/external/chromium_org/sandbox/mac/ |
BUILD.gn | 5 component("sandbox") { 33 generate_stubs_project = "sandbox/mac" 67 ":sandbox",
|
launchd_interception_server.cc | 5 #include "sandbox/mac/launchd_interception_server.h" 11 #include "sandbox/mac/bootstrap_sandbox.h" 13 namespace sandbox { namespace 21 const BootstrapSandbox* sandbox) 22 : sandbox_(sandbox), 34 // Allocate the dummy sandbox port. 38 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port."; 44 MACH_LOG(ERROR, kr) << "Failed to allocate dummy sandbox port send right."; 62 // No sandbox policy is in place for the sender of this message, which 70 // Filter messages sent via bootstrap_look_up to enforce the sandbox polic [all...] |
/external/chromium_org/sandbox/ |
sandbox.target.darwin-arm.mk | 7 LOCAL_MODULE_STEM := sandbox 31 .PHONY: sandbox 32 sandbox: sandbox_sandbox_gyp
|
sandbox.target.darwin-arm64.mk | 7 LOCAL_MODULE_STEM := sandbox 29 .PHONY: sandbox 30 sandbox: sandbox_sandbox_gyp
|
sandbox.target.darwin-mips.mk | 7 LOCAL_MODULE_STEM := sandbox 29 .PHONY: sandbox 30 sandbox: sandbox_sandbox_gyp
|
sandbox.target.darwin-x86.mk | 7 LOCAL_MODULE_STEM := sandbox 31 .PHONY: sandbox 32 sandbox: sandbox_sandbox_gyp
|
sandbox.target.darwin-x86_64.mk | 7 LOCAL_MODULE_STEM := sandbox 31 .PHONY: sandbox 32 sandbox: sandbox_sandbox_gyp
|
sandbox.target.linux-arm.mk | 7 LOCAL_MODULE_STEM := sandbox 31 .PHONY: sandbox 32 sandbox: sandbox_sandbox_gyp
|
sandbox.target.linux-arm64.mk | 7 LOCAL_MODULE_STEM := sandbox 29 .PHONY: sandbox 30 sandbox: sandbox_sandbox_gyp
|
sandbox.target.linux-mips.mk | 7 LOCAL_MODULE_STEM := sandbox 29 .PHONY: sandbox 30 sandbox: sandbox_sandbox_gyp
|
sandbox.target.linux-x86.mk | 7 LOCAL_MODULE_STEM := sandbox 31 .PHONY: sandbox 32 sandbox: sandbox_sandbox_gyp
|
sandbox.target.linux-x86_64.mk | 7 LOCAL_MODULE_STEM := sandbox 31 .PHONY: sandbox 32 sandbox: sandbox_sandbox_gyp
|
/external/chromium_org/sandbox/win/src/ |
Wow64.h | 11 #include "sandbox/win/src/sandbox_types.h" 13 namespace sandbox { namespace 48 } // namespace sandbox
|
acl.h | 12 #include "sandbox/win/src/sid.h" 14 namespace sandbox { namespace 41 } // namespace sandbox
|
service_resolver_unittest.cc | 10 #include "sandbox/win/src/resolver.h" 11 #include "sandbox/win/src/sandbox_utils.h" 12 #include "sandbox/win/src/service_resolver.h" 58 typedef ResolverThunkTest<sandbox::ServiceResolverThunk> WinXpResolverTest; 61 typedef ResolverThunkTest<sandbox::Win8ResolverThunk> Win8ResolverTest; 62 typedef ResolverThunkTest<sandbox::Wow64ResolverThunk> Wow64ResolverTest; 63 typedef ResolverThunkTest<sandbox::Wow64W8ResolverThunk> Wow64W8ResolverTest; 90 sandbox::ServiceResolverThunk* resolver) { 132 sandbox::ServiceResolverThunk* GetTestResolver(bool relaxed) { 151 sandbox::ServiceResolverThunk* resolver = GetTestResolver(relaxed) [all...] |
window.h | 12 #include "sandbox/win/src/sandbox_types.h" 14 namespace sandbox { namespace 38 } // namespace sandbox
|
sandbox.h | 5 // Sandbox is a sandbox library for windows processes. Use when you want a 16 // there are cases where the Sandbox library is linked against the main .exe 25 #include "sandbox/win/src/sandbox_policy.h" 26 #include "sandbox/win/src/sandbox_types.h" 28 // sandbox: Google User-Land Application Sandbox 29 namespace sandbox { namespace 58 // interface to specify the sandbox policy for new processes created by 69 // policy: This is the pointer to the policy object for the sandbox t [all...] |
handle_closer.h | 13 #include "sandbox/win/src/interception.h" 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/target_process.h" 17 namespace sandbox { namespace 72 } // namespace sandbox
|
process_thread_policy.h | 10 #include "sandbox/win/src/policy_low_level.h" 14 #include "sandbox/win/src/crosscall_server.h" 15 #include "sandbox/win/src/sandbox_policy.h" 17 namespace sandbox { namespace 80 } // namespace sandbox
|
/external/chromium_org/ui/views/examples/ |
examples_with_content_main_exe.cc | 12 #include "sandbox/win/src/sandbox_types.h" 28 // sandbox::InitLibcUrandomOverrides(). See http://crbug.com/374712. 39 sandbox::SandboxInterfaceInfo sandbox_info = {0};
|
/external/chromium_org/components/nacl/loader/nonsfi/ |
nonsfi_sandbox.cc | 21 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 22 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 23 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 24 #include "sandbox/linux/seccomp-bpf/trap.h" 25 #include "sandbox/linux/services/linux_syscalls.h" 32 using sandbox::ErrorCode; 33 using sandbox::SandboxBPF; 64 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL)), 72 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL), 74 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL)))) [all...] |
/external/chromium_org/components/nacl/loader/ |
nacl_helper_win_64.cc | 22 #include "sandbox/win/src/sandbox_types.h" 49 sandbox::SandboxInterfaceInfo sandbox_info = {0}; 65 // Initialize the sandbox for this process. 67 // Die if the sandbox can't be enabled. 68 CHECK(sandbox_initialized_ok) << "Error initializing sandbox for "
|
/external/chromium_org/remoting/webapp/ |
xhr_proxy.js | 8 * The sandbox isn't allowed to make XHRs, so they have to be proxied to the 13 * creations by JS running in the sandbox. 74 console.error('Sandbox: unproxied getResponseHeader(' + header + ') called.'); 78 console.error('Sandbox: unproxied getAllResponseHeaders called.'); 82 console.error('Sandbox: unproxied overrideMimeType called.');
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
baseline_policy_unittest.cc | 5 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h" 26 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 27 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 28 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 29 #include "sandbox/linux/services/android_futex.h" 30 #include "sandbox/linux/services/linux_syscalls.h" 31 #include "sandbox/linux/services/thread_helpers.h" 32 #include "sandbox/linux/tests/unit_tests.h" 34 namespace sandbox { namespace 97 // Without the sandbox, this would EBADF instead [all...] |
/external/chromium_org/sandbox/win/ |
BUILD.gn | 5 source_set("sandbox") {
97 "src/sandbox.cc",
98 "src/sandbox.h",
202 ":sandbox",
218 ":sandbox",
243 ":sandbox",
253 "sandbox_poc/sandbox.cc",
254 "sandbox_poc/sandbox.h",
255 "sandbox_poc/sandbox.ico",
256 "sandbox_poc/sandbox.rc", [all...] |