HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 201 - 225 of 851) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/chromium_org/components/nacl/loader/
nacl_helper_win_64.cc 22 #include "sandbox/win/src/sandbox_types.h"
49 sandbox::SandboxInterfaceInfo sandbox_info = {0};
65 // Initialize the sandbox for this process.
67 // Die if the sandbox can't be enabled.
68 CHECK(sandbox_initialized_ok) << "Error initializing sandbox for "
  /external/chromium_org/content/renderer/
renderer_main_platform_delegate_linux.cc 43 // The sandbox is started in the zygote process: zygote_main_linux.cc
49 // The setuid sandbox is started in the zygote process: zygote_main_linux.cc
67 // about:sandbox uses a value returned from LinuxSandbox::GetStatus() before
76 // Under the setuid sandbox, we should not be able to open any file via the
87 // but we know that under the seccomp-bpf sandbox, this should return EPERM.
  /external/chromium_org/remoting/webapp/
xhr_proxy.js 8 * The sandbox isn't allowed to make XHRs, so they have to be proxied to the
13 * creations by JS running in the sandbox.
74 console.error('Sandbox: unproxied getResponseHeader(' + header + ') called.');
78 console.error('Sandbox: unproxied getAllResponseHeaders called.');
82 console.error('Sandbox: unproxied overrideMimeType called.');
  /external/chromium_org/sandbox/linux/suid/client/
setuid_sandbox_client_unittest.cc 11 #include "sandbox/linux/suid/common/sandbox.h"
14 namespace sandbox { namespace
71 // Set-up a fake environment as if we went through the setuid sandbox.
93 } // namespace sandbox
  /external/chromium_org/sandbox/win/src/
handle_closer.h 13 #include "sandbox/win/src/interception.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/target_process.h"
17 namespace sandbox { namespace
73 } // namespace sandbox
process_thread_policy.h 10 #include "sandbox/win/src/policy_low_level.h"
14 #include "sandbox/win/src/crosscall_server.h"
15 #include "sandbox/win/src/sandbox_policy.h"
17 namespace sandbox { namespace
80 } // namespace sandbox
sync_policy.cc 7 #include "sandbox/win/src/sync_policy.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/policy_engine_opcodes.h"
14 #include "sandbox/win/src/policy_params.h"
15 #include "sandbox/win/src/sandbox_types.h"
16 #include "sandbox/win/src/sandbox_utils.h"
17 #include "sandbox/win/src/sync_interception.h"
18 #include "sandbox/win/src/win_utils.h"
20 namespace sandbox { namespace
    [all...]
filesystem_dispatcher.cc 5 #include "sandbox/win/src/filesystem_dispatcher.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/filesystem_interception.h"
9 #include "sandbox/win/src/filesystem_policy.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/policy_broker.h"
14 #include "sandbox/win/src/policy_params.h"
15 #include "sandbox/win/src/sandbox.h
18 namespace sandbox { namespace
    [all...]
process_policy_test.cc 13 #include "sandbox/win/src/sandbox.h"
14 #include "sandbox/win/src/sandbox_factory.h"
15 #include "sandbox/win/src/sandbox_policy.h"
16 #include "sandbox/win/tests/common/controller.h"
38 sandbox::SboxTestResult CreateProcessHelper(const string16& exe,
52 sandbox::SboxTestResult ret1 = sandbox::SBOX_TEST_FAILED;
57 ret1 = sandbox::SBOX_TEST_SUCCEEDED;
63 ret1 = sandbox::SBOX_TEST_DENIED
103 namespace sandbox { namespace
    [all...]
interceptors_64.cc 5 #include "sandbox/win/src/interceptors_64.h"
7 #include "sandbox/win/src/interceptors.h"
8 #include "sandbox/win/src/filesystem_interception.h"
9 #include "sandbox/win/src/named_pipe_interception.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/process_thread_interception.h"
12 #include "sandbox/win/src/registry_interception.h"
13 #include "sandbox/win/src/sandbox_nt_types.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/sync_interception.h
18 namespace sandbox { namespace
    [all...]
process_thread_dispatcher.cc 5 #include "sandbox/win/src/process_thread_dispatcher.h"
9 #include "sandbox/win/src/crosscall_client.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/policy_broker.h"
14 #include "sandbox/win/src/policy_params.h"
15 #include "sandbox/win/src/process_thread_interception.h"
16 #include "sandbox/win/src/process_thread_policy.h"
17 #include "sandbox/win/src/sandbox.h
95 namespace sandbox { namespace
    [all...]
app_container.cc 5 #include "sandbox/win/src/app_container.h"
13 #include "sandbox/win/src/internal_types.h"
28 HMODULE module = GetModuleHandle(sandbox::kKerneldllName);
31 module = GetModuleHandle(sandbox::kKernelBasedllName);
39 namespace sandbox { namespace
182 } // namespace sandbox
filesystem_policy.h 12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/nt_internals.h"
14 #include "sandbox/win/src/policy_low_level.h"
15 #include "sandbox/win/src/sandbox_policy.h"
17 namespace sandbox { namespace
106 } // namespace sandbox
  /external/openssh/
sandbox-darwin.c 23 #include <sandbox.h>
33 #include "sandbox.h"
36 /* Darwin/OS X sandbox */
51 debug3("%s: preparing Darwin sandbox", __func__);
64 debug3("%s: starting Darwin sandbox", __func__);
  /external/chromium_org/content/common/
handle_enumerator_win.cc 17 #include "sandbox/win/src/handle_table.h"
26 handle_types[sandbox::HandleTable::kTypeProcess] = ProcessHandle;
27 handle_types[sandbox::HandleTable::kTypeThread] = ThreadHandle;
28 handle_types[sandbox::HandleTable::kTypeFile] = FileHandle;
29 handle_types[sandbox::HandleTable::kTypeDirectory] = DirectoryHandle;
30 handle_types[sandbox::HandleTable::kTypeKey] = KeyHandle;
31 handle_types[sandbox::HandleTable::kTypeWindowStation] = WindowStationHandle;
32 handle_types[sandbox::HandleTable::kTypeDesktop] = DesktopHandle;
33 handle_types[sandbox::HandleTable::kTypeService] = ServiceHandle;
34 handle_types[sandbox::HandleTable::kTypeMutex] = MutexHandle
    [all...]
common.sb 7 ; included at the start of all other sandbox configuration files in Chrome.
11 ; printing on sandbox exceptions; this functionality only exists on 10.6. The
12 ; --enable-sandbox-logging flag or system versions <10.6 cause this flag to
  /external/chromium_org/chrome/common/extensions/docs/templates/articles/
sandboxingEval.html 36 <h2 id="why_sandbox">Why sandbox?</h2>
43 is the least of our worries. The solution on offer is a sandbox in which
59 <h2 id="creating_and_using">Creating and using a sandbox.</h2>
74 Each file that ought to be run inside a sandbox must be listed in the
75 extension manifest by adding a <code>sandbox</code> property. This is a
78 file cleverly named "sandbox.html". The manifest entry looks like this:
84 "sandbox": {
85 "pages": ["sandbox.html"]
96 <a href='/extensions/examples/howto/sandbox/sandbox.html'>sandbox.html</a
    [all...]
  /external/chromium_org/extensions/common/
csp_validator_unittest.cc 154 // Sandbox directive is required.
156 "sandbox", Manifest::TYPE_EXTENSION));
158 // Additional sandbox tokens are OK.
160 "sandbox allow-scripts", Manifest::TYPE_EXTENSION));
163 "sandbox allow-same-origin", Manifest::TYPE_EXTENSION));
167 "sandbox; img-src https://google.com", Manifest::TYPE_EXTENSION));
171 "sandbox allow-top-navigation", Manifest::TYPE_EXTENSION));
173 "sandbox allow-top-navigation", Manifest::TYPE_PLATFORM_APP));
177 "sandbox allow-popups", Manifest::TYPE_EXTENSION));
179 "sandbox allow-popups", Manifest::TYPE_PLATFORM_APP))
    [all...]
  /external/chromium_org/components/nacl/broker/
nacl_broker_listener.cc 21 #include "sandbox/win/src/sandbox_policy.h"
50 void NaClBrokerListener::PreSpawnTarget(sandbox::TargetPolicy* policy,
57 sandbox::ResultCode result = policy->AddRule(
58 sandbox::TargetPolicy::SUBSYS_NAMED_PIPES,
59 sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY,
61 *success = (result == sandbox::SBOX_ALL_OK);
  /external/chromium_org/content/ppapi_plugin/
ppapi_plugin_main.cc 25 #include "sandbox/win/src/sandbox.h"
38 sandbox::TargetServices* g_target_services = NULL;
48 // Windows-only skia sandbox support
105 // NSS must be initialized before enabling the sandbox below.
110 // before the sandbox is initialized.
  /external/chromium_org/content/zygote/
zygote_main_linux.cc 41 #include "sandbox/linux/services/libc_urandom_override.h"
42 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
102 // Sandbox interception of libc calls.
104 // Because we are running in a sandbox certain libc calls will fail (localtime
124 // the call to the browser over the sandbox IPC
256 // access to the plugins before entering the sandbox.
276 // to be created before imposing the sandbox.
291 // NSS libraries are loaded before sandbox is activated. This is to allow
300 // pre-sandbox init, but more likely this is just a build configuration error.
304 // Ensure access to the Pepper plugins before the sandbox is turned on
    [all...]
  /external/chromium_org/sandbox/linux/seccomp-bpf/
verifier.cc 7 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
8 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
9 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
10 #include "sandbox/linux/seccomp-bpf/verifier.h"
13 namespace sandbox { namespace
31 uint32_t EvaluateErrorCode(SandboxBPF* sandbox,
42 return sandbox->Unexpected64bitArgument().err();
46 return EvaluateErrorCode(sandbox,
54 return EvaluateErrorCode(sandbox,
63 return EvaluateErrorCode(sandbox,
    [all...]
  /external/chromium_org/sandbox/win/wow_helper/
wow_helper.cc 6 // sandbox a 32 bit application running on a 64 bit OS. The basic idea is to
15 #include "sandbox/win/wow_helper/service64_resolver.h"
16 #include "sandbox/win/wow_helper/target_code.h"
55 namespace sandbox { namespace
91 } // namespace sandbox
122 return sandbox::PatchNtdll(child, thunk, kPageSize);
  /external/chromium_org/testing/
test_env.py 22 sandbox and should enable it. This should return True iff the slave is a
23 Linux host with the sandbox file present and configured correctly."""
37 """Checks enables the sandbox if it is required, otherwise it disables it."""
42 print 'Enabling sandbox. Setting environment variable:'
47 print 'Sandbox not properly installed. Unsetting:'
50 # the variable empty silently disables the sandbox.
  /external/chromium_org/sandbox/win/
sandbox_win.gypi 14 # of the Windows sandbox library.
106 'src/sandbox.cc',
107 'src/sandbox.h',
171 'target_name': 'sandbox',
211 'sandbox',
242 'sandbox',
258 'sandbox',
283 'sandbox',
290 'sandbox_poc/sandbox.cc',
291 'sandbox_poc/sandbox.h'
    [all...]

Completed in 463 milliseconds

1 2 3 4 5 6 7 891011>>