HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 626 - 650 of 795) sorted by null

<<21222324252627282930>>

  /external/chromium_org/third_party/WebKit/Source/core/platform/graphics/chromium/
FontPlatformDataChromiumWin.cpp 279 // if there is no sandbox, then we can assume the font
  /external/chromium_org/third_party/WebKit/Source/core/platform/graphics/cocoa/
FontPlatformDataCocoa.mm 57 // FIXME: Chromium: The following code isn't correct for the Chromium port since the sandbox might
  /external/chromium_org/tools/perf/page_sets/
key_mobile_sites.json 215 "url": "http://mobile-news.sandbox.google.com/news/p#2",
  /frameworks/base/docs/html/guide/faq/
security.jd 74 run in an Application Sandbox that limits access to sensitive information or data
  /ndk/sources/host-tools/make-3.81/tests/
README 89 fourth serious problem is that it doesn't create its own sandbox when
  /external/chromium_org/
GypAndroid.darwin-mips.mk 90 include $(LOCAL_PATH)/sandbox/sandbox.target.darwin-mips.mk
91 include $(LOCAL_PATH)/sandbox/sandbox_services.target.darwin-mips.mk
GypAndroid.linux-mips.mk 90 include $(LOCAL_PATH)/sandbox/sandbox.target.linux-mips.mk
91 include $(LOCAL_PATH)/sandbox/sandbox_services.target.linux-mips.mk
  /external/chromium_org/chrome/browser/extensions/
sandboxed_unpacker.cc 140 // If |temp_file| contains a link, the sandbox will block al file system
292 // will cause file system access outside the sandbox path, and the sandbox
  /external/chromium_org/content/
content_shell.gypi 415 '../sandbox/sandbox.gyp:sandbox',
  /external/chromium_org/content/public/browser/
content_browser_client.h 66 namespace sandbox { namespace
581 // is launched. It gives the embedder a chance to add loosen the sandbox
583 virtual void PreSpawnRenderer(sandbox::TargetPolicy* policy,
  /external/chromium_org/ppapi/native_client/src/trusted/plugin/
plugin.h 348 // with the sandbox on.
366 // with the sandbox on.
373 // chosen for the sandbox ISA, any current service runtime is shut down, the
  /external/chromium_org/content/renderer/
renderer_webkitplatformsupport_impl.cc 216 DVLOG(1) << "Disabling sandbox support for testing.";
278 // Even if the sandbox is disabled, there's no reason why the code should
464 // The sandbox restricts our access to the registry, so we need to proxy
478 // The sandbox restricts our access to the registry, so we need to proxy
493 // The sandbox restricts our access to the registry, so we need to proxy
    [all...]
  /external/openssh/
configure.ac 529 AC_CHECK_HEADERS([sandbox.h])
    [all...]
  /external/chromium_org/tools/traceline/svgui/
startup-release.json 30 {'eventid': 1718197540, 'stacktrace': [[2088830549, 'kernel32.dll!CreateThread+0x1e'], [4216426, 'chrome.exe!sandbox::BrokerServicesBase::Init+0x5a [ c:\\g\\trunk\\src\\sandbox\\src\\broker_services.cc:70 ]'], [20404275, 'chrome.dll!BrowserMain+0xcb3 [ c:\\g\\trunk\\src\\chrome\\browser\\browser_main.cc:523 ]'], [19354554, 'chrome.dll!ChromeMain+0x83a [ c:\\g\\trunk\\src\\chrome\\app\\chrome_dll_main.cc:224 ]'], [4205604, 'chrome.exe!wWinMain+0x304 [ c:\\g\\trunk\\src\\chrome\\app\\chrome_exe_main.cc:103 ]'], [4482934, 'chrome.exe!__tmainCRTStartup+0x176 [ f:\\sp\\vctools\\crt_bld\\self_x86\\crt\\src\\crt0.c:324 ]'], [2088857559, 'kernel32.dll!BaseProcessStart+0x23']], 'thread': 3956, 'eventtype': 'EVENT_TYPE_CREATETHREAD', 'startaddr': 2088830553, 'ms': 63.831575999999998, 'cpu': 2147742720},
34 {'stacktrace': [[4340339, 'chrome.exe!PlatformThread::SetName+0x63 [ c:\\g\\trunk\\src\\base\\platform_thread_win.cc:62 ]'], [4215848, 'chrome.exe!sandbox::BrokerServicesBase::TargetEventsThread+0x28 [ c:\\g\\trunk\\src\\sandbox\\src\\broker_services.cc:147 ]'], [2088810115, 'kernel32.dll!BaseThreadStart+0x37']], 'thread': 2428, 'eventtype': 'EVENT_TYPE_THREADNAME', 'threadname': 'BrokerEventThread', 'ms': 64.838966999999997, 'cpu': 3124053392},
35 {'stacktrace': [[4215906, 'chrome.exe!sandbox::BrokerServicesBase::TargetEventsThread+0x62 [ c:\\g\\trunk\\src\\sandbox\\src\\broker_services.cc:151 ]'], [2088810115, 'kernel32.dll!BaseThreadStart+0x37']], 'thread': 2428, 'syscall': 190, 'eventtype': 'EVENT_TYPE_SYSCALL', 'syscallname': 'ntdll.dll!ZwRemoveIoCompletion', 'waiting': 1, 'done': 115.701297, 'ms': 64.856288000000006, 'syscallargs': [168, 17039276, 17038976], 'cpu': 3124053392},
    [all...]
  /external/chromium_org/chrome/browser/
chrome_content_browser_client.cc 147 #include "sandbox/win/src/sandbox_policy.h"
    [all...]
  /external/chromium_org/ash/
ash.gyp     [all...]
  /external/chromium_org/ipc/
ipc_channel_posix.cc 388 " IPC. Aborting to maintain sandbox isolation.";
414 // fd_pipe_ which makes Seccomp sandbox operation more efficient.
706 // Our process may be in a sandbox with a separate PID namespace.
  /external/chromium_org/ui/views/
views.gyp     [all...]
  /frameworks/base/core/java/android/os/
Process.java 676 * app-specific sandbox. It is different from {@link #myUserHandle} in that
677 * a uid identifies a specific app sandbox in a specific user.
694 * Returns whether the current process is in an isolated sandbox.
    [all...]
  /external/chromium/chrome/browser/
browser_main.cc 181 #include "sandbox/src/sandbox.h"
752 // Windows-specific initialization code for the sandbox broker services. This
757 sandbox::BrokerServices* broker_services =
760 sandbox::InitBrokerServices(broker_services);
765 sandbox::TargetPolicy* policy = broker_services->CreatePolicy();
766 sandbox::ResultCode result = policy->CreateAlternateDesktop(use_winsta);
767 CHECK(sandbox::SBOX_ERROR_FAILED_TO_SWITCH_BACK_WINSTATION != result);
    [all...]
idbbindingutilities_browsertest.cc 21 // Sanity test, check the function call directly outside the sandbox.
  /external/chromium/chrome/browser/policy/
configuration_policy_provider_win_unittest.cc 122 // two temporary sandbox keys in |kUnitTestRegistrySubKey|, one for HKLM and one
  /external/chromium_org/build/android/gyp/
generate_v14_compatible_resources.py 124 # https://plus.sandbox.google.com/+RomanNurik/posts/huuJd8iVVXY?e=Showroom
  /external/chromium_org/chrome/common/
chrome_utility_messages.h 145 // sandbox.
  /external/chromium_org/chrome/renderer/pepper/
ppb_pdf_impl.cc 218 // on Windows and Mac works through the renderer sandbox.

Completed in 1335 milliseconds

<<21222324252627282930>>