/external/chromium_org/sandbox/win/src/ |
sandbox_utils.h | 13 #include "sandbox/win/src/nt_internals.h" 15 namespace sandbox { namespace 23 } // namespace sandbox
|
sid.cc | 5 #include "sandbox/win/src/sid.h" 9 namespace sandbox { namespace 26 } // namespace sandbox
|
eat_resolver.h | 9 #include "sandbox/win/src/nt_internals.h" 10 #include "sandbox/win/src/resolver.h" 12 namespace sandbox { namespace 45 } // namespace sandbox
|
handle_closer_agent.h | 10 #include "sandbox/win/src/handle_closer.h" 11 #include "sandbox/win/src/sandbox_types.h" 13 namespace sandbox { namespace 35 } // namespace sandbox
|
handle_dispatcher.h | 9 #include "sandbox/win/src/crosscall_server.h" 10 #include "sandbox/win/src/sandbox_policy_base.h" 12 namespace sandbox { namespace 34 } // namespace sandbox
|
named_pipe_dispatcher.h | 10 #include "sandbox/win/src/crosscall_server.h" 11 #include "sandbox/win/src/sandbox_policy_base.h" 13 namespace sandbox { namespace 36 } // namespace sandbox
|
registry_dispatcher.h | 10 #include "sandbox/win/src/crosscall_server.h" 11 #include "sandbox/win/src/sandbox_policy_base.h" 13 namespace sandbox { namespace 38 } // namespace sandbox
|
registry_interception.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 36 } // namespace sandbox
|
sync_dispatcher.h | 10 #include "sandbox/win/src/crosscall_server.h" 11 #include "sandbox/win/src/sandbox_policy_base.h" 13 namespace sandbox { namespace 36 } // namespace sandbox
|
sync_interception.h | 5 #include "sandbox/win/src/nt_internals.h" 6 #include "sandbox/win/src/sandbox_types.h" 11 namespace sandbox { namespace 44 } // namespace sandbox
|
registry_policy.h | 12 #include "sandbox/win/src/crosscall_server.h" 13 #include "sandbox/win/src/nt_internals.h" 14 #include "sandbox/win/src/policy_low_level.h" 15 #include "sandbox/win/src/sandbox_policy.h" 17 namespace sandbox { namespace 56 } // namespace sandbox
|
sync_policy.h | 12 #include "sandbox/win/src/crosscall_server.h" 13 #include "sandbox/win/src/nt_internals.h" 14 #include "sandbox/win/src/policy_low_level.h" 15 #include "sandbox/win/src/sandbox_policy.h" 17 namespace sandbox { namespace 49 } // namespace sandbox
|
/external/chromium_org/components/nacl/loader/nonsfi/ |
nonsfi_sandbox_unittest.cc | 36 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 37 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 38 #include "sandbox/linux/services/linux_syscalls.h" 59 sandbox::SandboxBPF::SupportsSeccompSandbox(-1) == 60 sandbox::SandboxBPF::STATUS_AVAILABLE); 69 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), 82 // mmap. We just disable this test not to complicate the sandbox. 102 // The sanity check for DoFork without the sandbox. 112 // Then, try this in the sandbox. 115 DEATH_MESSAGE(sandbox::GetCloneErrorMessageContentForTests()) [all...] |
/external/chromium_org/apps/shell/app/ |
DEPS | 11 "+sandbox",
|
/external/chromium_org/chrome/nacl/ |
DEPS | 8 "+sandbox/win/src",
|
/external/chromium_org/components/nacl/loader/ |
DEPS | 5 "+sandbox/linux/seccomp-bpf", 6 "+sandbox/linux/services", 7 "+sandbox/linux/suid", 8 "+sandbox/win/src",
|
/external/chromium_org/content/common/sandbox_linux/android/ |
sandbox_bpf_base_policy_android.h | 9 #include "sandbox/linux/seccomp-bpf/errorcode.h" 21 // sandbox::SandboxBPFPolicy: 22 virtual sandbox::ErrorCode EvaluateSyscall( 23 sandbox::SandboxBPF* sandbox_compiler,
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
sandbox_bpf_compatibility_policy.h | 11 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 12 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 14 namespace sandbox { namespace 41 } // namespace sandbox
|
/external/chromium_org/chrome_elf/ |
ntdll_cache.h | 10 namespace sandbox { namespace 19 extern sandbox::ThunkData g_nt_thunk_storage;
|
thunk_getter.h | 8 namespace sandbox { namespace 14 sandbox::ServiceResolverThunk* GetThunk(bool relaxed);
|
/external/chromium_org/content/app/ |
startup_helper_win.cc | 13 #include "sandbox/win/src/process_mitigations.h" 14 #include "sandbox/win/src/sandbox_factory.h" 38 void InitializeSandboxInfo(sandbox::SandboxInterfaceInfo* info) { 39 info->broker_services = sandbox::SandboxFactory::GetBrokerServices(); 41 info->target_services = sandbox::SandboxFactory::GetTargetServices(); 44 sandbox::ApplyProcessMitigationsToCurrentProcess( 45 sandbox::MITIGATION_DEP | 46 sandbox::MITIGATION_DEP_NO_ATL_THUNK);
|
/external/chromium_org/sandbox/linux/tests/ |
test_utils.h | 10 namespace sandbox { namespace 21 } // namespace sandbox
|
/external/chromium_org/content/renderer/ |
renderer_main_platform_delegate_android.cc | 13 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 48 sandbox::SandboxBPF sandbox; local 49 sandbox.SetSandboxPolicy(new SandboxBPFBasePolicyAndroid()); 50 CHECK(sandbox.StartSandbox(sandbox::SandboxBPF::PROCESS_MULTI_THREADED));
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
baseline_policy.h | 8 #include "sandbox/linux/seccomp-bpf/errorcode.h" 9 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" 10 #include "sandbox/sandbox_export.h" 12 namespace sandbox { namespace 17 // This is a helper to build seccomp-bpf policies, i.e. policies for a sandbox 45 } // namespace sandbox.
|
/external/chromium_org/third_party/WebKit/PerformanceTests/Mutation/ |
append-child.html | 5 <div id="sandbox" style="display:none"></div> 7 var sandbox = document.getElementById('sandbox'); 37 sandbox.innerHTML = ''; 39 observer.observe(sandbox, {childList: true}); 42 sandbox.appendChild(elems[i]);
|