/external/chromium_org/tools/traceline/svgui/ |
startup-release.json | 30 {'eventid': 1718197540, 'stacktrace': [[2088830549, 'kernel32.dll!CreateThread+0x1e'], [4216426, 'chrome.exe!sandbox::BrokerServicesBase::Init+0x5a [ c:\\g\\trunk\\src\\sandbox\\src\\broker_services.cc:70 ]'], [20404275, 'chrome.dll!BrowserMain+0xcb3 [ c:\\g\\trunk\\src\\chrome\\browser\\browser_main.cc:523 ]'], [19354554, 'chrome.dll!ChromeMain+0x83a [ c:\\g\\trunk\\src\\chrome\\app\\chrome_dll_main.cc:224 ]'], [4205604, 'chrome.exe!wWinMain+0x304 [ c:\\g\\trunk\\src\\chrome\\app\\chrome_exe_main.cc:103 ]'], [4482934, 'chrome.exe!__tmainCRTStartup+0x176 [ f:\\sp\\vctools\\crt_bld\\self_x86\\crt\\src\\crt0.c:324 ]'], [2088857559, 'kernel32.dll!BaseProcessStart+0x23']], 'thread': 3956, 'eventtype': 'EVENT_TYPE_CREATETHREAD', 'startaddr': 2088830553, 'ms': 63.831575999999998, 'cpu': 2147742720}, 34 {'stacktrace': [[4340339, 'chrome.exe!PlatformThread::SetName+0x63 [ c:\\g\\trunk\\src\\base\\platform_thread_win.cc:62 ]'], [4215848, 'chrome.exe!sandbox::BrokerServicesBase::TargetEventsThread+0x28 [ c:\\g\\trunk\\src\\sandbox\\src\\broker_services.cc:147 ]'], [2088810115, 'kernel32.dll!BaseThreadStart+0x37']], 'thread': 2428, 'eventtype': 'EVENT_TYPE_THREADNAME', 'threadname': 'BrokerEventThread', 'ms': 64.838966999999997, 'cpu': 3124053392}, 35 {'stacktrace': [[4215906, 'chrome.exe!sandbox::BrokerServicesBase::TargetEventsThread+0x62 [ c:\\g\\trunk\\src\\sandbox\\src\\broker_services.cc:151 ]'], [2088810115, 'kernel32.dll!BaseThreadStart+0x37']], 'thread': 2428, 'syscall': 190, 'eventtype': 'EVENT_TYPE_SYSCALL', 'syscallname': 'ntdll.dll!ZwRemoveIoCompletion', 'waiting': 1, 'done': 115.701297, 'ms': 64.856288000000006, 'syscallargs': [168, 17039276, 17038976], 'cpu': 3124053392}, [all...] |
/external/chromium_org/chrome/browser/ |
chrome_content_browser_client.cc | 152 #include "sandbox/win/src/sandbox_policy.h" [all...] |
/external/chromium_org/chrome/common/extensions/docs/server2/test_data/github_file_system/ |
apps_samples.zip | |
/external/chromium_org/native_client_sdk/src/doc/community/security-contest/ |
contest-terms.rst | 128 #. Inner Sandbox: The "Inner Sandbox" means the Native Client 156 #. Outer Sandbox: The "Outer Sandbox" means the Native Client 534 * Compromise of the Outer Sandbox; 538 * Compromise of both the Inner and Outer Sandbox; and/or [all...] |
/external/chromium_org/ash/ |
ash.gyp | [all...] |
/external/chromium_org/ipc/ |
ipc_channel_posix.cc | 409 " IPC. Aborting to maintain sandbox isolation."; 435 // fd_pipe_ which makes Seccomp sandbox operation more efficient. 737 // Our process may be in a sandbox with a separate PID namespace. [all...] |
/external/chromium_org/ui/views/ |
views.gyp | [all...] |
/frameworks/base/core/java/android/os/ |
Process.java | 676 * app-specific sandbox. It is different from {@link #myUserHandle} in that 677 * a uid identifies a specific app sandbox in a specific user. 694 * Returns whether the current process is in an isolated sandbox. [all...] |
/external/chromium/chrome/browser/ |
browser_main.cc | 181 #include "sandbox/src/sandbox.h" 752 // Windows-specific initialization code for the sandbox broker services. This 757 sandbox::BrokerServices* broker_services = 760 sandbox::InitBrokerServices(broker_services); 765 sandbox::TargetPolicy* policy = broker_services->CreatePolicy(); 766 sandbox::ResultCode result = policy->CreateAlternateDesktop(use_winsta); 767 CHECK(sandbox::SBOX_ERROR_FAILED_TO_SWITCH_BACK_WINSTATION != result); [all...] |
idbbindingutilities_browsertest.cc | 21 // Sanity test, check the function call directly outside the sandbox.
|
/external/chromium/chrome/browser/policy/ |
configuration_policy_provider_win_unittest.cc | 122 // two temporary sandbox keys in |kUnitTestRegistrySubKey|, one for HKLM and one
|
/external/chromium_org/chrome/renderer/pepper/ |
ppb_pdf_impl.cc | 218 // on Windows and Mac works through the renderer sandbox.
|
/external/chromium_org/content/browser/fileapi/ |
file_system_context_unittest.cc | 339 // A request for a sandbox mount point should be served.
|
/external/chromium_org/content/browser/renderer_host/ |
render_widget_helper.h | 99 // DIBs because of sandbox limitations. Thus, it has to make synchronous IPCs
|
/external/chromium_org/content/renderer/pepper/ |
ppb_image_data_impl.cc | 34 // work in the sandbox.
|
/external/chromium_org/content/renderer/ |
renderer_webkitplatformsupport_impl.cc | 216 DVLOG(1) << "Disabling sandbox support for testing."; 283 // Even if the sandbox is disabled, there's no reason why the code should 453 // The sandbox restricts our access to the registry, so we need to proxy 467 // The sandbox restricts our access to the registry, so we need to proxy [all...] |
/external/chromium_org/gpu/config/ |
gpu_driver_bug_list_json.cc | 201 "description": "Some drivers are unable to reset the D3D device in the GPU process sandbox",
|
/external/chromium_org/third_party/WebKit/PerformanceTests/resources/ |
runner.js | 319 iframe.sandbox = ''; // Prevent external loads which could cause write() to return before completing the parse.
|
/external/chromium_org/third_party/WebKit/Source/core/frame/ |
DOMWindow.cpp | [all...] |
/external/chromium_org/third_party/sqlite/ |
system-sqlite.patch | 101 +** chromium sandbox. Opening a directory is a security risk (we are 102 +** told) so making it overrideable allows the chromium sandbox to 497 +** chromium sandbox. Opening a directory is a security risk (we are 498 +** told) so making it overrideable allows the chromium sandbox to
|
/external/chromium_org/webkit/browser/fileapi/ |
file_system_context.h | 96 // If none is given, this context only handles HTML5 Sandbox FileSystem
|
/external/openssh/ |
config.h | 774 /* Define to 1 if you have the <sandbox.h> header file. */ [all...] |
config.h.in | 771 /* Define to 1 if you have the <sandbox.h> header file. */ [all...] |
/frameworks/base/docs/html/training/activity-testing/ |
activity-ui-testing.jd | 209 see this <a href="https://plus.sandbox.google.com/+AndroidDevelopers/posts/TPy1EeSaSg8">Android Tools Protip</a>.</p>
|
/external/chromium_org/ |
.gitmodules | 121 [submodule "sandbox/linux/seccomp-legacy"] 122 path = sandbox/linux/seccomp-legacy
|