/external/chromium_org/content/public/plugin/ |
content_plugin_client.h | 19 // the sandbox is initialized for the plugin process.
|
/external/chromium_org/ppapi/proxy/ |
OWNERS | 4 # new sandbox escapes.
|
/external/chromium_org/remoting/host/ |
OWNERS | 2 # new sandbox escapes.
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
codegen.h | 12 #include "sandbox/linux/seccomp-bpf/basicblock.h" 13 #include "sandbox/linux/seccomp-bpf/instruction.h" 14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 32 // this DAG to a Sandbox::Program. 49 // // any C++ destructors after starting the sandbox. 50 // Sandbox::Program program; 63 static void PrintProgram(const Sandbox::Program& program); 92 void Compile(Instruction *instructions, Sandbox::Program *program); 140 void ConcatenateBasicBlocks(const BasicBlocks&, Sandbox::Program *program);
|
demo.cc | 29 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 33 using playground2::Sandbox; 37 // We don't expect our sandbox to do anything useful yet. So, we will fail 39 // following line should be removed as soon as the sandbox is starting to 214 // log the system call and then deny it. More elaborate sandbox policies 238 ErrorCode Evaluator(Sandbox *sandbox, int sysno, void *) { 327 return sandbox->Cond(1, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, 330 sandbox->Cond(1, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, 333 sandbox->Trap(DefaultHandler, NULL))) 419 Sandbox sandbox; local [all...] |
/external/chromium_org/sandbox/win/sandbox_poc/ |
resource.h | 3 // Used by sandbox.rc
|
sandbox_poc.vcproj | 160 RelativePath=".\sandbox.cc" 164 RelativePath=".\sandbox.h" 168 RelativePath=".\sandbox.ico" 172 RelativePath=".\sandbox.rc"
|
/external/chromium_org/sandbox/win/src/ |
interception_agent.cc | 6 // http://dev.chromium.org/developers/design-documents/sandbox . 8 #include "sandbox/win/src/interception_agent.h" 10 #include "sandbox/win/src/interception_internal.h" 11 #include "sandbox/win/src/interceptors.h" 12 #include "sandbox/win/src/eat_resolver.h" 13 #include "sandbox/win/src/sidestep_resolver.h" 14 #include "sandbox/win/src/sandbox_nt_util.h" 26 namespace sandbox { namespace 233 } // namespace sandbox
|
job.cc | 5 #include "sandbox/win/src/job.h" 8 #include "sandbox/win/src/restricted_token.h" 10 namespace sandbox { namespace 116 } // namespace sandbox
|
process_thread_policy.cc | 5 #include "sandbox/win/src/process_thread_policy.h" 10 #include "sandbox/win/src/ipc_tags.h" 11 #include "sandbox/win/src/nt_internals.h" 12 #include "sandbox/win/src/policy_engine_opcodes.h" 13 #include "sandbox/win/src/policy_params.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/win_utils.h" 74 namespace sandbox { namespace 242 } // namespace sandbox
|
registry_interception.cc | 5 #include "sandbox/win/src/registry_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/sandbox_factory.h" 10 #include "sandbox/win/src/sandbox_nt_util.h" 11 #include "sandbox/win/src/sharedmem_ipc_client.h" 12 #include "sandbox/win/src/target_services.h" 14 namespace sandbox { namespace 176 } // namespace sandbox
|
registry_policy.cc | 7 #include "sandbox/win/src/registry_policy.h" 10 #include "sandbox/win/src/ipc_tags.h" 11 #include "sandbox/win/src/policy_engine_opcodes.h" 12 #include "sandbox/win/src/policy_params.h" 13 #include "sandbox/win/src/sandbox_utils.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/win_utils.h" 115 namespace sandbox { namespace 225 } // namespace sandbox
|
resolver_32.cc | 5 #include "sandbox/win/src/resolver.h" 7 #include "sandbox/win/src/sandbox_nt_util.h" 57 namespace sandbox { namespace 88 } // namespace sandbox
|
sandbox_nt_util.h | 9 #include "sandbox/win/src/nt_internals.h" 10 #include "sandbox/win/src/sandbox_nt_types.h" 13 void* __cdecl operator new(size_t size, sandbox::AllocationType type, 15 void __cdecl operator delete(void* memory, sandbox::AllocationType type); 20 void __cdecl operator delete(void* memory, sandbox::AllocationType type, 25 sandbox::AllocationType type); 27 sandbox::AllocationType type); 48 namespace sandbox { namespace 170 } // namespace sandbox
|
sandbox_policy_base.h | 16 #include "sandbox/win/src/crosscall_server.h" 17 #include "sandbox/win/src/handle_closer.h" 18 #include "sandbox/win/src/ipc_tags.h" 19 #include "sandbox/win/src/policy_engine_opcodes.h" 20 #include "sandbox/win/src/policy_engine_params.h" 21 #include "sandbox/win/src/sandbox_policy.h" 22 #include "sandbox/win/src/win_utils.h" 24 namespace sandbox { namespace 158 } // namespace sandbox
|
sandbox_types.h | 8 namespace sandbox { namespace 10 // Operation result codes returned by the sandbox API. 52 // If the sandbox cannot create a secure environment for the target, the 89 } // namespace sandbox
|
win_utils_unittest.cc | 8 #include "sandbox/win/src/win_utils.h" 9 #include "sandbox/win/tests/common/test_utils.h" 13 using sandbox::IsReparsePoint; 55 using sandbox::SameObject;
|
filesystem_interception.cc | 5 #include "sandbox/win/src/filesystem_interception.h" 7 #include "sandbox/win/src/crosscall_client.h" 8 #include "sandbox/win/src/ipc_tags.h" 9 #include "sandbox/win/src/policy_params.h" 10 #include "sandbox/win/src/policy_target.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/sandbox_nt_util.h" 13 #include "sandbox/win/src/sharedmem_ipc_client.h" 14 #include "sandbox/win/src/target_services.h" 16 namespace sandbox { namespace [all...] |
/external/chromium_org/third_party/WebKit/PerformanceTests/Parser/ |
html-parser.html | 10 iframe.sandbox = 'allow-same-origin'; // Prevent external script loads which could cause write() to return before completing the parse.
|
/external/chromium_org/ui/base/ozone/ |
surface_factory_ozone.h | 35 // process before the sandbox has been activated. 39 // This method must be safe to run inside of the sandbox. 64 // that this may be called after we have entered the sandbox so if there are 66 // must be done outside of the sandbox, they must have been completed
|
/external/chromium_org/ui/metro_viewer/ |
OWNERS | 2 # new sandbox escapes.
|
/external/chromium_org/webkit/child/ |
webkit_child_helpers.h | 16 // computed inside the sandbox and thus its not always accurate.
|
/external/openssh/ |
sandbox-rlimit.c | 1 /* $OpenBSD: sandbox-rlimit.c,v 1.3 2011/06/23 09:34:13 djm Exp $ */ 35 #include "ssh-sandbox.h" 38 /* Minimal sandbox that sets zero nfiles, nprocs and filesize rlimits */ 53 debug3("%s: preparing rlimit sandbox", __func__);
|
/external/chromium_org/content/zygote/ |
zygote_main_linux.cc | 41 #include "sandbox/linux/services/libc_urandom_override.h" 42 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 102 // Sandbox interception of libc calls. 104 // Because we are running in a sandbox certain libc calls will fail (localtime 124 // the call to the browser over the sandbox IPC 256 // access to the plugins before entering the sandbox. 275 // to be created before imposing the sandbox. 288 // NSS libraries are loaded before sandbox is activated. This is to allow 297 // pre-sandbox init, but more likely this is just a build configuration error. 301 // Ensure access to the Pepper plugins before the sandbox is turned on [all...] |
/external/chromium_org/chrome/common/extensions/manifest_handlers/ |
sandboxed_page_info.h | 36 // Content Security Policy that should be used to enforce the sandbox used 37 // by sandboxed pages (guaranteed to have the "sandbox" directive without the
|