Searched
full:sandbox (Results
551 -
575 of
851) sorted by null
<<21222324252627282930>>
/external/chromium_org/content/ |
DEPS | 40 "+sandbox",
|
/external/chromium_org/content/public/test/ |
test_launcher.cc | 41 #include "sandbox/win/src/sandbox_factory.h" 42 #include "sandbox/win/src/sandbox_types.h" 455 sandbox::SandboxInterfaceInfo sandbox_info = {0}; 494 sandbox::SandboxInterfaceInfo sandbox_info;
|
/external/chromium_org/content/test/ |
content_test_launcher.cc | 28 #include "sandbox/win/src/sandbox_types.h"
|
/external/chromium_org/content/zygote/ |
zygote_linux.cc | 73 // A SOCK_DGRAM is installed in fd 5. This is the sandbox IPC channel. 268 // Assume that if we can't find the child in the sandbox, then 335 // sandbox does) until then, because that can interfere with the 387 // If no SUID sandbox is involved then no pid translation is
|
/external/chromium_org/extensions/common/manifest_handlers/ |
sandboxed_page_info.cc | 25 "sandbox allow-scripts allow-forms allow-popups";
|
/external/chromium_org/sandbox/linux/services/ |
broker_process_unittest.cc | 5 #include "sandbox/linux/services/broker_process.h" 22 #include "sandbox/linux/tests/unit_tests.h" 27 namespace sandbox { namespace 444 } // namespace sandbox
|
/external/chromium_org/sandbox/win/src/ |
restricted_token_unittest.cc | 11 #include "sandbox/win/src/restricted_token.h" 12 #include "sandbox/win/src/sid.h" 15 namespace sandbox { namespace 593 } // namespace sandbox
|
/external/chromium_org/sandbox/win/wow_helper/ |
wow_helper.vcproj | 189 Name="sandbox"
|
/external/chromium_org/third_party/WebKit/Source/core/frame/ |
Settings.h | 74 // HTML sandbox, plug-in sandboxing, and other important details.
|
/external/chromium_org/third_party/WebKit/Source/platform/ |
PlatformKeyboardEvent.cpp | 77 // FIXME: Does this even work inside the sandbox?
|
/external/chromium_org/third_party/WebKit/Source/platform/fonts/mac/ |
MemoryActivatedFont.h | 56 // by the sandbox.
|
/external/chromium_org/third_party/WebKit/public/ |
README | 32 Blink is designed to run in a sandbox and interacts with the operating system
|
/external/chromium_org/third_party/libjingle/overrides/ |
init_webrtc.cc | 121 // explicitly before the sandbox is initialized. In that case, this call is
|
/external/chromium_org/third_party/tcmalloc/chromium/src/base/ |
spinlock_linux-inl.h | 46 // is necessary to make the code compatible with the seccomp sandbox,
|
/external/llvm/test/CodeGen/X86/ |
dbg-declare.ll | 56 !26 = metadata !{metadata !"20020104-2.c", metadata !"/Volumes/Sandbox/llvm"}
|
/external/chromium_org/components/nacl/browser/ |
nacl_process_host.cc | 143 // TODO(bbudge) Handle the --no-sandbox case. 197 // permissions which may expand the surface area of the sandbox. 363 // We don't switch off sandbox automatically for security reasons. 364 SendErrorToRenderer("NaCl's GDB debug stub requires --no-sandbox flag" 597 // If we are on 64-bit Windows, the NaCl process's sandbox is 598 // managed by a different process from the renderer's sandbox. We 599 // need to inform the renderer's sandbox about the NaCl process so 732 // round trip out of the sandbox, we create an FD here. [all...] |
/external/chromium_org/ppapi/proxy/ |
flash_resource.cc | 130 // require filesystem access prohibited by the sandbox. 131 // TODO(shess): Figure out why OSX needs the access, the sandbox warmup should
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
FrameLoader.h | 163 // The following sandbox flags will be forced, regardless of changes to 164 // the sandbox attribute of any parent frames.
|
/external/chromium_org/tools/telemetry/telemetry/core/platform/profiler/ |
perf_profiler.py | 183 '--no-sandbox', 184 '--allow-sandbox-debugging',
|
strace_profiler.py | 232 '--no-sandbox', 233 '--allow-sandbox-debugging'
|
/external/chromium_org/ |
GypAndroid.darwin-arm.mk | 96 include $(LOCAL_PATH)/sandbox/sandbox.target.darwin-arm.mk 97 include $(LOCAL_PATH)/sandbox/sandbox_services.target.darwin-arm.mk 98 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.darwin-arm.mk 99 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.darwin-arm.mk 100 include $(LOCAL_PATH)/sandbox/seccomp_bpf_helpers.target.darwin-arm.mk
|
GypAndroid.darwin-arm64.mk | 96 include $(LOCAL_PATH)/sandbox/sandbox.target.darwin-arm.mk 97 include $(LOCAL_PATH)/sandbox/sandbox_services.target.darwin-arm.mk 98 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.darwin-arm.mk 99 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.darwin-arm.mk 100 include $(LOCAL_PATH)/sandbox/seccomp_bpf_helpers.target.darwin-arm.mk
|
GypAndroid.darwin-x86.mk | 101 include $(LOCAL_PATH)/sandbox/sandbox.target.darwin-x86.mk 102 include $(LOCAL_PATH)/sandbox/sandbox_services.target.darwin-x86.mk 103 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.darwin-x86.mk 104 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.darwin-x86.mk 105 include $(LOCAL_PATH)/sandbox/seccomp_bpf_helpers.target.darwin-x86.mk
|
GypAndroid.linux-arm.mk | 96 include $(LOCAL_PATH)/sandbox/sandbox.target.linux-arm.mk 97 include $(LOCAL_PATH)/sandbox/sandbox_services.target.linux-arm.mk 98 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.linux-arm.mk 99 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.linux-arm.mk 100 include $(LOCAL_PATH)/sandbox/seccomp_bpf_helpers.target.linux-arm.mk
|
GypAndroid.linux-arm64.mk | 96 include $(LOCAL_PATH)/sandbox/sandbox.target.linux-arm.mk 97 include $(LOCAL_PATH)/sandbox/sandbox_services.target.linux-arm.mk 98 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.linux-arm.mk 99 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.linux-arm.mk 100 include $(LOCAL_PATH)/sandbox/seccomp_bpf_helpers.target.linux-arm.mk
|
Completed in 930 milliseconds
<<21222324252627282930>>