HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 376 - 400 of 990) sorted by null

<<11121314151617181920>>

  /external/chromium_org/ppapi/proxy/
OWNERS 4 # new sandbox escapes.
  /external/chromium_org/remoting/host/
OWNERS 2 # new sandbox escapes.
  /external/chromium_org/sandbox/linux/seccomp-bpf/
die.cc 14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
15 #include "sandbox/linux/seccomp-bpf/syscall.h"
17 namespace sandbox { namespace
85 } // namespace sandbox
  /external/chromium_org/sandbox/linux/services/
android_arm_ucontext.h 11 // We also need greg_t for the sandbox, include it in this header as well.
broker_process.h 15 #include "sandbox/sandbox_export.h"
17 namespace sandbox { namespace
27 // 3. Enable sandbox.
104 } // namespace sandbox
scoped_process.cc 5 #include "sandbox/linux/services/scoped_process.h"
20 #include "sandbox/linux/services/thread_helpers.h"
22 namespace sandbox { namespace
119 } // namespace sandbox
scoped_process_unittest.cc 21 #include "sandbox/linux/services/scoped_process.h"
22 #include "sandbox/linux/tests/unit_tests.h"
25 namespace sandbox { namespace
130 } // namespace sandbox
  /external/chromium_org/sandbox/win/src/
resolver.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
10 #include "sandbox/win/src/nt_internals.h"
15 namespace sandbox { namespace
103 } // namespace sandbox
restricted_token_utils.h 11 #include "sandbox/win/src/restricted_token.h"
12 #include "sandbox/win/src/security_level.h"
17 namespace sandbox { namespace
81 } // namespace sandbox
service_resolver.h 8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/resolver.h"
11 namespace sandbox { namespace
136 } // namespace sandbox
target_process.h 14 #include "sandbox/win/src/crosscall_server.h"
15 #include "sandbox/win/src/sandbox_types.h"
25 namespace sandbox { namespace
130 } // namespace sandbox
interception.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
18 #include "sandbox/win/src/sandbox_types.h"
20 namespace sandbox { namespace
42 // sandbox::INTERCEPTION_SERVICE_CALL, &MyNtCreateFile, MY_ID_1))
47 // sandbox::INTERCEPTION_EAT, L"MyCreateDirectoryW@12", MY_ID_2))
62 // do not work with sandbox tests.
238 sandbox::INTERCEPTION_SERVICE_CALL, \
251 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT, \
264 sandbox::INTERCEPTION_SERVICE_CALL, \
275 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT,
    [all...]
  /external/chromium_org/skia/ext/
fontmgr_default_win.cc 22 // created with the pre-sandbox warmed up one. Otherwise, we fallback to a
  /external/chromium_org/third_party/WebKit/Source/core/dom/
SandboxFlags.cpp 37 // http://www.w3.org/TR/html5/the-iframe-element.html#attr-iframe-sandbox
53 // Turn off the corresponding sandbox flag if it's set as "allowed".
85 tokenErrors.appendLiteral(" are invalid sandbox flags.");
87 tokenErrors.appendLiteral(" is an invalid sandbox flag.");
  /external/chromium_org/ui/metro_viewer/
OWNERS 2 # new sandbox escapes.
  /external/chromium_org/ui/views_content_client/
views_content_client.cc 14 HINSTANCE instance, sandbox::SandboxInterfaceInfo* sandbox_info)
  /external/compiler-rt/test/asan/TestCases/Linux/
coverage-sandboxing.cc 9 // RUN: %run %t a 2>&1 | FileCheck %s --check-prefix=CHECK-sandbox
12 // RUN: %run %t a b 2>&1 | FileCheck %s --check-prefix=CHECK-sandbox
84 // CHECK-sandbox: PID: [[PID:[0-9]+]]
85 // CHECK-sandbox: 258 PCs written to packed file
  /external/chromium_org/base/debug/
debugger.h 23 // On OS X, the underlying mechanism doesn't work when the sandbox is enabled.
27 // BEFORE the sandbox is enabled.
  /external/chromium_org/chrome/app/
chrome_main.cc 19 sandbox::SandboxInterfaceInfo* sandbox_info);
30 sandbox::SandboxInterfaceInfo* sandbox_info) {
  /external/chromium_org/chrome/common/extensions/manifest_tests/
extension_manifests_sandboxed_unittest.cc 38 const char kSandboxedCSP[] = "sandbox allow-scripts allow-forms allow-popups";
42 "sandbox; script-src: https://www.google.com";
  /external/chromium_org/components/autofill/core/common/
autofill_switches.cc 38 // Use the sandbox Online Wallet service URL (for developer testing).
39 const char kWalletServiceUseSandbox[] = "wallet-service-use-sandbox";
  /external/chromium_org/content/plugin/
plugin_main.cc 26 #include "sandbox/win/src/sandbox.h"
  /external/chromium_org/content/public/app/
content_main.h 18 namespace sandbox { namespace
45 sandbox::SandboxInterfaceInfo* sandbox_info;
  /external/chromium_org/content/test/
content_test_suite.cc 80 // When running in a child process for Mac sandbox tests, the sandbox exists
  /external/chromium_org/sandbox/linux/
sandbox_linux.gypi 34 # We have two principal targets: sandbox and sandbox_linux_unittests
37 # the setuid sandbox and is its own target.
39 'target_name': 'sandbox',
180 # A demonstration program for the seccomp-bpf sandbox.
200 # The setuid sandbox, for Linux
204 'suid/common/sandbox.h',
210 'suid/sandbox.c',
299 'suid/common/sandbox.h',

Completed in 1166 milliseconds

<<11121314151617181920>>