/external/chromium_org/sandbox/win/src/ |
registry_interception.cc | 5 #include "sandbox/win/src/registry_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/sandbox_factory.h" 10 #include "sandbox/win/src/sandbox_nt_util.h" 11 #include "sandbox/win/src/sharedmem_ipc_client.h" 12 #include "sandbox/win/src/target_services.h" 14 namespace sandbox { namespace 176 } // namespace sandbox
|
registry_policy.cc | 7 #include "sandbox/win/src/registry_policy.h" 10 #include "sandbox/win/src/ipc_tags.h" 11 #include "sandbox/win/src/policy_engine_opcodes.h" 12 #include "sandbox/win/src/policy_params.h" 13 #include "sandbox/win/src/sandbox_utils.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/win_utils.h" 115 namespace sandbox { namespace 225 } // namespace sandbox
|
resolver_32.cc | 5 #include "sandbox/win/src/resolver.h" 7 #include "sandbox/win/src/sandbox_nt_util.h" 57 namespace sandbox { namespace 88 } // namespace sandbox
|
sandbox_nt_util.h | 11 #include "sandbox/win/src/nt_internals.h" 12 #include "sandbox/win/src/sandbox_nt_types.h" 15 void* __cdecl operator new(size_t size, sandbox::AllocationType type, 17 void __cdecl operator delete(void* memory, sandbox::AllocationType type); 22 void __cdecl operator delete(void* memory, sandbox::AllocationType type, 27 sandbox::AllocationType type); 29 sandbox::AllocationType type); 52 namespace sandbox { namespace 183 } // namespace sandbox
|
sandbox_policy_base.h | 16 #include "sandbox/win/src/crosscall_server.h" 17 #include "sandbox/win/src/handle_closer.h" 18 #include "sandbox/win/src/ipc_tags.h" 19 #include "sandbox/win/src/policy_engine_opcodes.h" 20 #include "sandbox/win/src/policy_engine_params.h" 21 #include "sandbox/win/src/sandbox_policy.h" 22 #include "sandbox/win/src/win_utils.h" 24 namespace sandbox { namespace 158 } // namespace sandbox
|
sandbox_types.h | 8 namespace sandbox { namespace 10 // Operation result codes returned by the sandbox API. 52 // If the sandbox cannot create a secure environment for the target, the 89 } // namespace sandbox
|
win_utils_unittest.cc | 8 #include "sandbox/win/src/win_utils.h" 9 #include "sandbox/win/tests/common/test_utils.h" 13 using sandbox::IsReparsePoint; 55 using sandbox::SameObject;
|
filesystem_interception.cc | 5 #include "sandbox/win/src/filesystem_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_params.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/sandbox_nt_util.h" 13 #include "sandbox/win/src/sharedmem_ipc_client.h" 14 #include "sandbox/win/src/target_services.h" 16 namespace sandbox { namespace [all...] |
handle_closer.cc | 5 #include "sandbox/win/src/handle_closer.h" 10 #include "sandbox/win/src/interceptors.h" 11 #include "sandbox/win/src/internal_types.h" 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/process_thread_interception.h" 14 #include "sandbox/win/src/win_utils.h" 30 namespace sandbox { namespace 202 } // namespace sandbox
|
/external/chromium_org/third_party/WebKit/PerformanceTests/Parser/ |
html-parser.html | 10 iframe.sandbox = 'allow-same-origin'; // Prevent external script loads which could cause write() to return before completing the parse.
|
/external/chromium_org/ui/metro_viewer/ |
OWNERS | 2 # new sandbox escapes.
|
/external/chromium_org/webkit/child/ |
webkit_child_helpers.h | 16 // computed inside the sandbox and thus its not always accurate.
|
/external/openssh/ |
sandbox-rlimit.c | 1 /* $OpenBSD: sandbox-rlimit.c,v 1.3 2011/06/23 09:34:13 djm Exp $ */ 35 #include "ssh-sandbox.h" 38 /* Minimal sandbox that sets zero nfiles, nprocs and filesize rlimits */ 53 debug3("%s: preparing rlimit sandbox", __func__);
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
sandbox_bpf.h | 20 #include "sandbox/linux/seccomp-bpf/die.h" 21 #include "sandbox/linux/seccomp-bpf/errorcode.h" 22 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 24 namespace sandbox { namespace 51 STATUS_ENABLED // The sandbox is now active 55 // pointer in |aux|. This pointer will then be forwarded to the sandbox 68 // NOTE: Setting a policy and starting the sandbox is a one-way operation. 70 // sandbox. Strictly speaking, that means we should disallow calling 72 // this makes it needlessly complicated to operate on "Sandbox" 85 // There are a lot of reasons why the Seccomp sandbox might not be available [all...] |
sandbox_bpf.cc | 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 27 #include "sandbox/linux/seccomp-bpf/codegen.h" 28 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 29 #include "sandbox/linux/seccomp-bpf/syscall.h" 30 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h" 31 #include "sandbox/linux/seccomp-bpf/verifier.h" 33 namespace sandbox { namespace 57 // We define a really simple sandbox policy. It is just good enough for us 58 // to tell that the sandbox has actually been activated. 157 // This means, we must conditionally disable the sandbox -- and that's no 165 SandboxBPF* sandbox = static_cast<SandboxBPF*>(aux); local 411 SandboxBPF sandbox; local [all...] |
demo.cc | 30 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 31 #include "sandbox/linux/services/linux_syscalls.h" 33 using sandbox::ErrorCode; 34 using sandbox::SandboxBPF; 35 using sandbox::arch_seccomp_data; 39 // We don't expect our sandbox to do anything useful yet. So, we will fail 41 // following line should be removed as soon as the sandbox is starting to 216 // log the system call and then deny it. More elaborate sandbox policies 240 ErrorCode Evaluator(SandboxBPF* sandbox, int sysno, void *) { 329 return sandbox->Cond(1, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL 421 SandboxBPF sandbox; local [all...] |
syscall_unittest.cc | 15 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 17 #include "sandbox/linux/seccomp-bpf/syscall.h" 18 #include "sandbox/linux/tests/unit_tests.h" 21 namespace sandbox { namespace 81 ErrorCode CopyAllArgsOnUnamePolicy(SandboxBPF* sandbox, int sysno, void* aux) { 86 return sandbox->Trap(CopySyscallArgsToAux, aux); 201 } // namespace sandbox
|
/external/chromium_org/ash/shell/ |
shell_main.cc | 7 #include "sandbox/win/src/sandbox_types.h" 26 sandbox::SandboxInterfaceInfo sandbox_info = {0};
|
/external/chromium_org/chrome/app/ |
chrome_main.cc | 17 sandbox::SandboxInterfaceInfo* sandbox_info); 28 sandbox::SandboxInterfaceInfo* sandbox_info) {
|
/external/chromium_org/content/public/app/ |
content_main.h | 15 namespace sandbox { namespace 32 sandbox::SandboxInterfaceInfo* sandbox_info,
|
content_main_runner.h | 16 namespace sandbox { namespace 38 sandbox::SandboxInterfaceInfo* sandbox_info,
|
/external/chromium_org/content/shell/app/ |
shell_main.cc | 8 #include "sandbox/win/src/sandbox_types.h" 21 sandbox::SandboxInterfaceInfo sandbox_info = {0};
|
/external/chromium_org/extensions/common/manifest_handlers/ |
sandboxed_page_info.h | 36 // Content Security Policy that should be used to enforce the sandbox used 37 // by sandboxed pages (guaranteed to have the "sandbox" directive without the
|
/external/chromium_org/sandbox/linux/ |
sandbox_linux.gypi | 41 # We have two principal targets: sandbox and sandbox_linux_unittests 43 # FIXME(jln): for historial reasons, sandbox_linux is the setuid sandbox 46 'target_name': 'sandbox', 149 # A demonstration program for the seccomp-bpf sandbox. 169 # The setuid sandbox, for Linux 173 'suid/common/sandbox.h', 179 'suid/sandbox.c', 253 'suid/common/sandbox.h',
|
/external/chromium_org/sandbox/linux/tests/ |
unit_tests.h | 12 namespace sandbox { namespace 36 #define DEATH_SUCCESS() sandbox::UnitTests::DeathSuccess, NULL 38 sandbox::UnitTests::DeathMessage, \ 41 sandbox::UnitTests::DeathExitCode, \ 44 sandbox::UnitTests::DeathExitCode, \ 54 sandbox::UnitTests::RunTestInProcess(TEST_##test_name, NULL, death); \ 60 // changes to the system (i.e. they install a sandbox). GTest provides death 69 ((expr) ? static_cast<void>(0) : sandbox::UnitTests::AssertionFailure( \
|