Searched
full:sandbox (Results
576 -
600 of
851) sorted by null
<<21222324252627282930>>
/external/chromium_org/ |
GypAndroid.linux-x86.mk | 101 include $(LOCAL_PATH)/sandbox/sandbox.target.linux-x86.mk 102 include $(LOCAL_PATH)/sandbox/sandbox_services.target.linux-x86.mk 103 include $(LOCAL_PATH)/sandbox/sandbox_services_headers.target.linux-x86.mk 104 include $(LOCAL_PATH)/sandbox/seccomp_bpf.target.linux-x86.mk 105 include $(LOCAL_PATH)/sandbox/seccomp_bpf_helpers.target.linux-x86.mk
|
/docs/source.android.com/src/devices/tech/security/ |
index.jd | 78 Application Sandbox. Applications get a dedicated part of the filesystem in 179 <li>Mandatory application sandbox for all applications</li> 189 restricted by the Application Sandbox.</p> 197 native code is constrained by the Application Sandbox. Whether that code is 227 <h2 id="the-application-sandbox">The Application Sandbox</h2> 234 <p>This sets up a kernel-level Application Sandbox. The kernel enforces security 242 sandbox is simple, auditable, and based on decades-old UNIX-style user 244 <p>Since the Application Sandbox is in the kernel, this security model extends to 248 Sandbox. On some platforms, developers are constrained to a specifi [all...] |
/external/chromium_org/content/app/ |
content_main_runner.cc | 49 #include "sandbox/win/src/sandbox_types.h" 538 sandbox::SandboxInterfaceInfo* sandbox_info, 686 // We need to allocate the IO Ports before the Sandbox is initialized or 760 // On OS X the renderer sandbox needs to be initialized later in the 847 sandbox::SandboxInterfaceInfo sandbox_info_;
|
/external/chromium_org/extensions/common/ |
manifest_constants.cc | 114 const char kSandboxedPages[] = "sandbox.pages"; 115 const char kSandboxedPagesCSP[] = "sandbox.content_security_policy"; 537 "Invalid value for 'sandbox.pages'."; 539 "Invalid value for 'sandbox.pages[*]'."; 541 "Invalid value for 'sandbox.content_security_policy'.";
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
syscall_sets.cc | 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 8 #include "sandbox/linux/services/linux_syscalls.h" 10 namespace sandbox { namespace 770 // These give a lot of ambient authority and bypass the setuid sandbox. 981 } // namespace sandbox.
|
/external/apache-xml/src/main/java/org/apache/xml/serializer/ |
OutputPropertiesFactory.java | 401 // Repeat IOException handling for sandbox/applet case -sc 456 // No-op for sandbox/applet case, leave null -sc 469 // No-op for sandbox/applet case, leave null -sc
|
/external/chromium_org/chrome/ |
chrome_renderer.gypi | 411 '../sandbox/sandbox.gyp:sandbox',
|
/external/chromium_org/ppapi/native_client/tools/browser_tester/browsertester/ |
browserlauncher.py | 305 # Chrome process can't access file within sandbox 310 cmd.append('--no-sandbox') 315 cmd.append('--no-sandbox')
|
/external/chromium_org/remoting/webapp/ |
remoting.js | 82 var sandbox = /** @type {HTMLIFrameElement} */ 83 document.getElementById('wcs-sandbox'); 84 remoting.wcsSandbox = new remoting.WcsSandboxContainer(sandbox.contentWindow);
|
/external/chromium_org/sandbox/win/src/ |
policy_engine_opcodes.h | 8 #include "sandbox/win/src/policy_engine_params.h" 46 namespace sandbox { namespace 378 } // namespace sandbox
|
/external/chromium_org/tools/valgrind/drmemory/ |
suppressions.txt | 268 *!sandbox::PolicyBase::~PolicyBase 273 *!sandbox::GetHandleName 278 *!sandbox::GetPathFromHandle
|
/external/chromium_org/components/nacl/loader/ |
nacl_listener.cc | 48 // On Mac OS X, shm_open() works in the sandbox but does not give us 60 // ftruncate() is disallowed by the Mac OS X sandbox and
|
/external/chromium_org/content/browser/worker_host/test/ |
worker_browsertest.cc | 145 // This test is flaky inside the Linux SUID sandbox. 161 // This test is flaky inside the Linux SUID sandbox: http://crbug.com/130116
|
/external/chromium_org/tools/perf/page_sets/ |
key_mobile_sites.json | 262 "url": "http://mobile-news.sandbox.google.com/news/pt1", 266 "url": "http://mobile-news.sandbox.google.com/news/pt0",
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_internal_defs.h | 93 // Notify the tools that the sandbox is going to be turned on. The reserved 95 // that the tools may call to bypass the sandbox.
|
/external/llvm/docs/HistoricalNotes/ |
2000-11-18-EarlyDesignIdeasResp.txt | 35 * To keep things "safe" ie to enforce a sandbox on Java/foreign code, 48 for value add. The nice safe "sandbox" VM can be provided as a layer
|
/external/openssh/ |
ChangeLog | 12 regress errors for the sandbox to warnings. ok tim dtucker 34 an explicitly requested sandbox type 43 test with sandbox enabled; ok djm@ 89 [sandbox-systrace.c] 110 - (djm) [configure.ac Makefile.in sandbox-darwin.c] Add a sandbox for 124 This introduces a new "UsePrivilegeSeparation=sandbox" option for 130 The sandbox is implemented using systrace(4) in unsupervised "fast-path" 135 UsePrivilegeSeparation=sandbox will become the default in the future 144 [sshd.c ssh-sandbox.h sandbox.h sandbox-rlimit.c sandbox-systrace.c [all...] |
/external/chromium_org/sandbox/win/wow_helper/ |
wow_helper.pdb | 16 ?? BINDSTATUS_FINDINGRESOURCE ??? 8 8 ?.1+??I ??C~?B?@?\?'? * CIL * * ? '?Microsoft (R) LINK J h:\ch1\src\sandbox\wow_helper\x64\Release\service64_resolver.obj : D ? '? '?Microsoft (R) Optimizing Compiler J ? ? scoped_ptr<char>::~scoped_ptr<char> |