/external/chromium_org/chrome_elf/ |
ntdll_cache.cc | 14 #include "sandbox/win/src/interception_internal.h" 15 #include "sandbox/win/src/internal_types.h" 16 #include "sandbox/win/src/service_resolver.h" 23 __declspec(allocate(".crthunk")) sandbox::ThunkData g_nt_thunk_storage; 57 scoped_ptr<sandbox::ServiceResolverThunk> thunk(GetThunk(kRelaxed)); 73 NTSTATUS ret = thunk->CopyThunk(::GetModuleHandle(sandbox::kNtdllName), 76 sizeof(sandbox::ThunkData),
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
die.h | 9 #include "sandbox/sandbox_export.h" 11 namespace sandbox { namespace 15 #define SANDBOX_DIE(m) sandbox::Die::SandboxDie(m, __FILE__, __LINE__) 19 #define RAW_SANDBOX_DIE(m) sandbox::Die::RawSandboxDie(m) 22 #define SANDBOX_INFO(m) sandbox::Die::SandboxInfo(m, __FILE__, __LINE__) 26 // Terminate the program, even if the current sandbox policy prevents some 66 } // namespace sandbox
|
sandbox_bpf.h | 21 #include "sandbox/linux/seccomp-bpf/die.h" 22 #include "sandbox/linux/seccomp-bpf/errorcode.h" 23 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 24 #include "sandbox/sandbox_export.h" 26 namespace sandbox { namespace 54 STATUS_ENABLED // The sandbox is now active 59 // StartSandbox(), the program should indicate whether or not the sandbox 74 // NOTE: Setting a policy and starting the sandbox is a one-way operation. 76 // sandbox. Strictly speaking, that means we should disallow calling 78 // this makes it needlessly complicated to operate on "Sandbox" [all...] |
bpf_tests.h | 10 #include "sandbox/linux/seccomp-bpf/bpf_tester_compatibility_delegate.h" 11 #include "sandbox/linux/tests/unit_tests.h" 13 namespace sandbox { namespace 34 sandbox::SandboxBPFTestRunner bpf_test_runner( \ 35 new sandbox::BPFTesterSimpleDelegate<bpf_policy_class_name>( \ 37 sandbox::UnitTests::RunTestInProcess(&bpf_test_runner, death); \ 53 sandbox::SandboxBPFTestRunner bpf_test_runner( \ 55 sandbox::UnitTests::RunTestInProcess(&bpf_test_runner, death); \ 88 sandbox::BPFTesterCompatibilityDelegate<aux>::AuxType* BPF_AUX); \ 90 sandbox::SandboxBPFTestRunner bpf_test_runner( [all...] |
/external/chromium_org/sandbox/mac/ |
launchd_interception_server.h | 13 #include "sandbox/mac/mach_message_server.h" 14 #include "sandbox/mac/os_compatibility.h" 16 namespace sandbox { namespace 28 explicit LaunchdInterceptionServer(const BootstrapSandbox* sandbox); 43 // Given a look_up2 request message, this looks up the appropriate sandbox 58 // The sandbox for which this message server is running. 76 } // namespace sandbox
|
bootstrap_sandbox.h | 17 #include "sandbox/mac/policy.h" 18 #include "sandbox/sandbox_export.h" 20 namespace sandbox { namespace 24 // The BootstrapSandbox is a second-layer sandbox for Mac. It is used to limit 29 // With this sandbox, the parent process must replace the bootstrap port prior 35 // launchd for servicing. If it is not, then the sandbox will reply with a 38 // Clients that which to use the sandbox must inform it of the creation and 39 // death of child processes for which the sandbox should be enforced. The 40 // client of the sandbox is intended to be an unsandboxed parent process that 43 // When the parent is ready to fork a new child process with this sandbox [all...] |
/external/chromium_org/sandbox/win/src/ |
handle_policy_test.cc | 6 #include "sandbox/win/src/handle_policy.h" 7 #include "sandbox/win/src/nt_internals.h" 8 #include "sandbox/win/src/sandbox.h" 9 #include "sandbox/win/src/sandbox_factory.h" 10 #include "sandbox/win/src/sandbox_policy.h" 11 #include "sandbox/win/src/win_utils.h" 12 #include "sandbox/win/tests/common/controller.h" 15 namespace sandbox { namespace 113 } // namespace sandbox [all...] |
handle_closer_test.cc | 7 #include "sandbox/win/src/handle_closer_agent.h" 8 #include "sandbox/win/src/sandbox.h" 9 #include "sandbox/win/src/sandbox_factory.h" 10 #include "sandbox/win/src/target_services.h" 11 #include "sandbox/win/tests/common/controller.h" 51 namespace sandbox { namespace 111 sandbox::TargetPolicy* policy = runner.GetPolicy(); 118 CHECK(sandbox::GetHandleName(marker, &handle_name)); 131 sandbox::TargetPolicy* policy = runner.GetPolicy() [all...] |
registry_dispatcher.cc | 5 #include "sandbox/win/src/registry_dispatcher.h" 9 #include "sandbox/win/src/crosscall_client.h" 10 #include "sandbox/win/src/interception.h" 11 #include "sandbox/win/src/interceptors.h" 12 #include "sandbox/win/src/ipc_tags.h" 13 #include "sandbox/win/src/sandbox_nt_util.h" 14 #include "sandbox/win/src/policy_broker.h" 15 #include "sandbox/win/src/policy_params.h" 16 #include "sandbox/win/src/sandbox.h 40 namespace sandbox { namespace [all...] |
broker_services.h | 15 #include "sandbox/win/src/crosscall_server.h" 16 #include "sandbox/win/src/job.h" 17 #include "sandbox/win/src/sandbox.h" 18 #include "sandbox/win/src/sharedmem_ipc_server.h" 19 #include "sandbox/win/src/win2k_threadpool.h" 20 #include "sandbox/win/src/win_utils.h" 29 namespace sandbox { namespace 115 } // namespace sandbox
|
unload_dll_test.cc | 6 #include "sandbox/win/src/sandbox.h" 7 #include "sandbox/win/src/sandbox_factory.h" 8 #include "sandbox/win/src/target_services.h" 9 #include "sandbox/win/tests/common/controller.h" 12 namespace sandbox { namespace 64 sandbox::TargetPolicy* policy = runner.GetPolicy(); 75 sandbox::TargetPolicy* policy = runner.GetPolicy(); 96 } // namespace sandbox
|
policy_engine_unittest.cc | 5 #include "sandbox/win/src/policy_engine_params.h" 6 #include "sandbox/win/src/policy_engine_processor.h" 9 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = { 10 #define POLPARAM(p) sandbox::ParamPickerMake(p), 13 namespace sandbox { namespace 102 } // namespace sandbox
|
named_pipe_policy_test.cc | 6 #include "sandbox/win/src/handle_closer.h" 7 #include "sandbox/win/src/sandbox.h" 8 #include "sandbox/win/src/sandbox_policy.h" 9 #include "sandbox/win/src/sandbox_factory.h" 10 #include "sandbox/win/tests/common/controller.h" 13 namespace sandbox { namespace 62 // Tests if we can create a pipe in the sandbox. 74 // On XP, the sandbox can create a pipe without any help but it fails on 82 // Tests if we can create a pipe with a path traversal in the sandbox [all...] |
sandbox_policy_base.cc | 5 #include "sandbox/win/src/sandbox_policy_base.h" 11 #include "sandbox/win/src/app_container.h" 12 #include "sandbox/win/src/filesystem_dispatcher.h" 13 #include "sandbox/win/src/filesystem_policy.h" 14 #include "sandbox/win/src/handle_dispatcher.h" 15 #include "sandbox/win/src/handle_policy.h" 16 #include "sandbox/win/src/job.h" 17 #include "sandbox/win/src/interception.h" 18 #include "sandbox/win/src/process_mitigations.h" 19 #include "sandbox/win/src/named_pipe_dispatcher.h 70 namespace sandbox { namespace [all...] |
/external/chromium_org/sandbox/linux/tests/ |
main.cc | 8 #include "sandbox/linux/tests/test_utils.h" 9 #include "sandbox/linux/tests/unit_tests.h" 12 namespace sandbox { namespace 24 } // namespace sandbox 53 sandbox::RunPostTestsChecks();
|
/external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/ |
append-child-deep.html | 5 <div id="sandbox" style="display:none"></div> 7 var sandbox = document.getElementById('sandbox'); 8 var node = sandbox; 42 observer.observe(sandbox, {childList: true, subtree: true});
|
/external/chromium_org/content/common/sandbox_linux/ |
bpf_cros_arm_gpu_policy_linux.cc | 25 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 26 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 27 #include "sandbox/linux/services/linux_syscalls.h" 29 using sandbox::ErrorCode; 30 using sandbox::SandboxBPF; 31 using sandbox::SyscallSets; 78 // On ARM we're enabling the sandbox before the X connection is made, 97 static sandbox::SandboxBPFPolicy* Create() { 112 ErrorCode CrosArmGpuBrokerProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox, 120 return CrosArmGpuProcessPolicy::EvaluateSyscall(sandbox, sysno) [all...] |
bpf_gpu_policy_linux.cc | 28 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 29 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 30 #include "sandbox/linux/services/broker_process.h" 31 #include "sandbox/linux/services/linux_syscalls.h" 33 using sandbox::BrokerProcess; 34 using sandbox::ErrorCode; 35 using sandbox::SandboxBPF; 36 using sandbox::SyscallSets; 37 using sandbox::arch_seccomp_data; 113 static sandbox::SandboxBPFPolicy* Create() [all...] |
/external/chromium_org/components/autofill/content/browser/wallet/ |
wallet_service_url_unittest.cc | 19 EXPECT_EQ("https://wallet-web.sandbox.google.com/online/v2/u/1/wallet/" 22 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/u/1/" 25 EXPECT_EQ("https://wallet-web.sandbox.google.com/manage/w/1/paymentMethods", 27 EXPECT_EQ("https://wallet-web.sandbox.google.com/manage/w/1/settings/" 30 EXPECT_EQ("https://wallet-web.sandbox.google.com/online/v2/u/1/wallet/" 33 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/u/2/" 36 EXPECT_EQ("https://wallet-web.sandbox.google.com/online/v2/u/1/wallet/" 39 EXPECT_EQ("https://wallet-web.sandbox.google.com/online/v2/u/1/wallet/" 42 EXPECT_EQ("https://wallet-web.sandbox.google.com/online-secure/v2/u/1/" 45 EXPECT_EQ("https://wallet-web.sandbox.google.com/online/v2/u/1/ [all...] |
/external/chromium_org/content/shell/android/browsertests_apk/ |
AndroidManifest.xml | 12 <permission android:name="org.chromium.content_shell.permission.SANDBOX" 34 android:permission="org.chromium.content_shell.permission.SANDBOX" 39 android:permission="org.chromium.content_shell.permission.SANDBOX" 44 android:permission="org.chromium.content_shell.permission.SANDBOX" 49 android:permission="org.chromium.content_shell.permission.SANDBOX" 54 android:permission="org.chromium.content_shell.permission.SANDBOX" 59 android:permission="org.chromium.content_shell.permission.SANDBOX" 64 android:permission="org.chromium.content_shell.permission.SANDBOX" 69 android:permission="org.chromium.content_shell.permission.SANDBOX" 74 android:permission="org.chromium.content_shell.permission.SANDBOX" [all...] |
/external/chromium_org/content/shell/android/linker_test_apk/ |
AndroidManifest.xml | 12 <permission android:name="org.chromium.content_shell.permission.SANDBOX" 34 android:permission="org.chromium.content_shell.permission.SANDBOX" 39 android:permission="org.chromium.content_shell.permission.SANDBOX" 44 android:permission="org.chromium.content_shell.permission.SANDBOX" 49 android:permission="org.chromium.content_shell.permission.SANDBOX" 54 android:permission="org.chromium.content_shell.permission.SANDBOX" 59 android:permission="org.chromium.content_shell.permission.SANDBOX" 64 android:permission="org.chromium.content_shell.permission.SANDBOX" 69 android:permission="org.chromium.content_shell.permission.SANDBOX" 74 android:permission="org.chromium.content_shell.permission.SANDBOX" [all...] |
/external/chromium_org/content/shell/android/shell_apk/ |
AndroidManifest.xml | 12 <permission android:name="org.chromium.content_shell.permission.SANDBOX" 35 android:permission="org.chromium.content_shell.permission.SANDBOX" 40 android:permission="org.chromium.content_shell.permission.SANDBOX" 45 android:permission="org.chromium.content_shell.permission.SANDBOX" 50 android:permission="org.chromium.content_shell.permission.SANDBOX" 55 android:permission="org.chromium.content_shell.permission.SANDBOX" 60 android:permission="org.chromium.content_shell.permission.SANDBOX" 65 android:permission="org.chromium.content_shell.permission.SANDBOX" 70 android:permission="org.chromium.content_shell.permission.SANDBOX" 75 android:permission="org.chromium.content_shell.permission.SANDBOX" [all...] |
/external/chromium_org/sandbox/win/wow_helper/ |
wow_helper.cc | 6 // sandbox a 32 bit application running on a 64 bit OS. The basic idea is to 15 #include "sandbox/win/wow_helper/service64_resolver.h" 16 #include "sandbox/win/wow_helper/target_code.h" 18 namespace sandbox { namespace 54 } // namespace sandbox 85 return sandbox::PatchNtdll(child, thunk, kPageSize);
|
/external/chromium_org/content/common/ |
sandbox_mac.mm | 11 #include <sandbox.h> 44 // Is the sandbox currently active. 52 // Mapping from sandbox process types to resource IDs containing the sandbox 102 // Errors quoting strings for the Sandbox profile are always fatal, report them 114 NSString* Sandbox::AllowMetadataForPath(const base::FilePath& allowed_path) { 147 bool Sandbox::QuotePlainString(const std::string& src_utf8, std::string* dst) { 183 bool Sandbox::QuoteStringForRegex(const std::string& str_utf8, 185 // Characters with special meanings in sandbox profile syntax. 220 // The Mac sandbox regex parser only handles printable ASCII characters [all...] |
/external/chromium_org/components/nacl/loader/sandbox_linux/ |
nacl_sandbox_linux.cc | 24 #include "sandbox/linux/services/credentials.h" 25 #include "sandbox/linux/services/thread_helpers.h" 26 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 50 setuid_sandbox_client_(sandbox::SetuidSandboxClient::Create()) { 64 return sandbox::ThreadHelpers::IsSingleThreaded(proc_self_task.get()); 69 sandbox::Credentials credentials; 81 // the setuid sandbox model. 97 // 6) The socket created by the SUID sandbox helper, used by ChrootMe(). 99 // (Only present when running under the SUID sandbox.) 104 // leave any FDs open before we enable the sandbox [all...] |