HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 701 - 725 of 795) sorted by null

<<21222324252627282930>>

  /external/chromium/base/
process_util_linux.cc 391 // Try statm if smaps is empty because of the SUID sandbox.
  /external/chromium/chrome/browser/extensions/
extension_service.h 522 // strong sandbox. Typically, these NaCl modules are stored in extensions
  /external/chromium_org/android_webview/
libwebviewchromium.target.darwin-arm.mk 192 $(call intermediates-dir-for,GYP,sandbox_sandbox_gyp)/sandbox.stamp \
    [all...]
libwebviewchromium.target.darwin-mips.mk 191 $(call intermediates-dir-for,GYP,sandbox_sandbox_gyp)/sandbox.stamp \
    [all...]
libwebviewchromium.target.darwin-x86.mk 196 $(call intermediates-dir-for,GYP,sandbox_sandbox_gyp)/sandbox.stamp \
    [all...]
libwebviewchromium.target.linux-arm.mk 192 $(call intermediates-dir-for,GYP,sandbox_sandbox_gyp)/sandbox.stamp \
    [all...]
libwebviewchromium.target.linux-mips.mk 191 $(call intermediates-dir-for,GYP,sandbox_sandbox_gyp)/sandbox.stamp \
    [all...]
libwebviewchromium.target.linux-x86.mk 196 $(call intermediates-dir-for,GYP,sandbox_sandbox_gyp)/sandbox.stamp \
    [all...]
  /external/chromium_org/base/
base.gypi 727 # Metrics won't work in the NaCl sandbox.
    [all...]
  /external/chromium_org/base/debug/
stack_trace_posix.cc 492 // NOTE: code from sandbox/linux/seccomp-bpf/demo.cc.
  /external/chromium_org/chrome/common/
url_constants.cc 240 const char kChromeUISandboxHost[] = "sandbox";
  /external/chromium_org/chrome/test/reliability/
page_load_test.cc 209 // We won't get v8 log unless --no-sandbox is specified.
  /external/chromium_org/chrome_frame/test/
chrome_frame_test_utils.cc 351 // TODO(stoyan): sandbox/win/src/restricted_token_utils.cc has
  /external/chromium_org/chrome_frame/test/reliability/
page_load_test.cc 582 // We won't get v8 log unless --no-sandbox is specified.
  /external/chromium_org/content/browser/worker_host/
worker_process_host.cc 71 virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
  /external/chromium_org/content/
content_browser.target.darwin-arm.mk 23 $(call intermediates-dir-for,GYP,sandbox_sandbox_gyp)/sandbox.stamp \
content_browser.target.darwin-mips.mk 23 $(call intermediates-dir-for,GYP,sandbox_sandbox_gyp)/sandbox.stamp \
content_browser.target.darwin-x86.mk 23 $(call intermediates-dir-for,GYP,sandbox_sandbox_gyp)/sandbox.stamp \
content_browser.target.linux-arm.mk 23 $(call intermediates-dir-for,GYP,sandbox_sandbox_gyp)/sandbox.stamp \
content_browser.target.linux-mips.mk 23 $(call intermediates-dir-for,GYP,sandbox_sandbox_gyp)/sandbox.stamp \
content_browser.target.linux-x86.mk 23 $(call intermediates-dir-for,GYP,sandbox_sandbox_gyp)/sandbox.stamp \
  /external/chromium_org/content/renderer/pepper/
plugin_module.cc 700 // sandbox restrictions. So getting here implies it doesn't exist or should
  /external/chromium_org/dbus/
message.cc 709 // NB: sending a directory potentially enables sandbox escape
  /external/chromium_org/third_party/re2/re2/
regexp.h 75 // avoids the sandbox.
  /external/chromium_org/v8/src/
sampler.cc 215 // for some reason doesn't work in Chrome's sandbox.

Completed in 1145 milliseconds

<<21222324252627282930>>