/external/chromium_org/sandbox/linux/services/ |
broker_process.cc | 5 #include "sandbox/linux/services/broker_process.h" 24 #include "sandbox/linux/services/linux_syscalls.h" 121 namespace sandbox { namespace 179 // Enable the sandbox if provided. 522 } // namespace sandbox.
|
broker_process_unittest.cc | 5 #include "sandbox/linux/services/broker_process.h" 20 #include "sandbox/linux/tests/unit_tests.h" 23 namespace sandbox { namespace 358 // Sandbox test because we could get a SIGPIPE. 438 } // namespace sandbox
|
/external/chromium_org/sandbox/win/src/ |
crosscall_client.h | 8 #include "sandbox/win/src/crosscall_params.h" 9 #include "sandbox/win/src/sandbox.h" 39 namespace sandbox { namespace 481 } // namespace sandbox
|
policy_low_level_unittest.cc | 5 #include "sandbox/win/src/policy_engine_params.h" 6 #include "sandbox/win/src/policy_engine_processor.h" 7 #include "sandbox/win/src/policy_low_level.h" 10 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = { 11 #define POLPARAM(p) sandbox::ParamPickerMake(p), 14 namespace sandbox { namespace 617 } // namespace sandbox
|
policy_low_level.cc | 8 #include "sandbox/win/src/policy_low_level.h" 32 namespace sandbox { namespace 348 } // namespace sandbox
|
restricted_token_unittest.cc | 11 #include "sandbox/win/src/restricted_token.h" 12 #include "sandbox/win/src/sid.h" 15 namespace sandbox { namespace 593 } // namespace sandbox
|
/external/chromium_org/chrome/installer/linux/common/ |
installer.include | 134 # sandbox 135 # Rename sandbox binary with hyphen instead of underscore because that's what 138 "${STAGEDIR}/${INSTALLDIR}/${PROGNAME}-sandbox"
|
/external/chromium_org/remoting/host/win/ |
unprivileged_process_delegate.cc | 32 #include "sandbox/win/src/restricted_token.h" 83 sandbox::RestrictedToken restricted_token; 93 if (restricted_token.SetIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW)
|
/external/chromium/base/i18n/ |
icu_util.cc | 105 // Instead, Mac maps the file in and hands off the data so the sandbox won't
|
/external/chromium/chrome/browser/ |
crash_handler_host_linux.h | 29 // allows us to be outside the sandbox.
|
/external/chromium_org/base/i18n/ |
icu_util.cc | 109 // Instead, Mac maps the file in and hands off the data so the sandbox won't
|
/external/chromium_org/chrome/browser/chromeos/contacts/ |
contact.proto | 42 // must be decoded within a sandbox by e.g. ImageDecoder before being used.
|
/external/chromium_org/chrome/browser/ |
crash_handler_host_linux.h | 26 // because it allows us to be outside the sandbox.
|
/external/chromium_org/chrome/browser/nacl_host/test/ |
debug_stub_browser_tests.py | 57 # Breakpoints and single-stepping might interfere with Chrome sandbox. So we
|
/external/chromium_org/chrome/common/ |
chrome_paths_win.cc | 117 // lies on a network share the sandbox will prevent us from accessing it.
|
/external/chromium_org/chrome/common/extensions/manifest_handlers/ |
sandboxed_page_info.cc | 25 "sandbox allow-scripts allow-forms allow-popups";
|
/external/chromium_org/chrome/utility/ |
chrome_content_utility_client.cc | 94 // Load the pdf plugin before the sandbox is turned on. This is for Windows 333 // used by the Chrome PDF plugin that will fail in the sandbox. 341 // CreateDC fails behind the sandbox, but not CreateCompatibleDC. 395 // Patch the IAT for handling specific APIs known to fail in the sandbox.
|
/external/chromium_org/content/ |
DEPS | 43 "+sandbox",
|
/external/chromium_org/sandbox/win/wow_helper/ |
wow_helper.vcproj | 189 Name="sandbox"
|
/external/chromium_org/third_party/WebKit/Source/core/platform/chromium/ |
PlatformKeyboardEventChromium.cpp | 77 // FIXME: Does this even work inside the sandbox?
|
/external/chromium_org/third_party/WebKit/Source/core/platform/graphics/chromium/ |
CrossProcessFontLoading.h | 56 // by the sandbox.
|
/external/chromium_org/third_party/WebKit/public/ |
README | 32 Blink is designed to run in a sandbox and interacts with the operating system
|
/external/chromium_org/third_party/libjingle/overrides/ |
init_webrtc.cc | 112 // explicitly before the sandbox is initialized. In that case, this call is
|
/external/chromium_org/third_party/tcmalloc/chromium/src/base/ |
spinlock_linux-inl.h | 46 // is necessary to make the code compatible with the seccomp sandbox,
|
/external/chromium_org/tools/code_coverage/ |
coverage.py | 58 ['page_cycler_tests.exe', '--gtest_filter=*File --no-sandbox'], 59 ['reliability_tests.exe', '--no-sandbox'], 60 ['startup_tests.exe', '--no-sandbox'], 61 ['tab_switching_test.exe', '--no-sandbox'],
|