HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 176 - 200 of 990) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/chromium_org/chrome_elf/
ntdll_cache.cc 14 #include "sandbox/win/src/interception_internal.h"
15 #include "sandbox/win/src/internal_types.h"
16 #include "sandbox/win/src/service_resolver.h"
23 __declspec(allocate(".crthunk")) sandbox::ThunkData g_nt_thunk_storage;
57 scoped_ptr<sandbox::ServiceResolverThunk> thunk(GetThunk(kRelaxed));
73 NTSTATUS ret = thunk->CopyThunk(::GetModuleHandle(sandbox::kNtdllName),
76 sizeof(sandbox::ThunkData),
  /external/chromium_org/sandbox/linux/seccomp-bpf/
die.h 9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
15 #define SANDBOX_DIE(m) sandbox::Die::SandboxDie(m, __FILE__, __LINE__)
19 #define RAW_SANDBOX_DIE(m) sandbox::Die::RawSandboxDie(m)
22 #define SANDBOX_INFO(m) sandbox::Die::SandboxInfo(m, __FILE__, __LINE__)
26 // Terminate the program, even if the current sandbox policy prevents some
66 } // namespace sandbox
sandbox_bpf.h 21 #include "sandbox/linux/seccomp-bpf/die.h"
22 #include "sandbox/linux/seccomp-bpf/errorcode.h"
23 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
24 #include "sandbox/sandbox_export.h"
26 namespace sandbox { namespace
54 STATUS_ENABLED // The sandbox is now active
59 // StartSandbox(), the program should indicate whether or not the sandbox
74 // NOTE: Setting a policy and starting the sandbox is a one-way operation.
76 // sandbox. Strictly speaking, that means we should disallow calling
78 // this makes it needlessly complicated to operate on "Sandbox"
    [all...]
bpf_tests.h 10 #include "sandbox/linux/seccomp-bpf/bpf_tester_compatibility_delegate.h"
11 #include "sandbox/linux/tests/unit_tests.h"
13 namespace sandbox { namespace
34 sandbox::SandboxBPFTestRunner bpf_test_runner( \
35 new sandbox::BPFTesterSimpleDelegate<bpf_policy_class_name>( \
37 sandbox::UnitTests::RunTestInProcess(&bpf_test_runner, death); \
53 sandbox::SandboxBPFTestRunner bpf_test_runner( \
55 sandbox::UnitTests::RunTestInProcess(&bpf_test_runner, death); \
88 sandbox::BPFTesterCompatibilityDelegate<aux>::AuxType* BPF_AUX); \
90 sandbox::SandboxBPFTestRunner bpf_test_runner(
    [all...]
  /external/chromium_org/sandbox/mac/
launchd_interception_server.h 13 #include "sandbox/mac/mach_message_server.h"
14 #include "sandbox/mac/os_compatibility.h"
16 namespace sandbox { namespace
28 explicit LaunchdInterceptionServer(const BootstrapSandbox* sandbox);
43 // Given a look_up2 request message, this looks up the appropriate sandbox
58 // The sandbox for which this message server is running.
76 } // namespace sandbox
bootstrap_sandbox.h 17 #include "sandbox/mac/policy.h"
18 #include "sandbox/sandbox_export.h"
20 namespace sandbox { namespace
24 // The BootstrapSandbox is a second-layer sandbox for Mac. It is used to limit
29 // With this sandbox, the parent process must replace the bootstrap port prior
35 // launchd for servicing. If it is not, then the sandbox will reply with a
38 // Clients that which to use the sandbox must inform it of the creation and
39 // death of child processes for which the sandbox should be enforced. The
40 // client of the sandbox is intended to be an unsandboxed parent process that
43 // When the parent is ready to fork a new child process with this sandbox
    [all...]
  /external/chromium_org/sandbox/win/src/
handle_policy_test.cc 6 #include "sandbox/win/src/handle_policy.h"
7 #include "sandbox/win/src/nt_internals.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/sandbox_policy.h"
11 #include "sandbox/win/src/win_utils.h"
12 #include "sandbox/win/tests/common/controller.h"
15 namespace sandbox { namespace
113 } // namespace sandbox
    [all...]
handle_closer_test.cc 7 #include "sandbox/win/src/handle_closer_agent.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/target_services.h"
11 #include "sandbox/win/tests/common/controller.h"
51 namespace sandbox { namespace
111 sandbox::TargetPolicy* policy = runner.GetPolicy();
118 CHECK(sandbox::GetHandleName(marker, &handle_name));
131 sandbox::TargetPolicy* policy = runner.GetPolicy()
    [all...]
registry_dispatcher.cc 5 #include "sandbox/win/src/registry_dispatcher.h"
9 #include "sandbox/win/src/crosscall_client.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/sandbox_nt_util.h"
14 #include "sandbox/win/src/policy_broker.h"
15 #include "sandbox/win/src/policy_params.h"
16 #include "sandbox/win/src/sandbox.h
40 namespace sandbox { namespace
    [all...]
broker_services.h 15 #include "sandbox/win/src/crosscall_server.h"
16 #include "sandbox/win/src/job.h"
17 #include "sandbox/win/src/sandbox.h"
18 #include "sandbox/win/src/sharedmem_ipc_server.h"
19 #include "sandbox/win/src/win2k_threadpool.h"
20 #include "sandbox/win/src/win_utils.h"
29 namespace sandbox { namespace
115 } // namespace sandbox
unload_dll_test.cc 6 #include "sandbox/win/src/sandbox.h"
7 #include "sandbox/win/src/sandbox_factory.h"
8 #include "sandbox/win/src/target_services.h"
9 #include "sandbox/win/tests/common/controller.h"
12 namespace sandbox { namespace
64 sandbox::TargetPolicy* policy = runner.GetPolicy();
75 sandbox::TargetPolicy* policy = runner.GetPolicy();
96 } // namespace sandbox
policy_engine_unittest.cc 5 #include "sandbox/win/src/policy_engine_params.h"
6 #include "sandbox/win/src/policy_engine_processor.h"
9 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = {
10 #define POLPARAM(p) sandbox::ParamPickerMake(p),
13 namespace sandbox { namespace
102 } // namespace sandbox
named_pipe_policy_test.cc 6 #include "sandbox/win/src/handle_closer.h"
7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/sandbox_policy.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/tests/common/controller.h"
13 namespace sandbox { namespace
62 // Tests if we can create a pipe in the sandbox.
74 // On XP, the sandbox can create a pipe without any help but it fails on
82 // Tests if we can create a pipe with a path traversal in the sandbox
    [all...]
sandbox_policy_base.cc 5 #include "sandbox/win/src/sandbox_policy_base.h"
11 #include "sandbox/win/src/app_container.h"
12 #include "sandbox/win/src/filesystem_dispatcher.h"
13 #include "sandbox/win/src/filesystem_policy.h"
14 #include "sandbox/win/src/handle_dispatcher.h"
15 #include "sandbox/win/src/handle_policy.h"
16 #include "sandbox/win/src/job.h"
17 #include "sandbox/win/src/interception.h"
18 #include "sandbox/win/src/process_mitigations.h"
19 #include "sandbox/win/src/named_pipe_dispatcher.h
70 namespace sandbox { namespace
    [all...]
  /external/chromium_org/sandbox/linux/tests/
main.cc 8 #include "sandbox/linux/tests/test_utils.h"
9 #include "sandbox/linux/tests/unit_tests.h"
12 namespace sandbox { namespace
24 } // namespace sandbox
53 sandbox::RunPostTestsChecks();
  /external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/
append-child-deep.html 5 <div id="sandbox" style="display:none"></div>
7 var sandbox = document.getElementById('sandbox');
8 var node = sandbox;
42 observer.observe(sandbox, {childList: true, subtree: true});
  /external/chromium_org/content/common/sandbox_linux/
bpf_cros_arm_gpu_policy_linux.cc 25 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
26 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
27 #include "sandbox/linux/services/linux_syscalls.h"
29 using sandbox::ErrorCode;
30 using sandbox::SandboxBPF;
31 using sandbox::SyscallSets;
78 // On ARM we're enabling the sandbox before the X connection is made,
97 static sandbox::SandboxBPFPolicy* Create() {
112 ErrorCode CrosArmGpuBrokerProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
120 return CrosArmGpuProcessPolicy::EvaluateSyscall(sandbox, sysno)
    [all...]
bpf_gpu_policy_linux.cc 28 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
29 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
30 #include "sandbox/linux/services/broker_process.h"
31 #include "sandbox/linux/services/linux_syscalls.h"
33 using sandbox::BrokerProcess;
34 using sandbox::ErrorCode;
35 using sandbox::SandboxBPF;
36 using sandbox::SyscallSets;
37 using sandbox::arch_seccomp_data;
113 static sandbox::SandboxBPFPolicy* Create()
    [all...]
  /external/chromium_org/components/autofill/content/browser/wallet/
wallet_service_url_unittest.cc 19 EXPECT_EQ("https://wallet-web.sandbox.google.com/online/v2/u/1/wallet/"
22 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/u/1/"
25 EXPECT_EQ("https://wallet-web.sandbox.google.com/manage/w/1/paymentMethods",
27 EXPECT_EQ("https://wallet-web.sandbox.google.com/manage/w/1/settings/"
30 EXPECT_EQ("https://wallet-web.sandbox.google.com/online/v2/u/1/wallet/"
33 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/u/2/"
36 EXPECT_EQ("https://wallet-web.sandbox.google.com/online/v2/u/1/wallet/"
39 EXPECT_EQ("https://wallet-web.sandbox.google.com/online/v2/u/1/wallet/"
42 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/u/1/"
45 EXPECT_EQ("https://wallet-web.sandbox.google.com/online/v2/u/1/
    [all...]
  /external/chromium_org/content/shell/android/browsertests_apk/
AndroidManifest.xml 12 <permission android:name="org.chromium.content_shell.permission.SANDBOX"
34 android:permission="org.chromium.content_shell.permission.SANDBOX"
39 android:permission="org.chromium.content_shell.permission.SANDBOX"
44 android:permission="org.chromium.content_shell.permission.SANDBOX"
49 android:permission="org.chromium.content_shell.permission.SANDBOX"
54 android:permission="org.chromium.content_shell.permission.SANDBOX"
59 android:permission="org.chromium.content_shell.permission.SANDBOX"
64 android:permission="org.chromium.content_shell.permission.SANDBOX"
69 android:permission="org.chromium.content_shell.permission.SANDBOX"
74 android:permission="org.chromium.content_shell.permission.SANDBOX"
    [all...]
  /external/chromium_org/content/shell/android/linker_test_apk/
AndroidManifest.xml 12 <permission android:name="org.chromium.content_shell.permission.SANDBOX"
34 android:permission="org.chromium.content_shell.permission.SANDBOX"
39 android:permission="org.chromium.content_shell.permission.SANDBOX"
44 android:permission="org.chromium.content_shell.permission.SANDBOX"
49 android:permission="org.chromium.content_shell.permission.SANDBOX"
54 android:permission="org.chromium.content_shell.permission.SANDBOX"
59 android:permission="org.chromium.content_shell.permission.SANDBOX"
64 android:permission="org.chromium.content_shell.permission.SANDBOX"
69 android:permission="org.chromium.content_shell.permission.SANDBOX"
74 android:permission="org.chromium.content_shell.permission.SANDBOX"
    [all...]
  /external/chromium_org/content/shell/android/shell_apk/
AndroidManifest.xml 12 <permission android:name="org.chromium.content_shell.permission.SANDBOX"
35 android:permission="org.chromium.content_shell.permission.SANDBOX"
40 android:permission="org.chromium.content_shell.permission.SANDBOX"
45 android:permission="org.chromium.content_shell.permission.SANDBOX"
50 android:permission="org.chromium.content_shell.permission.SANDBOX"
55 android:permission="org.chromium.content_shell.permission.SANDBOX"
60 android:permission="org.chromium.content_shell.permission.SANDBOX"
65 android:permission="org.chromium.content_shell.permission.SANDBOX"
70 android:permission="org.chromium.content_shell.permission.SANDBOX"
75 android:permission="org.chromium.content_shell.permission.SANDBOX"
    [all...]
  /external/chromium_org/sandbox/win/wow_helper/
wow_helper.cc 6 // sandbox a 32 bit application running on a 64 bit OS. The basic idea is to
15 #include "sandbox/win/wow_helper/service64_resolver.h"
16 #include "sandbox/win/wow_helper/target_code.h"
18 namespace sandbox { namespace
54 } // namespace sandbox
85 return sandbox::PatchNtdll(child, thunk, kPageSize);
  /external/chromium_org/content/common/
sandbox_mac.mm 11 #include <sandbox.h>
44 // Is the sandbox currently active.
52 // Mapping from sandbox process types to resource IDs containing the sandbox
102 // Errors quoting strings for the Sandbox profile are always fatal, report them
114 NSString* Sandbox::AllowMetadataForPath(const base::FilePath& allowed_path) {
147 bool Sandbox::QuotePlainString(const std::string& src_utf8, std::string* dst) {
183 bool Sandbox::QuoteStringForRegex(const std::string& str_utf8,
185 // Characters with special meanings in sandbox profile syntax.
220 // The Mac sandbox regex parser only handles printable ASCII characters
    [all...]
  /external/chromium_org/components/nacl/loader/sandbox_linux/
nacl_sandbox_linux.cc 24 #include "sandbox/linux/services/credentials.h"
25 #include "sandbox/linux/services/thread_helpers.h"
26 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
50 setuid_sandbox_client_(sandbox::SetuidSandboxClient::Create()) {
64 return sandbox::ThreadHelpers::IsSingleThreaded(proc_self_task.get());
69 sandbox::Credentials credentials;
81 // the setuid sandbox model.
97 // 6) The socket created by the SUID sandbox helper, used by ChrootMe().
99 // (Only present when running under the SUID sandbox.)
104 // leave any FDs open before we enable the sandbox
    [all...]

Completed in 245 milliseconds

1 2 3 4 5 6 78 91011>>