OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:sandbox
(Results
351 - 375
of
990
) sorted by null
<<
11
12
13
14
15
16
17
18
19
20
>>
/external/chromium_org/sandbox/win/src/
policy_engine_processor.cc
5
#include "
sandbox
/win/src/policy_engine_processor.h"
7
namespace
sandbox
{
namespace
107
} // namespace
sandbox
sid_unittest.cc
11
#include "
sandbox
/win/src/sid.h"
14
namespace
sandbox
{
namespace
71
} // namespace
sandbox
target_process.cc
5
#include "
sandbox
/win/src/target_process.h"
12
#include "
sandbox
/win/src/crosscall_server.h"
13
#include "
sandbox
/win/src/crosscall_client.h"
14
#include "
sandbox
/win/src/policy_low_level.h"
15
#include "
sandbox
/win/src/sandbox_types.h"
16
#include "
sandbox
/win/src/sharedmem_ipc_server.h"
24
sandbox
::PolicyGlobal* policy =
25
reinterpret_cast<
sandbox
::PolicyGlobal*>(dest);
29
for (size_t i = 0; i <
sandbox
::kMaxServiceCount; i++) {
33
policy->entry[i] = reinterpret_cast<
sandbox
::PolicyBuffer*>(buffer)
40
namespace
sandbox
{
namespace
[
all
...]
threadpool_unittest.cc
5
#include "
sandbox
/win/src/win2k_threadpool.h"
16
namespace
sandbox
{
namespace
94
} // namespace
sandbox
/external/chromium_org/sandbox/win/tools/finder/
finder_fs.cc
5
#include "
sandbox
/win/src/restricted_token.h"
6
#include "
sandbox
/win/src/restricted_token_utils.h"
7
#include "
sandbox
/win/tools/finder/finder.h"
finder_registry.cc
5
#include "
sandbox
/win/src/restricted_token.h"
6
#include "
sandbox
/win/src/restricted_token_utils.h"
7
#include "
sandbox
/win/tools/finder/finder.h"
/external/chromium_org/android_webview/common/
OWNERS
2
# new
sandbox
escapes.
/external/chromium_org/base/files/
scoped_file.cc
27
// It's especially problematic on Linux with the setuid
sandbox
, where
/external/chromium_org/chrome/common/media/
OWNERS
2
# new
sandbox
escapes.
/external/chromium_org/components/autofill/content/common/
OWNERS
2
# new
sandbox
escapes.
/external/chromium_org/components/cdm/common/
OWNERS
2
# new
sandbox
escapes.
/external/chromium_org/components/nacl/common/
OWNERS
2
# new
sandbox
escapes.
/external/chromium_org/components/nacl/loader/
nacl_main_platform_delegate_mac.mm
25
<< "Error initializing
sandbox
for " << switches::kNaClLoaderProcess;
/external/chromium_org/components/tracing/
OWNERS
5
# new
sandbox
escapes.
/external/chromium_org/components/visitedlink/common/
OWNERS
2
# new
sandbox
escapes.
/external/chromium_org/content/
OWNERS
14
# Mac
Sandbox
profiles.
/external/chromium_org/content/common/dom_storage/
OWNERS
5
# new
sandbox
escapes.
/external/chromium_org/content/common/
font_config_ipc_linux.h
16
// of the
sandbox
. See http://code.google.com/p/chromium/wiki/LinuxSandboxIPC
process_type.cc
27
return "
Sandbox
helper";
sandbox_util.h
11
// This file contains cross-platform
sandbox
code internal to content.
/external/chromium_org/content/common/service_worker/
OWNERS
8
# new
sandbox
escapes.
/external/chromium_org/content/public/app/
content_main_delegate.h
37
// before the
sandbox
is engaged.
40
// This is where the embedder can add startup code to run after the
sandbox
54
// can allocate an IO port for it before the
sandbox
is initialized. Embedders
64
// Allows the embedder to override initializing the
sandbox
. This is needed
/external/chromium_org/content/public/common/
zygote_fork_delegate_linux.h
33
// layer-1
sandbox
such as the setuid
sandbox
.
55
// child process's real PID from within the SUID
sandbox
.
63
// suid
sandbox
, Fork() returns the Linux process ID.
/external/chromium_org/content/renderer/
renderer_main_platform_delegate.h
33
// the
sandbox
is enabled.
/external/chromium_org/ipc/
OWNERS
12
# new
sandbox
escapes.
Completed in 870 milliseconds
<<
11
12
13
14
15
16
17
18
19
20
>>