OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:sandbox
(Results
526 - 550
of
851
) sorted by null
<<
21
22
23
24
25
26
27
28
29
30
>>
/external/chromium_org/sandbox/linux/seccomp-bpf/
syscall.h
10
namespace
sandbox
{
namespace
136
} // namespace
sandbox
codegen_unittest.cc
11
#include "
sandbox
/linux/seccomp-bpf/codegen.h"
12
#include "
sandbox
/linux/seccomp-bpf/sandbox_bpf.h"
13
#include "
sandbox
/linux/tests/unit_tests.h"
15
namespace
sandbox
{
namespace
447
} // namespace
sandbox
syscall.cc
5
#include "
sandbox
/linux/seccomp-bpf/syscall.h"
12
namespace
sandbox
{
namespace
243
} // namespace
sandbox
/external/chromium_org/sandbox/linux/services/
libc_urandom_override.cc
5
#include "
sandbox
/linux/services/libc_urandom_override.h"
23
namespace
sandbox
{
namespace
broker_process.cc
5
#include "
sandbox
/linux/services/broker_process.h"
26
#include "
sandbox
/linux/services/linux_syscalls.h"
115
namespace
sandbox
{
namespace
176
// Enable the
sandbox
if provided.
520
} // namespace
sandbox
.
/external/chromium_org/sandbox/
sandbox_services_headers.target.darwin-arm.mk
92
$(LOCAL_PATH)/
sandbox
\
175
$(LOCAL_PATH)/
sandbox
\
sandbox_services_headers.target.darwin-x86.mk
94
$(LOCAL_PATH)/
sandbox
\
180
$(LOCAL_PATH)/
sandbox
\
sandbox_services_headers.target.linux-arm.mk
92
$(LOCAL_PATH)/
sandbox
\
175
$(LOCAL_PATH)/
sandbox
\
sandbox_services_headers.target.linux-x86.mk
94
$(LOCAL_PATH)/
sandbox
\
180
$(LOCAL_PATH)/
sandbox
\
/external/chromium_org/sandbox/win/sandbox_poc/pocdll/
invasive.cc
6
#include "
sandbox
/win/sandbox_poc/pocdll/exports.h"
7
#include "
sandbox
/win/sandbox_poc/pocdll/utils.h"
/external/chromium_org/sandbox/win/src/
ipc_unittest.cc
6
#include "
sandbox
/win/src/crosscall_client.h"
7
#include "
sandbox
/win/src/crosscall_server.h"
8
#include "
sandbox
/win/src/sharedmem_ipc_client.h"
9
#include "
sandbox
/win/src/sharedmem_ipc_server.h"
12
namespace
sandbox
{
namespace
625
sandbox
::SharedMemIPCServer::ServerControl srv_control = {
630
sandbox
::CrossCallReturn call_return = {0};
641
} // namespace
sandbox
crosscall_client.h
8
#include "
sandbox
/win/src/crosscall_params.h"
9
#include "
sandbox
/win/src/
sandbox
.h"
39
namespace
sandbox
{
namespace
481
} // namespace
sandbox
policy_low_level_unittest.cc
5
#include "
sandbox
/win/src/policy_engine_params.h"
6
#include "
sandbox
/win/src/policy_engine_processor.h"
7
#include "
sandbox
/win/src/policy_low_level.h"
10
#define POLPARAMS_BEGIN(x)
sandbox
::ParameterSet x[] = {
11
#define POLPARAM(p)
sandbox
::ParamPickerMake(p),
14
namespace
sandbox
{
namespace
617
} // namespace
sandbox
policy_low_level.cc
8
#include "
sandbox
/win/src/policy_low_level.h"
32
namespace
sandbox
{
namespace
348
} // namespace
sandbox
/external/chromium_org/tools/
run-bisect-manual-test.py
13
to setup the
sandbox
manually before running the script. Otherwise the script
119
print 'SUID
sandbox
has not been setup.'\
/external/chromium_org/native_client_sdk/src/doc/devguide/devcycle/
debugging.rst
115
``--no-
sandbox
`` flag. You must also be careful that each variable points to
273
version of the NaCl
sandbox
on your system, you can translate the
300
#. Launch Chrome with these three required flags: ``--enable-nacl --enable-nacl-debug --no-
sandbox
``.
305
chrome --enable-nacl --enable-nacl-debug --no-
sandbox
--disable-hang-monitor localhost:5103
317
``--no-
sandbox
``
318
Turns off the Chrome
sandbox
(not the Native Client
sandbox
). This enables
/external/chromium_org/chrome/installer/linux/common/
installer.include
135
#
sandbox
136
# Rename
sandbox
binary with hyphen instead of underscore because that's what
139
"${STAGEDIR}/${INSTALLDIR}/${PROGNAME}-
sandbox
"
/external/chromium_org/remoting/host/win/
unprivileged_process_delegate.cc
32
#include "
sandbox
/win/src/restricted_token.h"
84
sandbox
::RestrictedToken restricted_token;
94
if (restricted_token.SetIntegrityLevel(
sandbox
::INTEGRITY_LEVEL_LOW)
/external/chromium/base/i18n/
icu_util.cc
105
// Instead, Mac maps the file in and hands off the data so the
sandbox
won't
/external/chromium/chrome/browser/
crash_handler_host_linux.h
29
// allows us to be outside the
sandbox
.
/external/chromium_org/base/i18n/
icu_util.cc
82
// Instead, we map the file in and hand off the data so the
sandbox
won't
/external/chromium_org/chrome/browser/chromeos/contacts/
contact.proto
42
// must be decoded within a
sandbox
by e.g. ImageDecoder before being used.
/external/chromium_org/chrome/browser/nacl_host/test/
debug_stub_browser_tests.py
57
# Breakpoints and single-stepping might interfere with Chrome
sandbox
. So we
/external/chromium_org/chrome/common/
chrome_paths_win.cc
117
// lies on a network share the
sandbox
will prevent us from accessing it.
/external/chromium_org/chrome/test/base/
chrome_test_launcher.cc
34
#include "
sandbox
/win/src/sandbox_types.h"
Completed in 1154 milliseconds
<<
21
22
23
24
25
26
27
28
29
30
>>