HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 526 - 550 of 795) sorted by null

<<21222324252627282930>>

  /external/llvm/test/CodeGen/X86/
dbg-declare.ll 56 !26 = metadata !{metadata !"20020104-2.c", metadata !"/Volumes/Sandbox/llvm"}
  /external/chromium_org/chrome/app/
client_util.cc 36 typedef int (*DLL_MAIN)(HINSTANCE, sandbox::SandboxInterfaceInfo*);
167 sandbox::SandboxInterfaceInfo* sbox_info) {
chrome_main_delegate.cc 44 #include "sandbox/win/src/sandbox.h"
238 // Mac needs them too for scrollbar related images and for sandbox
656 // The renderer sandbox prevents us from accessing our .pak files directly.
717 // to be used from inside the sandbox.
794 // No sandbox needed for relauncher.
  /external/chromium_org/chrome/browser/nacl_host/
nacl_process_host.cc 91 // TODO(bbudge) Handle the --no-sandbox case.
151 // permissions which may expand the surface area of the sandbox.
291 // We don't switch off sandbox automatically for security reasons.
292 SendErrorToRenderer("NaCl's GDB debug stub requires --no-sandbox flag"
525 // If we are on 64-bit Windows, the NaCl process's sandbox is
526 // managed by a different process from the renderer's sandbox. We
527 // need to inform the renderer's sandbox about the NaCl process so
660 // round trip out of the sandbox, we create an FD here.
    [all...]
  /external/chromium_org/ppapi/proxy/
flash_resource.cc 130 // require filesystem access prohibited by the sandbox.
131 // TODO(shess): Figure out why OSX needs the access, the sandbox warmup should
  /docs/source.android.com/src/devices/tech/security/
index.jd 78 Application Sandbox. Applications get a dedicated part of the filesystem in
179 <li>Mandatory application sandbox for all applications</li>
189 restricted by the Application Sandbox.</p>
197 native code is constrained by the Application Sandbox. Whether that code is
227 <h2 id="the-application-sandbox">The Application Sandbox</h2>
234 <p>This sets up a kernel-level Application Sandbox. The kernel enforces security
242 sandbox is simple, auditable, and based on decades-old UNIX-style user
244 <p>Since the Application Sandbox is in the kernel, this security model extends to
248 Sandbox. On some platforms, developers are constrained to a specifi
    [all...]
  /external/chromium_org/
GypAndroid.darwin-arm.mk 90 include $(LOCAL_PATH)/sandbox/sandbox.target.darwin-arm.mk
91 include $(LOCAL_PATH)/sandbox/sandbox_services.target.darwin-arm.mk
92 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.darwin-arm.mk
93 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.darwin-arm.mk
GypAndroid.darwin-x86.mk 95 include $(LOCAL_PATH)/sandbox/sandbox.target.darwin-x86.mk
96 include $(LOCAL_PATH)/sandbox/sandbox_services.target.darwin-x86.mk
97 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.darwin-x86.mk
98 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.darwin-x86.mk
GypAndroid.linux-arm.mk 90 include $(LOCAL_PATH)/sandbox/sandbox.target.linux-arm.mk
91 include $(LOCAL_PATH)/sandbox/sandbox_services.target.linux-arm.mk
92 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.linux-arm.mk
93 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.linux-arm.mk
GypAndroid.linux-x86.mk 95 include $(LOCAL_PATH)/sandbox/sandbox.target.linux-x86.mk
96 include $(LOCAL_PATH)/sandbox/sandbox_services.target.linux-x86.mk
97 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.linux-x86.mk
98 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.linux-x86.mk
  /external/chromium_org/chrome/common/extensions/
extension_manifest_constants.cc 107 const char kSandboxedPages[] = "sandbox.pages";
108 const char kSandboxedPagesCSP[] = "sandbox.content_security_policy";
501 "Invalid value for 'sandbox.pages'.";
503 "Invalid value for 'sandbox.pages[*]'.";
505 "Invalid value for 'sandbox.content_security_policy'.";
  /external/chromium_org/content/app/
content_main_runner.cc 43 #include "sandbox/win/src/sandbox_types.h"
507 sandbox::SandboxInterfaceInfo* sandbox_info,
655 // We need to allocate the IO Ports before the Sandbox is initialized or
730 // On OS X the renderer sandbox needs to be initialized later in the
817 sandbox::SandboxInterfaceInfo sandbox_info_;
  /external/apache-xml/src/main/java/org/apache/xml/serializer/
OutputPropertiesFactory.java 401 // Repeat IOException handling for sandbox/applet case -sc
456 // No-op for sandbox/applet case, leave null -sc
469 // No-op for sandbox/applet case, leave null -sc
  /external/chromium_org/chrome/
chrome_renderer.gypi 394 '../sandbox/sandbox.gyp:sandbox',
  /external/chromium_org/content/zygote/
zygote_linux.cc 66 // A SOCK_DGRAM is installed in fd 5. This is the sandbox IPC channel.
214 // Assume that if we can't find the child in the sandbox, then
277 // sandbox does) until then, because that can interfere with the
  /external/chromium_org/ppapi/native_client/tools/browser_tester/browsertester/
browserlauncher.py 298 # Chrome process can't access file within sandbox
303 cmd.append('--no-sandbox')
307 cmd.append('--no-sandbox')
  /external/chromium_org/remoting/webapp/
remoting.js 81 var sandbox = /** @type {HTMLIFrameElement} */
82 document.getElementById('wcs-sandbox');
83 remoting.wcsSandbox = new remoting.WcsSandboxContainer(sandbox.contentWindow);
  /external/chromium_org/sandbox/win/src/
policy_engine_opcodes.h 8 #include "sandbox/win/src/policy_engine_params.h"
46 namespace sandbox { namespace
378 } // namespace sandbox
  /external/chromium_org/tools/valgrind/drmemory/
suppressions.txt 274 *!sandbox::PolicyBase::~PolicyBase
279 *!sandbox::GetHandleName
284 *!sandbox::GetPathFromHandle
  /external/chromium_org/chrome/renderer/
chrome_content_renderer_client_unittest.cc 41 const char kAllowedNaClAppURL2[] = "https://plus.sandbox.google.com";
240 GURL("http://plus.sandbox.google.com/foo"), // http scheme
  /external/chromium_org/components/nacl/loader/
nacl_listener.cc 48 // On Mac OS X, shm_open() works in the sandbox but does not give us
60 // ftruncate() is disallowed by the Mac OS X sandbox and
  /external/chromium_org/content/browser/worker_host/test/
worker_browsertest.cc 145 // This test is flaky inside the Linux SUID sandbox.
160 // This test is flaky inside the Linux SUID sandbox.
  /external/chromium_org/sandbox/linux/seccomp-bpf/
syscall.cc 8 #include "sandbox/linux/seccomp-bpf/port.h"
9 #include "sandbox/linux/seccomp-bpf/syscall.h"
  /external/chromium_org/third_party/WebKit/Source/core/loader/
FrameLoader.h 190 // The following sandbox flags will be forced, regardless of changes to
191 // the sandbox attribute of any parent frames.
  /external/compiler-rt/lib/sanitizer_common/
sanitizer_internal_defs.h 93 // Notify the tools that the sandbox is going to be turned on. The reserved
95 // that the tools may call to bypass the sandbox.

Completed in 948 milliseconds

<<21222324252627282930>>