/external/chromium_org/content/common/sandbox_linux/android/ |
sandbox_bpf_base_policy_android.cc | 9 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 18 sandbox::ErrorCode SandboxBPFBasePolicyAndroid::EvaluateSyscall( 19 sandbox::SandboxBPF* sandbox, 35 // filesystem "sandbox". 55 return sandbox::ErrorCode(sandbox::ErrorCode::ERR_ALLOWED); 57 return SandboxBPFBasePolicy::EvaluateSyscall(sandbox, sysno);
|
/external/chromium_org/sandbox/linux/services/ |
libc_urandom_override.h | 8 namespace sandbox { namespace 12 } // namespace sandbox
|
android_ucontext.h | 11 #include "sandbox/linux/services/android_arm_ucontext.h" 13 #include "sandbox/linux/services/android_i386_ucontext.h" 15 #include "sandbox/linux/services/android_x86_64_ucontext.h"
|
linux_syscalls.h | 13 #include "sandbox/linux/services/x86_64_linux_syscalls.h" 17 #include "sandbox/linux/services/x86_32_linux_syscalls.h" 21 #include "sandbox/linux/services/arm_linux_syscalls.h"
|
/external/chromium_org/sandbox/win/src/ |
sandbox.cc | 7 #include "sandbox/win/src/sandbox.h" 8 #include "sandbox/win/src/sandbox_factory.h" 9 #include "sandbox/win/src/broker_services.h" 10 #include "sandbox/win/src/target_services.h" 12 namespace sandbox { namespace 43 } // namespace sandbox 47 return sandbox::g_shared_section != NULL;
|
handle_policy.h | 11 #include "sandbox/win/src/crosscall_server.h" 12 #include "sandbox/win/src/policy_low_level.h" 13 #include "sandbox/win/src/sandbox_policy.h" 15 namespace sandbox { namespace 37 } // namespace sandbox
|
process_mitigations_win32k_policy.h | 9 #include "sandbox/win/src/crosscall_server.h" 10 #include "sandbox/win/src/policy_low_level.h" 11 #include "sandbox/win/src/sandbox_policy.h" 13 namespace sandbox { namespace 31 } // namespace sandbox
|
handle_dispatcher.cc | 5 #include "sandbox/win/src/handle_dispatcher.h" 8 #include "sandbox/win/src/handle_interception.h" 9 #include "sandbox/win/src/handle_policy.h" 10 #include "sandbox/win/src/ipc_tags.h" 11 #include "sandbox/win/src/policy_broker.h" 12 #include "sandbox/win/src/policy_params.h" 13 #include "sandbox/win/src/sandbox.h" 14 #include "sandbox/win/src/sandbox_nt_util.h" 15 #include "sandbox/win/src/sandbox_types.h 18 namespace sandbox { namespace [all...] |
sync_dispatcher.cc | 5 #include "sandbox/win/src/sync_dispatcher.h" 8 #include "sandbox/win/src/crosscall_client.h" 9 #include "sandbox/win/src/interception.h" 10 #include "sandbox/win/src/interceptors.h" 11 #include "sandbox/win/src/ipc_tags.h" 12 #include "sandbox/win/src/policy_broker.h" 13 #include "sandbox/win/src/policy_params.h" 14 #include "sandbox/win/src/sandbox.h" 15 #include "sandbox/win/src/sync_interception.h 18 namespace sandbox { namespace [all...] |
ipc_ping_test.cc | 6 #include "sandbox/win/src/sandbox.h" 7 #include "sandbox/win/src/sandbox_factory.h" 8 #include "sandbox/win/src/target_services.h" 9 #include "sandbox/win/tests/common/controller.h" 11 namespace sandbox { namespace 58 } // namespace sandbox
|
handle_policy.cc | 5 #include "sandbox/win/src/handle_policy.h" 10 #include "sandbox/win/src/broker_services.h" 11 #include "sandbox/win/src/ipc_tags.h" 12 #include "sandbox/win/src/policy_engine_opcodes.h" 13 #include "sandbox/win/src/policy_params.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/sandbox_utils.h" 17 namespace sandbox { namespace 92 } // namespace sandbox
|
policy_broker.cc | 7 #include "sandbox/win/src/policy_broker.h" 12 #include "sandbox/win/src/interception.h" 13 #include "sandbox/win/src/interceptors.h" 14 #include "sandbox/win/src/policy_target.h" 15 #include "sandbox/win/src/process_thread_interception.h" 16 #include "sandbox/win/src/sandbox.h" 17 #include "sandbox/win/src/sandbox_nt_types.h" 18 #include "sandbox/win/src/sandbox_types.h" 19 #include "sandbox/win/src/target_process.h 24 namespace sandbox { namespace [all...] |
policy_broker.h | 8 #include "sandbox/win/src/interception.h" 10 namespace sandbox { namespace 21 } // namespace sandbox
|
process_mitigations_win32k_dispatcher.h | 9 #include "sandbox/win/src/sandbox_policy_base.h" 11 namespace sandbox { namespace 29 } // namespace sandbox
|
process_mitigations_win32k_policy.cc | 5 #include "sandbox/win/src/process_mitigations_win32k_policy.h" 7 namespace sandbox { namespace 23 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/ |
DEPS | 11 # sandbox/ explicitly. 12 "-sandbox/linux", 15 # Anything included from sandbox/linux must be declared after this line or in 22 "+sandbox/sandbox_export.h", 24 "+sandbox/linux/tests",
|
/external/chromium_org/content/common/sandbox_linux/ |
bpf_gpu_policy_linux.h | 14 namespace sandbox { namespace 31 // Start a broker process to handle open() inside the sandbox. 33 // suitable sandbox policy for the broker process itself. 38 sandbox::SandboxBPFPolicy* (*broker_sandboxer_allocator)(void), 42 sandbox::BrokerProcess* broker_process() { return broker_process_; } 45 // A BrokerProcess is a helper that is started before the sandbox is engaged 47 // this runs from a SIGSYS handler triggered by the seccomp-bpf sandbox. 48 // This should never be destroyed, as after the sandbox is started it is 51 // which executes iff the sandbox is going to be enabled afterwards. 52 sandbox::BrokerProcess* broker_process_ [all...] |
bpf_ppapi_policy_linux.cc | 12 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" 13 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 15 #include "sandbox/linux/services/linux_syscalls.h" 17 using sandbox::SyscallSets; 24 ErrorCode PpapiProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox, 43 return SandboxBPFBasePolicy::EvaluateSyscall(sandbox, sysno);
|
bpf_renderer_policy_linux.cc | 12 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" 13 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 15 #include "sandbox/linux/services/linux_syscalls.h" 17 using sandbox::SyscallSets; 24 ErrorCode RendererProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox, 28 return sandbox::RestrictIoctl(sandbox); 60 return SandboxBPFBasePolicy::EvaluateSyscall(sandbox, sysno);
|
sandbox_init_linux.cc | 9 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 13 bool InitializeSandbox(scoped_ptr<sandbox::SandboxBPFPolicy> policy) { 17 scoped_ptr<sandbox::SandboxBPFPolicy> GetBPFSandboxBaselinePolicy() {
|
/external/chromium_org/native_client_sdk/doc_generated/reference/sandbox_internals/ |
index.html | 3 <section id="sandbox-internals"> 4 <span id="sandbox-internals-index"></span><h1 id="sandbox-internals"><span id="sandbox-internals-index"></span>Sandbox Internals</h1> 5 <p>The sandbox internals documentation describes implementation details for 7 Client. These details can be useful to reimplement a sandbox, or to 17 untrusted: it too runs in a Native Client sandbox described below.</p> 20 <li><a class="reference internal" href="/native-client/reference/sandbox_internals/arm-32-bit-sandbox.html#arm-32-bit-sandbox"><em>ARM 32-bit</em></a>.</li [all...] |
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
syscall_parameters_restrictions.h | 11 #include "sandbox/sandbox_export.h" 14 // sandbox that reduces the Linux kernel's attack surface. They return an 17 namespace sandbox { namespace 27 RestrictCloneToThreadsAndEPERMFork(SandboxBPF* sandbox); 31 SANDBOX_EXPORT ErrorCode RestrictPrctl(SandboxBPF* sandbox); 35 SANDBOX_EXPORT ErrorCode RestrictIoctl(SandboxBPF* sandbox); 41 SANDBOX_EXPORT ErrorCode RestrictMmapFlags(SandboxBPF* sandbox); 45 SANDBOX_EXPORT ErrorCode RestrictMprotectFlags(SandboxBPF* sandbox); 52 SANDBOX_EXPORT ErrorCode RestrictFcntlCommands(SandboxBPF* sandbox); 57 SANDBOX_EXPORT ErrorCode RestrictSocketcallCommand(SandboxBPF* sandbox); [all...] |
baseline_policy.cc | 5 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h" 16 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 17 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" 18 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 19 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 20 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 21 #include "sandbox/linux/services/linux_syscalls.h" 26 namespace sandbox { namespace 87 SandboxBPF* sandbox, 93 return RestrictIoctl(sandbox); [all...] |
/external/chromium_org/sandbox/win/tools/finder/ |
finder.cc | 5 #include "sandbox/win/src/restricted_token.h" 6 #include "sandbox/win/src/restricted_token_utils.h" 7 #include "sandbox/win/tools/finder/finder.h" 24 DWORD Finder::Init(sandbox::TokenLevel token_type, 38 err_code = sandbox::CreateRestrictedToken(&token_handle_, token_type, 39 sandbox::INTEGRITY_LEVEL_LAST, 40 sandbox::PRIMARY);
|
/external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/ |
inner-html.html | 5 <div id="sandbox" style="display:none"></div> 7 var sandbox = document.getElementById('sandbox'); 10 sandbox.appendChild(document.createElement('div')); 11 var html = sandbox.innerHTML; 37 sandbox.innerHTML = html; 41 observer.observe(sandbox, {childList: true});
|