HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 576 - 600 of 851) sorted by null

<<21222324252627282930>>

  /external/chromium_org/
GypAndroid.linux-x86.mk 101 include $(LOCAL_PATH)/sandbox/sandbox.target.linux-x86.mk
102 include $(LOCAL_PATH)/sandbox/sandbox_services.target.linux-x86.mk
103 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.linux-x86.mk
104 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.linux-x86.mk
105 include $(LOCAL_PATH)/sandbox/seccomp_bpf_helpers.target.linux-x86.mk
  /docs/source.android.com/src/devices/tech/security/
index.jd 78 Application Sandbox. Applications get a dedicated part of the filesystem in
179 <li>Mandatory application sandbox for all applications</li>
189 restricted by the Application Sandbox.</p>
197 native code is constrained by the Application Sandbox. Whether that code is
227 <h2 id="the-application-sandbox">The Application Sandbox</h2>
234 <p>This sets up a kernel-level Application Sandbox. The kernel enforces security
242 sandbox is simple, auditable, and based on decades-old UNIX-style user
244 <p>Since the Application Sandbox is in the kernel, this security model extends to
248 Sandbox. On some platforms, developers are constrained to a specifi
    [all...]
  /external/chromium_org/content/app/
content_main_runner.cc 49 #include "sandbox/win/src/sandbox_types.h"
538 sandbox::SandboxInterfaceInfo* sandbox_info,
686 // We need to allocate the IO Ports before the Sandbox is initialized or
760 // On OS X the renderer sandbox needs to be initialized later in the
847 sandbox::SandboxInterfaceInfo sandbox_info_;
  /external/chromium_org/extensions/common/
manifest_constants.cc 114 const char kSandboxedPages[] = "sandbox.pages";
115 const char kSandboxedPagesCSP[] = "sandbox.content_security_policy";
537 "Invalid value for 'sandbox.pages'.";
539 "Invalid value for 'sandbox.pages[*]'.";
541 "Invalid value for 'sandbox.content_security_policy'.";
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
syscall_sets.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
8 #include "sandbox/linux/services/linux_syscalls.h"
10 namespace sandbox { namespace
770 // These give a lot of ambient authority and bypass the setuid sandbox.
981 } // namespace sandbox.
  /external/apache-xml/src/main/java/org/apache/xml/serializer/
OutputPropertiesFactory.java 401 // Repeat IOException handling for sandbox/applet case -sc
456 // No-op for sandbox/applet case, leave null -sc
469 // No-op for sandbox/applet case, leave null -sc
  /external/chromium_org/chrome/
chrome_renderer.gypi 411 '../sandbox/sandbox.gyp:sandbox',
  /external/chromium_org/ppapi/native_client/tools/browser_tester/browsertester/
browserlauncher.py 305 # Chrome process can't access file within sandbox
310 cmd.append('--no-sandbox')
315 cmd.append('--no-sandbox')
  /external/chromium_org/remoting/webapp/
remoting.js 82 var sandbox = /** @type {HTMLIFrameElement} */
83 document.getElementById('wcs-sandbox');
84 remoting.wcsSandbox = new remoting.WcsSandboxContainer(sandbox.contentWindow);
  /external/chromium_org/sandbox/win/src/
policy_engine_opcodes.h 8 #include "sandbox/win/src/policy_engine_params.h"
46 namespace sandbox { namespace
378 } // namespace sandbox
  /external/chromium_org/tools/valgrind/drmemory/
suppressions.txt 268 *!sandbox::PolicyBase::~PolicyBase
273 *!sandbox::GetHandleName
278 *!sandbox::GetPathFromHandle
  /external/chromium_org/components/nacl/loader/
nacl_listener.cc 48 // On Mac OS X, shm_open() works in the sandbox but does not give us
60 // ftruncate() is disallowed by the Mac OS X sandbox and
  /external/chromium_org/content/browser/worker_host/test/
worker_browsertest.cc 145 // This test is flaky inside the Linux SUID sandbox.
161 // This test is flaky inside the Linux SUID sandbox: http://crbug.com/130116
  /external/chromium_org/tools/perf/page_sets/
key_mobile_sites.json 262 "url": "http://mobile-news.sandbox.google.com/news/pt1",
266 "url": "http://mobile-news.sandbox.google.com/news/pt0",
  /external/compiler-rt/lib/sanitizer_common/
sanitizer_internal_defs.h 93 // Notify the tools that the sandbox is going to be turned on. The reserved
95 // that the tools may call to bypass the sandbox.
  /external/llvm/docs/HistoricalNotes/
2000-11-18-EarlyDesignIdeasResp.txt 35 * To keep things "safe" ie to enforce a sandbox on Java/foreign code,
48 for value add. The nice safe "sandbox" VM can be provided as a layer
  /external/openssh/
ChangeLog 12 regress errors for the sandbox to warnings. ok tim dtucker
34 an explicitly requested sandbox type
43 test with sandbox enabled; ok djm@
89 [sandbox-systrace.c]
110 - (djm) [configure.ac Makefile.in sandbox-darwin.c] Add a sandbox for
124 This introduces a new "UsePrivilegeSeparation=sandbox" option for
130 The sandbox is implemented using systrace(4) in unsupervised "fast-path"
135 UsePrivilegeSeparation=sandbox will become the default in the future
144 [sshd.c ssh-sandbox.h sandbox.h sandbox-rlimit.c sandbox-systrace.c
    [all...]
  /external/chromium_org/sandbox/win/wow_helper/
wow_helper.pdb 16 ??BINDSTATUS_FINDINGRESOURCE???88?.1+??I??C~?B?@?\?'?* CIL **?'?Microsoft (R) LINKJh:\ch1\src\sandbox\wow_helper\x64\Release\service64_resolver.obj:D?'?'?Microsoft (R) Optimizing CompilerJ ??scoped_ptr<char>::~scoped_ptr<char> ?OthisZ?uog0sandbox::Service64ResolverThunk::IsFunctionAService@PeOthisXOlocal_thunk0?Ofunction_codeP#OreadV|
19 f sandbox::Service64ResolverThunk::GetThunkSizeeOthisVX@:d?sandbox::Service64ResolverThunk::ResolveTarget 0ZOthis8@Omodule@?Ofunction_nameH?OaddressZHc?sandbox::Service64ResolverThunk::ResolveInterceptorZOthis"@Ointerceptor_module?Ointerceptor_name COaddressN???b?sandbox::Service64ResolverThunk::SetupP`ZOthish@Otarget_module"p@Ointerceptor_modulex?Otarget_name??Ointerceptor_name&?@Ointerceptor_entry_point?Othunk_storage?#Ostorage_bytes?#Ostorage_used`?Othunk_buffer^h?`sandbox::Service64ResolverThunk::Setup'::`1'::dtor$0 N<G?sandbox::ResolverThunk::ResolveTarget8Othis@Omodule?Ofunction_name ?OaddressR$E?sandbox::ResolverThunk::ResolveInterceptor8Othis"@Ointerceptor_module?Ointerceptor_name COaddressB| ??Ksandbox::ResolverThunk::Init 08Othis8@Otarget_modu (…)
    [all...]
  /external/chromium/chrome/browser/extensions/
sandboxed_extension_unpacker.h 177 // put here because we cannot run windows crypto code in the sandbox. But we
  /external/chromium/chrome/browser/
utility_process_host.cc 158 // TODO(port): Sandbox this on Linux. Also, zygote this to work with
  /external/chromium/crypto/
nss_util.h 73 // sandbox is active.
  /external/chromium_org/base/
cpu.cc 163 // platform-specific, and not accessible from the sandbox.
  /external/chromium_org/base/test/
test_support_ios.mm 103 // sandbox.
  /external/chromium_org/chrome/browser/notifications/sync_notifier/
notification_bitmap_fetcher_browsertest.cc 88 // --single-process. The reason is that the sandbox does not get created
  /external/chromium_org/chrome/browser/renderer_host/pepper/
pepper_flash_browser_host.cc 104 // sandbox.

Completed in 871 milliseconds

<<21222324252627282930>>