HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 326 - 350 of 990) sorted by null

<<11121314151617181920>>

  /external/chromium_org/chrome/android/shell/java/
AndroidManifest.xml 13 <permission android:name="org.chromium.chrome.shell.permission.SANDBOX"
62 android:permission="org.chromium.content_shell.permission.SANDBOX"
67 android:permission="org.chromium.content_shell.permission.SANDBOX"
72 android:permission="org.chromium.content_shell.permission.SANDBOX"
77 android:permission="org.chromium.content_shell.permission.SANDBOX"
82 android:permission="org.chromium.content_shell.permission.SANDBOX"
87 android:permission="org.chromium.content_shell.permission.SANDBOX"
92 android:permission="org.chromium.content_shell.permission.SANDBOX"
97 android:permission="org.chromium.content_shell.permission.SANDBOX"
102 android:permission="org.chromium.content_shell.permission.SANDBOX"
    [all...]
  /external/chromium_org/sandbox/linux/seccomp-bpf/
errorcode.cc 5 #include "sandbox/linux/seccomp-bpf/die.h"
6 #include "sandbox/linux/seccomp-bpf/errorcode.h"
8 namespace sandbox { namespace
52 SANDBOX_DIE("Invalid opcode in BPF sandbox rules");
109 } // namespace sandbox
syscall_iterator_unittest.cc 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
6 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
7 #include "sandbox/linux/tests/unit_tests.h"
9 namespace sandbox { namespace
136 } // namespace sandbox
codegen.h 12 #include "sandbox/linux/seccomp-bpf/basicblock.h"
13 #include "sandbox/linux/seccomp-bpf/instruction.h"
14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
15 #include "sandbox/sandbox_export.h"
17 namespace sandbox { namespace
49 // // any C++ destructors after starting the sandbox.
158 } // namespace sandbox
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
syscall_sets.h 10 #include "sandbox/sandbox_export.h"
13 // sandbox that reduces the Linux kernel's attack surface. Given their
17 namespace sandbox { namespace
75 // These give a lot of ambient authority and bypass the setuid sandbox.
104 } // namespace sandbox.
  /external/chromium_org/sandbox/linux/services/
yama_unittests.cc 15 #include "sandbox/linux/services/scoped_process.h"
16 #include "sandbox/linux/services/yama.h"
17 #include "sandbox/linux/tests/unit_tests.h"
20 namespace sandbox { namespace
152 } // namespace sandbox
init_process_reaper.cc 5 #include "sandbox/linux/services/init_process_reaper.h"
18 namespace sandbox { namespace
101 } // namespace sandbox.
yama.cc 5 #include "sandbox/linux/services/yama.h"
27 namespace sandbox { namespace
116 } // namespace sandbox
  /external/chromium_org/sandbox/win/src/
interception_agent.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
13 #include "sandbox/win/src/nt_internals.h"
14 #include "sandbox/win/src/sandbox_types.h"
16 namespace sandbox { namespace
85 } // namespace sandbox
window.cc 5 #include "sandbox/win/src/window.h"
11 #include "sandbox/win/src/acl.h"
12 #include "sandbox/win/src/sid.h"
35 namespace sandbox { namespace
157 } // namespace sandbox
registry_policy_test.cc 8 #include "sandbox/win/src/registry_policy.h"
9 #include "sandbox/win/src/sandbox.h"
10 #include "sandbox/win/src/sandbox_policy.h"
11 #include "sandbox/win/src/sandbox_factory.h"
12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/win_utils.h"
14 #include "sandbox/win/tests/common/controller.h"
43 namespace sandbox { namespace
289 } // namespace sandbox
    [all...]
sandbox_nt_util.cc 5 #include "sandbox/win/src/sandbox_nt_util.h"
8 #include "sandbox/win/src/sandbox_factory.h"
9 #include "sandbox/win/src/target_services.h"
11 namespace sandbox { namespace
16 } // namespace sandbox
22 using sandbox::g_nt;
76 using sandbox::g_nt;
105 namespace sandbox { namespace
544 } // namespace sandbox
546 void* operator new(size_t size, sandbox::AllocationType type
    [all...]
sharedmem_ipc_client.cc 6 #include "sandbox/win/src/sharedmem_ipc_client.h"
7 #include "sandbox/win/src/sandbox.h"
8 #include "sandbox/win/src/crosscall_client.h"
9 #include "sandbox/win/src/crosscall_params.h"
12 namespace sandbox { namespace
152 } // namespace sandbox
acl.cc 5 #include "sandbox/win/src/acl.h"
12 namespace sandbox { namespace
125 } // namespace sandbox
  /external/chromium_org/third_party/WebKit/PerformanceTests/ShadowDOM/
StyleSheetInsert.html 12 testDoc.body.innerHTML = "<head></head><body><div id='sandbox'></div></body>";
19 var sandbox = testDoc.getElementById('sandbox');
26 sandbox.appendChild(elementA);
31 sandbox.appendChild(elementB);
  /external/chromium_org/sandbox/linux/tests/
unit_tests.h 10 #include "sandbox/linux/tests/sandbox_test_runner_function_pointer.h"
13 namespace sandbox { namespace
55 #define DEATH_SUCCESS() sandbox::UnitTests::DeathSuccess, NULL
57 sandbox::UnitTests::DeathSuccessAllowNoise, NULL
59 sandbox::UnitTests::DeathMessage, \
62 sandbox::UnitTests::DeathExitCode, \
65 sandbox::UnitTests::DeathBySignal, \
76 sandbox::UnitTests::RunTestInProcess(&sandbox_test_runner, death); \
82 // changes to the system (i.e. they install a sandbox). GTest provides death
96 ((expr) ? static_cast<void>(0) : sandbox::UnitTests::AssertionFailure(
    [all...]
  /external/chromium_org/sandbox/
seccomp_bpf.target.darwin-x86.mk 28 sandbox/linux/seccomp-bpf/basicblock.cc \
29 sandbox/linux/seccomp-bpf/codegen.cc \
30 sandbox/linux/seccomp-bpf/die.cc \
31 sandbox/linux/seccomp-bpf/errorcode.cc \
32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \
33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \
34 sandbox/linux/seccomp-bpf/syscall.cc \
35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \
36 sandbox/linux/seccomp-bpf/trap.cc \
37 sandbox/linux/seccomp-bpf/verifier.c
    [all...]
seccomp_bpf.target.darwin-x86_64.mk 28 sandbox/linux/seccomp-bpf/basicblock.cc \
29 sandbox/linux/seccomp-bpf/codegen.cc \
30 sandbox/linux/seccomp-bpf/die.cc \
31 sandbox/linux/seccomp-bpf/errorcode.cc \
32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \
33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \
34 sandbox/linux/seccomp-bpf/syscall.cc \
35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \
36 sandbox/linux/seccomp-bpf/trap.cc \
37 sandbox/linux/seccomp-bpf/verifier.c
    [all...]
seccomp_bpf.target.linux-x86.mk 28 sandbox/linux/seccomp-bpf/basicblock.cc \
29 sandbox/linux/seccomp-bpf/codegen.cc \
30 sandbox/linux/seccomp-bpf/die.cc \
31 sandbox/linux/seccomp-bpf/errorcode.cc \
32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \
33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \
34 sandbox/linux/seccomp-bpf/syscall.cc \
35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \
36 sandbox/linux/seccomp-bpf/trap.cc \
37 sandbox/linux/seccomp-bpf/verifier.c
    [all...]
seccomp_bpf.target.linux-x86_64.mk 28 sandbox/linux/seccomp-bpf/basicblock.cc \
29 sandbox/linux/seccomp-bpf/codegen.cc \
30 sandbox/linux/seccomp-bpf/die.cc \
31 sandbox/linux/seccomp-bpf/errorcode.cc \
32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \
33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \
34 sandbox/linux/seccomp-bpf/syscall.cc \
35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \
36 sandbox/linux/seccomp-bpf/trap.cc \
37 sandbox/linux/seccomp-bpf/verifier.c
    [all...]
  /external/chromium_org/sandbox/win/sandbox_poc/
main_ui_window.cc 15 #include "sandbox/win/sandbox_poc/main_ui_window.h"
17 #include "sandbox/win/sandbox_poc/resource.h"
18 #include "sandbox/win/src/acl.h"
19 #include "sandbox/win/src/sandbox.h"
20 #include "sandbox/win/src/win_utils.h"
43 sandbox::BrokerServices* broker) {
103 ::SetWindowText(window, L"Sandbox Proof of Concept");
508 sandbox::TargetPolicy* policy = broker_->CreatePolicy();
509 policy->SetJobLevel(sandbox::JOB_LOCKDOWN, 0)
    [all...]
  /external/chromium_org/content/zygote/
zygote_main_linux.cc 40 #include "sandbox/linux/services/init_process_reaper.h"
41 #include "sandbox/linux/services/libc_urandom_override.h"
42 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
102 // Sandbox interception of libc calls.
104 // Because we are running in a sandbox certain libc calls will fail (localtime
124 // the call to the browser over the sandbox IPC
276 // access to the plugins before entering the sandbox.
296 // to be created before imposing the sandbox.
311 // NSS libraries are loaded before sandbox is activated. This is to allow
320 // pre-sandbox init, but more likely this is just a build configuration error
    [all...]
  /external/chromium_org/build/
update-linux-sandbox.sh 11 CHROME_SANDBOX_INST_PATH="/usr/local/sbin/chrome-devel-sandbox"
62 echo "Your installed setuid sandbox is too old, installing it now."
68 echo "Your setuid sandbox is up to date"
  /external/chromium_org/chrome/common/extensions/docs/templates/articles/
app_external.html 24 <a href="https://github.com/GoogleChrome/chrome-app-samples/tree/master/sandbox">sandbox</a> sample.
121 <h2 id="sandboxing">Sandbox local content</h2>
130 <a href="manifest/sandbox">sandbox</a>.
141 <h3 id="inline_scripts">Use inline scripts in sandbox</h3>
158 <h3 id="include_sandbox">Include sandbox in manifest</h3>
161 You need to include the <code>sandbox</code> field in the manifest
162 and list the app pages to be served in a sandbox:
166 "sandbox":
    [all...]
  /external/chromium_org/content/gpu/
gpu_child_thread.h 25 namespace sandbox { namespace
82 // Windows specific client sandbox interface.
83 sandbox::TargetServices* target_services_;

Completed in 306 milliseconds

<<11121314151617181920>>