/external/chromium_org/third_party/WebKit/Source/core/platform/graphics/chromium/ |
FontPlatformDataChromiumWin.cpp | 279 // if there is no sandbox, then we can assume the font
|
/external/chromium_org/third_party/WebKit/Source/core/platform/graphics/cocoa/ |
FontPlatformDataCocoa.mm | 57 // FIXME: Chromium: The following code isn't correct for the Chromium port since the sandbox might
|
/external/chromium_org/tools/perf/page_sets/ |
key_mobile_sites.json | 215 "url": "http://mobile-news.sandbox.google.com/news/p#2",
|
/frameworks/base/docs/html/guide/faq/ |
security.jd | 74 run in an Application Sandbox that limits access to sensitive information or data
|
/ndk/sources/host-tools/make-3.81/tests/ |
README | 89 fourth serious problem is that it doesn't create its own sandbox when
|
/external/chromium_org/ |
GypAndroid.darwin-mips.mk | 90 include $(LOCAL_PATH)/sandbox/sandbox.target.darwin-mips.mk 91 include $(LOCAL_PATH)/sandbox/sandbox_services.target.darwin-mips.mk
|
GypAndroid.linux-mips.mk | 90 include $(LOCAL_PATH)/sandbox/sandbox.target.linux-mips.mk 91 include $(LOCAL_PATH)/sandbox/sandbox_services.target.linux-mips.mk
|
/external/chromium_org/chrome/browser/extensions/ |
sandboxed_unpacker.cc | 140 // If |temp_file| contains a link, the sandbox will block al file system 292 // will cause file system access outside the sandbox path, and the sandbox
|
/external/chromium_org/content/ |
content_shell.gypi | 415 '../sandbox/sandbox.gyp:sandbox',
|
/external/chromium_org/content/public/browser/ |
content_browser_client.h | 66 namespace sandbox { namespace 581 // is launched. It gives the embedder a chance to add loosen the sandbox 583 virtual void PreSpawnRenderer(sandbox::TargetPolicy* policy,
|
/external/chromium_org/ppapi/native_client/src/trusted/plugin/ |
plugin.h | 348 // with the sandbox on. 366 // with the sandbox on. 373 // chosen for the sandbox ISA, any current service runtime is shut down, the
|
/external/chromium_org/content/renderer/ |
renderer_webkitplatformsupport_impl.cc | 216 DVLOG(1) << "Disabling sandbox support for testing."; 278 // Even if the sandbox is disabled, there's no reason why the code should 464 // The sandbox restricts our access to the registry, so we need to proxy 478 // The sandbox restricts our access to the registry, so we need to proxy 493 // The sandbox restricts our access to the registry, so we need to proxy [all...] |
/external/openssh/ |
configure.ac | 529 AC_CHECK_HEADERS([sandbox.h]) [all...] |
/external/chromium_org/tools/traceline/svgui/ |
startup-release.json | 30 {'eventid': 1718197540, 'stacktrace': [[2088830549, 'kernel32.dll!CreateThread+0x1e'], [4216426, 'chrome.exe!sandbox::BrokerServicesBase::Init+0x5a [ c:\\g\\trunk\\src\\sandbox\\src\\broker_services.cc:70 ]'], [20404275, 'chrome.dll!BrowserMain+0xcb3 [ c:\\g\\trunk\\src\\chrome\\browser\\browser_main.cc:523 ]'], [19354554, 'chrome.dll!ChromeMain+0x83a [ c:\\g\\trunk\\src\\chrome\\app\\chrome_dll_main.cc:224 ]'], [4205604, 'chrome.exe!wWinMain+0x304 [ c:\\g\\trunk\\src\\chrome\\app\\chrome_exe_main.cc:103 ]'], [4482934, 'chrome.exe!__tmainCRTStartup+0x176 [ f:\\sp\\vctools\\crt_bld\\self_x86\\crt\\src\\crt0.c:324 ]'], [2088857559, 'kernel32.dll!BaseProcessStart+0x23']], 'thread': 3956, 'eventtype': 'EVENT_TYPE_CREATETHREAD', 'startaddr': 2088830553, 'ms': 63.831575999999998, 'cpu': 2147742720}, 34 {'stacktrace': [[4340339, 'chrome.exe!PlatformThread::SetName+0x63 [ c:\\g\\trunk\\src\\base\\platform_thread_win.cc:62 ]'], [4215848, 'chrome.exe!sandbox::BrokerServicesBase::TargetEventsThread+0x28 [ c:\\g\\trunk\\src\\sandbox\\src\\broker_services.cc:147 ]'], [2088810115, 'kernel32.dll!BaseThreadStart+0x37']], 'thread': 2428, 'eventtype': 'EVENT_TYPE_THREADNAME', 'threadname': 'BrokerEventThread', 'ms': 64.838966999999997, 'cpu': 3124053392}, 35 {'stacktrace': [[4215906, 'chrome.exe!sandbox::BrokerServicesBase::TargetEventsThread+0x62 [ c:\\g\\trunk\\src\\sandbox\\src\\broker_services.cc:151 ]'], [2088810115, 'kernel32.dll!BaseThreadStart+0x37']], 'thread': 2428, 'syscall': 190, 'eventtype': 'EVENT_TYPE_SYSCALL', 'syscallname': 'ntdll.dll!ZwRemoveIoCompletion', 'waiting': 1, 'done': 115.701297, 'ms': 64.856288000000006, 'syscallargs': [168, 17039276, 17038976], 'cpu': 3124053392}, [all...] |
/external/chromium_org/chrome/browser/ |
chrome_content_browser_client.cc | 147 #include "sandbox/win/src/sandbox_policy.h" [all...] |
/external/chromium_org/ash/ |
ash.gyp | [all...] |
/external/chromium_org/ipc/ |
ipc_channel_posix.cc | 388 " IPC. Aborting to maintain sandbox isolation."; 414 // fd_pipe_ which makes Seccomp sandbox operation more efficient. 706 // Our process may be in a sandbox with a separate PID namespace.
|
/external/chromium_org/ui/views/ |
views.gyp | [all...] |
/frameworks/base/core/java/android/os/ |
Process.java | 676 * app-specific sandbox. It is different from {@link #myUserHandle} in that 677 * a uid identifies a specific app sandbox in a specific user. 694 * Returns whether the current process is in an isolated sandbox. [all...] |
/external/chromium/chrome/browser/ |
browser_main.cc | 181 #include "sandbox/src/sandbox.h" 752 // Windows-specific initialization code for the sandbox broker services. This 757 sandbox::BrokerServices* broker_services = 760 sandbox::InitBrokerServices(broker_services); 765 sandbox::TargetPolicy* policy = broker_services->CreatePolicy(); 766 sandbox::ResultCode result = policy->CreateAlternateDesktop(use_winsta); 767 CHECK(sandbox::SBOX_ERROR_FAILED_TO_SWITCH_BACK_WINSTATION != result); [all...] |
idbbindingutilities_browsertest.cc | 21 // Sanity test, check the function call directly outside the sandbox.
|
/external/chromium/chrome/browser/policy/ |
configuration_policy_provider_win_unittest.cc | 122 // two temporary sandbox keys in |kUnitTestRegistrySubKey|, one for HKLM and one
|
/external/chromium_org/build/android/gyp/ |
generate_v14_compatible_resources.py | 124 # https://plus.sandbox.google.com/+RomanNurik/posts/huuJd8iVVXY?e=Showroom
|
/external/chromium_org/chrome/common/ |
chrome_utility_messages.h | 145 // sandbox.
|
/external/chromium_org/chrome/renderer/pepper/ |
ppb_pdf_impl.cc | 218 // on Windows and Mac works through the renderer sandbox.
|