HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 526 - 550 of 851) sorted by null

<<21222324252627282930>>

  /external/chromium_org/sandbox/linux/seccomp-bpf/
syscall.h 10 namespace sandbox { namespace
136 } // namespace sandbox
codegen_unittest.cc 11 #include "sandbox/linux/seccomp-bpf/codegen.h"
12 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
13 #include "sandbox/linux/tests/unit_tests.h"
15 namespace sandbox { namespace
447 } // namespace sandbox
syscall.cc 5 #include "sandbox/linux/seccomp-bpf/syscall.h"
12 namespace sandbox { namespace
243 } // namespace sandbox
  /external/chromium_org/sandbox/linux/services/
libc_urandom_override.cc 5 #include "sandbox/linux/services/libc_urandom_override.h"
23 namespace sandbox { namespace
broker_process.cc 5 #include "sandbox/linux/services/broker_process.h"
26 #include "sandbox/linux/services/linux_syscalls.h"
115 namespace sandbox { namespace
176 // Enable the sandbox if provided.
520 } // namespace sandbox.
  /external/chromium_org/sandbox/
sandbox_services_headers.target.darwin-arm.mk 92 $(LOCAL_PATH)/sandbox \
175 $(LOCAL_PATH)/sandbox \
sandbox_services_headers.target.darwin-x86.mk 94 $(LOCAL_PATH)/sandbox \
180 $(LOCAL_PATH)/sandbox \
sandbox_services_headers.target.linux-arm.mk 92 $(LOCAL_PATH)/sandbox \
175 $(LOCAL_PATH)/sandbox \
sandbox_services_headers.target.linux-x86.mk 94 $(LOCAL_PATH)/sandbox \
180 $(LOCAL_PATH)/sandbox \
  /external/chromium_org/sandbox/win/sandbox_poc/pocdll/
invasive.cc 6 #include "sandbox/win/sandbox_poc/pocdll/exports.h"
7 #include "sandbox/win/sandbox_poc/pocdll/utils.h"
  /external/chromium_org/sandbox/win/src/
ipc_unittest.cc 6 #include "sandbox/win/src/crosscall_client.h"
7 #include "sandbox/win/src/crosscall_server.h"
8 #include "sandbox/win/src/sharedmem_ipc_client.h"
9 #include "sandbox/win/src/sharedmem_ipc_server.h"
12 namespace sandbox { namespace
625 sandbox::SharedMemIPCServer::ServerControl srv_control = {
630 sandbox::CrossCallReturn call_return = {0};
641 } // namespace sandbox
crosscall_client.h 8 #include "sandbox/win/src/crosscall_params.h"
9 #include "sandbox/win/src/sandbox.h"
39 namespace sandbox { namespace
481 } // namespace sandbox
policy_low_level_unittest.cc 5 #include "sandbox/win/src/policy_engine_params.h"
6 #include "sandbox/win/src/policy_engine_processor.h"
7 #include "sandbox/win/src/policy_low_level.h"
10 #define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = {
11 #define POLPARAM(p) sandbox::ParamPickerMake(p),
14 namespace sandbox { namespace
617 } // namespace sandbox
policy_low_level.cc 8 #include "sandbox/win/src/policy_low_level.h"
32 namespace sandbox { namespace
348 } // namespace sandbox
  /external/chromium_org/tools/
run-bisect-manual-test.py 13 to setup the sandbox manually before running the script. Otherwise the script
119 print 'SUID sandbox has not been setup.'\
  /external/chromium_org/native_client_sdk/src/doc/devguide/devcycle/
debugging.rst 115 ``--no-sandbox`` flag. You must also be careful that each variable points to
273 version of the NaCl sandbox on your system, you can translate the
300 #. Launch Chrome with these three required flags: ``--enable-nacl --enable-nacl-debug --no-sandbox``.
305 chrome --enable-nacl --enable-nacl-debug --no-sandbox --disable-hang-monitor localhost:5103
317 ``--no-sandbox``
318 Turns off the Chrome sandbox (not the Native Client sandbox). This enables
  /external/chromium_org/chrome/installer/linux/common/
installer.include 135 # sandbox
136 # Rename sandbox binary with hyphen instead of underscore because that's what
139 "${STAGEDIR}/${INSTALLDIR}/${PROGNAME}-sandbox"
  /external/chromium_org/remoting/host/win/
unprivileged_process_delegate.cc 32 #include "sandbox/win/src/restricted_token.h"
84 sandbox::RestrictedToken restricted_token;
94 if (restricted_token.SetIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW)
  /external/chromium/base/i18n/
icu_util.cc 105 // Instead, Mac maps the file in and hands off the data so the sandbox won't
  /external/chromium/chrome/browser/
crash_handler_host_linux.h 29 // allows us to be outside the sandbox.
  /external/chromium_org/base/i18n/
icu_util.cc 82 // Instead, we map the file in and hand off the data so the sandbox won't
  /external/chromium_org/chrome/browser/chromeos/contacts/
contact.proto 42 // must be decoded within a sandbox by e.g. ImageDecoder before being used.
  /external/chromium_org/chrome/browser/nacl_host/test/
debug_stub_browser_tests.py 57 # Breakpoints and single-stepping might interfere with Chrome sandbox. So we
  /external/chromium_org/chrome/common/
chrome_paths_win.cc 117 // lies on a network share the sandbox will prevent us from accessing it.
  /external/chromium_org/chrome/test/base/
chrome_test_launcher.cc 34 #include "sandbox/win/src/sandbox_types.h"

Completed in 1154 milliseconds

<<21222324252627282930>>