HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 226 - 250 of 795) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium_org/content/public/plugin/
content_plugin_client.h 19 // the sandbox is initialized for the plugin process.
  /external/chromium_org/ppapi/proxy/
OWNERS 4 # new sandbox escapes.
  /external/chromium_org/remoting/host/
OWNERS 2 # new sandbox escapes.
  /external/chromium_org/sandbox/linux/seccomp-bpf/
codegen.h 12 #include "sandbox/linux/seccomp-bpf/basicblock.h"
13 #include "sandbox/linux/seccomp-bpf/instruction.h"
14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
32 // this DAG to a Sandbox::Program.
49 // // any C++ destructors after starting the sandbox.
50 // Sandbox::Program program;
63 static void PrintProgram(const Sandbox::Program& program);
92 void Compile(Instruction *instructions, Sandbox::Program *program);
140 void ConcatenateBasicBlocks(const BasicBlocks&, Sandbox::Program *program);
demo.cc 29 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
33 using playground2::Sandbox;
37 // We don't expect our sandbox to do anything useful yet. So, we will fail
39 // following line should be removed as soon as the sandbox is starting to
214 // log the system call and then deny it. More elaborate sandbox policies
238 ErrorCode Evaluator(Sandbox *sandbox, int sysno, void *) {
327 return sandbox->Cond(1, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL,
330 sandbox->Cond(1, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL,
333 sandbox->Trap(DefaultHandler, NULL)))
419 Sandbox sandbox; local
    [all...]
  /external/chromium_org/sandbox/win/sandbox_poc/
resource.h 3 // Used by sandbox.rc
sandbox_poc.vcproj 160 RelativePath=".\sandbox.cc"
164 RelativePath=".\sandbox.h"
168 RelativePath=".\sandbox.ico"
172 RelativePath=".\sandbox.rc"
  /external/chromium_org/sandbox/win/src/
interception_agent.cc 6 // http://dev.chromium.org/developers/design-documents/sandbox .
8 #include "sandbox/win/src/interception_agent.h"
10 #include "sandbox/win/src/interception_internal.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/eat_resolver.h"
13 #include "sandbox/win/src/sidestep_resolver.h"
14 #include "sandbox/win/src/sandbox_nt_util.h"
26 namespace sandbox { namespace
233 } // namespace sandbox
job.cc 5 #include "sandbox/win/src/job.h"
8 #include "sandbox/win/src/restricted_token.h"
10 namespace sandbox { namespace
116 } // namespace sandbox
process_thread_policy.cc 5 #include "sandbox/win/src/process_thread_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/nt_internals.h"
12 #include "sandbox/win/src/policy_engine_opcodes.h"
13 #include "sandbox/win/src/policy_params.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/win_utils.h"
74 namespace sandbox { namespace
242 } // namespace sandbox
registry_interception.cc 5 #include "sandbox/win/src/registry_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/sandbox_nt_util.h"
11 #include "sandbox/win/src/sharedmem_ipc_client.h"
12 #include "sandbox/win/src/target_services.h"
14 namespace sandbox { namespace
176 } // namespace sandbox
registry_policy.cc 7 #include "sandbox/win/src/registry_policy.h"
10 #include "sandbox/win/src/ipc_tags.h"
11 #include "sandbox/win/src/policy_engine_opcodes.h"
12 #include "sandbox/win/src/policy_params.h"
13 #include "sandbox/win/src/sandbox_utils.h"
14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/win_utils.h"
115 namespace sandbox { namespace
225 } // namespace sandbox
resolver_32.cc 5 #include "sandbox/win/src/resolver.h"
7 #include "sandbox/win/src/sandbox_nt_util.h"
57 namespace sandbox { namespace
88 } // namespace sandbox
sandbox_nt_util.h 9 #include "sandbox/win/src/nt_internals.h"
10 #include "sandbox/win/src/sandbox_nt_types.h"
13 void* __cdecl operator new(size_t size, sandbox::AllocationType type,
15 void __cdecl operator delete(void* memory, sandbox::AllocationType type);
20 void __cdecl operator delete(void* memory, sandbox::AllocationType type,
25 sandbox::AllocationType type);
27 sandbox::AllocationType type);
48 namespace sandbox { namespace
170 } // namespace sandbox
sandbox_policy_base.h 16 #include "sandbox/win/src/crosscall_server.h"
17 #include "sandbox/win/src/handle_closer.h"
18 #include "sandbox/win/src/ipc_tags.h"
19 #include "sandbox/win/src/policy_engine_opcodes.h"
20 #include "sandbox/win/src/policy_engine_params.h"
21 #include "sandbox/win/src/sandbox_policy.h"
22 #include "sandbox/win/src/win_utils.h"
24 namespace sandbox { namespace
158 } // namespace sandbox
sandbox_types.h 8 namespace sandbox { namespace
10 // Operation result codes returned by the sandbox API.
52 // If the sandbox cannot create a secure environment for the target, the
89 } // namespace sandbox
win_utils_unittest.cc 8 #include "sandbox/win/src/win_utils.h"
9 #include "sandbox/win/tests/common/test_utils.h"
13 using sandbox::IsReparsePoint;
55 using sandbox::SameObject;
filesystem_interception.cc 5 #include "sandbox/win/src/filesystem_interception.h"
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/ipc_tags.h"
9 #include "sandbox/win/src/policy_params.h"
10 #include "sandbox/win/src/policy_target.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
13 #include "sandbox/win/src/sharedmem_ipc_client.h"
14 #include "sandbox/win/src/target_services.h"
16 namespace sandbox { namespace
    [all...]
  /external/chromium_org/third_party/WebKit/PerformanceTests/Parser/
html-parser.html 10 iframe.sandbox = 'allow-same-origin'; // Prevent external script loads which could cause write() to return before completing the parse.
  /external/chromium_org/ui/base/ozone/
surface_factory_ozone.h 35 // process before the sandbox has been activated.
39 // This method must be safe to run inside of the sandbox.
64 // that this may be called after we have entered the sandbox so if there are
66 // must be done outside of the sandbox, they must have been completed
  /external/chromium_org/ui/metro_viewer/
OWNERS 2 # new sandbox escapes.
  /external/chromium_org/webkit/child/
webkit_child_helpers.h 16 // computed inside the sandbox and thus its not always accurate.
  /external/openssh/
sandbox-rlimit.c 1 /* $OpenBSD: sandbox-rlimit.c,v 1.3 2011/06/23 09:34:13 djm Exp $ */
35 #include "ssh-sandbox.h"
38 /* Minimal sandbox that sets zero nfiles, nprocs and filesize rlimits */
53 debug3("%s: preparing rlimit sandbox", __func__);
  /external/chromium_org/content/zygote/
zygote_main_linux.cc 41 #include "sandbox/linux/services/libc_urandom_override.h"
42 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
102 // Sandbox interception of libc calls.
104 // Because we are running in a sandbox certain libc calls will fail (localtime
124 // the call to the browser over the sandbox IPC
256 // access to the plugins before entering the sandbox.
275 // to be created before imposing the sandbox.
288 // NSS libraries are loaded before sandbox is activated. This is to allow
297 // pre-sandbox init, but more likely this is just a build configuration error.
301 // Ensure access to the Pepper plugins before the sandbox is turned on
    [all...]
  /external/chromium_org/chrome/common/extensions/manifest_handlers/
sandboxed_page_info.h 36 // Content Security Policy that should be used to enforce the sandbox used
37 // by sandboxed pages (guaranteed to have the "sandbox" directive without the

Completed in 764 milliseconds

1 2 3 4 5 6 7 8 91011>>