HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 376 - 400 of 851) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/win/src/
interception_unittest.cc 12 #include "sandbox/win/src/interception.h"
13 #include "sandbox/win/src/interceptors.h"
14 #include "sandbox/win/src/interception_internal.h"
15 #include "sandbox/win/src/target_process.h"
18 namespace sandbox { namespace
212 } // namespace sandbox
process_mitigations.cc 5 #include "sandbox/win/src/process_mitigations.h"
10 #include "sandbox/win/src/nt_internals.h"
11 #include "sandbox/win/src/sandbox_utils.h"
12 #include "sandbox/win/src/win_utils.h"
29 namespace sandbox { namespace
333 } // namespace sandbox
  /external/chromium_org/sandbox/win/tests/common/
controller.cc 5 #include "sandbox/win/tests/common/controller.h"
12 #include "sandbox/win/src/sandbox_factory.h"
63 namespace sandbox { namespace
216 arguments += no_sandbox_ ? L"-no-sandbox " : L" ";
329 } else if (0 != _wcsicmp(argv[1], L"-child-no-sandbox")) {
336 } // namespace sandbox
  /external/chromium_org/sandbox/win/wow_helper/
service64_resolver.cc 5 #include "sandbox/win/wow_helper/service64_resolver.h"
8 #include "sandbox/win/wow_helper/target_code.h"
97 sandbox::PatchInfo patch_info;
135 NTSTATUS ResolveNtdll(sandbox::PatchInfo* patch_info) {
153 namespace sandbox { namespace
342 } // namespace sandbox
  /external/chromium_org/chrome/app/
client_util.h 15 namespace sandbox { namespace
39 int Launch(HINSTANCE instance, sandbox::SandboxInterfaceInfo* sbox_info);
  /external/chromium_org/chrome/common/
OWNERS 8 # Mac Sandbox profiles.
13 # new sandbox escapes.
  /external/chromium_org/components/breakpad/browser/
crash_handler_host_linux.h 26 // This is the host for processes which run breakpad inside the sandbox on
28 // allows us to be outside the sandbox.
  /external/chromium_org/content/plugin/
plugin_main.cc 26 #include "sandbox/win/src/sandbox.h"
  /external/chromium_org/content/public/browser/
utility_process_host.h 54 // Allows a directory to be opened through the sandbox, in case it's needed by
61 // Make the process run without a sandbox.
zygote_host_linux.h 29 // Returns the pid of the Sandbox Helper process.
  /external/chromium_org/sandbox/linux/seccomp-bpf/
instruction.h 10 namespace sandbox { namespace
60 } // namespace sandbox
  /external/chromium_org/sandbox/win/sandbox_poc/pocdll/
processes_and_threads.cc 7 #include "sandbox/win/sandbox_poc/pocdll/exports.h"
8 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
  /external/chromium_org/third_party/WebKit/public/platform/mac/
WebSandboxSupport.h 44 // Put methods here that are required due to sandbox restrictions.
47 // Given an input font - |srcFont| [which can't be loaded due to sandbox
  /external/chromium_org/third_party/WebKit/public/platform/win/
WebSandboxSupport.h 38 // Put methods here that are required due to sandbox restrictions.
42 // and due to sandbox restrictions, the current process may be unable
  /external/chromium/base/
rand_util_posix.cc 20 // it if we are later put in a sandbox. This class wraps the file descriptor so
  /external/chromium/build/
all.gyp 81 '../sandbox/sandbox.gyp:*',
112 '../sandbox/sandbox.gyp:*',
183 '../sandbox/sandbox.gyp:sbox_integration_tests',
184 '../sandbox/sandbox.gyp:sbox_unittests',
185 '../sandbox/sandbox.gyp:sbox_validation_tests'
    [all...]
  /external/chromium_org/base/
rand_util_posix.cc 19 // it if we are later put in a sandbox. This class wraps the file descriptor so
  /external/chromium_org/chrome/plugin/
chrome_content_plugin_client.cc 28 // before the sandbox is initialized.
  /external/chromium_org/chrome/test/functional/
test_clean_exit.py 28 extra_flags = ['--no-sandbox', '--child-clean-exit',
  /external/chromium_org/components/nacl/broker/
nacl_broker_listener.h 29 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
  /external/chromium_org/content/browser/renderer_host/
render_sandbox_host_linux.h 19 // This is a singleton object which handles sandbox requests from the
  /external/chromium_org/content/public/common/
content_client.h 37 namespace sandbox { namespace
141 // resource ID corresponding to the sandbox profile to use. The legal values
143 // SandboxType::SANDBOX_TYPE_AFTER_LAST_TYPE. Returns false if no sandbox
146 // the sandbox profile to use and true is returned.
  /external/chromium_org/content/renderer/pepper/
usb_key_code_conversion_linux.cc 19 // sandbox.
  /external/chromium_org/content/test/
mock_render_process.cc 27 // DIBs in the current process, since there is no sandbox protecting us (and
  /external/chromium_org/ipc/
OWNERS 12 # new sandbox escapes.

Completed in 2827 milliseconds

<<11121314151617181920>>