HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 351 - 375 of 990) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/win/src/
policy_engine_processor.cc 5 #include "sandbox/win/src/policy_engine_processor.h"
7 namespace sandbox { namespace
107 } // namespace sandbox
sid_unittest.cc 11 #include "sandbox/win/src/sid.h"
14 namespace sandbox { namespace
71 } // namespace sandbox
target_process.cc 5 #include "sandbox/win/src/target_process.h"
12 #include "sandbox/win/src/crosscall_server.h"
13 #include "sandbox/win/src/crosscall_client.h"
14 #include "sandbox/win/src/policy_low_level.h"
15 #include "sandbox/win/src/sandbox_types.h"
16 #include "sandbox/win/src/sharedmem_ipc_server.h"
24 sandbox::PolicyGlobal* policy =
25 reinterpret_cast<sandbox::PolicyGlobal*>(dest);
29 for (size_t i = 0; i < sandbox::kMaxServiceCount; i++) {
33 policy->entry[i] = reinterpret_cast<sandbox::PolicyBuffer*>(buffer)
40 namespace sandbox { namespace
    [all...]
threadpool_unittest.cc 5 #include "sandbox/win/src/win2k_threadpool.h"
16 namespace sandbox { namespace
94 } // namespace sandbox
  /external/chromium_org/sandbox/win/tools/finder/
finder_fs.cc 5 #include "sandbox/win/src/restricted_token.h"
6 #include "sandbox/win/src/restricted_token_utils.h"
7 #include "sandbox/win/tools/finder/finder.h"
finder_registry.cc 5 #include "sandbox/win/src/restricted_token.h"
6 #include "sandbox/win/src/restricted_token_utils.h"
7 #include "sandbox/win/tools/finder/finder.h"
  /external/chromium_org/android_webview/common/
OWNERS 2 # new sandbox escapes.
  /external/chromium_org/base/files/
scoped_file.cc 27 // It's especially problematic on Linux with the setuid sandbox, where
  /external/chromium_org/chrome/common/media/
OWNERS 2 # new sandbox escapes.
  /external/chromium_org/components/autofill/content/common/
OWNERS 2 # new sandbox escapes.
  /external/chromium_org/components/cdm/common/
OWNERS 2 # new sandbox escapes.
  /external/chromium_org/components/nacl/common/
OWNERS 2 # new sandbox escapes.
  /external/chromium_org/components/nacl/loader/
nacl_main_platform_delegate_mac.mm 25 << "Error initializing sandbox for " << switches::kNaClLoaderProcess;
  /external/chromium_org/components/tracing/
OWNERS 5 # new sandbox escapes.
  /external/chromium_org/components/visitedlink/common/
OWNERS 2 # new sandbox escapes.
  /external/chromium_org/content/
OWNERS 14 # Mac Sandbox profiles.
  /external/chromium_org/content/common/dom_storage/
OWNERS 5 # new sandbox escapes.
  /external/chromium_org/content/common/
font_config_ipc_linux.h 16 // of the sandbox. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC
process_type.cc 27 return "Sandbox helper";
sandbox_util.h 11 // This file contains cross-platform sandbox code internal to content.
  /external/chromium_org/content/common/service_worker/
OWNERS 8 # new sandbox escapes.
  /external/chromium_org/content/public/app/
content_main_delegate.h 37 // before the sandbox is engaged.
40 // This is where the embedder can add startup code to run after the sandbox
54 // can allocate an IO port for it before the sandbox is initialized. Embedders
64 // Allows the embedder to override initializing the sandbox. This is needed
  /external/chromium_org/content/public/common/
zygote_fork_delegate_linux.h 33 // layer-1 sandbox such as the setuid sandbox.
55 // child process's real PID from within the SUID sandbox.
63 // suid sandbox, Fork() returns the Linux process ID.
  /external/chromium_org/content/renderer/
renderer_main_platform_delegate.h 33 // the sandbox is enabled.
  /external/chromium_org/ipc/
OWNERS 12 # new sandbox escapes.

Completed in 870 milliseconds

<<11121314151617181920>>