/external/chromium_org/ppapi/proxy/ |
OWNERS | 4 # new sandbox escapes.
|
/external/chromium_org/remoting/host/ |
OWNERS | 2 # new sandbox escapes.
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
die.cc | 14 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 15 #include "sandbox/linux/seccomp-bpf/syscall.h" 17 namespace sandbox { namespace 85 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/services/ |
android_arm_ucontext.h | 11 // We also need greg_t for the sandbox, include it in this header as well.
|
broker_process.h | 15 #include "sandbox/sandbox_export.h" 17 namespace sandbox { namespace 27 // 3. Enable sandbox. 104 } // namespace sandbox
|
scoped_process.cc | 5 #include "sandbox/linux/services/scoped_process.h" 20 #include "sandbox/linux/services/thread_helpers.h" 22 namespace sandbox { namespace 119 } // namespace sandbox
|
scoped_process_unittest.cc | 21 #include "sandbox/linux/services/scoped_process.h" 22 #include "sandbox/linux/tests/unit_tests.h" 25 namespace sandbox { namespace 130 } // namespace sandbox
|
/external/chromium_org/sandbox/win/src/ |
resolver.h | 7 // http://dev.chromium.org/developers/design-documents/sandbox . 10 #include "sandbox/win/src/nt_internals.h" 15 namespace sandbox { namespace 103 } // namespace sandbox
|
restricted_token_utils.h | 11 #include "sandbox/win/src/restricted_token.h" 12 #include "sandbox/win/src/security_level.h" 17 namespace sandbox { namespace 81 } // namespace sandbox
|
service_resolver.h | 8 #include "sandbox/win/src/nt_internals.h" 9 #include "sandbox/win/src/resolver.h" 11 namespace sandbox { namespace 136 } // namespace sandbox
|
target_process.h | 14 #include "sandbox/win/src/crosscall_server.h" 15 #include "sandbox/win/src/sandbox_types.h" 25 namespace sandbox { namespace 130 } // namespace sandbox
|
interception.h | 7 // http://dev.chromium.org/developers/design-documents/sandbox . 18 #include "sandbox/win/src/sandbox_types.h" 20 namespace sandbox { namespace 42 // sandbox::INTERCEPTION_SERVICE_CALL, &MyNtCreateFile, MY_ID_1)) 47 // sandbox::INTERCEPTION_EAT, L"MyCreateDirectoryW@12", MY_ID_2)) 62 // do not work with sandbox tests. 238 sandbox::INTERCEPTION_SERVICE_CALL, \ 251 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT, \ 264 sandbox::INTERCEPTION_SERVICE_CALL, \ 275 manager->AddToPatchedFunctions(dll, #function, sandbox::INTERCEPTION_EAT, [all...] |
/external/chromium_org/skia/ext/ |
fontmgr_default_win.cc | 22 // created with the pre-sandbox warmed up one. Otherwise, we fallback to a
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
SandboxFlags.cpp | 37 // http://www.w3.org/TR/html5/the-iframe-element.html#attr-iframe-sandbox 53 // Turn off the corresponding sandbox flag if it's set as "allowed". 85 tokenErrors.appendLiteral(" are invalid sandbox flags."); 87 tokenErrors.appendLiteral(" is an invalid sandbox flag.");
|
/external/chromium_org/ui/metro_viewer/ |
OWNERS | 2 # new sandbox escapes.
|
/external/chromium_org/ui/views_content_client/ |
views_content_client.cc | 14 HINSTANCE instance, sandbox::SandboxInterfaceInfo* sandbox_info)
|
/external/compiler-rt/test/asan/TestCases/Linux/ |
coverage-sandboxing.cc | 9 // RUN: %run %t a 2>&1 | FileCheck %s --check-prefix=CHECK-sandbox 12 // RUN: %run %t a b 2>&1 | FileCheck %s --check-prefix=CHECK-sandbox 84 // CHECK-sandbox: PID: [[PID:[0-9]+]] 85 // CHECK-sandbox: 258 PCs written to packed file
|
/external/chromium_org/base/debug/ |
debugger.h | 23 // On OS X, the underlying mechanism doesn't work when the sandbox is enabled. 27 // BEFORE the sandbox is enabled.
|
/external/chromium_org/chrome/app/ |
chrome_main.cc | 19 sandbox::SandboxInterfaceInfo* sandbox_info); 30 sandbox::SandboxInterfaceInfo* sandbox_info) {
|
/external/chromium_org/chrome/common/extensions/manifest_tests/ |
extension_manifests_sandboxed_unittest.cc | 38 const char kSandboxedCSP[] = "sandbox allow-scripts allow-forms allow-popups"; 42 "sandbox; script-src: https://www.google.com";
|
/external/chromium_org/components/autofill/core/common/ |
autofill_switches.cc | 38 // Use the sandbox Online Wallet service URL (for developer testing). 39 const char kWalletServiceUseSandbox[] = "wallet-service-use-sandbox";
|
/external/chromium_org/content/plugin/ |
plugin_main.cc | 26 #include "sandbox/win/src/sandbox.h"
|
/external/chromium_org/content/public/app/ |
content_main.h | 18 namespace sandbox { namespace 45 sandbox::SandboxInterfaceInfo* sandbox_info;
|
/external/chromium_org/content/test/ |
content_test_suite.cc | 80 // When running in a child process for Mac sandbox tests, the sandbox exists
|
/external/chromium_org/sandbox/linux/ |
sandbox_linux.gypi | 34 # We have two principal targets: sandbox and sandbox_linux_unittests 37 # the setuid sandbox and is its own target. 39 'target_name': 'sandbox', 180 # A demonstration program for the seccomp-bpf sandbox. 200 # The setuid sandbox, for Linux 204 'suid/common/sandbox.h', 210 'suid/sandbox.c', 299 'suid/common/sandbox.h',
|