/external/chromium_org/sandbox/linux/tests/ |
unit_tests.cc | 16 #include "sandbox/linux/tests/unit_tests.h" 42 namespace sandbox { namespace 102 // in the BPF sandbox, as it potentially makes global state changes and as 120 ASSERT_EQ(1, num_threads) << "Running sandbox tests with multiple threads " 186 // run (e.g. when testing sandbox features on a kernel that doesn't
|
/external/chromium_org/sandbox/ |
sandbox_services.target.darwin-arm.mk | 26 sandbox/linux/services/broker_process.cc \ 27 sandbox/linux/services/init_process_reaper.cc \ 28 sandbox/linux/services/thread_helpers.cc 96 $(LOCAL_PATH)/sandbox \ 181 $(LOCAL_PATH)/sandbox \
|
sandbox_services.target.darwin-x86.mk | 26 sandbox/linux/services/broker_process.cc \ 27 sandbox/linux/services/init_process_reaper.cc \ 28 sandbox/linux/services/thread_helpers.cc 98 $(LOCAL_PATH)/sandbox \ 186 $(LOCAL_PATH)/sandbox \
|
sandbox_services.target.linux-arm.mk | 26 sandbox/linux/services/broker_process.cc \ 27 sandbox/linux/services/init_process_reaper.cc \ 28 sandbox/linux/services/thread_helpers.cc 96 $(LOCAL_PATH)/sandbox \ 181 $(LOCAL_PATH)/sandbox \
|
sandbox_services.target.linux-x86.mk | 26 sandbox/linux/services/broker_process.cc \ 27 sandbox/linux/services/init_process_reaper.cc \ 28 sandbox/linux/services/thread_helpers.cc 98 $(LOCAL_PATH)/sandbox \ 186 $(LOCAL_PATH)/sandbox \
|
/external/chromium_org/sandbox/win/src/ |
restricted_token.h | 13 #include "sandbox/win/src/restricted_token_utils.h" 14 #include "sandbox/win/src/security_level.h" 15 #include "sandbox/win/src/sid.h" 25 namespace sandbox { namespace 197 } // namespace sandbox
|
policy_opcodes_unittest.cc | 5 #include "sandbox/win/src/sandbox_types.h" 6 #include "sandbox/win/src/sandbox_nt_types.h" 7 #include "sandbox/win/src/policy_engine_params.h" 8 #include "sandbox/win/src/policy_engine_opcodes.h" 18 namespace sandbox { namespace 344 } // namespace sandbox
|
shared_handles.h | 18 namespace sandbox { namespace 106 } // namespace sandbox
|
win_utils.h | 14 namespace sandbox { namespace 108 } // namespace sandbox
|
/external/chromium_org/chrome/common/extensions/docs/templates/articles/ |
sencha_framework.html | 30 <li><a href="app_external.html#sandboxing">Sandbox</a> app's logic.</li> 50 The "sandbox" field is used 51 to sandbox the app's main logic in a unique origin. 76 "sandbox": { 77 "pages": ["sandbox.html"] 117 <h2 id="three">Sandbox app's logic</h2> 124 that acts as a sandbox environment: 127 <iframe id="sandbox-frame" sandbox="allow-scripts" src="sandbox.html"></iframe [all...] |
tut_migration_to_manifest_v2.html | 92 <li>Define the <a href="manifest/sandbox.html">sandbox</a> property.</li> 102 <li>Create a sandbox entry in your manifest and 103 run the affected code in the sandbox, 324 Chrome provides a sandbox for pages to run in their own origin, 331 <li>Create a sandbox entry in your manifest file.</li> 332 <li>In the sandbox entry, 333 list the pages you want to run in the sandbox.</li>
|
/external/chromium_org/content/public/common/ |
content_switches.cc | 23 const char kAllowNoSandboxJob[] = "allow-no-sandbox-job"; 26 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging"; 224 // Disable the GPU process sandbox. 225 const char kDisableGpuSandbox[] = "disable-gpu-sandbox"; 291 // Disable the seccomp filter sandbox (seccomp-bpf) (Linux only). 292 const char kDisableSeccompFilterSandbox[] = "disable-seccomp-filter-sandbox"; 297 // Disable the setuid sandbox (Linux only). 298 const char kDisableSetuidSandbox[] = "disable-setuid-sandbox"; 527 // Cause the OS X sandbox write to syslog every time an access to a resource 528 // is denied by the sandbox [all...] |
zygote_fork_delegate_linux.h | 51 // child processes real PID from within the SUID sandbox. See 59 // suid sandbox, Fork() returns the Linux process ID.
|
/docs/source.android.com/src/devices/tech/security/ |
enhancements43.jd | 11 <li><strong>Android sandbox reinforced with SELinux.</strong> 12 This release strengthens the Android sandbox using the SELinux
|
/external/chromium_org/chrome/browser/ |
DEPS | 48 "+sandbox/win/src", # The path doesn't say it, but this is the Windows sandbox.
|
/external/chromium_org/chrome/common/extensions/docs/templates/json/ |
manifest.json | 134 "sandbox": { 135 "documentation": "manifest/sandbox.html",
|
/external/chromium_org/chrome/test/android/javatests/src/org/chromium/chrome/test/util/ |
ApplicationData.java | 34 * framework does not try to create it for sandbox processes and fail. 55 // will try to create it otherwise and will fail for sandbox processes with
|
/external/chromium_org/content/common/ |
sandbox_mac_system_access_unittest.mm | 41 // Shouldn't be able to open the pasteboard in the sandbox. 111 // Opening /dev/urandom succeeds under the sandbox.
|
/external/chromium_org/content/gpu/ |
gpu_main.cc | 43 #include "sandbox/win/src/sandbox.h" 64 bool StartSandboxWindows(const sandbox::SandboxInterfaceInfo*); 212 // a GL context, so start the sandbox early. 364 // Warm up the random subsystem, which needs to be done pre-sandbox on all 387 TRACE_EVENT0("gpu", "Initialize sandbox"); 410 bool StartSandboxWindows(const sandbox::SandboxInterfaceInfo* sandbox_info) { 416 sandbox::TargetServices* target_services = sandbox_info->target_services;
|
/external/chromium_org/sandbox/linux/services/ |
credentials.h | 19 namespace sandbox { namespace 77 } // namespace sandbox.
|
/external/chromium_org/sandbox/win/src/sidestep/ |
ia32_modrm_map.cpp | 9 #include "sandbox/win/src/sidestep/mini_disassembler.h" 10 #include "sandbox/win/src/sidestep/mini_disassembler_types.h"
|
/external/chromium_org/tools/telemetry/telemetry/core/platform/profiler/ |
vtune_profiler.py | 103 '--no-sandbox', 104 '--allow-sandbox-debugging',
|
/external/compiler-rt/include/sanitizer/ |
common_interface_defs.h | 34 // Notify the tools that the sandbox is going to be turned on. The reserved 36 // that the tools may call to bypass the sandbox.
|
/external/llvm/test/DebugInfo/X86/ |
empty-array.ll | 27 !0 = metadata !{i32 786449, metadata !20, i32 4, metadata !"clang version 3.3 (trunk 169136)", i1 false, metadata !"", i32 0, metadata !1, metadata !1, metadata !1, metadata !3, metadata !3, metadata !""} ; [ DW_TAG_compile_unit ] [/Volumes/Sandbox/llvm/t.cpp] [DW_LANG_C_plus_plus] 45 !20 = metadata !{metadata !"t.cpp", metadata !"/Volumes/Sandbox/llvm"}
|
nondefault-subrange-array.ll | 30 !0 = metadata !{i32 786449, metadata !20, i32 4, metadata !"clang version 3.3 (trunk 169136)", i1 false, metadata !"", i32 0, metadata !1, metadata !1, metadata !1, metadata !3, metadata !3, metadata !""} ; [ DW_TAG_compile_unit ] [/Volumes/Sandbox/llvm/t.cpp] [DW_LANG_C_plus_plus] 48 !20 = metadata !{metadata !"t.cpp", metadata !"/Volumes/Sandbox/llvm"}
|