HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 251 - 275 of 990) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/win/src/
sync_policy.cc 7 #include "sandbox/win/src/sync_policy.h"
11 #include "sandbox/win/src/ipc_tags.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/policy_engine_opcodes.h"
14 #include "sandbox/win/src/policy_params.h"
15 #include "sandbox/win/src/sandbox_types.h"
16 #include "sandbox/win/src/sandbox_utils.h"
17 #include "sandbox/win/src/sync_interception.h"
18 #include "sandbox/win/src/win_utils.h"
20 namespace sandbox { namespace
    [all...]
filesystem_dispatcher.cc 5 #include "sandbox/win/src/filesystem_dispatcher.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/filesystem_interception.h"
9 #include "sandbox/win/src/filesystem_policy.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/policy_broker.h"
14 #include "sandbox/win/src/policy_params.h"
15 #include "sandbox/win/src/sandbox.h
18 namespace sandbox { namespace
    [all...]
interceptors_64.cc 5 #include "sandbox/win/src/interceptors_64.h"
7 #include "sandbox/win/src/interceptors.h"
8 #include "sandbox/win/src/filesystem_interception.h"
9 #include "sandbox/win/src/named_pipe_interception.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/process_mitigations_win32k_interception.h"
12 #include "sandbox/win/src/process_thread_interception.h"
13 #include "sandbox/win/src/registry_interception.h"
14 #include "sandbox/win/src/sandbox_nt_types.h"
15 #include "sandbox/win/src/sandbox_types.h
19 namespace sandbox { namespace
    [all...]
process_policy_test.cc 13 #include "sandbox/win/src/sandbox.h"
14 #include "sandbox/win/src/sandbox_factory.h"
15 #include "sandbox/win/src/sandbox_policy.h"
16 #include "sandbox/win/tests/common/controller.h"
38 sandbox::SboxTestResult CreateProcessHelper(const base::string16& exe,
52 sandbox::SboxTestResult ret1 = sandbox::SBOX_TEST_FAILED;
57 ret1 = sandbox::SBOX_TEST_SUCCEEDED;
63 ret1 = sandbox::SBOX_TEST_DENIED
103 namespace sandbox { namespace
    [all...]
process_thread_dispatcher.cc 5 #include "sandbox/win/src/process_thread_dispatcher.h"
9 #include "sandbox/win/src/crosscall_client.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/policy_broker.h"
14 #include "sandbox/win/src/policy_params.h"
15 #include "sandbox/win/src/process_thread_interception.h"
16 #include "sandbox/win/src/process_thread_policy.h"
17 #include "sandbox/win/src/sandbox.h
95 namespace sandbox { namespace
    [all...]
app_container.cc 5 #include "sandbox/win/src/app_container.h"
13 #include "sandbox/win/src/internal_types.h"
28 HMODULE module = GetModuleHandle(sandbox::kKerneldllName);
31 module = GetModuleHandle(sandbox::kKernelBasedllName);
39 namespace sandbox { namespace
183 } // namespace sandbox
filesystem_policy.h 12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/nt_internals.h"
14 #include "sandbox/win/src/policy_low_level.h"
15 #include "sandbox/win/src/sandbox_policy.h"
17 namespace sandbox { namespace
106 } // namespace sandbox
  /external/chromium_org/content/renderer/
renderer_main_platform_delegate_win.cc 20 #include "sandbox/win/src/sandbox.h"
38 // Windows-only skia sandbox support
96 // cached and there's no more need to access the registry. If the sandbox
118 sandbox::TargetServices* target_services =
122 // Cause advapi32 to load before the sandbox is turned on.
125 // Warm up language subsystems before the sandbox is turned on.
  /external/chromium_org/sandbox/linux/seccomp-bpf/
bpf_tests_unittest.cc 5 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
16 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
17 #include "sandbox/linux/services/linux_syscalls.h"
18 #include "sandbox/linux/tests/unit_tests.h"
21 namespace sandbox { namespace
36 ErrorCode EmptyPolicyTakesClass(SandboxBPF* sandbox,
139 } // namespace sandbox
verifier.cc 7 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
8 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
9 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
10 #include "sandbox/linux/seccomp-bpf/verifier.h"
13 namespace sandbox { namespace
31 uint32_t EvaluateErrorCode(SandboxBPF* sandbox,
42 return sandbox->Unexpected64bitArgument().err();
46 return EvaluateErrorCode(sandbox,
54 return EvaluateErrorCode(sandbox,
63 return EvaluateErrorCode(sandbox,
    [all...]
demo.cc 31 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
32 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
33 #include "sandbox/linux/services/linux_syscalls.h"
35 using sandbox::ErrorCode;
36 using sandbox::SandboxBPF;
37 using sandbox::SandboxBPFPolicy;
38 using sandbox::arch_seccomp_data;
42 // We don't expect our sandbox to do anything useful yet. So, we will fail
44 // following line should be removed as soon as the sandbox is starting to
219 // log the system call and then deny it. More elaborate sandbox policie
434 SandboxBPF sandbox; local
    [all...]
syscall_iterator.h 11 #include "sandbox/sandbox_export.h"
13 namespace sandbox { namespace
54 } // namespace sandbox
  /external/chromium_org/content/common/
handle_enumerator_win.cc 17 #include "sandbox/win/src/handle_table.h"
28 handle_types[sandbox::HandleTable::kTypeProcess] = ProcessHandle;
29 handle_types[sandbox::HandleTable::kTypeThread] = ThreadHandle;
30 handle_types[sandbox::HandleTable::kTypeFile] = FileHandle;
31 handle_types[sandbox::HandleTable::kTypeDirectory] = DirectoryHandle;
32 handle_types[sandbox::HandleTable::kTypeKey] = KeyHandle;
33 handle_types[sandbox::HandleTable::kTypeWindowStation] = WindowStationHandle;
34 handle_types[sandbox::HandleTable::kTypeDesktop] = DesktopHandle;
35 handle_types[sandbox::HandleTable::kTypeService] = ServiceHandle;
36 handle_types[sandbox::HandleTable::kTypeMutex] = MutexHandle
    [all...]
common.sb 7 ; included at the start of all other sandbox configuration files in Chrome.
11 ; printing on sandbox exceptions; this functionality only exists on 10.6. The
12 ; --enable-sandbox-logging flag or system versions <10.6 cause this flag to
  /external/chromium_org/content/common/sandbox_linux/
sandbox_linux.cc 32 #include "sandbox/linux/services/credentials.h"
33 #include "sandbox/linux/services/thread_helpers.h"
34 #include "sandbox/linux/services/yama.h"
35 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
42 using sandbox::Yama;
59 "Activated " + sandbox_name + " sandbox for process type: " +
117 setuid_sandbox_client_(sandbox::SetuidSandboxClient::Create())
120 LOG(FATAL) << "Failed to instantiate the setuid sandbox client.";
143 // Sanitizers need to open some resources before the sandbox is enabled.
151 // its contents before the sandbox is enabled. It also pre-opens th
    [all...]
  /external/chromium_org/chrome/common/extensions/docs/templates/articles/
sandboxingEval.html 36 <h2 id="why_sandbox">Why sandbox?</h2>
43 is the least of our worries. The solution on offer is a sandbox in which
59 <h2 id="creating_and_using">Creating and using a sandbox.</h2>
74 Each file that ought to be run inside a sandbox must be listed in the
75 extension manifest by adding a <code>sandbox</code> property. This is a
78 file cleverly named "sandbox.html". The manifest entry looks like this:
84 "sandbox": {
85 "pages": ["sandbox.html"]
96 <a href='/extensions/examples/howto/sandbox/sandbox.html'>sandbox.html</a
    [all...]
  /external/chromium_org/extensions/common/
csp_validator_unittest.cc 154 // Sandbox directive is required.
156 "sandbox", Manifest::TYPE_EXTENSION));
158 // Additional sandbox tokens are OK.
160 "sandbox allow-scripts", Manifest::TYPE_EXTENSION));
163 "sandbox allow-same-origin", Manifest::TYPE_EXTENSION));
167 "sandbox; img-src https://google.com", Manifest::TYPE_EXTENSION));
171 "sandbox allow-top-navigation", Manifest::TYPE_EXTENSION));
173 "sandbox allow-top-navigation", Manifest::TYPE_PLATFORM_APP));
177 "sandbox allow-popups", Manifest::TYPE_EXTENSION));
179 "sandbox allow-popups", Manifest::TYPE_PLATFORM_APP))
    [all...]
  /external/chromium_org/chrome_elf/
chrome_elf.gyp 97 '../sandbox/sandbox.gyp:sandbox',
133 '../sandbox/sandbox.gyp:sandbox',
  /external/chromium_org/components/nacl/broker/
nacl_broker_listener.cc 21 #include "sandbox/win/src/sandbox_policy.h"
49 void NaClBrokerListener::PreSpawnTarget(sandbox::TargetPolicy* policy,
56 sandbox::ResultCode result = policy->AddRule(
57 sandbox::TargetPolicy::SUBSYS_NAMED_PIPES,
58 sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY,
60 *success = (result == sandbox::SBOX_ALL_OK);
  /external/chromium_org/sandbox/linux/suid/client/
setuid_sandbox_client_unittest.cc 9 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
10 #include "sandbox/linux/suid/common/sandbox.h"
13 namespace sandbox { namespace
70 // Set-up a fake environment as if we went through the setuid sandbox.
100 } // namespace sandbox
  /external/chromium_org/testing/
test_env.py 22 sandbox and should enable it. This should return True iff the slave is a
23 Linux host with the sandbox file present and configured correctly."""
37 """Checks enables the sandbox if it is required, otherwise it disables it."""
42 print 'Enabling sandbox. Setting environment variable:'
47 print 'Sandbox not properly installed. Unsetting:'
50 # the variable empty silently disables the sandbox.
  /external/chromium_org/content/
content_app.gypi 46 '../sandbox/sandbox.gyp:sandbox',
  /external/chromium_org/sandbox/linux/services/
scoped_process.h 11 #include "sandbox/sandbox_export.h"
13 namespace sandbox { namespace
53 } // namespace sandbox
yama.h 10 #include "sandbox/sandbox_export.h"
12 namespace sandbox { namespace
56 } // namespace sandbox
  /external/chromium_org/sandbox/mac/
os_compatibility.h 6 // that occur between different OS versions. The Mach messages that the sandbox
19 namespace sandbox { namespace
50 } // namespace sandbox

Completed in 934 milliseconds

<<11121314151617181920>>