HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 426 - 450 of 851) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/linux/tests/
unit_tests.cc 16 #include "sandbox/linux/tests/unit_tests.h"
42 namespace sandbox { namespace
102 // in the BPF sandbox, as it potentially makes global state changes and as
120 ASSERT_EQ(1, num_threads) << "Running sandbox tests with multiple threads "
186 // run (e.g. when testing sandbox features on a kernel that doesn't
  /external/chromium_org/sandbox/
sandbox_services.target.darwin-arm.mk 26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/thread_helpers.cc
96 $(LOCAL_PATH)/sandbox \
181 $(LOCAL_PATH)/sandbox \
sandbox_services.target.darwin-x86.mk 26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/thread_helpers.cc
98 $(LOCAL_PATH)/sandbox \
186 $(LOCAL_PATH)/sandbox \
sandbox_services.target.linux-arm.mk 26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/thread_helpers.cc
96 $(LOCAL_PATH)/sandbox \
181 $(LOCAL_PATH)/sandbox \
sandbox_services.target.linux-x86.mk 26 sandbox/linux/services/broker_process.cc \
27 sandbox/linux/services/init_process_reaper.cc \
28 sandbox/linux/services/thread_helpers.cc
98 $(LOCAL_PATH)/sandbox \
186 $(LOCAL_PATH)/sandbox \
  /external/chromium_org/sandbox/win/src/
restricted_token.h 13 #include "sandbox/win/src/restricted_token_utils.h"
14 #include "sandbox/win/src/security_level.h"
15 #include "sandbox/win/src/sid.h"
25 namespace sandbox { namespace
197 } // namespace sandbox
policy_opcodes_unittest.cc 5 #include "sandbox/win/src/sandbox_types.h"
6 #include "sandbox/win/src/sandbox_nt_types.h"
7 #include "sandbox/win/src/policy_engine_params.h"
8 #include "sandbox/win/src/policy_engine_opcodes.h"
18 namespace sandbox { namespace
344 } // namespace sandbox
shared_handles.h 18 namespace sandbox { namespace
106 } // namespace sandbox
win_utils.h 14 namespace sandbox { namespace
108 } // namespace sandbox
  /external/chromium_org/chrome/common/extensions/docs/templates/articles/
sencha_framework.html 30 <li><a href="app_external.html#sandboxing">Sandbox</a> app's logic.</li>
50 The "sandbox" field is used
51 to sandbox the app's main logic in a unique origin.
76 "sandbox": {
77 "pages": ["sandbox.html"]
117 <h2 id="three">Sandbox app's logic</h2>
124 that acts as a sandbox environment:
127 &lt;iframe id="sandbox-frame" sandbox="allow-scripts" src="sandbox.html">&lt;/iframe
    [all...]
tut_migration_to_manifest_v2.html 92 <li>Define the <a href="manifest/sandbox.html">sandbox</a> property.</li>
102 <li>Create a sandbox entry in your manifest and
103 run the affected code in the sandbox,
324 Chrome provides a sandbox for pages to run in their own origin,
331 <li>Create a sandbox entry in your manifest file.</li>
332 <li>In the sandbox entry,
333 list the pages you want to run in the sandbox.</li>
  /external/chromium_org/content/public/common/
content_switches.cc 23 const char kAllowNoSandboxJob[] = "allow-no-sandbox-job";
26 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging";
224 // Disable the GPU process sandbox.
225 const char kDisableGpuSandbox[] = "disable-gpu-sandbox";
291 // Disable the seccomp filter sandbox (seccomp-bpf) (Linux only).
292 const char kDisableSeccompFilterSandbox[] = "disable-seccomp-filter-sandbox";
297 // Disable the setuid sandbox (Linux only).
298 const char kDisableSetuidSandbox[] = "disable-setuid-sandbox";
527 // Cause the OS X sandbox write to syslog every time an access to a resource
528 // is denied by the sandbox
    [all...]
zygote_fork_delegate_linux.h 51 // child processes real PID from within the SUID sandbox. See
59 // suid sandbox, Fork() returns the Linux process ID.
  /docs/source.android.com/src/devices/tech/security/
enhancements43.jd 11 <li><strong>Android sandbox reinforced with SELinux.</strong>
12 This release strengthens the Android sandbox using the SELinux
  /external/chromium_org/chrome/browser/
DEPS 48 "+sandbox/win/src", # The path doesn't say it, but this is the Windows sandbox.
  /external/chromium_org/chrome/common/extensions/docs/templates/json/
manifest.json 134 "sandbox": {
135 "documentation": "manifest/sandbox.html",
  /external/chromium_org/chrome/test/android/javatests/src/org/chromium/chrome/test/util/
ApplicationData.java 34 * framework does not try to create it for sandbox processes and fail.
55 // will try to create it otherwise and will fail for sandbox processes with
  /external/chromium_org/content/common/
sandbox_mac_system_access_unittest.mm 41 // Shouldn't be able to open the pasteboard in the sandbox.
111 // Opening /dev/urandom succeeds under the sandbox.
  /external/chromium_org/content/gpu/
gpu_main.cc 43 #include "sandbox/win/src/sandbox.h"
64 bool StartSandboxWindows(const sandbox::SandboxInterfaceInfo*);
212 // a GL context, so start the sandbox early.
364 // Warm up the random subsystem, which needs to be done pre-sandbox on all
387 TRACE_EVENT0("gpu", "Initialize sandbox");
410 bool StartSandboxWindows(const sandbox::SandboxInterfaceInfo* sandbox_info) {
416 sandbox::TargetServices* target_services = sandbox_info->target_services;
  /external/chromium_org/sandbox/linux/services/
credentials.h 19 namespace sandbox { namespace
77 } // namespace sandbox.
  /external/chromium_org/sandbox/win/src/sidestep/
ia32_modrm_map.cpp 9 #include "sandbox/win/src/sidestep/mini_disassembler.h"
10 #include "sandbox/win/src/sidestep/mini_disassembler_types.h"
  /external/chromium_org/tools/telemetry/telemetry/core/platform/profiler/
vtune_profiler.py 103 '--no-sandbox',
104 '--allow-sandbox-debugging',
  /external/compiler-rt/include/sanitizer/
common_interface_defs.h 34 // Notify the tools that the sandbox is going to be turned on. The reserved
36 // that the tools may call to bypass the sandbox.
  /external/llvm/test/DebugInfo/X86/
empty-array.ll 27 !0 = metadata !{i32 786449, metadata !20, i32 4, metadata !"clang version 3.3 (trunk 169136)", i1 false, metadata !"", i32 0, metadata !1, metadata !1, metadata !1, metadata !3, metadata !3, metadata !""} ; [ DW_TAG_compile_unit ] [/Volumes/Sandbox/llvm/t.cpp] [DW_LANG_C_plus_plus]
45 !20 = metadata !{metadata !"t.cpp", metadata !"/Volumes/Sandbox/llvm"}
nondefault-subrange-array.ll 30 !0 = metadata !{i32 786449, metadata !20, i32 4, metadata !"clang version 3.3 (trunk 169136)", i1 false, metadata !"", i32 0, metadata !1, metadata !1, metadata !1, metadata !3, metadata !3, metadata !""} ; [ DW_TAG_compile_unit ] [/Volumes/Sandbox/llvm/t.cpp] [DW_LANG_C_plus_plus]
48 !20 = metadata !{metadata !"t.cpp", metadata !"/Volumes/Sandbox/llvm"}

Completed in 1963 milliseconds

<<11121314151617181920>>