HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 51 - 75 of 990) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/chromium_org/content/common/sandbox_linux/android/
sandbox_bpf_base_policy_android.cc 9 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
18 sandbox::ErrorCode SandboxBPFBasePolicyAndroid::EvaluateSyscall(
19 sandbox::SandboxBPF* sandbox,
35 // filesystem "sandbox".
55 return sandbox::ErrorCode(sandbox::ErrorCode::ERR_ALLOWED);
57 return SandboxBPFBasePolicy::EvaluateSyscall(sandbox, sysno);
  /external/chromium_org/sandbox/linux/services/
libc_urandom_override.h 8 namespace sandbox { namespace
12 } // namespace sandbox
android_ucontext.h 11 #include "sandbox/linux/services/android_arm_ucontext.h"
13 #include "sandbox/linux/services/android_i386_ucontext.h"
15 #include "sandbox/linux/services/android_x86_64_ucontext.h"
linux_syscalls.h 13 #include "sandbox/linux/services/x86_64_linux_syscalls.h"
17 #include "sandbox/linux/services/x86_32_linux_syscalls.h"
21 #include "sandbox/linux/services/arm_linux_syscalls.h"
  /external/chromium_org/sandbox/win/src/
sandbox.cc 7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/broker_services.h"
10 #include "sandbox/win/src/target_services.h"
12 namespace sandbox { namespace
43 } // namespace sandbox
47 return sandbox::g_shared_section != NULL;
handle_policy.h 11 #include "sandbox/win/src/crosscall_server.h"
12 #include "sandbox/win/src/policy_low_level.h"
13 #include "sandbox/win/src/sandbox_policy.h"
15 namespace sandbox { namespace
37 } // namespace sandbox
process_mitigations_win32k_policy.h 9 #include "sandbox/win/src/crosscall_server.h"
10 #include "sandbox/win/src/policy_low_level.h"
11 #include "sandbox/win/src/sandbox_policy.h"
13 namespace sandbox { namespace
31 } // namespace sandbox
handle_dispatcher.cc 5 #include "sandbox/win/src/handle_dispatcher.h"
8 #include "sandbox/win/src/handle_interception.h"
9 #include "sandbox/win/src/handle_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/policy_broker.h"
12 #include "sandbox/win/src/policy_params.h"
13 #include "sandbox/win/src/sandbox.h"
14 #include "sandbox/win/src/sandbox_nt_util.h"
15 #include "sandbox/win/src/sandbox_types.h
18 namespace sandbox { namespace
    [all...]
sync_dispatcher.cc 5 #include "sandbox/win/src/sync_dispatcher.h"
8 #include "sandbox/win/src/crosscall_client.h"
9 #include "sandbox/win/src/interception.h"
10 #include "sandbox/win/src/interceptors.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/policy_broker.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox.h"
15 #include "sandbox/win/src/sync_interception.h
18 namespace sandbox { namespace
    [all...]
ipc_ping_test.cc 6 #include "sandbox/win/src/sandbox.h"
7 #include "sandbox/win/src/sandbox_factory.h"
8 #include "sandbox/win/src/target_services.h"
9 #include "sandbox/win/tests/common/controller.h"
11 namespace sandbox { namespace
58 } // namespace sandbox
handle_policy.cc 5 #include "sandbox/win/src/handle_policy.h"
10 #include "sandbox/win/src/broker_services.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/policy_engine_opcodes.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/sandbox_utils.h"
17 namespace sandbox { namespace
92 } // namespace sandbox
policy_broker.cc 7 #include "sandbox/win/src/policy_broker.h"
12 #include "sandbox/win/src/interception.h"
13 #include "sandbox/win/src/interceptors.h"
14 #include "sandbox/win/src/policy_target.h"
15 #include "sandbox/win/src/process_thread_interception.h"
16 #include "sandbox/win/src/sandbox.h"
17 #include "sandbox/win/src/sandbox_nt_types.h"
18 #include "sandbox/win/src/sandbox_types.h"
19 #include "sandbox/win/src/target_process.h
24 namespace sandbox { namespace
    [all...]
policy_broker.h 8 #include "sandbox/win/src/interception.h"
10 namespace sandbox { namespace
21 } // namespace sandbox
process_mitigations_win32k_dispatcher.h 9 #include "sandbox/win/src/sandbox_policy_base.h"
11 namespace sandbox { namespace
29 } // namespace sandbox
process_mitigations_win32k_policy.cc 5 #include "sandbox/win/src/process_mitigations_win32k_policy.h"
7 namespace sandbox { namespace
23 } // namespace sandbox
  /external/chromium_org/sandbox/linux/
DEPS 11 # sandbox/ explicitly.
12 "-sandbox/linux",
15 # Anything included from sandbox/linux must be declared after this line or in
22 "+sandbox/sandbox_export.h",
24 "+sandbox/linux/tests",
  /external/chromium_org/content/common/sandbox_linux/
bpf_gpu_policy_linux.h 14 namespace sandbox { namespace
31 // Start a broker process to handle open() inside the sandbox.
33 // suitable sandbox policy for the broker process itself.
38 sandbox::SandboxBPFPolicy* (*broker_sandboxer_allocator)(void),
42 sandbox::BrokerProcess* broker_process() { return broker_process_; }
45 // A BrokerProcess is a helper that is started before the sandbox is engaged
47 // this runs from a SIGSYS handler triggered by the seccomp-bpf sandbox.
48 // This should never be destroyed, as after the sandbox is started it is
51 // which executes iff the sandbox is going to be enabled afterwards.
52 sandbox::BrokerProcess* broker_process_
    [all...]
bpf_ppapi_policy_linux.cc 12 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
13 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
15 #include "sandbox/linux/services/linux_syscalls.h"
17 using sandbox::SyscallSets;
24 ErrorCode PpapiProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
43 return SandboxBPFBasePolicy::EvaluateSyscall(sandbox, sysno);
bpf_renderer_policy_linux.cc 12 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
13 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
15 #include "sandbox/linux/services/linux_syscalls.h"
17 using sandbox::SyscallSets;
24 ErrorCode RendererProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
28 return sandbox::RestrictIoctl(sandbox);
60 return SandboxBPFBasePolicy::EvaluateSyscall(sandbox, sysno);
sandbox_init_linux.cc 9 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
13 bool InitializeSandbox(scoped_ptr<sandbox::SandboxBPFPolicy> policy) {
17 scoped_ptr<sandbox::SandboxBPFPolicy> GetBPFSandboxBaselinePolicy() {
  /external/chromium_org/native_client_sdk/doc_generated/reference/sandbox_internals/
index.html 3 <section id="sandbox-internals">
4 <span id="sandbox-internals-index"></span><h1 id="sandbox-internals"><span id="sandbox-internals-index"></span>Sandbox Internals</h1>
5 <p>The sandbox internals documentation describes implementation details for
7 Client. These details can be useful to reimplement a sandbox, or to
17 untrusted: it too runs in a Native Client sandbox described below.</p>
20 <li><a class="reference internal" href="/native-client/reference/sandbox_internals/arm-32-bit-sandbox.html#arm-32-bit-sandbox"><em>ARM 32-bit</em></a>.</li
    [all...]
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
syscall_parameters_restrictions.h 11 #include "sandbox/sandbox_export.h"
14 // sandbox that reduces the Linux kernel's attack surface. They return an
17 namespace sandbox { namespace
27 RestrictCloneToThreadsAndEPERMFork(SandboxBPF* sandbox);
31 SANDBOX_EXPORT ErrorCode RestrictPrctl(SandboxBPF* sandbox);
35 SANDBOX_EXPORT ErrorCode RestrictIoctl(SandboxBPF* sandbox);
41 SANDBOX_EXPORT ErrorCode RestrictMmapFlags(SandboxBPF* sandbox);
45 SANDBOX_EXPORT ErrorCode RestrictMprotectFlags(SandboxBPF* sandbox);
52 SANDBOX_EXPORT ErrorCode RestrictFcntlCommands(SandboxBPF* sandbox);
57 SANDBOX_EXPORT ErrorCode RestrictSocketcallCommand(SandboxBPF* sandbox);
    [all...]
baseline_policy.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
16 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
17 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
18 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
19 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
20 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
21 #include "sandbox/linux/services/linux_syscalls.h"
26 namespace sandbox { namespace
87 SandboxBPF* sandbox,
93 return RestrictIoctl(sandbox);
    [all...]
  /external/chromium_org/sandbox/win/tools/finder/
finder.cc 5 #include "sandbox/win/src/restricted_token.h"
6 #include "sandbox/win/src/restricted_token_utils.h"
7 #include "sandbox/win/tools/finder/finder.h"
24 DWORD Finder::Init(sandbox::TokenLevel token_type,
38 err_code = sandbox::CreateRestrictedToken(&token_handle_, token_type,
39 sandbox::INTEGRITY_LEVEL_LAST,
40 sandbox::PRIMARY);
  /external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/
inner-html.html 5 <div id="sandbox" style="display:none"></div>
7 var sandbox = document.getElementById('sandbox');
10 sandbox.appendChild(document.createElement('div'));
11 var html = sandbox.innerHTML;
37 sandbox.innerHTML = html;
41 observer.observe(sandbox, {childList: true});

Completed in 92 milliseconds

1 23 4 5 6 7 8 91011>>