/external/chromium_org/content/common/sandbox_linux/ |
sandbox_seccomp_bpf_linux.cc | 35 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h" 36 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 37 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" 38 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 39 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 40 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 41 #include "sandbox/linux/services/linux_syscalls.h" 43 using sandbox::BaselinePolicy; 44 using sandbox::SyscallSets; 50 void StartSandboxWithPolicy(sandbox::SandboxBPFPolicy* policy) 154 SandboxBPF sandbox; local [all...] |
/external/chromium_org/content/common/ |
sandbox_win.cc | 29 #include "sandbox/win/src/process_mitigations.h" 30 #include "sandbox/win/src/sandbox.h" 31 #include "sandbox/win/src/sandbox_nt_util.h" 32 #include "sandbox/win/src/win_utils.h" 34 static sandbox::BrokerServices* g_broker_services = NULL; 35 static sandbox::TargetServices* g_target_services = NULL; 113 sandbox::TargetPolicy::Semantics access, 114 sandbox::TargetPolicy* policy) { 122 sandbox::ResultCode result [all...] |
sandbox_mac_diraccess_unittest.mm | 9 #include <sandbox.h> 29 // Tests need to be in the same namespace as the Sandbox class to be useable 68 EXPECT_TRUE(Sandbox::QuotePlainString(in, &out)); 91 EXPECT_FALSE(Sandbox::QuoteStringForRegex(fail_string, &out)); 92 EXPECT_TRUE(Sandbox::QuoteStringForRegex(ok_string, &out)); 99 EXPECT_TRUE(Sandbox::QuoteStringForRegex("}", &out)); // } == 0x7D == 125 100 EXPECT_FALSE(Sandbox::QuoteStringForRegex("~", &out)); // ~ == 0x7E == 126 102 Sandbox::QuoteStringForRegex(WideToUTF8(L"^\u2135.\u2136$"), &out)); 109 EXPECT_TRUE(Sandbox::QuoteStringForRegex(in, &out)); 128 EXPECT_TRUE(Sandbox::QuoteStringForRegex(in_utf8, &out)) [all...] |
sandbox_mac.h | 30 // Class representing a substring of the sandbox profile tagged with its type. 57 class CONTENT_EXPORT Sandbox { 64 // sandbox is turned on. |sandbox_type| is the type of sandbox to warm up. 70 // Turns on the OS X sandbox for this process. 71 // |sandbox_type| - type of Sandbox to use. See SandboxWarmup() for legal 73 // |allowed_dir| - directory to allow access to, currently the only sandbox 76 // Returns true on success, false if an error occurred enabling the sandbox. 80 // Returns true if the sandbox has been enabled for the current process. 86 // Build the Sandbox command necessary to allow access to a named director [all...] |
sandbox_mac_unittest_helper.h | 13 // Helpers for writing unit tests that runs in the context of the Mac sandbox. 17 // its functions to run code before or after the sandbox is initialised in a 28 // .. test code that runs in sandbox goes here .. 43 // a given test in the sandbox. 46 // Runs a test specified by |test_name| in a sandbox of the type specified 48 // to the child process runing in the sandbox, or NULL if additional data is 56 // Runs the test specified by |test_name| in all the different sandbox types 63 // Additional sandbox types defined by the embedder (e.g. the NaCl sandbox) 69 // Class to ease writing test cases that run inside the OS X sandbox [all...] |
sandbox_mac_unittest_helper.mm | 8 #include <sandbox.h> 54 // Go through all the sandbox types, and run the test case in each of them 63 "Failed in sandbox type " << i << 113 LOG(ERROR) << "Couldn't find sandbox test case(" << name << ")"; 120 // Main function for driver process that enables the sandbox and runs test 128 LOG(ERROR) << "Sandbox type not specified"; 134 LOG(ERROR) << "Sandbox test name not specified"; 144 LOG(ERROR) << "Invalid sandbox test name (" << sandbox_test_name << ")"; 152 LOG(ERROR) << sandbox_test_name << "Failed test before sandbox init"; 156 Sandbox::SandboxWarmup(sandbox_type) [all...] |
/external/chromium_org/sandbox/win/tools/launcher/ |
launcher.cc | 5 #include "sandbox/win/src/restricted_token_utils.h" 27 sandbox::TokenLevel* level) { 29 *level = sandbox::USER_LOCKDOWN; 31 *level = sandbox::USER_RESTRICTED; 33 *level = sandbox::USER_LIMITED; 35 *level = sandbox::USER_INTERACTIVE; 37 *level = sandbox::USER_NON_ADMIN; 39 *level = sandbox::USER_RESTRICTED_SAME_ACCESS; 41 *level = sandbox::USER_UNPROTECTED; 49 bool GetJobLevelFromString(const wchar_t *param, sandbox::JobLevel* level) [all...] |
/external/chromium_org/sandbox/win/src/ |
process_mitigations_test.cc | 9 #include "sandbox/win/src/nt_internals.h" 10 #include "sandbox/win/src/process_mitigations.h" 11 #include "sandbox/win/src/sandbox.h" 12 #include "sandbox/win/src/sandbox_factory.h" 13 #include "sandbox/win/src/sandbox_utils.h" 14 #include "sandbox/win/src/target_services.h" 15 #include "sandbox/win/src/win_utils.h" 16 #include "sandbox/win/tests/common/controller.h" 85 namespace sandbox { namespace [all...] |
integrity_level_test.cc | 10 #include "sandbox/win/src/sandbox.h" 11 #include "sandbox/win/src/sandbox_policy.h" 12 #include "sandbox/win/src/sandbox_factory.h" 13 #include "sandbox/win/tests/common/controller.h" 15 namespace sandbox { namespace 90 } // namespace sandbox
|
named_pipe_policy.cc | 5 #include "sandbox/win/src/named_pipe_policy.h" 9 #include "sandbox/win/src/ipc_tags.h" 10 #include "sandbox/win/src/policy_engine_opcodes.h" 11 #include "sandbox/win/src/policy_params.h" 12 #include "sandbox/win/src/sandbox_types.h" 43 namespace sandbox { namespace 86 } // namespace sandbox
|
target_interceptions.cc | 5 #include "sandbox/win/src/target_interceptions.h" 7 #include "sandbox/win/src/interception_agent.h" 8 #include "sandbox/win/src/sandbox_factory.h" 9 #include "sandbox/win/src/sandbox_nt_util.h" 10 #include "sandbox/win/src/target_services.h" 12 namespace sandbox { namespace 100 } // namespace sandbox
|
named_pipe_dispatcher.cc | 5 #include "sandbox/win/src/named_pipe_dispatcher.h" 10 #include "sandbox/win/src/crosscall_client.h" 11 #include "sandbox/win/src/interception.h" 12 #include "sandbox/win/src/interceptors.h" 13 #include "sandbox/win/src/ipc_tags.h" 14 #include "sandbox/win/src/named_pipe_interception.h" 15 #include "sandbox/win/src/named_pipe_policy.h" 16 #include "sandbox/win/src/policy_broker.h" 17 #include "sandbox/win/src/policy_params.h" 18 #include "sandbox/win/src/sandbox.h 21 namespace sandbox { namespace [all...] |
handle_policy.cc | 5 #include "sandbox/win/src/handle_policy.h" 10 #include "sandbox/win/src/broker_services.h" 11 #include "sandbox/win/src/ipc_tags.h" 12 #include "sandbox/win/src/policy_engine_opcodes.h" 13 #include "sandbox/win/src/policy_params.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/sandbox_utils.h" 17 namespace sandbox { namespace 93 } // namespace sandbox
|
named_pipe_policy.h | 12 #include "sandbox/win/src/crosscall_server.h" 13 #include "sandbox/win/src/policy_low_level.h" 14 #include "sandbox/win/src/sandbox_policy.h" 16 namespace sandbox { namespace 43 } // namespace sandbox
|
service_resolver.cc | 5 #include "sandbox/win/src/service_resolver.h" 8 #include "sandbox/win/src/internal_types.h" 9 #include "sandbox/win/src/sandbox_nt_util.h" 11 namespace sandbox { namespace 46 } // namespace sandbox
|
win2k_threadpool.h | 10 #include "sandbox/win/src/crosscall_server.h" 12 namespace sandbox { namespace 15 // for the sandbox IPC subsystem. See sandbox\crosscall_server.h for the details 56 } // namespace sandbox
|
interceptors.h | 9 #include "sandbox/win/src/interceptors_64.h" 12 namespace sandbox { namespace 52 } // namespace sandbox
|
policy_target.cc | 5 #include "sandbox/win/src/policy_target.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_engine_processor.h" 10 #include "sandbox/win/src/policy_low_level.h" 11 #include "sandbox/win/src/policy_params.h" 12 #include "sandbox/win/src/sandbox_factory.h" 13 #include "sandbox/win/src/sandbox_nt_util.h" 14 #include "sandbox/win/src/sharedmem_ipc_client.h" 15 #include "sandbox/win/src/target_services.h 17 namespace sandbox { namespace [all...] |
/external/chromium_org/chrome/test/security_tests/ |
sandbox_browsertest_linux.cc | 11 // Both the SUID sandbox (http://crbug.com/137653) and the Seccomp-BPF sandbox 25 // The setuid sandbox is required as our first-layer sandbox. 29 // A second-layer sandbox is also required to be adequately sandboxed.
|
/external/chromium_org/components/nacl/loader/ |
nacl_main_platform_delegate_linux.cc | 16 // The setuid sandbox is started in the zygote process: zygote_main_linux.cc 19 // The seccomp sandbox is started in the renderer. 26 // The seccomp sandbox should not be enabled for Native Client until 29 // At best, NaCl will not work. At worst, enabling the seccomp sandbox 30 // could create a hole in the NaCl sandbox.
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
baseline_policy.h | 8 #include "sandbox/linux/seccomp-bpf/errorcode.h" 9 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 11 namespace sandbox { namespace 16 // This is a helper to build seccomp-bpf policies, i.e. policies for a sandbox 41 } // namespace sandbox.
|
/external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/ |
remove-child-deep.html | 5 <div id="sandbox" style="display:none"></div> 7 var sandbox = document.getElementById('sandbox'); 8 var node = sandbox; 32 observer.observe(sandbox, {childList: true, subtree: true});
|
/external/chromium_org/chrome/common/extensions/docs/templates/articles/manifest/ |
sandbox.html | 1 <h1 id="sandbox">Manifest - Sandbox</h1> 6 with them. Being in a sandbox has two implications: 21 served in a sandbox with a custom CSP:</p> 26 "sandbox": { 33 "sandbox allow-scripts; script-src https://www.google.com" 41 <code>sandbox allow-scripts allow-forms</code>. You can specify your CSP 42 value to restrict the sandbox even further, but it must have the <code>sandbox</code> 44 <a href="http://www.whatwg.org/specs/web-apps/current-work/multipage/the-iframe-element.html#attr-iframe-sandbox">th [all...] |
/external/chromium_org/content/public/common/ |
sandbox_type_mac.h | 10 // Defines the Mac sandbox types known within content. Embedders can add 11 // additional sandbox types with IDs starting with SANDBOX_TYPE_AFTER_LAST_TYPE. 18 // The worker process uses the most restrictive sandbox which has almost
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
sandbox_bpf_policy.h | 10 namespace sandbox { namespace 15 // This is the interface to implement to define a BPF sandbox policy. 33 } // namespace sandbox
|