/external/chromium_org/sandbox/mac/ |
os_compatibility.cc | 5 #include "sandbox/mac/os_compatibility.h" 12 namespace sandbox { namespace 127 } // namespace sandbox
|
bootstrap_sandbox_unittest.mm | 5 #include "sandbox/mac/bootstrap_sandbox.h" 77 namespace sandbox { 117 // Run the test without the sandbox. 133 // Run the test with the sandbox enabled without notifications on the policy 318 char service_name[] = "org.chromium.sandbox.test.ForwardMessageInProcess"; 346 "org.chromium.sandbox.test.DefaultRuleAllow"; 348 "org.chromium.sandbox.test.DefaultRuleAllow.Deny"; 417 } // namespace sandbox
|
/external/chromium_org/sandbox/win/src/ |
app_container_test.cc | 14 #include "sandbox/win/src/sync_policy_test.h" 69 namespace sandbox { namespace 144 } // namespace sandbox
|
handle_table.h | 13 #include "sandbox/win/src/nt_internals.h" 15 namespace sandbox { namespace 157 } // namespace sandbox
|
interception.cc | 6 // http://dev.chromium.org/developers/design-documents/sandbox . 10 #include "sandbox/win/src/interception.h" 17 #include "sandbox/win/src/interception_internal.h" 18 #include "sandbox/win/src/interceptors.h" 19 #include "sandbox/win/src/sandbox.h" 20 #include "sandbox/win/src/service_resolver.h" 21 #include "sandbox/win/src/target_interceptions.h" 22 #include "sandbox/win/src/target_process.h" 23 #include "sandbox/win/src/wow64.h 54 namespace sandbox { namespace [all...] |
crosscall_server.cc | 8 #include "sandbox/win/src/crosscall_server.h" 9 #include "sandbox/win/src/crosscall_params.h" 10 #include "sandbox/win/src/crosscall_client.h" 20 const size_t kMaxBufferSize = sandbox::kIPCChannelSize; 24 namespace sandbox { namespace 300 } // namespace sandbox
|
interception_unittest.cc | 12 #include "sandbox/win/src/interception.h" 13 #include "sandbox/win/src/interceptors.h" 14 #include "sandbox/win/src/interception_internal.h" 15 #include "sandbox/win/src/target_process.h" 18 namespace sandbox { namespace 212 } // namespace sandbox
|
/external/chromium_org/tools/perf/page_sets/data/ |
key_mobile_sites.json | 5 "http://mobile-news.sandbox.google.com/news/pt0" 8 "http://mobile-news.sandbox.google.com/news/p#2" 17 "http://mobile-news.sandbox.google.com/news/pt1"
|
/external/chromium_org/win8/metro_driver/ |
metro_driver.gyp | 74 '../../sandbox/sandbox.gyp:sandbox',
|
/external/chromium_org/remoting/webapp/ |
wcs_sandbox_container.js | 8 * The application side of the application/sandbox WCS interface, used by the 9 * application to exchange messages with the sandbox. 18 * @param {Window} sandbox The Javascript Window object representing the 22 remoting.WcsSandboxContainer = function(sandbox) { 24 this.sandbox_ = sandbox; 130 * Event handler to process messages from the sandbox.
|
/external/chromium_org/sandbox/win/tests/common/ |
controller.cc | 5 #include "sandbox/win/tests/common/controller.h" 12 #include "sandbox/win/src/sandbox_factory.h" 63 namespace sandbox { namespace 216 arguments += no_sandbox_ ? L"-no-sandbox " : L" "; 329 } else if (0 != _wcsicmp(argv[1], L"-child-no-sandbox")) { 336 } // namespace sandbox
|
/external/chromium_org/sandbox/win/wow_helper/ |
service64_resolver.cc | 5 #include "sandbox/win/wow_helper/service64_resolver.h" 8 #include "sandbox/win/wow_helper/target_code.h" 97 sandbox::PatchInfo patch_info; 135 NTSTATUS ResolveNtdll(sandbox::PatchInfo* patch_info) { 153 namespace sandbox { namespace 342 } // namespace sandbox
|
/external/chromium_org/components/breakpad/browser/ |
crash_handler_host_linux.h | 26 // This is the host for processes which run breakpad inside the sandbox on 28 // allows us to be outside the sandbox.
|
/external/chromium_org/content/common/ |
OWNERS | 10 # Mac Sandbox. 22 # new sandbox escapes.
|
/external/chromium_org/content/public/browser/ |
utility_process_host.h | 51 // Allows a directory to be opened through the sandbox, in case it's needed by 58 // Make the process run without a sandbox.
|
/external/chromium_org/extensions/renderer/ |
script_context_browsertest.cc | 33 " <iframe name='frame1_2' sandbox=''></iframe>" 35 "<iframe name='frame2' sandbox='' srcdoc=\""
|
/external/chromium_org/native_client_sdk/src/doc/ |
sitemap.rst | 58 reference/sandbox_internals/arm-32-bit-sandbox.rst 59 reference/sandbox_internals/x86-64-sandbox.rst
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
instruction.h | 10 namespace sandbox { namespace 60 } // namespace sandbox
|
/external/chromium_org/sandbox/win/sandbox_poc/pocdll/ |
processes_and_threads.cc | 7 #include "sandbox/win/sandbox_poc/pocdll/exports.h" 8 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
SandboxFlags.h | 35 // See http://www.whatwg.org/specs/web-apps/current-work/#attr-iframe-sandbox for a list of the sandbox flags.
|
/external/chromium_org/third_party/WebKit/public/platform/mac/ |
WebSandboxSupport.h | 44 // Put methods here that are required due to sandbox restrictions. 47 // Given an input font - |srcFont| [which can't be loaded due to sandbox
|
/external/chromium_org/third_party/WebKit/public/platform/win/ |
WebSandboxSupport.h | 38 // Put methods here that are required due to sandbox restrictions. 42 // and due to sandbox restrictions, the current process may be unable
|
/external/llvm/lib/Target/Mips/MCTargetDesc/ |
MipsNaClELFStreamer.cpp | 11 // as required by NaCl's SFI sandbox. It inserts address-masking instructions 103 // Sandbox indirect branch or return instruction by inserting mask operation 114 // Sandbox memory access or SP change. Insert mask operation before and/or 121 // Sandbox memory access. 127 // Sandbox SP change. 140 // Sandbox indirect jumps. 148 // Sandbox loads, stores and SP changes. 168 // Sandbox calls by aligning call and branch delay to the bundle end.
|
/external/chromium_org/components/nacl/browser/ |
pnacl_translation_cache_unittest.cc | 136 "sandbox:x86-32;extra_flags:;", 142 "sandbox:x86-32;extra_flags:;", 148 "sandbox:x86-32;extra_flags:;", 154 "sandbox:x86-32;extra_flags:;", 161 "sandbox:x86-32;extra_flags:;", 168 "sandbox:x86-32;extra_flags:;", 173 "sandbox:x86-32;extra_flags:;", 178 "sandbox:x86-32;extra_flags:;", 184 "sandbox:x86-32;extra_flags:-mavx-neon;", 191 "sandbox:x86-32;extra_flags:-mavx-neon;" [all...] |
/external/chromium_org/components/nacl/zygote/ |
nacl_fork_delegate_linux.cc | 38 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 39 #include "sandbox/linux/suid/common/sandbox.h" 149 scoped_ptr<sandbox::SetuidSandboxClient> setuid_sandbox_client( 150 sandbox::SetuidSandboxClient::Create()); 153 // the SUID sandbox. 169 // NaCl's x86-64 sandbox is not zero-address-based. Starting 178 // non-zero-address-based sandbox on x86-32 because it provides some 181 // sandbox on those. 240 // setuid sandbox wrapper manually [all...] |