Searched
full:sandbox (Results
626 -
650 of
851) sorted by null
<<21222324252627282930>>
/external/sepolicy/ |
app.te | 31 # App sandbox file accesses.
|
/external/chromium_org/native_client_sdk/src/doc/ |
faq.rst | 53 * **Security:** Users are kept secure with an ever-improving sandbox 120 * `Native Client: A Sandbox for Portable, Untrusted x86 Code 354 Native Client's sandbox works by validating the untrusted code (the 359 data sandbox. In particular this means that once loaded into memory, 371 The beauty of the Native Client sandbox is in reducing "safe" code to a 379 runtime also includes an outer sandbox that mediates system calls. For 380 more details about both sandboxes, see `Native Client: A Sandbox for
|
/external/chromium_org/chrome/app/ |
chrome_main_delegate.cc | 49 #include "sandbox/win/src/sandbox.h" 243 // Mac needs them too for scrollbar related images and for sandbox 664 // The renderer sandbox prevents us from accessing our .pak files directly. 799 // No sandbox needed for relauncher.
|
client_util.cc | 38 typedef int (*DLL_MAIN)(HINSTANCE, sandbox::SandboxInterfaceInfo*); 276 sandbox::SandboxInterfaceInfo* sbox_info) {
|
/external/chromium_org/content/browser/ |
browser_main_loop.cc | 144 base::FilePath sandbox_candidate = exe_dir.AppendASCII("chrome-sandbox"); 150 // variable is required to enable the sandbox. See 161 static const char no_suid_error[] = "Running without the SUID sandbox! See " 163 "for more information on developing with the sandbox on."; 178 // Tickle the sandbox host and zygote host so they fork now. [all...] |
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
codegen.cc | 7 #include "sandbox/linux/seccomp-bpf/codegen.h" 12 void TraverseRecursively(std::set<sandbox::Instruction*>* visited, 13 sandbox::Instruction* instruction) { 34 namespace sandbox { namespace 750 } // namespace sandbox
|
/frameworks/base/docs/html/training/articles/ |
security-tips.jd | 38 <li>The Android Application Sandbox, which isolates your app data and code execution 179 capabilities not provided by the basic sandbox, including access to device features such as [all...] |
/external/chromium/chrome/browser/extensions/ |
sandboxed_extension_unpacker.cc | 126 // sandbox path, and the sandbox will deny the operation.
|
/external/chromium_org/ |
PRESUBMIT_test.py | 411 '"+sandbox",', 426 'sandbox/DEPS',
|
.gitignore | 173 /sandbox/linux/seccomp-legacy/
|
/external/chromium_org/chrome/browser/chromeos/app_mode/ |
kiosk_app_manager_browsertest.cc | 177 // spawning sandbox host process. See crbug.com/322732. 203 // Restart the thread as the sandbox host process has already been spawned.
|
/external/chromium_org/chrome/renderer/ |
chrome_render_process_observer.cc | 129 // CreateDC fails behind the sandbox, but not CreateCompatibleDC. 298 // after we engage the sandbox.
|
/external/chromium_org/chrome/test/functional/ |
special_tabs.py | 135 'chrome://sandbox': { 'title': 'Sandbox Status' },
|
/external/chromium_org/content/child/ |
child_thread.cc | 62 // This isn't needed on Windows because there the sandbox's job object 335 // since this is blocked by the sandbox.
|
/external/chromium_org/native_client_sdk/src/doc/reference/ |
pnacl-c-cpp-language-support.rst | 90 intent to support it. The embedding sandbox's runtime can offer APIs 94 sandbox's runtime (e.g. NaCl's Pepper APIs), but using them once setup
|
/external/chromium_org/sandbox/win/ |
sandbox_standalone.sln | 3 Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "sandbox", "src\sandbox.vcproj", "{881F6A97-D539-4C48-B401-DF04385B2343}"
|
/external/chromium_org/tools/cygprofile/ |
cygprofile.cc | 17 // Note for the ChromeOS Chrome. Remove renderer process from the sandbox (add 18 // --no-sandbox option to running Chrome in /sbin/session_manager_setup.sh).
|
/external/chromium_org/ui/gl/ |
gl_surface_glx.cc | 213 // the sandbox goes up. 299 // for use on a separate thread. We must allocate this before the sandbox
|
/external/chromium/chrome/browser/ |
memory_details_linux.cc | 185 // Handle the zygote separately. With the SUID sandbox and a separate
|
utility_process_host.h | 28 // If you need a single method call in the sandbox, use StartFooBar(p).
|
/external/chromium/chrome/browser/nacl_host/ |
nacl_process_host.cc | 275 // round trip out of the sandbox, we create an FD here.
|
/external/chromium/chrome/common/ |
utility_messages.h | 112 // sandbox.
|
/external/chromium_org/base/ |
path_service.cc | 250 // For some locations this will fail if called from inside the sandbox there-
|
/external/chromium_org/base/threading/ |
platform_thread_mac.mm | 60 // pthread_setname() fails (harmlessly) in the sandbox, ignore when it does.
|
/external/chromium_org/chrome/browser/ |
chrome_content_browser_client.h | 262 virtual void PreSpawnRenderer(sandbox::TargetPolicy* policy,
|
Completed in 696 milliseconds
<<21222324252627282930>>