/external/chromium_org/ppapi/shared_impl/ |
time_conversion.h | 27 // process only on Windows (the sandbox prevents this from working properly on
|
/external/chromium_org/remoting/client/plugin/ |
pepper_port_allocator.h | 23 // code doesn't work in sandbox.
|
/external/chromium_org/remoting/webapp/ |
wcs_sandbox_content.js | 8 * The sandbox side of the application/sandbox WCS interface, used by the 9 * sandbox to exchange messages with the application. 210 * Entry point for the WCS sandbox process.
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
basicblock.h | 10 #include "sandbox/linux/seccomp-bpf/instruction.h"
|
trap.h | 14 #include "sandbox/linux/seccomp-bpf/port.h" 27 // time. For the purposes of our sandbox, this assertion should always be 28 // true. Threads are incompatible with the seccomp sandbox anyway. 56 // Once unsafe traps are enabled, the sandbox is essentially compromised.
|
trap.cc | 16 #include "sandbox/linux/seccomp-bpf/codegen.h" 17 #include "sandbox/linux/seccomp-bpf/die.h" 18 #include "sandbox/linux/seccomp-bpf/syscall.h" 19 #include "sandbox/linux/seccomp-bpf/trap.h" 23 #include "sandbox/linux/services/android_ucontext.h" 92 // to avoid race conditions. Normally, this is a non-issue as the sandbox 169 // evaluator registered with the sandbox. 261 // threaded while the sandbox is being set up). But we nonetheless are 323 SANDBOX_INFO("WARNING! Disabling sandbox for debugging purposes"); 326 SANDBOX_INFO("Cannot disable sandbox and use unsafe traps unless [all...] |
/external/chromium_org/sandbox/linux/suid/common/ |
suid_unsafe_environment_variables.h | 9 // We need to save these environment variables before running a SUID sandbox
|
/external/chromium_org/sandbox/win/src/ |
Wow64.cc | 5 #include "sandbox/win/src/wow64.h" 13 #include "sandbox/win/src/target_process.h" 74 namespace sandbox { namespace 219 } // namespace sandbox
|
handle_table.cc | 5 #include "sandbox/win/src/handle_table.h" 12 #include "sandbox/win/src/win_utils.h" 23 namespace sandbox { namespace 183 } // namespace sandbox
|
policy_engine_processor.h | 9 #include "sandbox/win/src/policy_engine_params.h" 10 #include "sandbox/win/src/policy_engine_opcodes.h" 12 namespace sandbox { namespace 143 } // namespace sandbox
|
service_resolver_64.cc | 5 #include "sandbox/win/src/service_resolver.h" 9 #include "sandbox/win/src/win_utils.h" 83 namespace sandbox { namespace 193 } // namespace sandbox
|
file_policy_test.cc | 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/sandbox.h" 14 #include "sandbox/win/src/sandbox_factory.h" 15 #include "sandbox/win/src/sandbox_policy.h" 16 #include "sandbox/win/src/win_utils.h" 17 #include "sandbox/win/tests/common/controller.h" 18 #include "sandbox/win/tests/common/test_utils.h" 25 namespace sandbox { namespace 599 } // namespace sandbox [all...] |
restricted_token.h | 12 #include "sandbox/win/src/restricted_token_utils.h" 13 #include "sandbox/win/src/security_level.h" 14 #include "sandbox/win/src/sid.h" 24 namespace sandbox { namespace 196 } // namespace sandbox
|
/external/chromium_org/sandbox/win/tools/finder/ |
finder_kernel.cc | 5 #include "sandbox/win/src/restricted_token.h" 6 #include "sandbox/win/src/restricted_token_utils.h" 7 #include "sandbox/win/tools/finder/finder.h" 8 #include "sandbox/win/tools/finder/ntundoc.h"
|
/external/chromium_org/third_party/WebKit/PerformanceTests/DOM/ |
TraverseChildNodes.html | 15 iframe.sandbox = ''; // Prevent external script loads which could cause write() to return before completing the parse.
|
/external/chromium_org/third_party/WebKit/PerformanceTests/Parser/ |
html-parser-threaded.html | 13 iframe.sandbox = ''; // Prevent external script loads which could cause write() to return before completing the parse.
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
SecurityContext.cpp | 89 // http://www.w3.org/TR/html5/the-iframe-element.html#attr-iframe-sandbox 105 // Turn off the corresponding sandbox flag if it's set as "allowed". 135 tokenErrors.appendLiteral(" are invalid sandbox flags."); 137 tokenErrors.appendLiteral(" is an invalid sandbox flag.");
|
/external/chromium_org/third_party/WebKit/Source/core/html/ |
HTMLIFrameElement.idl | 29 [Reflect] attribute DOMString sandbox;
|
/external/chromium_org/tools/perf/measurements/ |
skpicture_printer.py | 19 '--no-sandbox',
|
/external/openssh/ |
Android.mk | 122 sandbox-null.c sandbox-rlimit.c sandbox-systrace.c sandbox-darwin.o
|
ssh-sandbox.h | 1 /* $OpenBSD: ssh-sandbox.h,v 1.1 2011/06/23 09:34:13 djm Exp $ */
|
/external/chromium_org/sandbox/win/tests/integration_tests/ |
integration_tests_test.cc | 8 #include "sandbox/win/src/sandbox.h" 9 #include "sandbox/win/src/target_services.h" 10 #include "sandbox/win/src/sandbox_factory.h" 11 #include "sandbox/win/tests/common/controller.h" 13 namespace sandbox { namespace 306 } // namespace sandbox
|
/external/chromium_org/content/renderer/ |
renderer_main.cc | 195 // Load pepper plugins before engaging the sandbox. 199 // Initialize WebRTC before engaging the sandbox. 217 LOG(ERROR) << "Running without renderer sandbox"; 220 // symbols when the sandbox is enabled, so only try when the sandbox is
|
/external/chromium_org/sandbox/linux/tests/ |
unit_tests.cc | 16 #include "sandbox/linux/tests/unit_tests.h" 42 namespace sandbox { namespace 105 // in the BPF sandbox, as it potentially makes global state changes and as 121 ASSERT_EQ(1, num_threads) << "Running sandbox tests with multiple threads " 187 // run (e.g. when testing sandbox features on a kernel that doesn't
|
/external/chromium_org/chrome/ |
chrome_exe.gypi | 67 # We still want the _win entry point for sandbox, etc. 462 '../sandbox/sandbox.gyp:sandbox', 477 '../sandbox/sandbox.gyp:sandbox', 587 '../sandbox/sandbox.gyp:sandbox_win64',
|