/external/chromium_org/sandbox/win/sandbox_poc/pocdll/ |
invasive.cc | 6 #include "sandbox/win/sandbox_poc/pocdll/exports.h" 7 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
|
/external/chromium_org/sandbox/win/src/ |
ipc_unittest.cc | 6 #include "sandbox/win/src/crosscall_client.h" 7 #include "sandbox/win/src/crosscall_server.h" 8 #include "sandbox/win/src/sharedmem_ipc_client.h" 9 #include "sandbox/win/src/sharedmem_ipc_server.h" 12 namespace sandbox { namespace 623 sandbox::SharedMemIPCServer::ServerControl srv_control = { 628 sandbox::CrossCallReturn call_return = {0}; 639 } // namespace sandbox
|
crosscall_client.h | 8 #include "sandbox/win/src/crosscall_params.h" 9 #include "sandbox/win/src/sandbox.h" 39 namespace sandbox { namespace 481 } // namespace sandbox
|
policy_low_level_unittest.cc | 5 #include "sandbox/win/src/policy_engine_params.h" 6 #include "sandbox/win/src/policy_engine_processor.h" 7 #include "sandbox/win/src/policy_low_level.h" 10 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = { 11 #define POLPARAM(p) sandbox::ParamPickerMake(p), 14 namespace sandbox { namespace 617 } // namespace sandbox
|
policy_low_level.cc | 8 #include "sandbox/win/src/policy_low_level.h" 32 namespace sandbox { namespace 348 } // namespace sandbox
|
/external/chromium_org/tools/ |
run-bisect-manual-test.py | 13 to setup the sandbox manually before running the script. Otherwise the script 138 print 'SUID sandbox has not been setup.'\
|
/external/chromium_org/tools/telemetry/telemetry/core/platform/profiler/ |
vtune_profiler.py | 142 '--no-sandbox', 143 '--allow-sandbox-debugging',
|
/external/chromium_org/ui/ozone/public/ |
surface_factory_ozone.h | 89 // process before the sandbox has been activated. 93 // This method must be safe to run inside of the sandbox.
|
/external/llvm/test/DebugInfo/X86/ |
nondefault-subrange-array.ll | 33 !0 = metadata !{i32 786449, metadata !20, i32 4, metadata !"clang version 3.3 (trunk 169136)", i1 false, metadata !"", i32 0, metadata !1, metadata !1, metadata !1, metadata !3, metadata !1, metadata !""} ; [ DW_TAG_compile_unit ] [/Volumes/Sandbox/llvm/t.cpp] [DW_LANG_C_plus_plus] 51 !20 = metadata !{metadata !"t.cpp", metadata !"/Volumes/Sandbox/llvm"}
|
/external/chromium_org/chrome/app/ |
client_util.cc | 38 #include "sandbox/win/src/sandbox.h" 42 typedef int (*DLL_MAIN)(HINSTANCE, sandbox::SandboxInterfaceInfo*); 288 // Initialize the sandbox services. 289 sandbox::SandboxInterfaceInfo sandbox_info = {0};
|
/external/chromium_org/sandbox/linux/services/ |
broker_process.cc | 5 #include "sandbox/linux/services/broker_process.h" 32 #include "sandbox/linux/services/linux_syscalls.h" 44 // process' system calls profile to be able to loosely sandbox it. 137 namespace sandbox { namespace 545 } // namespace sandbox.
|
broker_process_unittest.cc | 5 #include "sandbox/linux/services/broker_process.h" 27 #include "sandbox/linux/tests/test_utils.h" 28 #include "sandbox/linux/tests/unit_tests.h" 31 namespace sandbox { namespace 503 } // namespace sandbox
|
credentials.cc | 5 #include "sandbox/linux/services/credentials.h" 168 namespace sandbox { namespace 347 } // namespace sandbox.
|
/external/chromium_org/third_party/sinonjs/src/ |
sinon.js | 964 sinon.sandbox = require("./sinon/sandbox"); [all...] |
/external/chromium_org/native_client_sdk/doc_generated/ |
overview.html | 66 <li><strong>Security:</strong> Native Client uses a double sandbox model designed to protect 141 <li>The NaCl sandbox ensures that code accesses system resources only through 147 <p>The above security measures are in addition to the existing sandbox in the 151 combination of the NaCl sandbox and the Chrome sandbox, we say that 152 Native Client employs a double sandbox design.</p> 163 the nexe within the Native Client sandbox as described above. It also uses
|
/external/chromium_org/chrome/test/nacl/ |
nacl_browsertest.cc | 237 // On windows, the debug stub requires --no-sandbox: 246 // TODO(jvoung): Make this test work on Windows 32-bit. When --no-sandbox 247 // is used, the required 1GB sandbox address space is not reserved.
|
/external/chromium_org/components/nacl/loader/nonsfi/ |
nonsfi_sandbox_sigsys_unittest.cc | 11 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 12 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 23 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), \
|
/external/chromium_org/remoting/host/win/ |
unprivileged_process_delegate.cc | 33 #include "sandbox/win/src/restricted_token.h" 85 sandbox::RestrictedToken restricted_token; 95 if (restricted_token.SetIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW)
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
syscall.cc | 5 #include "sandbox/linux/seccomp-bpf/syscall.h" 12 namespace sandbox { namespace 268 } // namespace sandbox
|
/cts/tests/tests/security/src/android/security/cts/ |
SeccompDeathTestService.java | 29 * Service used to run tests for seccomp-bpf sandboxing. Since sandbox violations
|
/external/chromium_org/chrome/browser/nacl_host/test/ |
debug_stub_browser_tests.py | 57 # Breakpoints and single-stepping might interfere with Chrome sandbox. So we
|
/external/chromium_org/chrome/browser/ui/startup/ |
bad_flags_prompt.cc | 41 // These flags disable sandbox-related security.
|
/external/chromium_org/chrome/common/ |
chrome_paths_win.cc | 107 // lies on a network share the sandbox will prevent us from accessing it.
|
/external/chromium_org/chrome/test/base/ |
chrome_test_launcher.cc | 33 #include "sandbox/win/src/sandbox_types.h"
|
/external/chromium_org/chrome_elf/blacklist/ |
blacklist.h | 9 #include "sandbox/win/src/sandbox_nt_types.h"
|