/external/llvm/test/CodeGen/X86/ |
dbg-declare.ll | 56 !26 = metadata !{metadata !"20020104-2.c", metadata !"/Volumes/Sandbox/llvm"}
|
/external/chromium_org/chrome/app/ |
client_util.cc | 36 typedef int (*DLL_MAIN)(HINSTANCE, sandbox::SandboxInterfaceInfo*); 167 sandbox::SandboxInterfaceInfo* sbox_info) {
|
chrome_main_delegate.cc | 44 #include "sandbox/win/src/sandbox.h" 238 // Mac needs them too for scrollbar related images and for sandbox 656 // The renderer sandbox prevents us from accessing our .pak files directly. 717 // to be used from inside the sandbox. 794 // No sandbox needed for relauncher.
|
/external/chromium_org/chrome/browser/nacl_host/ |
nacl_process_host.cc | 91 // TODO(bbudge) Handle the --no-sandbox case. 151 // permissions which may expand the surface area of the sandbox. 291 // We don't switch off sandbox automatically for security reasons. 292 SendErrorToRenderer("NaCl's GDB debug stub requires --no-sandbox flag" 525 // If we are on 64-bit Windows, the NaCl process's sandbox is 526 // managed by a different process from the renderer's sandbox. We 527 // need to inform the renderer's sandbox about the NaCl process so 660 // round trip out of the sandbox, we create an FD here. [all...] |
/external/chromium_org/ppapi/proxy/ |
flash_resource.cc | 130 // require filesystem access prohibited by the sandbox. 131 // TODO(shess): Figure out why OSX needs the access, the sandbox warmup should
|
/docs/source.android.com/src/devices/tech/security/ |
index.jd | 78 Application Sandbox. Applications get a dedicated part of the filesystem in 179 <li>Mandatory application sandbox for all applications</li> 189 restricted by the Application Sandbox.</p> 197 native code is constrained by the Application Sandbox. Whether that code is 227 <h2 id="the-application-sandbox">The Application Sandbox</h2> 234 <p>This sets up a kernel-level Application Sandbox. The kernel enforces security 242 sandbox is simple, auditable, and based on decades-old UNIX-style user 244 <p>Since the Application Sandbox is in the kernel, this security model extends to 248 Sandbox. On some platforms, developers are constrained to a specifi [all...] |
/external/chromium_org/ |
GypAndroid.darwin-arm.mk | 90 include $(LOCAL_PATH)/sandbox/sandbox.target.darwin-arm.mk 91 include $(LOCAL_PATH)/sandbox/sandbox_services.target.darwin-arm.mk 92 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.darwin-arm.mk 93 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.darwin-arm.mk
|
GypAndroid.darwin-x86.mk | 95 include $(LOCAL_PATH)/sandbox/sandbox.target.darwin-x86.mk 96 include $(LOCAL_PATH)/sandbox/sandbox_services.target.darwin-x86.mk 97 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.darwin-x86.mk 98 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.darwin-x86.mk
|
GypAndroid.linux-arm.mk | 90 include $(LOCAL_PATH)/sandbox/sandbox.target.linux-arm.mk 91 include $(LOCAL_PATH)/sandbox/sandbox_services.target.linux-arm.mk 92 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.linux-arm.mk 93 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.linux-arm.mk
|
GypAndroid.linux-x86.mk | 95 include $(LOCAL_PATH)/sandbox/sandbox.target.linux-x86.mk 96 include $(LOCAL_PATH)/sandbox/sandbox_services.target.linux-x86.mk 97 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.linux-x86.mk 98 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.linux-x86.mk
|
/external/chromium_org/chrome/common/extensions/ |
extension_manifest_constants.cc | 107 const char kSandboxedPages[] = "sandbox.pages"; 108 const char kSandboxedPagesCSP[] = "sandbox.content_security_policy"; 501 "Invalid value for 'sandbox.pages'."; 503 "Invalid value for 'sandbox.pages[*]'."; 505 "Invalid value for 'sandbox.content_security_policy'.";
|
/external/chromium_org/content/app/ |
content_main_runner.cc | 43 #include "sandbox/win/src/sandbox_types.h" 507 sandbox::SandboxInterfaceInfo* sandbox_info, 655 // We need to allocate the IO Ports before the Sandbox is initialized or 730 // On OS X the renderer sandbox needs to be initialized later in the 817 sandbox::SandboxInterfaceInfo sandbox_info_;
|
/external/apache-xml/src/main/java/org/apache/xml/serializer/ |
OutputPropertiesFactory.java | 401 // Repeat IOException handling for sandbox/applet case -sc 456 // No-op for sandbox/applet case, leave null -sc 469 // No-op for sandbox/applet case, leave null -sc
|
/external/chromium_org/chrome/ |
chrome_renderer.gypi | 394 '../sandbox/sandbox.gyp:sandbox',
|
/external/chromium_org/content/zygote/ |
zygote_linux.cc | 66 // A SOCK_DGRAM is installed in fd 5. This is the sandbox IPC channel. 214 // Assume that if we can't find the child in the sandbox, then 277 // sandbox does) until then, because that can interfere with the
|
/external/chromium_org/ppapi/native_client/tools/browser_tester/browsertester/ |
browserlauncher.py | 298 # Chrome process can't access file within sandbox 303 cmd.append('--no-sandbox') 307 cmd.append('--no-sandbox')
|
/external/chromium_org/remoting/webapp/ |
remoting.js | 81 var sandbox = /** @type {HTMLIFrameElement} */ 82 document.getElementById('wcs-sandbox'); 83 remoting.wcsSandbox = new remoting.WcsSandboxContainer(sandbox.contentWindow);
|
/external/chromium_org/sandbox/win/src/ |
policy_engine_opcodes.h | 8 #include "sandbox/win/src/policy_engine_params.h" 46 namespace sandbox { namespace 378 } // namespace sandbox
|
/external/chromium_org/tools/valgrind/drmemory/ |
suppressions.txt | 274 *!sandbox::PolicyBase::~PolicyBase 279 *!sandbox::GetHandleName 284 *!sandbox::GetPathFromHandle
|
/external/chromium_org/chrome/renderer/ |
chrome_content_renderer_client_unittest.cc | 41 const char kAllowedNaClAppURL2[] = "https://plus.sandbox.google.com"; 240 GURL("http://plus.sandbox.google.com/foo"), // http scheme
|
/external/chromium_org/components/nacl/loader/ |
nacl_listener.cc | 48 // On Mac OS X, shm_open() works in the sandbox but does not give us 60 // ftruncate() is disallowed by the Mac OS X sandbox and
|
/external/chromium_org/content/browser/worker_host/test/ |
worker_browsertest.cc | 145 // This test is flaky inside the Linux SUID sandbox. 160 // This test is flaky inside the Linux SUID sandbox.
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
syscall.cc | 8 #include "sandbox/linux/seccomp-bpf/port.h" 9 #include "sandbox/linux/seccomp-bpf/syscall.h"
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
FrameLoader.h | 190 // The following sandbox flags will be forced, regardless of changes to 191 // the sandbox attribute of any parent frames.
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_internal_defs.h | 93 // Notify the tools that the sandbox is going to be turned on. The reserved 95 // that the tools may call to bypass the sandbox.
|