/external/chromium_org/sandbox/ |
sandbox.target.darwin-mips.mk | 7 LOCAL_MODULE_STEM := sandbox 28 .PHONY: sandbox 29 sandbox: sandbox_sandbox_gyp
|
sandbox.target.darwin-x86.mk | 7 LOCAL_MODULE_STEM := sandbox 29 .PHONY: sandbox 30 sandbox: sandbox_sandbox_gyp
|
sandbox.target.linux-arm.mk | 7 LOCAL_MODULE_STEM := sandbox 29 .PHONY: sandbox 30 sandbox: sandbox_sandbox_gyp
|
sandbox.target.linux-mips.mk | 7 LOCAL_MODULE_STEM := sandbox 28 .PHONY: sandbox 29 sandbox: sandbox_sandbox_gyp
|
sandbox.target.linux-x86.mk | 7 LOCAL_MODULE_STEM := sandbox 29 .PHONY: sandbox 30 sandbox: sandbox_sandbox_gyp
|
/external/chromium_org/sandbox/win/src/ |
Wow64.h | 11 #include "sandbox/win/src/sandbox_types.h" 13 namespace sandbox { namespace 48 } // namespace sandbox
|
acl.h | 11 #include "sandbox/win/src/sid.h" 13 namespace sandbox { namespace 38 } // namespace sandbox
|
service_resolver.cc | 5 #include "sandbox/win/src/service_resolver.h" 10 namespace sandbox { namespace 42 } // namespace sandbox
|
window.h | 11 #include "sandbox/win/src/sandbox_types.h" 13 namespace sandbox { namespace 37 } // namespace sandbox
|
sandbox.h | 5 // Sandbox is a sandbox library for windows processes. Use when you want a 16 // there are cases where the Sandbox library is linked against the main .exe 25 #include "sandbox/win/src/sandbox_policy.h" 26 #include "sandbox/win/src/sandbox_types.h" 28 // sandbox: Google User-Land Application Sandbox 29 namespace sandbox { namespace 58 // interface to specify the sandbox policy for new processes created by 69 // policy: This is the pointer to the policy object for the sandbox t [all...] |
handle_closer.h | 13 #include "sandbox/win/src/interception.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/target_process.h" 17 namespace sandbox { namespace 73 } // namespace sandbox
|
process_thread_policy.h | 10 #include "sandbox/win/src/policy_low_level.h" 13 #include "sandbox/win/src/crosscall_server.h" 14 #include "sandbox/win/src/sandbox_policy.h" 16 namespace sandbox { namespace 79 } // namespace sandbox
|
filesystem_dispatcher.cc | 5 #include "sandbox/win/src/filesystem_dispatcher.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/filesystem_interception.h" 9 #include "sandbox/win/src/filesystem_policy.h" 10 #include "sandbox/win/src/interception.h" 11 #include "sandbox/win/src/interceptors.h" 12 #include "sandbox/win/src/ipc_tags.h" 13 #include "sandbox/win/src/policy_broker.h" 14 #include "sandbox/win/src/policy_params.h" 15 #include "sandbox/win/src/sandbox.h 18 namespace sandbox { namespace [all...] |
process_policy_test.cc | 13 #include "sandbox/win/src/sandbox.h" 14 #include "sandbox/win/src/sandbox_factory.h" 15 #include "sandbox/win/src/sandbox_policy.h" 16 #include "sandbox/win/tests/common/controller.h" 38 sandbox::SboxTestResult CreateProcessHelper(const string16& exe, 52 sandbox::SboxTestResult ret1 = sandbox::SBOX_TEST_FAILED; 59 ret1 = sandbox::SBOX_TEST_DENIED; 61 ret1 = sandbox::SBOX_TEST_FAILED 100 namespace sandbox { namespace [all...] |
interceptors_64.cc | 5 #include "sandbox/win/src/interceptors_64.h" 7 #include "sandbox/win/src/interceptors.h" 8 #include "sandbox/win/src/filesystem_interception.h" 9 #include "sandbox/win/src/named_pipe_interception.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/process_thread_interception.h" 12 #include "sandbox/win/src/registry_interception.h" 13 #include "sandbox/win/src/sandbox_nt_types.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/sync_interception.h 18 namespace sandbox { namespace [all...] |
process_thread_dispatcher.cc | 5 #include "sandbox/win/src/process_thread_dispatcher.h" 9 #include "sandbox/win/src/crosscall_client.h" 10 #include "sandbox/win/src/interception.h" 11 #include "sandbox/win/src/interceptors.h" 12 #include "sandbox/win/src/ipc_tags.h" 13 #include "sandbox/win/src/policy_broker.h" 14 #include "sandbox/win/src/policy_params.h" 15 #include "sandbox/win/src/process_thread_interception.h" 16 #include "sandbox/win/src/process_thread_policy.h" 17 #include "sandbox/win/src/sandbox.h 95 namespace sandbox { namespace [all...] |
/external/chromium_org/content/common/ |
sandbox_linux.cc | 24 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 33 "Activated " + sandbox_name + " sandbox for process type: " + 72 setuid_sandbox_client_(sandbox::SetuidSandboxClient::Create()) { 74 LOG(FATAL) << "Failed to instantiate the setuid sandbox client."; 88 // ASan API call to notify the tool the sandbox is going to be turned on. 96 // ASan needs to open some resources before the sandbox is enabled. 103 // produce a sandbox escape in Release mode. 110 VLOG(1) << "Lacking support for seccomp-bpf sandbox."; 121 // We need to make absolutely sure that our sandbox is "sealed" before 134 // TSAN starts a helper thread. So we don't start the sandbox and don' [all...] |
handle_enumerator_win.cc | 17 #include "sandbox/win/src/handle_table.h" 26 handle_types[sandbox::HandleTable::kTypeProcess] = ProcessHandle; 27 handle_types[sandbox::HandleTable::kTypeThread] = ThreadHandle; 28 handle_types[sandbox::HandleTable::kTypeFile] = FileHandle; 29 handle_types[sandbox::HandleTable::kTypeDirectory] = DirectoryHandle; 30 handle_types[sandbox::HandleTable::kTypeKey] = KeyHandle; 31 handle_types[sandbox::HandleTable::kTypeWindowStation] = WindowStationHandle; 32 handle_types[sandbox::HandleTable::kTypeDesktop] = DesktopHandle; 33 handle_types[sandbox::HandleTable::kTypeService] = ServiceHandle; 34 handle_types[sandbox::HandleTable::kTypeMutex] = MutexHandle [all...] |
/external/chromium_org/components/nacl/loader/ |
nacl_main_platform_delegate_mac.mm | 44 // Be sure not to load the sandbox test DLL if the sandbox isn't on. 46 // TODO(jvoung): allow testing without sandbox, but change expected ret vals. 60 << "Error initializing sandbox for " << switches::kNaClLoaderProcess; 75 VLOG(1) << "Failed to get NaCl sandbox test function";
|
/external/chromium_org/content/renderer/ |
renderer_main_platform_delegate_linux.cc | 43 // The sandbox is started in the zygote process: zygote_main_linux.cc 49 // The setuid sandbox is started in the zygote process: zygote_main_linux.cc 67 // about:sandbox uses a value returned from LinuxSandbox::GetStatus() before 76 // Under the setuid sandbox, we should not be able to open any file via the 87 // but we know that under the seccomp-bpf sandbox, this should return EPERM.
|
/external/chromium_org/remoting/webapp/ |
xhr_proxy.js | 8 * The sandbox isn't allowed to make XHRs, so they have to be proxied to the 13 * creations by JS running in the sandbox. 74 console.error('Sandbox: unproxied getResponseHeader(' + header + ') called.'); 78 console.error('Sandbox: unproxied getAllResponseHeaders called.'); 82 console.error('Sandbox: unproxied overrideMimeType called.');
|
/external/chromium_org/sandbox/linux/suid/client/ |
setuid_sandbox_client_unittest.cc | 11 #include "sandbox/linux/suid/common/sandbox.h" 14 namespace sandbox { namespace 71 // Set-up a fake environment as if we went through the setuid sandbox. 93 } // namespace sandbox
|
/external/openssh/ |
sandbox-darwin.c | 23 #include <sandbox.h> 33 #include "sandbox.h" 36 /* Darwin/OS X sandbox */ 51 debug3("%s: preparing Darwin sandbox", __func__); 64 debug3("%s: starting Darwin sandbox", __func__);
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
verifier.cc | 7 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 8 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h" 9 #include "sandbox/linux/seccomp-bpf/verifier.h" 15 using playground2::Sandbox; 38 uint32_t EvaluateErrorCode(Sandbox *sandbox, const ErrorCode& code, 48 return sandbox->Unexpected64bitArgument().err(); 52 return EvaluateErrorCode(sandbox, 60 return EvaluateErrorCode(sandbox, 69 return EvaluateErrorCode(sandbox, [all...] |
/external/chromium_org/chrome/common/extensions/ |
csp_validator_unittest.cc | 154 // Sandbox directive is required. 156 "sandbox", Manifest::TYPE_EXTENSION)); 158 // Additional sandbox tokens are OK. 160 "sandbox allow-scripts", Manifest::TYPE_EXTENSION)); 163 "sandbox allow-same-origin", Manifest::TYPE_EXTENSION)); 167 "sandbox; img-src https://google.com", Manifest::TYPE_EXTENSION)); 171 "sandbox allow-top-navigation", Manifest::TYPE_EXTENSION)); 173 "sandbox allow-top-navigation", Manifest::TYPE_PLATFORM_APP)); 177 "sandbox allow-popups", Manifest::TYPE_EXTENSION)); 179 "sandbox allow-popups", Manifest::TYPE_PLATFORM_APP)) [all...] |