox { namespace 23 // The purpose of this is to be able to spawn an EXE inside a SandBox, have it 25 // sandbox. This is useful for developer debugging and for security testing. 54 // BrokerService that will launch a new EXE inside the sandbox and load the 59 sandbox::BrokerServices* broker); 116 // Spawns a target EXE inside the sandbox (with the help of the 159 // The BrokerServices will be used to spawn an EXE in a sandbox and ask 161 sandbox::BrokerServices* broker_;
|
/external/chromium_org/sandbox/win/sandbox_poc/pocdll/ |
fs.cc | 5 #include "sandbox/win/sandbox_poc/pocdll/exports.h" 6 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
|
network.cc | 5 #include "sandbox/win/sandbox_poc/pocdll/exports.h" 6 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
|
registry.cc | 5 #include "sandbox/win/sandbox_poc/pocdll/exports.h" 6 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
|
spyware.cc | 8 #include "sandbox/win/sandbox_poc/pocdll/exports.h" 9 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
|
/external/chromium_org/sandbox/win/tests/validation_tests/ |
commands.cc | 9 #include "sandbox/win/tests/validation_tests/commands.h" 11 #include "sandbox/win/tests/common/controller.h" 48 return sandbox::SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; 61 return sandbox::SBOX_TEST_SUCCEEDED; 64 return sandbox::SBOX_TEST_DENIED; 66 return sandbox::SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; 73 namespace sandbox { namespace 333 } // namespace sandbox
|
/external/chromium_org/third_party/WebKit/Source/platform/fonts/mac/ |
MemoryActivatedFont.mm | 26 // font loading being blocked by the sandbox, we need a mechnasim to both 59 // from inside the sandbox). 83 // the sandbox to construct a key which we hope will be as unique as possible 118 // font due to being blocked by the sandbox. 119 // This by definition shouldn't happen if there is no sandbox support. 168 // parameter. If loading is blocked by the sandbox, the font may be loaded 170 // If sandbox loading also fails, a fallback font is loaded. 192 // Font loading was blocked by the Sandbox.
|
/external/chromium_org/ui/ozone/public/ |
surface_ozone_canvas.h | 47 // called after we have entered the sandbox so if there are operations (e.g. 49 // outside of the sandbox, they must have been completed in
|
/external/chromium_org/content/ppapi_plugin/ |
ppapi_plugin_main.cc | 28 #include "sandbox/win/src/sandbox.h" 45 sandbox::TargetServices* g_target_services = NULL; 55 // Windows-only skia sandbox support 120 // NSS must be initialized before enabling the sandbox below. 125 // before the sandbox is initialized.
|
/external/chromium_org/sandbox/win/src/ |
sharedmem_ipc_server.h | 12 #include "sandbox/win/src/crosscall_params.h" 13 #include "sandbox/win/src/crosscall_server.h" 14 #include "sandbox/win/src/sharedmem_ipc_client.h" 32 namespace sandbox { namespace 56 // do not work with sandbox tests. 125 } // namespace sandbox
|
filesystem_policy.cc | 7 #include "sandbox/win/src/filesystem_policy.h" 11 #include "sandbox/win/src/ipc_tags.h" 12 #include "sandbox/win/src/policy_engine_opcodes.h" 13 #include "sandbox/win/src/policy_params.h" 14 #include "sandbox/win/src/sandbox_utils.h" 15 #include "sandbox/win/src/sandbox_types.h" 16 #include "sandbox/win/src/win_utils.h" 43 if (!sandbox::SameObject(local_handle, obj_attributes->ObjectName->Buffer)) { 59 namespace sandbox { namespace 386 } // namespace sandbox [all...] |
policy_target_test.cc | 7 #include "sandbox/win/src/sandbox.h" 8 #include "sandbox/win/src/sandbox_factory.h" 9 #include "sandbox/win/src/sandbox_utils.h" 10 #include "sandbox/win/src/target_services.h" 11 #include "sandbox/win/tests/common/controller.h" 14 namespace sandbox { namespace 214 // Launches the app in the sandbox and ask it to wait in an 277 // Launches the app in the sandbox and ask it to wait in an 344 } // namespace sandbox [all...] |
win_utils.cc | 5 #include "sandbox/win/src/win_utils.h" 11 #include "sandbox/win/src/internal_types.h" 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/sandbox_nt_util.h" 39 if (0 == path.compare(0, sandbox::kNTPrefixLen, sandbox::kNTPrefix)) 40 start = sandbox::kNTPrefixLen; 48 namespace sandbox { namespace 301 }; // namespace sandbox 307 HMODULE ntdll_local = ::GetModuleHandle(sandbox::kNtdllName) [all...] |
/external/chromium_org/sandbox/ |
seccomp_bpf.target.darwin-arm.mk | 28 sandbox/linux/seccomp-bpf/basicblock.cc \ 29 sandbox/linux/seccomp-bpf/codegen.cc \ 30 sandbox/linux/seccomp-bpf/die.cc \ 31 sandbox/linux/seccomp-bpf/errorcode.cc \ 32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \ 33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \ 34 sandbox/linux/seccomp-bpf/syscall.cc \ 35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \ 36 sandbox/linux/seccomp-bpf/trap.cc \ 37 sandbox/linux/seccomp-bpf/verifier.c [all...] |
seccomp_bpf.target.linux-arm.mk | 28 sandbox/linux/seccomp-bpf/basicblock.cc \ 29 sandbox/linux/seccomp-bpf/codegen.cc \ 30 sandbox/linux/seccomp-bpf/die.cc \ 31 sandbox/linux/seccomp-bpf/errorcode.cc \ 32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \ 33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \ 34 sandbox/linux/seccomp-bpf/syscall.cc \ 35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \ 36 sandbox/linux/seccomp-bpf/trap.cc \ 37 sandbox/linux/seccomp-bpf/verifier.c [all...] |
sandbox_services.target.darwin-arm.mk | 27 sandbox/linux/services/broker_process.cc \ 28 sandbox/linux/services/init_process_reaper.cc \ 29 sandbox/linux/services/scoped_process.cc \ 30 sandbox/linux/services/thread_helpers.cc \ 31 sandbox/linux/services/yama.cc 118 $(LOCAL_PATH)/sandbox \ 223 $(LOCAL_PATH)/sandbox \
|
sandbox_services.target.darwin-arm64.mk | 27 sandbox/linux/services/broker_process.cc \ 28 sandbox/linux/services/init_process_reaper.cc \ 29 sandbox/linux/services/scoped_process.cc \ 30 sandbox/linux/services/thread_helpers.cc \ 31 sandbox/linux/services/yama.cc 107 $(LOCAL_PATH)/sandbox \ 200 $(LOCAL_PATH)/sandbox \
|
sandbox_services.target.darwin-mips.mk | 27 sandbox/linux/services/broker_process.cc \ 28 sandbox/linux/services/init_process_reaper.cc \ 29 sandbox/linux/services/scoped_process.cc \ 30 sandbox/linux/services/thread_helpers.cc \ 31 sandbox/linux/services/yama.cc 112 $(LOCAL_PATH)/sandbox \ 211 $(LOCAL_PATH)/sandbox \
|
sandbox_services.target.darwin-x86.mk | 27 sandbox/linux/services/broker_process.cc \ 28 sandbox/linux/services/init_process_reaper.cc \ 29 sandbox/linux/services/scoped_process.cc \ 30 sandbox/linux/services/thread_helpers.cc \ 31 sandbox/linux/services/yama.cc 113 $(LOCAL_PATH)/sandbox \ 212 $(LOCAL_PATH)/sandbox \
|
sandbox_services.target.darwin-x86_64.mk | 27 sandbox/linux/services/broker_process.cc \ 28 sandbox/linux/services/init_process_reaper.cc \ 29 sandbox/linux/services/scoped_process.cc \ 30 sandbox/linux/services/thread_helpers.cc \ 31 sandbox/linux/services/yama.cc 112 $(LOCAL_PATH)/sandbox \ 210 $(LOCAL_PATH)/sandbox \
|
sandbox_services.target.linux-arm.mk | 27 sandbox/linux/services/broker_process.cc \ 28 sandbox/linux/services/init_process_reaper.cc \ 29 sandbox/linux/services/scoped_process.cc \ 30 sandbox/linux/services/thread_helpers.cc \ 31 sandbox/linux/services/yama.cc 118 $(LOCAL_PATH)/sandbox \ 223 $(LOCAL_PATH)/sandbox \
|
/external/chromium_org/chrome/tools/ |
chrome-process-identifier.sh | 9 # zygote, renderer). It also prints out information on whether a sandbox is 10 # active and what type of sandbox has been identified. 22 # zygote inside of the setuid sandbox, renderers are in a process tree separate 72 # The seccomp sandbox has exactly one child process that has no other 91 echo "Process $child is a $type; setuid sandbox is active" 135 # sandbox causes it to be reparented to "init". When this happens, we can 141 [ -d /proc/$i/cwd/. ] || echo -n "; setuid sandbox is active"
|