/external/chromium_org/components/nacl/loader/ |
nacl_helper_win_64.cc | 22 #include "sandbox/win/src/sandbox_types.h" 49 sandbox::SandboxInterfaceInfo sandbox_info = {0}; 65 // Initialize the sandbox for this process. 67 // Die if the sandbox can't be enabled. 68 CHECK(sandbox_initialized_ok) << "Error initializing sandbox for "
|
/external/chromium_org/content/renderer/ |
renderer_main_platform_delegate_linux.cc | 43 // The sandbox is started in the zygote process: zygote_main_linux.cc 49 // The setuid sandbox is started in the zygote process: zygote_main_linux.cc 67 // about:sandbox uses a value returned from LinuxSandbox::GetStatus() before 76 // Under the setuid sandbox, we should not be able to open any file via the 87 // but we know that under the seccomp-bpf sandbox, this should return EPERM.
|
/external/chromium_org/remoting/webapp/ |
xhr_proxy.js | 8 * The sandbox isn't allowed to make XHRs, so they have to be proxied to the 13 * creations by JS running in the sandbox. 74 console.error('Sandbox: unproxied getResponseHeader(' + header + ') called.'); 78 console.error('Sandbox: unproxied getAllResponseHeaders called.'); 82 console.error('Sandbox: unproxied overrideMimeType called.');
|
/external/chromium_org/sandbox/linux/suid/client/ |
setuid_sandbox_client_unittest.cc | 11 #include "sandbox/linux/suid/common/sandbox.h" 14 namespace sandbox { namespace 71 // Set-up a fake environment as if we went through the setuid sandbox. 93 } // namespace sandbox
|
/external/chromium_org/sandbox/win/src/ |
handle_closer.h | 13 #include "sandbox/win/src/interception.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/target_process.h" 17 namespace sandbox { namespace 73 } // namespace sandbox
|
process_thread_policy.h | 10 #include "sandbox/win/src/policy_low_level.h" 14 #include "sandbox/win/src/crosscall_server.h" 15 #include "sandbox/win/src/sandbox_policy.h" 17 namespace sandbox { namespace 80 } // namespace sandbox
|
sync_policy.cc | 7 #include "sandbox/win/src/sync_policy.h" 11 #include "sandbox/win/src/ipc_tags.h" 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/policy_engine_opcodes.h" 14 #include "sandbox/win/src/policy_params.h" 15 #include "sandbox/win/src/sandbox_types.h" 16 #include "sandbox/win/src/sandbox_utils.h" 17 #include "sandbox/win/src/sync_interception.h" 18 #include "sandbox/win/src/win_utils.h" 20 namespace sandbox { namespace [all...] |
filesystem_dispatcher.cc | 5 #include "sandbox/win/src/filesystem_dispatcher.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/filesystem_interception.h" 9 #include "sandbox/win/src/filesystem_policy.h" 10 #include "sandbox/win/src/interception.h" 11 #include "sandbox/win/src/interceptors.h" 12 #include "sandbox/win/src/ipc_tags.h" 13 #include "sandbox/win/src/policy_broker.h" 14 #include "sandbox/win/src/policy_params.h" 15 #include "sandbox/win/src/sandbox.h 18 namespace sandbox { namespace [all...] |
process_policy_test.cc | 13 #include "sandbox/win/src/sandbox.h" 14 #include "sandbox/win/src/sandbox_factory.h" 15 #include "sandbox/win/src/sandbox_policy.h" 16 #include "sandbox/win/tests/common/controller.h" 38 sandbox::SboxTestResult CreateProcessHelper(const string16& exe, 52 sandbox::SboxTestResult ret1 = sandbox::SBOX_TEST_FAILED; 57 ret1 = sandbox::SBOX_TEST_SUCCEEDED; 63 ret1 = sandbox::SBOX_TEST_DENIED 103 namespace sandbox { namespace [all...] |
interceptors_64.cc | 5 #include "sandbox/win/src/interceptors_64.h" 7 #include "sandbox/win/src/interceptors.h" 8 #include "sandbox/win/src/filesystem_interception.h" 9 #include "sandbox/win/src/named_pipe_interception.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/process_thread_interception.h" 12 #include "sandbox/win/src/registry_interception.h" 13 #include "sandbox/win/src/sandbox_nt_types.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/sync_interception.h 18 namespace sandbox { namespace [all...] |
process_thread_dispatcher.cc | 5 #include "sandbox/win/src/process_thread_dispatcher.h" 9 #include "sandbox/win/src/crosscall_client.h" 10 #include "sandbox/win/src/interception.h" 11 #include "sandbox/win/src/interceptors.h" 12 #include "sandbox/win/src/ipc_tags.h" 13 #include "sandbox/win/src/policy_broker.h" 14 #include "sandbox/win/src/policy_params.h" 15 #include "sandbox/win/src/process_thread_interception.h" 16 #include "sandbox/win/src/process_thread_policy.h" 17 #include "sandbox/win/src/sandbox.h 95 namespace sandbox { namespace [all...] |
app_container.cc | 5 #include "sandbox/win/src/app_container.h" 13 #include "sandbox/win/src/internal_types.h" 28 HMODULE module = GetModuleHandle(sandbox::kKerneldllName); 31 module = GetModuleHandle(sandbox::kKernelBasedllName); 39 namespace sandbox { namespace 182 } // namespace sandbox
|
filesystem_policy.h | 12 #include "sandbox/win/src/crosscall_server.h" 13 #include "sandbox/win/src/nt_internals.h" 14 #include "sandbox/win/src/policy_low_level.h" 15 #include "sandbox/win/src/sandbox_policy.h" 17 namespace sandbox { namespace 106 } // namespace sandbox
|
/external/openssh/ |
sandbox-darwin.c | 23 #include <sandbox.h> 33 #include "sandbox.h" 36 /* Darwin/OS X sandbox */ 51 debug3("%s: preparing Darwin sandbox", __func__); 64 debug3("%s: starting Darwin sandbox", __func__);
|
/external/chromium_org/content/common/ |
handle_enumerator_win.cc | 17 #include "sandbox/win/src/handle_table.h" 26 handle_types[sandbox::HandleTable::kTypeProcess] = ProcessHandle; 27 handle_types[sandbox::HandleTable::kTypeThread] = ThreadHandle; 28 handle_types[sandbox::HandleTable::kTypeFile] = FileHandle; 29 handle_types[sandbox::HandleTable::kTypeDirectory] = DirectoryHandle; 30 handle_types[sandbox::HandleTable::kTypeKey] = KeyHandle; 31 handle_types[sandbox::HandleTable::kTypeWindowStation] = WindowStationHandle; 32 handle_types[sandbox::HandleTable::kTypeDesktop] = DesktopHandle; 33 handle_types[sandbox::HandleTable::kTypeService] = ServiceHandle; 34 handle_types[sandbox::HandleTable::kTypeMutex] = MutexHandle [all...] |
common.sb | 7 ; included at the start of all other sandbox configuration files in Chrome. 11 ; printing on sandbox exceptions; this functionality only exists on 10.6. The 12 ; --enable-sandbox-logging flag or system versions <10.6 cause this flag to
|
/external/chromium_org/chrome/common/extensions/docs/templates/articles/ |
sandboxingEval.html | 36 <h2 id="why_sandbox">Why sandbox?</h2> 43 is the least of our worries. The solution on offer is a sandbox in which 59 <h2 id="creating_and_using">Creating and using a sandbox.</h2> 74 Each file that ought to be run inside a sandbox must be listed in the 75 extension manifest by adding a <code>sandbox</code> property. This is a 78 file cleverly named "sandbox.html". The manifest entry looks like this: 84 "sandbox": { 85 "pages": ["sandbox.html"] 96 <a href='/extensions/examples/howto/sandbox/sandbox.html'>sandbox.html</a [all...] |
/external/chromium_org/extensions/common/ |
csp_validator_unittest.cc | 154 // Sandbox directive is required. 156 "sandbox", Manifest::TYPE_EXTENSION)); 158 // Additional sandbox tokens are OK. 160 "sandbox allow-scripts", Manifest::TYPE_EXTENSION)); 163 "sandbox allow-same-origin", Manifest::TYPE_EXTENSION)); 167 "sandbox; img-src https://google.com", Manifest::TYPE_EXTENSION)); 171 "sandbox allow-top-navigation", Manifest::TYPE_EXTENSION)); 173 "sandbox allow-top-navigation", Manifest::TYPE_PLATFORM_APP)); 177 "sandbox allow-popups", Manifest::TYPE_EXTENSION)); 179 "sandbox allow-popups", Manifest::TYPE_PLATFORM_APP)) [all...] |
/external/chromium_org/components/nacl/broker/ |
nacl_broker_listener.cc | 21 #include "sandbox/win/src/sandbox_policy.h" 50 void NaClBrokerListener::PreSpawnTarget(sandbox::TargetPolicy* policy, 57 sandbox::ResultCode result = policy->AddRule( 58 sandbox::TargetPolicy::SUBSYS_NAMED_PIPES, 59 sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY, 61 *success = (result == sandbox::SBOX_ALL_OK);
|
/external/chromium_org/content/ppapi_plugin/ |
ppapi_plugin_main.cc | 25 #include "sandbox/win/src/sandbox.h" 38 sandbox::TargetServices* g_target_services = NULL; 48 // Windows-only skia sandbox support 105 // NSS must be initialized before enabling the sandbox below. 110 // before the sandbox is initialized.
|
/external/chromium_org/content/zygote/ |
zygote_main_linux.cc | 41 #include "sandbox/linux/services/libc_urandom_override.h" 42 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 102 // Sandbox interception of libc calls. 104 // Because we are running in a sandbox certain libc calls will fail (localtime 124 // the call to the browser over the sandbox IPC 256 // access to the plugins before entering the sandbox. 276 // to be created before imposing the sandbox. 291 // NSS libraries are loaded before sandbox is activated. This is to allow 300 // pre-sandbox init, but more likely this is just a build configuration error. 304 // Ensure access to the Pepper plugins before the sandbox is turned on [all...] |
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
verifier.cc | 7 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 8 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 9 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h" 10 #include "sandbox/linux/seccomp-bpf/verifier.h" 13 namespace sandbox { namespace 31 uint32_t EvaluateErrorCode(SandboxBPF* sandbox, 42 return sandbox->Unexpected64bitArgument().err(); 46 return EvaluateErrorCode(sandbox, 54 return EvaluateErrorCode(sandbox, 63 return EvaluateErrorCode(sandbox, [all...] |
/external/chromium_org/sandbox/win/wow_helper/ |
wow_helper.cc | 6 // sandbox a 32 bit application running on a 64 bit OS. The basic idea is to 15 #include "sandbox/win/wow_helper/service64_resolver.h" 16 #include "sandbox/win/wow_helper/target_code.h" 55 namespace sandbox { namespace 91 } // namespace sandbox 122 return sandbox::PatchNtdll(child, thunk, kPageSize);
|
/external/chromium_org/testing/ |
test_env.py | 22 sandbox and should enable it. This should return True iff the slave is a 23 Linux host with the sandbox file present and configured correctly.""" 37 """Checks enables the sandbox if it is required, otherwise it disables it.""" 42 print 'Enabling sandbox. Setting environment variable:' 47 print 'Sandbox not properly installed. Unsetting:' 50 # the variable empty silently disables the sandbox.
|
/external/chromium_org/sandbox/win/ |
sandbox_win.gypi | 14 # of the Windows sandbox library. 106 'src/sandbox.cc', 107 'src/sandbox.h', 171 'target_name': 'sandbox', 211 'sandbox', 242 'sandbox', 258 'sandbox', 283 'sandbox', 290 'sandbox_poc/sandbox.cc', 291 'sandbox_poc/sandbox.h' [all...] |