/external/chromium_org/sandbox/win/src/ |
interception_unittest.cc | 12 #include "sandbox/win/src/interception.h" 13 #include "sandbox/win/src/interceptors.h" 14 #include "sandbox/win/src/interception_internal.h" 15 #include "sandbox/win/src/target_process.h" 18 namespace sandbox { namespace 212 } // namespace sandbox
|
process_mitigations.cc | 5 #include "sandbox/win/src/process_mitigations.h" 10 #include "sandbox/win/src/nt_internals.h" 11 #include "sandbox/win/src/sandbox_utils.h" 12 #include "sandbox/win/src/win_utils.h" 29 namespace sandbox { namespace 333 } // namespace sandbox
|
/external/chromium_org/sandbox/win/tests/common/ |
controller.cc | 5 #include "sandbox/win/tests/common/controller.h" 12 #include "sandbox/win/src/sandbox_factory.h" 63 namespace sandbox { namespace 216 arguments += no_sandbox_ ? L"-no-sandbox " : L" "; 329 } else if (0 != _wcsicmp(argv[1], L"-child-no-sandbox")) { 336 } // namespace sandbox
|
/external/chromium_org/sandbox/win/wow_helper/ |
service64_resolver.cc | 5 #include "sandbox/win/wow_helper/service64_resolver.h" 8 #include "sandbox/win/wow_helper/target_code.h" 97 sandbox::PatchInfo patch_info; 135 NTSTATUS ResolveNtdll(sandbox::PatchInfo* patch_info) { 153 namespace sandbox { namespace 342 } // namespace sandbox
|
/external/chromium_org/chrome/app/ |
client_util.h | 15 namespace sandbox { namespace 39 int Launch(HINSTANCE instance, sandbox::SandboxInterfaceInfo* sbox_info);
|
/external/chromium_org/chrome/common/ |
OWNERS | 8 # Mac Sandbox profiles. 13 # new sandbox escapes.
|
/external/chromium_org/components/breakpad/browser/ |
crash_handler_host_linux.h | 26 // This is the host for processes which run breakpad inside the sandbox on 28 // allows us to be outside the sandbox.
|
/external/chromium_org/content/plugin/ |
plugin_main.cc | 26 #include "sandbox/win/src/sandbox.h"
|
/external/chromium_org/content/public/browser/ |
utility_process_host.h | 54 // Allows a directory to be opened through the sandbox, in case it's needed by 61 // Make the process run without a sandbox.
|
zygote_host_linux.h | 29 // Returns the pid of the Sandbox Helper process.
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
instruction.h | 10 namespace sandbox { namespace 60 } // namespace sandbox
|
/external/chromium_org/sandbox/win/sandbox_poc/pocdll/ |
processes_and_threads.cc | 7 #include "sandbox/win/sandbox_poc/pocdll/exports.h" 8 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
|
/external/chromium_org/third_party/WebKit/public/platform/mac/ |
WebSandboxSupport.h | 44 // Put methods here that are required due to sandbox restrictions. 47 // Given an input font - |srcFont| [which can't be loaded due to sandbox
|
/external/chromium_org/third_party/WebKit/public/platform/win/ |
WebSandboxSupport.h | 38 // Put methods here that are required due to sandbox restrictions. 42 // and due to sandbox restrictions, the current process may be unable
|
/external/chromium/base/ |
rand_util_posix.cc | 20 // it if we are later put in a sandbox. This class wraps the file descriptor so
|
/external/chromium/build/ |
all.gyp | 81 '../sandbox/sandbox.gyp:*', 112 '../sandbox/sandbox.gyp:*', 183 '../sandbox/sandbox.gyp:sbox_integration_tests', 184 '../sandbox/sandbox.gyp:sbox_unittests', 185 '../sandbox/sandbox.gyp:sbox_validation_tests' [all...] |
/external/chromium_org/base/ |
rand_util_posix.cc | 19 // it if we are later put in a sandbox. This class wraps the file descriptor so
|
/external/chromium_org/chrome/plugin/ |
chrome_content_plugin_client.cc | 28 // before the sandbox is initialized.
|
/external/chromium_org/chrome/test/functional/ |
test_clean_exit.py | 28 extra_flags = ['--no-sandbox', '--child-clean-exit',
|
/external/chromium_org/components/nacl/broker/ |
nacl_broker_listener.h | 29 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
|
/external/chromium_org/content/browser/renderer_host/ |
render_sandbox_host_linux.h | 19 // This is a singleton object which handles sandbox requests from the
|
/external/chromium_org/content/public/common/ |
content_client.h | 37 namespace sandbox { namespace 141 // resource ID corresponding to the sandbox profile to use. The legal values 143 // SandboxType::SANDBOX_TYPE_AFTER_LAST_TYPE. Returns false if no sandbox 146 // the sandbox profile to use and true is returned.
|
/external/chromium_org/content/renderer/pepper/ |
usb_key_code_conversion_linux.cc | 19 // sandbox.
|
/external/chromium_org/content/test/ |
mock_render_process.cc | 27 // DIBs in the current process, since there is no sandbox protecting us (and
|
/external/chromium_org/ipc/ |
OWNERS | 12 # new sandbox escapes.
|