/external/chromium_org/sandbox/mac/ |
policy.h | 13 #include "sandbox/sandbox_export.h" 15 namespace sandbox { namespace 68 } // namespace sandbox
|
policy_unittest.cc | 5 #include "sandbox/mac/policy.h" 9 namespace sandbox { namespace 98 } // namespace sandbox
|
sandbox_mac.gypi | 8 'target_name': 'sandbox', 45 'generate_stubs_project': 'sandbox/mac', 84 'sandbox',
|
xpc_stubs.sig | 5 // This file contains declarations of public XPC functions used in the sandbox.
|
/external/chromium_org/sandbox/win/ |
sandbox_win.gypi | 14 # of the Windows sandbox library. 112 'src/sandbox.cc', 113 'src/sandbox.h', 177 'target_name': 'sandbox', 216 'sandbox', 248 'sandbox', 265 'sandbox', 291 'sandbox', 298 'sandbox_poc/sandbox.cc', 299 'sandbox_poc/sandbox.h' [all...] |
/external/chromium_org/sandbox/win/src/ |
app_container.h | 14 #include "sandbox/win/src/sandbox_types.h" 22 namespace sandbox { namespace 67 } // namespace sandbox
|
app_container_unittest.cc | 6 #include "sandbox/win/src/app_container.h" 9 namespace sandbox { namespace 58 } // namespace sandbox
|
job.h | 9 #include "sandbox/win/src/restricted_token_utils.h" 11 namespace sandbox { namespace 62 } // namespace sandbox
|
shared_handles.cc | 5 #include "sandbox/win/src/shared_handles.h" 7 namespace sandbox { namespace 67 } // namespace sandbox
|
/external/chromium_org/chrome/app/ |
DEPS | 22 "+sandbox",
|
/external/chromium_org/chrome/browser/resources/gaia_auth/ |
main.html | 12 sandbox="allow-same-origin allow-scripts allow-popups allow-forms
|
/external/chromium_org/chrome/common/ |
nacl_loader.sb | 6 ; This is the Sandbox configuration file used for safeguarding the user's
|
/external/chromium_org/chrome_elf/blacklist/ |
blacklist_interceptions.cc | 21 #include "sandbox/win/src/internal_types.h" 22 #include "sandbox/win/src/nt_internals.h" 23 #include "sandbox/win/src/sandbox_nt_util.h" 24 #include "sandbox/win/src/sandbox_types.h" 34 HMODULE ntdll = ::GetModuleHandle(sandbox::kNtdllName); 133 *flags |= sandbox::MODULE_IS_PE_IMAGE; 147 *flags |= sandbox::MODULE_HAS_ENTRY_POINT; 149 *flags |= sandbox::MODULE_HAS_CODE; 201 if (module_name.empty() && (image_flags & sandbox::MODULE_HAS_CODE)) {
|
/external/chromium_org/components/nacl/common/ |
nacl_switches.cc | 19 // sandbox. 26 // Disable sandbox even for non SFI mode. This is particularly unsafe 27 // as non SFI NaCl heavily relies on the seccomp sandbox. 29 "nacl-dangerous-no-sandbox-nonsfi";
|
/external/chromium_org/components/nacl/renderer/ |
sandbox_arch.h | 12 // Returns the kind of SFI sandbox implemented by NaCl on this
|
/external/chromium_org/content/browser/ |
OWNERS | 11 # Mac Sandbox profiles.
|
/external/chromium_org/content/child/ |
content_child_helpers.h | 15 // computed inside the sandbox and thus its not always accurate.
|
/external/chromium_org/content/public/plugin/ |
content_plugin_client.h | 19 // the sandbox is initialized for the plugin process.
|
/external/chromium_org/content/renderer/ |
renderer_main_platform_delegate_linux.cc | 43 // The setuid sandbox is started in the zygote process: zygote_main_linux.cc 48 // about:sandbox uses a value returned from LinuxSandbox::GetStatus() before 57 // Under the setuid sandbox, we should not be able to open any file via the 68 // but we know that under the seccomp-bpf sandbox, this should return EPERM.
|
/external/chromium_org/sandbox/linux/ |
BUILD.gn | 16 # We have two principal targets: sandbox and sandbox_linux_unittests 19 # the setuid sandbox and is its own target. 21 group("sandbox") { 78 ":sandbox", 181 # A demonstration program for the seccomp-bpf sandbox. 192 # The setuid sandbox for Linux. 195 "suid/common/sandbox.h", 201 "suid/sandbox.c", 269 "suid/common/sandbox.h",
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
syscall_iterator.cc | 5 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h" 8 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 10 namespace sandbox { namespace 92 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
sigsys_handlers.h | 10 #include "sandbox/sandbox_export.h" 14 // See sandbox/linux/seccomp-bpf/trap.h to see how they work. 16 namespace sandbox { namespace 59 } // namespace sandbox.
|
/external/chromium_org/sandbox/linux/services/ |
thread_helpers_unittests.cc | 5 #include "sandbox/linux/services/thread_helpers.h" 21 #include "sandbox/linux/tests/unit_tests.h" 26 namespace sandbox { namespace 111 } // namespace sandbox
|
/external/chromium_org/sandbox/win/sandbox_poc/ |
resource.h | 3 // Used by sandbox.rc
|
sandbox_poc.vcproj | 160 RelativePath=".\sandbox.cc" 164 RelativePath=".\sandbox.h" 168 RelativePath=".\sandbox.ico" 172 RelativePath=".\sandbox.rc"
|