Searched refs:sandbox (Results 1 - 25 of 471) sorted by relevance

1234567891011>>

/external/chromium_org/sandbox/linux/seccomp-bpf/
H A Dbasicblock.cc5 #include "sandbox/linux/seccomp-bpf/basicblock.h"
7 namespace sandbox { namespace
13 } // namespace sandbox
H A Dsandbox_bpf_test_runner.cc5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_test_runner.h"
12 #include "sandbox/linux/seccomp-bpf/die.h"
13 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
14 #include "sandbox/linux/tests/unit_tests.h"
16 namespace sandbox { namespace
28 sandbox::Die::EnableSimpleExit();
33 if (sandbox::SandboxBPF::SupportsSeccompSandbox(-1) ==
34 sandbox::SandboxBPF::STATUS_AVAILABLE) {
35 // Ensure the the sandbox is actually available at this time
38 SANDBOX_ASSERT(sandbox
42 sandbox::SandboxBPF sandbox; local
60 sandbox::SandboxBPF sandbox; local
[all...]
H A Dsandbox_bpf_policy.cc5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
9 #include "sandbox/linux/seccomp-bpf/errorcode.h"
11 namespace sandbox { namespace
17 } // namespace sandbox
/external/chromium_org/sandbox/linux/services/
H A Dlibc_urandom_override.h8 namespace sandbox { namespace
12 } // namespace sandbox
H A Dinit_process_reaper.h9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
23 } // namespace sandbox.
/external/chromium_org/sandbox/win/src/
H A DWow64_64.cc7 #include "sandbox/win/src/wow64.h"
9 namespace sandbox { namespace
18 } // namespace sandbox
H A Dsandbox_globals.cc7 #include "sandbox/win/src/sandbox_nt_types.h"
8 #include "sandbox/win/src/sandbox_types.h"
10 namespace sandbox { namespace
18 } // namespace sandbox
H A Dsync_policy_test.h8 #include "sandbox/win/tests/common/controller.h"
10 namespace sandbox { namespace
16 } // namespace sandbox
/external/chromium_org/chrome_elf/
H A Dthunk_getter.h8 namespace sandbox { namespace
14 sandbox::ServiceResolverThunk* GetThunk(bool relaxed);
H A Dntdll_cache.h10 namespace sandbox { namespace
19 extern sandbox::ThunkData g_nt_thunk_storage;
/external/chromium_org/content/browser/
H A Dbootstrap_sandbox_mac.h8 namespace sandbox { namespace
14 // Whether or not the bootstrap sandbox should be enabled.
19 // On the first call to this function, the sandbox will be created and all
21 sandbox::BootstrapSandbox* GetBootstrapSandbox();
H A Dbootstrap_sandbox_mac.cc15 #include "sandbox/mac/bootstrap_sandbox.h"
27 sandbox::BootstrapSandbox* sandbox() const { function in class:content::__anon7026::BootstrapSandboxPolicy
44 scoped_ptr<sandbox::BootstrapSandbox> sandbox_;
53 sandbox()->ChildDied(data.handle);
58 sandbox()->ChildDied(data.handle);
62 : sandbox_(sandbox::BootstrapSandbox::Create()) {
82 sandbox::BootstrapSandbox* GetBootstrapSandbox() {
83 return BootstrapSandboxPolicy::GetInstance()->sandbox();
/external/chromium_org/sandbox/linux/tests/
H A Dsandbox_test_runner.cc5 #include "sandbox/linux/tests/sandbox_test_runner.h"
7 namespace sandbox { namespace
19 } // namespace sandbox
/external/chromium_org/content/common/
H A Dsandbox_init_win.cc11 #include "sandbox/win/src/sandbox.h"
12 #include "sandbox/win/src/sandbox_types.h"
16 bool InitializeSandbox(sandbox::SandboxInterfaceInfo* sandbox_info) {
19 sandbox::BrokerServices* broker_services = sandbox_info->broker_services;
25 // process because it will initialize the sandbox broker, which requires the
30 sandbox::TargetPolicy* policy = broker_services->CreatePolicy();
31 sandbox::ResultCode result = policy->CreateAlternateDesktop(true);
32 CHECK(sandbox::SBOX_ERROR_FAILED_TO_SWITCH_BACK_WINSTATION != result);
41 sandbox
[all...]
H A Dsandbox_win.h9 #include "sandbox/win/src/security_level.h"
15 namespace sandbox { namespace
23 // Wrapper around sandbox::TargetPolicy::SetJobLevel that checks if the sandbox
26 sandbox::JobLevel job_level,
28 sandbox::TargetPolicy* policy);
31 void AddBaseHandleClosePolicy(sandbox::TargetPolicy* policy);
33 bool InitBrokerServices(sandbox::BrokerServices* broker_services);
35 bool InitTargetServices(sandbox::TargetServices* target_services);
/external/chromium_org/content/common/sandbox_linux/
H A Dsandbox_init_linux.cc9 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
14 scoped_ptr<sandbox::bpf_dsl::SandboxBPFDSLPolicy> policy) {
18 scoped_ptr<sandbox::bpf_dsl::SandboxBPFDSLPolicy>
H A Dbpf_ppapi_policy_linux.cc12 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
13 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
14 #include "sandbox/linux/services/linux_syscalls.h"
16 using sandbox::SyscallSets;
17 using sandbox::bpf_dsl::Allow;
18 using sandbox::bpf_dsl::Error;
19 using sandbox::bpf_dsl::ResultExpr;
H A Dsandbox_bpf_base_policy_linux.h10 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
11 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
19 class SandboxBPFBasePolicy : public sandbox::bpf_dsl::SandboxBPFDSLPolicy {
24 virtual sandbox::bpf_dsl::ResultExpr EvaluateSyscall(
26 virtual sandbox::bpf_dsl::ResultExpr InvalidSyscall() const OVERRIDE;
29 // is passed to the BPF compiler and the sandbox is engaged.
30 // If PreSandboxHook() returns true, the sandbox is guaranteed to be
32 // This will be used when enabling the sandbox though
40 // Compose the BaselinePolicy from sandbox/.
41 scoped_ptr<sandbox
[all...]
H A Dbpf_gpu_policy_linux.h14 namespace sandbox { namespace
25 virtual sandbox::bpf_dsl::ResultExpr EvaluateSyscall(
31 // Start a broker process to handle open() inside the sandbox.
33 // suitable sandbox policy for the broker process itself.
38 sandbox::bpf_dsl::SandboxBPFDSLPolicy* (*broker_sandboxer_allocator)(
43 sandbox::BrokerProcess* broker_process() { return broker_process_; }
46 // A BrokerProcess is a helper that is started before the sandbox is engaged
48 // this runs from a SIGSYS handler triggered by the seccomp-bpf sandbox.
49 // This should never be destroyed, as after the sandbox is started it is
52 // which executes iff the sandbox i
[all...]
H A Dbpf_utility_policy_linux.cc12 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
13 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
14 #include "sandbox/linux/services/linux_syscalls.h"
16 using sandbox::SyscallSets;
17 using sandbox::bpf_dsl::Allow;
18 using sandbox::bpf_dsl::Error;
19 using sandbox::bpf_dsl::ResultExpr;
37 return sandbox::RestrictIoctl();
H A Dbpf_renderer_policy_linux.cc12 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
13 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
14 #include "sandbox/linux/services/linux_syscalls.h"
16 using sandbox::SyscallSets;
17 using sandbox::bpf_dsl::Allow;
18 using sandbox::bpf_dsl::Error;
19 using sandbox::bpf_dsl::ResultExpr;
31 return sandbox::RestrictClockID();
33 return sandbox::RestrictIoctl();
/external/chromium_org/content/public/app/
H A Dstartup_helper_win.h12 namespace sandbox { namespace
22 // Initializes the sandbox code and turns on DEP. Note: This function
24 // sandbox library); it will not work correctly if it is exported from a
26 void InitializeSandboxInfo(sandbox::SandboxInterfaceInfo* sandbox_info);
/external/chromium_org/content/renderer/
H A Drenderer_main_platform_delegate_android.cc13 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
48 sandbox::SandboxBPF sandbox; local
49 sandbox.SetSandboxPolicy(new SandboxBPFBasePolicyAndroid());
50 CHECK(sandbox.StartSandbox(sandbox::SandboxBPF::PROCESS_MULTI_THREADED));
/external/chromium_org/content/app/
H A Dstartup_helper_win.cc13 #include "sandbox/win/src/process_mitigations.h"
14 #include "sandbox/win/src/sandbox_factory.h"
38 void InitializeSandboxInfo(sandbox::SandboxInterfaceInfo* info) {
39 info->broker_services = sandbox::SandboxFactory::GetBrokerServices();
41 info->target_services = sandbox::SandboxFactory::GetTargetServices();
44 sandbox::ApplyProcessMitigationsToCurrentProcess(
45 sandbox::MITIGATION_DEP |
46 sandbox::MITIGATION_DEP_NO_ATL_THUNK);
/external/chromium_org/components/nacl/loader/nonsfi/
H A Dnonsfi_sandbox.h9 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
14 // The seccomp sandbox policy for NaCl non-SFI mode. Note that this
16 // depends on seccomp sandbox.
18 : public sandbox::bpf_dsl::SandboxBPFDSLPolicy {
23 virtual sandbox::bpf_dsl::ResultExpr EvaluateSyscall(
25 virtual sandbox::bpf_dsl::ResultExpr InvalidSyscall() const OVERRIDE;
31 // Initializes seccomp-bpf sandbox for non-SFI NaCl. Returns false on

Completed in 411 milliseconds

1234567891011>>