/external/chromium_org/chrome/android/shell/java/ |
AndroidManifest.xml | 13 <permission android:name="org.chromium.chrome.shell.permission.SANDBOX" 62 android:permission="org.chromium.content_shell.permission.SANDBOX" 67 android:permission="org.chromium.content_shell.permission.SANDBOX" 72 android:permission="org.chromium.content_shell.permission.SANDBOX" 77 android:permission="org.chromium.content_shell.permission.SANDBOX" 82 android:permission="org.chromium.content_shell.permission.SANDBOX" 87 android:permission="org.chromium.content_shell.permission.SANDBOX" 92 android:permission="org.chromium.content_shell.permission.SANDBOX" 97 android:permission="org.chromium.content_shell.permission.SANDBOX" 102 android:permission="org.chromium.content_shell.permission.SANDBOX" [all...] |
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
errorcode.cc | 5 #include "sandbox/linux/seccomp-bpf/die.h" 6 #include "sandbox/linux/seccomp-bpf/errorcode.h" 8 namespace sandbox { namespace 52 SANDBOX_DIE("Invalid opcode in BPF sandbox rules"); 109 } // namespace sandbox
|
syscall_iterator_unittest.cc | 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 6 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h" 7 #include "sandbox/linux/tests/unit_tests.h" 9 namespace sandbox { namespace 136 } // namespace sandbox
|
codegen.h | 12 #include "sandbox/linux/seccomp-bpf/basicblock.h" 13 #include "sandbox/linux/seccomp-bpf/instruction.h" 14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 15 #include "sandbox/sandbox_export.h" 17 namespace sandbox { namespace 49 // // any C++ destructors after starting the sandbox. 158 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
syscall_sets.h | 10 #include "sandbox/sandbox_export.h" 13 // sandbox that reduces the Linux kernel's attack surface. Given their 17 namespace sandbox { namespace 75 // These give a lot of ambient authority and bypass the setuid sandbox. 104 } // namespace sandbox.
|
/external/chromium_org/sandbox/linux/services/ |
yama_unittests.cc | 15 #include "sandbox/linux/services/scoped_process.h" 16 #include "sandbox/linux/services/yama.h" 17 #include "sandbox/linux/tests/unit_tests.h" 20 namespace sandbox { namespace 152 } // namespace sandbox
|
init_process_reaper.cc | 5 #include "sandbox/linux/services/init_process_reaper.h" 18 namespace sandbox { namespace 101 } // namespace sandbox.
|
yama.cc | 5 #include "sandbox/linux/services/yama.h" 27 namespace sandbox { namespace 116 } // namespace sandbox
|
/external/chromium_org/sandbox/win/src/ |
interception_agent.h | 7 // http://dev.chromium.org/developers/design-documents/sandbox . 13 #include "sandbox/win/src/nt_internals.h" 14 #include "sandbox/win/src/sandbox_types.h" 16 namespace sandbox { namespace 85 } // namespace sandbox
|
window.cc | 5 #include "sandbox/win/src/window.h" 11 #include "sandbox/win/src/acl.h" 12 #include "sandbox/win/src/sid.h" 35 namespace sandbox { namespace 157 } // namespace sandbox
|
registry_policy_test.cc | 8 #include "sandbox/win/src/registry_policy.h" 9 #include "sandbox/win/src/sandbox.h" 10 #include "sandbox/win/src/sandbox_policy.h" 11 #include "sandbox/win/src/sandbox_factory.h" 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/win_utils.h" 14 #include "sandbox/win/tests/common/controller.h" 43 namespace sandbox { namespace 289 } // namespace sandbox [all...] |
sandbox_nt_util.cc | 5 #include "sandbox/win/src/sandbox_nt_util.h" 8 #include "sandbox/win/src/sandbox_factory.h" 9 #include "sandbox/win/src/target_services.h" 11 namespace sandbox { namespace 16 } // namespace sandbox 22 using sandbox::g_nt; 76 using sandbox::g_nt; 105 namespace sandbox { namespace 544 } // namespace sandbox 546 void* operator new(size_t size, sandbox::AllocationType type [all...] |
sharedmem_ipc_client.cc | 6 #include "sandbox/win/src/sharedmem_ipc_client.h" 7 #include "sandbox/win/src/sandbox.h" 8 #include "sandbox/win/src/crosscall_client.h" 9 #include "sandbox/win/src/crosscall_params.h" 12 namespace sandbox { namespace 152 } // namespace sandbox
|
acl.cc | 5 #include "sandbox/win/src/acl.h" 12 namespace sandbox { namespace 125 } // namespace sandbox
|
/external/chromium_org/third_party/WebKit/PerformanceTests/ShadowDOM/ |
StyleSheetInsert.html | 12 testDoc.body.innerHTML = "<head></head><body><div id='sandbox'></div></body>"; 19 var sandbox = testDoc.getElementById('sandbox'); 26 sandbox.appendChild(elementA); 31 sandbox.appendChild(elementB);
|
/external/chromium_org/sandbox/linux/tests/ |
unit_tests.h | 10 #include "sandbox/linux/tests/sandbox_test_runner_function_pointer.h" 13 namespace sandbox { namespace 55 #define DEATH_SUCCESS() sandbox::UnitTests::DeathSuccess, NULL 57 sandbox::UnitTests::DeathSuccessAllowNoise, NULL 59 sandbox::UnitTests::DeathMessage, \ 62 sandbox::UnitTests::DeathExitCode, \ 65 sandbox::UnitTests::DeathBySignal, \ 76 sandbox::UnitTests::RunTestInProcess(&sandbox_test_runner, death); \ 82 // changes to the system (i.e. they install a sandbox). GTest provides death 96 ((expr) ? static_cast<void>(0) : sandbox::UnitTests::AssertionFailure( [all...] |
/external/chromium_org/sandbox/ |
seccomp_bpf.target.darwin-x86.mk | 28 sandbox/linux/seccomp-bpf/basicblock.cc \ 29 sandbox/linux/seccomp-bpf/codegen.cc \ 30 sandbox/linux/seccomp-bpf/die.cc \ 31 sandbox/linux/seccomp-bpf/errorcode.cc \ 32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \ 33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \ 34 sandbox/linux/seccomp-bpf/syscall.cc \ 35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \ 36 sandbox/linux/seccomp-bpf/trap.cc \ 37 sandbox/linux/seccomp-bpf/verifier.c [all...] |
seccomp_bpf.target.darwin-x86_64.mk | 28 sandbox/linux/seccomp-bpf/basicblock.cc \ 29 sandbox/linux/seccomp-bpf/codegen.cc \ 30 sandbox/linux/seccomp-bpf/die.cc \ 31 sandbox/linux/seccomp-bpf/errorcode.cc \ 32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \ 33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \ 34 sandbox/linux/seccomp-bpf/syscall.cc \ 35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \ 36 sandbox/linux/seccomp-bpf/trap.cc \ 37 sandbox/linux/seccomp-bpf/verifier.c [all...] |
seccomp_bpf.target.linux-x86.mk | 28 sandbox/linux/seccomp-bpf/basicblock.cc \ 29 sandbox/linux/seccomp-bpf/codegen.cc \ 30 sandbox/linux/seccomp-bpf/die.cc \ 31 sandbox/linux/seccomp-bpf/errorcode.cc \ 32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \ 33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \ 34 sandbox/linux/seccomp-bpf/syscall.cc \ 35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \ 36 sandbox/linux/seccomp-bpf/trap.cc \ 37 sandbox/linux/seccomp-bpf/verifier.c [all...] |
seccomp_bpf.target.linux-x86_64.mk | 28 sandbox/linux/seccomp-bpf/basicblock.cc \ 29 sandbox/linux/seccomp-bpf/codegen.cc \ 30 sandbox/linux/seccomp-bpf/die.cc \ 31 sandbox/linux/seccomp-bpf/errorcode.cc \ 32 sandbox/linux/seccomp-bpf/sandbox_bpf.cc \ 33 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.cc \ 34 sandbox/linux/seccomp-bpf/syscall.cc \ 35 sandbox/linux/seccomp-bpf/syscall_iterator.cc \ 36 sandbox/linux/seccomp-bpf/trap.cc \ 37 sandbox/linux/seccomp-bpf/verifier.c [all...] |
/external/chromium_org/sandbox/win/sandbox_poc/ |
main_ui_window.cc | 15 #include "sandbox/win/sandbox_poc/main_ui_window.h" 17 #include "sandbox/win/sandbox_poc/resource.h" 18 #include "sandbox/win/src/acl.h" 19 #include "sandbox/win/src/sandbox.h" 20 #include "sandbox/win/src/win_utils.h" 43 sandbox::BrokerServices* broker) { 103 ::SetWindowText(window, L"Sandbox Proof of Concept"); 508 sandbox::TargetPolicy* policy = broker_->CreatePolicy(); 509 policy->SetJobLevel(sandbox::JOB_LOCKDOWN, 0) [all...] |
/external/chromium_org/content/zygote/ |
zygote_main_linux.cc | 40 #include "sandbox/linux/services/init_process_reaper.h" 41 #include "sandbox/linux/services/libc_urandom_override.h" 42 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 102 // Sandbox interception of libc calls. 104 // Because we are running in a sandbox certain libc calls will fail (localtime 124 // the call to the browser over the sandbox IPC 276 // access to the plugins before entering the sandbox. 296 // to be created before imposing the sandbox. 311 // NSS libraries are loaded before sandbox is activated. This is to allow 320 // pre-sandbox init, but more likely this is just a build configuration error [all...] |
/external/chromium_org/build/ |
update-linux-sandbox.sh | 11 CHROME_SANDBOX_INST_PATH="/usr/local/sbin/chrome-devel-sandbox" 62 echo "Your installed setuid sandbox is too old, installing it now." 68 echo "Your setuid sandbox is up to date"
|
/external/chromium_org/chrome/common/extensions/docs/templates/articles/ |
app_external.html | 24 <a href="https://github.com/GoogleChrome/chrome-app-samples/tree/master/sandbox">sandbox</a> sample. 121 <h2 id="sandboxing">Sandbox local content</h2> 130 <a href="manifest/sandbox">sandbox</a>. 141 <h3 id="inline_scripts">Use inline scripts in sandbox</h3> 158 <h3 id="include_sandbox">Include sandbox in manifest</h3> 161 You need to include the <code>sandbox</code> field in the manifest 162 and list the app pages to be served in a sandbox: 166 "sandbox": [all...] |
/external/chromium_org/content/gpu/ |
gpu_child_thread.h | 25 namespace sandbox { namespace 82 // Windows specific client sandbox interface. 83 sandbox::TargetServices* target_services_;
|