HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 676 - 700 of 851) sorted by null

<<21222324252627282930>>

  /external/chromium_org/tools/traceline/svgui/
startup-release.json 30 {'eventid': 1718197540, 'stacktrace': [[2088830549, 'kernel32.dll!CreateThread+0x1e'], [4216426, 'chrome.exe!sandbox::BrokerServicesBase::Init+0x5a [ c:\\g\\trunk\\src\\sandbox\\src\\broker_services.cc:70 ]'], [20404275, 'chrome.dll!BrowserMain+0xcb3 [ c:\\g\\trunk\\src\\chrome\\browser\\browser_main.cc:523 ]'], [19354554, 'chrome.dll!ChromeMain+0x83a [ c:\\g\\trunk\\src\\chrome\\app\\chrome_dll_main.cc:224 ]'], [4205604, 'chrome.exe!wWinMain+0x304 [ c:\\g\\trunk\\src\\chrome\\app\\chrome_exe_main.cc:103 ]'], [4482934, 'chrome.exe!__tmainCRTStartup+0x176 [ f:\\sp\\vctools\\crt_bld\\self_x86\\crt\\src\\crt0.c:324 ]'], [2088857559, 'kernel32.dll!BaseProcessStart+0x23']], 'thread': 3956, 'eventtype': 'EVENT_TYPE_CREATETHREAD', 'startaddr': 2088830553, 'ms': 63.831575999999998, 'cpu': 2147742720},
34 {'stacktrace': [[4340339, 'chrome.exe!PlatformThread::SetName+0x63 [ c:\\g\\trunk\\src\\base\\platform_thread_win.cc:62 ]'], [4215848, 'chrome.exe!sandbox::BrokerServicesBase::TargetEventsThread+0x28 [ c:\\g\\trunk\\src\\sandbox\\src\\broker_services.cc:147 ]'], [2088810115, 'kernel32.dll!BaseThreadStart+0x37']], 'thread': 2428, 'eventtype': 'EVENT_TYPE_THREADNAME', 'threadname': 'BrokerEventThread', 'ms': 64.838966999999997, 'cpu': 3124053392},
35 {'stacktrace': [[4215906, 'chrome.exe!sandbox::BrokerServicesBase::TargetEventsThread+0x62 [ c:\\g\\trunk\\src\\sandbox\\src\\broker_services.cc:151 ]'], [2088810115, 'kernel32.dll!BaseThreadStart+0x37']], 'thread': 2428, 'syscall': 190, 'eventtype': 'EVENT_TYPE_SYSCALL', 'syscallname': 'ntdll.dll!ZwRemoveIoCompletion', 'waiting': 1, 'done': 115.701297, 'ms': 64.856288000000006, 'syscallargs': [168, 17039276, 17038976], 'cpu': 3124053392},
    [all...]
  /external/chromium_org/chrome/browser/
chrome_content_browser_client.cc 152 #include "sandbox/win/src/sandbox_policy.h"
    [all...]
  /external/chromium_org/chrome/common/extensions/docs/server2/test_data/github_file_system/
apps_samples.zip 
  /external/chromium_org/native_client_sdk/src/doc/community/security-contest/
contest-terms.rst 128 #. Inner Sandbox: The "Inner Sandbox" means the Native Client
156 #. Outer Sandbox: The "Outer Sandbox" means the Native Client
534 * Compromise of the Outer Sandbox;
538 * Compromise of both the Inner and Outer Sandbox; and/or
    [all...]
  /external/chromium_org/ash/
ash.gyp     [all...]
  /external/chromium_org/ipc/
ipc_channel_posix.cc 409 " IPC. Aborting to maintain sandbox isolation.";
435 // fd_pipe_ which makes Seccomp sandbox operation more efficient.
737 // Our process may be in a sandbox with a separate PID namespace.
    [all...]
  /external/chromium_org/ui/views/
views.gyp     [all...]
  /frameworks/base/core/java/android/os/
Process.java 676 * app-specific sandbox. It is different from {@link #myUserHandle} in that
677 * a uid identifies a specific app sandbox in a specific user.
694 * Returns whether the current process is in an isolated sandbox.
    [all...]
  /external/chromium/chrome/browser/
browser_main.cc 181 #include "sandbox/src/sandbox.h"
752 // Windows-specific initialization code for the sandbox broker services. This
757 sandbox::BrokerServices* broker_services =
760 sandbox::InitBrokerServices(broker_services);
765 sandbox::TargetPolicy* policy = broker_services->CreatePolicy();
766 sandbox::ResultCode result = policy->CreateAlternateDesktop(use_winsta);
767 CHECK(sandbox::SBOX_ERROR_FAILED_TO_SWITCH_BACK_WINSTATION != result);
    [all...]
idbbindingutilities_browsertest.cc 21 // Sanity test, check the function call directly outside the sandbox.
  /external/chromium/chrome/browser/policy/
configuration_policy_provider_win_unittest.cc 122 // two temporary sandbox keys in |kUnitTestRegistrySubKey|, one for HKLM and one
  /external/chromium_org/chrome/renderer/pepper/
ppb_pdf_impl.cc 218 // on Windows and Mac works through the renderer sandbox.
  /external/chromium_org/content/browser/fileapi/
file_system_context_unittest.cc 339 // A request for a sandbox mount point should be served.
  /external/chromium_org/content/browser/renderer_host/
render_widget_helper.h 99 // DIBs because of sandbox limitations. Thus, it has to make synchronous IPCs
  /external/chromium_org/content/renderer/pepper/
ppb_image_data_impl.cc 34 // work in the sandbox.
  /external/chromium_org/content/renderer/
renderer_webkitplatformsupport_impl.cc 216 DVLOG(1) << "Disabling sandbox support for testing.";
283 // Even if the sandbox is disabled, there's no reason why the code should
453 // The sandbox restricts our access to the registry, so we need to proxy
467 // The sandbox restricts our access to the registry, so we need to proxy
    [all...]
  /external/chromium_org/gpu/config/
gpu_driver_bug_list_json.cc 201 "description": "Some drivers are unable to reset the D3D device in the GPU process sandbox",
  /external/chromium_org/third_party/WebKit/PerformanceTests/resources/
runner.js 319 iframe.sandbox = ''; // Prevent external loads which could cause write() to return before completing the parse.
  /external/chromium_org/third_party/WebKit/Source/core/frame/
DOMWindow.cpp     [all...]
  /external/chromium_org/third_party/sqlite/
system-sqlite.patch 101 +** chromium sandbox. Opening a directory is a security risk (we are
102 +** told) so making it overrideable allows the chromium sandbox to
497 +** chromium sandbox. Opening a directory is a security risk (we are
498 +** told) so making it overrideable allows the chromium sandbox to
  /external/chromium_org/webkit/browser/fileapi/
file_system_context.h 96 // If none is given, this context only handles HTML5 Sandbox FileSystem
  /external/openssh/
config.h 774 /* Define to 1 if you have the <sandbox.h> header file. */
    [all...]
config.h.in 771 /* Define to 1 if you have the <sandbox.h> header file. */
    [all...]
  /frameworks/base/docs/html/training/activity-testing/
activity-ui-testing.jd 209 see this <a href="https://plus.sandbox.google.com/+AndroidDevelopers/posts/TPy1EeSaSg8">Android Tools Protip</a>.</p>
  /external/chromium_org/
.gitmodules 121 [submodule "sandbox/linux/seccomp-legacy"]
122 path = sandbox/linux/seccomp-legacy

Completed in 1074 milliseconds

<<21222324252627282930>>