/external/chromium_org/sandbox/win/src/ |
sync_policy.cc | 7 #include "sandbox/win/src/sync_policy.h" 11 #include "sandbox/win/src/ipc_tags.h" 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/policy_engine_opcodes.h" 14 #include "sandbox/win/src/policy_params.h" 15 #include "sandbox/win/src/sandbox_types.h" 16 #include "sandbox/win/src/sandbox_utils.h" 17 #include "sandbox/win/src/sync_interception.h" 18 #include "sandbox/win/src/win_utils.h" 20 namespace sandbox { namespace [all...] |
filesystem_dispatcher.cc | 5 #include "sandbox/win/src/filesystem_dispatcher.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/filesystem_interception.h" 9 #include "sandbox/win/src/filesystem_policy.h" 10 #include "sandbox/win/src/interception.h" 11 #include "sandbox/win/src/interceptors.h" 12 #include "sandbox/win/src/ipc_tags.h" 13 #include "sandbox/win/src/policy_broker.h" 14 #include "sandbox/win/src/policy_params.h" 15 #include "sandbox/win/src/sandbox.h 18 namespace sandbox { namespace [all...] |
interceptors_64.cc | 5 #include "sandbox/win/src/interceptors_64.h" 7 #include "sandbox/win/src/interceptors.h" 8 #include "sandbox/win/src/filesystem_interception.h" 9 #include "sandbox/win/src/named_pipe_interception.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/process_mitigations_win32k_interception.h" 12 #include "sandbox/win/src/process_thread_interception.h" 13 #include "sandbox/win/src/registry_interception.h" 14 #include "sandbox/win/src/sandbox_nt_types.h" 15 #include "sandbox/win/src/sandbox_types.h 19 namespace sandbox { namespace [all...] |
process_policy_test.cc | 13 #include "sandbox/win/src/sandbox.h" 14 #include "sandbox/win/src/sandbox_factory.h" 15 #include "sandbox/win/src/sandbox_policy.h" 16 #include "sandbox/win/tests/common/controller.h" 38 sandbox::SboxTestResult CreateProcessHelper(const base::string16& exe, 52 sandbox::SboxTestResult ret1 = sandbox::SBOX_TEST_FAILED; 57 ret1 = sandbox::SBOX_TEST_SUCCEEDED; 63 ret1 = sandbox::SBOX_TEST_DENIED 103 namespace sandbox { namespace [all...] |
process_thread_dispatcher.cc | 5 #include "sandbox/win/src/process_thread_dispatcher.h" 9 #include "sandbox/win/src/crosscall_client.h" 10 #include "sandbox/win/src/interception.h" 11 #include "sandbox/win/src/interceptors.h" 12 #include "sandbox/win/src/ipc_tags.h" 13 #include "sandbox/win/src/policy_broker.h" 14 #include "sandbox/win/src/policy_params.h" 15 #include "sandbox/win/src/process_thread_interception.h" 16 #include "sandbox/win/src/process_thread_policy.h" 17 #include "sandbox/win/src/sandbox.h 95 namespace sandbox { namespace [all...] |
app_container.cc | 5 #include "sandbox/win/src/app_container.h" 13 #include "sandbox/win/src/internal_types.h" 28 HMODULE module = GetModuleHandle(sandbox::kKerneldllName); 31 module = GetModuleHandle(sandbox::kKernelBasedllName); 39 namespace sandbox { namespace 183 } // namespace sandbox
|
filesystem_policy.h | 12 #include "sandbox/win/src/crosscall_server.h" 13 #include "sandbox/win/src/nt_internals.h" 14 #include "sandbox/win/src/policy_low_level.h" 15 #include "sandbox/win/src/sandbox_policy.h" 17 namespace sandbox { namespace 106 } // namespace sandbox
|
/external/chromium_org/content/renderer/ |
renderer_main_platform_delegate_win.cc | 20 #include "sandbox/win/src/sandbox.h" 38 // Windows-only skia sandbox support 96 // cached and there's no more need to access the registry. If the sandbox 118 sandbox::TargetServices* target_services = 122 // Cause advapi32 to load before the sandbox is turned on. 125 // Warm up language subsystems before the sandbox is turned on.
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
bpf_tests_unittest.cc | 5 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 17 #include "sandbox/linux/services/linux_syscalls.h" 18 #include "sandbox/linux/tests/unit_tests.h" 21 namespace sandbox { namespace 36 ErrorCode EmptyPolicyTakesClass(SandboxBPF* sandbox, 139 } // namespace sandbox
|
verifier.cc | 7 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 8 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 9 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h" 10 #include "sandbox/linux/seccomp-bpf/verifier.h" 13 namespace sandbox { namespace 31 uint32_t EvaluateErrorCode(SandboxBPF* sandbox, 42 return sandbox->Unexpected64bitArgument().err(); 46 return EvaluateErrorCode(sandbox, 54 return EvaluateErrorCode(sandbox, 63 return EvaluateErrorCode(sandbox, [all...] |
demo.cc | 31 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 32 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 33 #include "sandbox/linux/services/linux_syscalls.h" 35 using sandbox::ErrorCode; 36 using sandbox::SandboxBPF; 37 using sandbox::SandboxBPFPolicy; 38 using sandbox::arch_seccomp_data; 42 // We don't expect our sandbox to do anything useful yet. So, we will fail 44 // following line should be removed as soon as the sandbox is starting to 219 // log the system call and then deny it. More elaborate sandbox policie 434 SandboxBPF sandbox; local [all...] |
syscall_iterator.h | 11 #include "sandbox/sandbox_export.h" 13 namespace sandbox { namespace 54 } // namespace sandbox
|
/external/chromium_org/content/common/ |
handle_enumerator_win.cc | 17 #include "sandbox/win/src/handle_table.h" 28 handle_types[sandbox::HandleTable::kTypeProcess] = ProcessHandle; 29 handle_types[sandbox::HandleTable::kTypeThread] = ThreadHandle; 30 handle_types[sandbox::HandleTable::kTypeFile] = FileHandle; 31 handle_types[sandbox::HandleTable::kTypeDirectory] = DirectoryHandle; 32 handle_types[sandbox::HandleTable::kTypeKey] = KeyHandle; 33 handle_types[sandbox::HandleTable::kTypeWindowStation] = WindowStationHandle; 34 handle_types[sandbox::HandleTable::kTypeDesktop] = DesktopHandle; 35 handle_types[sandbox::HandleTable::kTypeService] = ServiceHandle; 36 handle_types[sandbox::HandleTable::kTypeMutex] = MutexHandle [all...] |
common.sb | 7 ; included at the start of all other sandbox configuration files in Chrome. 11 ; printing on sandbox exceptions; this functionality only exists on 10.6. The 12 ; --enable-sandbox-logging flag or system versions <10.6 cause this flag to
|
/external/chromium_org/content/common/sandbox_linux/ |
sandbox_linux.cc | 32 #include "sandbox/linux/services/credentials.h" 33 #include "sandbox/linux/services/thread_helpers.h" 34 #include "sandbox/linux/services/yama.h" 35 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 42 using sandbox::Yama; 59 "Activated " + sandbox_name + " sandbox for process type: " + 117 setuid_sandbox_client_(sandbox::SetuidSandboxClient::Create()) 120 LOG(FATAL) << "Failed to instantiate the setuid sandbox client."; 143 // Sanitizers need to open some resources before the sandbox is enabled. 151 // its contents before the sandbox is enabled. It also pre-opens th [all...] |
/external/chromium_org/chrome/common/extensions/docs/templates/articles/ |
sandboxingEval.html | 36 <h2 id="why_sandbox">Why sandbox?</h2> 43 is the least of our worries. The solution on offer is a sandbox in which 59 <h2 id="creating_and_using">Creating and using a sandbox.</h2> 74 Each file that ought to be run inside a sandbox must be listed in the 75 extension manifest by adding a <code>sandbox</code> property. This is a 78 file cleverly named "sandbox.html". The manifest entry looks like this: 84 "sandbox": { 85 "pages": ["sandbox.html"] 96 <a href='/extensions/examples/howto/sandbox/sandbox.html'>sandbox.html</a [all...] |
/external/chromium_org/extensions/common/ |
csp_validator_unittest.cc | 154 // Sandbox directive is required. 156 "sandbox", Manifest::TYPE_EXTENSION)); 158 // Additional sandbox tokens are OK. 160 "sandbox allow-scripts", Manifest::TYPE_EXTENSION)); 163 "sandbox allow-same-origin", Manifest::TYPE_EXTENSION)); 167 "sandbox; img-src https://google.com", Manifest::TYPE_EXTENSION)); 171 "sandbox allow-top-navigation", Manifest::TYPE_EXTENSION)); 173 "sandbox allow-top-navigation", Manifest::TYPE_PLATFORM_APP)); 177 "sandbox allow-popups", Manifest::TYPE_EXTENSION)); 179 "sandbox allow-popups", Manifest::TYPE_PLATFORM_APP)) [all...] |
/external/chromium_org/chrome_elf/ |
chrome_elf.gyp | 97 '../sandbox/sandbox.gyp:sandbox', 133 '../sandbox/sandbox.gyp:sandbox',
|
/external/chromium_org/components/nacl/broker/ |
nacl_broker_listener.cc | 21 #include "sandbox/win/src/sandbox_policy.h" 49 void NaClBrokerListener::PreSpawnTarget(sandbox::TargetPolicy* policy, 56 sandbox::ResultCode result = policy->AddRule( 57 sandbox::TargetPolicy::SUBSYS_NAMED_PIPES, 58 sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY, 60 *success = (result == sandbox::SBOX_ALL_OK);
|
/external/chromium_org/sandbox/linux/suid/client/ |
setuid_sandbox_client_unittest.cc | 9 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 10 #include "sandbox/linux/suid/common/sandbox.h" 13 namespace sandbox { namespace 70 // Set-up a fake environment as if we went through the setuid sandbox. 100 } // namespace sandbox
|
/external/chromium_org/testing/ |
test_env.py | 22 sandbox and should enable it. This should return True iff the slave is a 23 Linux host with the sandbox file present and configured correctly.""" 37 """Checks enables the sandbox if it is required, otherwise it disables it.""" 42 print 'Enabling sandbox. Setting environment variable:' 47 print 'Sandbox not properly installed. Unsetting:' 50 # the variable empty silently disables the sandbox.
|
/external/chromium_org/content/ |
content_app.gypi | 46 '../sandbox/sandbox.gyp:sandbox',
|
/external/chromium_org/sandbox/linux/services/ |
scoped_process.h | 11 #include "sandbox/sandbox_export.h" 13 namespace sandbox { namespace 53 } // namespace sandbox
|
yama.h | 10 #include "sandbox/sandbox_export.h" 12 namespace sandbox { namespace 56 } // namespace sandbox
|
/external/chromium_org/sandbox/mac/ |
os_compatibility.h | 6 // that occur between different OS versions. The Mach messages that the sandbox 19 namespace sandbox { namespace 50 } // namespace sandbox
|