Searched
full:sandbox (Results
651 -
675 of
990) sorted by null
<<21222324252627282930>>
/external/chromium_org/content/ |
DEPS | 44 "+sandbox",
|
/external/chromium_org/extensions/common/manifest_handlers/ |
sandboxed_page_info.cc | 25 "sandbox allow-scripts allow-forms allow-popups";
|
/external/chromium_org/native_client_sdk/doc_generated/ |
index.html | 7 <div class="big-intro"><p><strong>Native Client</strong> is a sandbox for running compiled C and C++ code in the
|
/external/chromium_org/native_client_sdk/src/gonacl_appengine/static/bullet/ |
fullscreen.html | 56 Client</a> is a sandbox for running compiled C and C++ code in the
|
/external/chromium_org/sandbox/linux/suid/ |
linux_util.c | 13 #include "sandbox/linux/suid/linux_util.h"
|
/external/chromium_org/sandbox/win/src/ |
restricted_token_unittest.cc | 11 #include "sandbox/win/src/restricted_token.h" 12 #include "sandbox/win/src/sid.h" 15 namespace sandbox { namespace 588 } // namespace sandbox
|
/external/chromium_org/sandbox/win/wow_helper/ |
wow_helper.vcproj | 189 Name="sandbox"
|
/external/chromium_org/third_party/WebKit/Source/core/html/ |
HTMLIFrameElement.cpp | 85 document().addConsoleMessage(OtherMessageSource, ErrorMessageLevel, "Error while parsing the 'sandbox' attribute: " + invalidTokens);
|
/external/chromium_org/third_party/WebKit/Source/platform/ |
PlatformKeyboardEvent.cpp | 77 // FIXME: Does this even work inside the sandbox?
|
/external/chromium_org/third_party/WebKit/Source/platform/fonts/mac/ |
MemoryActivatedFont.h | 56 // by the sandbox.
|
/external/chromium_org/third_party/WebKit/public/ |
README | 31 Blink is designed to run in a sandbox and interacts with the operating system
|
/external/chromium_org/third_party/tcmalloc/chromium/src/base/ |
spinlock_linux-inl.h | 46 // is necessary to make the code compatible with the seccomp sandbox,
|
/external/chromium_org/tools/ipc_fuzzer/ |
play_testcase.py | 69 '--no-sandbox',
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_procmaps.h | 38 // In some cases, e.g. when running under a sandbox on Linux, ASan is unable
|
/external/lldb/test/pexpect-2.4/examples/ |
fix_cvs_files.py | 11 Run this on a CHECKED OUT module sandbox, not on the repository itself. After
|
/external/llvm/test/DebugInfo/X86/ |
dbg-declare.ll | 55 !26 = metadata !{metadata !"20020104-2.c", metadata !"/Volumes/Sandbox/llvm"}
|
/external/sepolicy/ |
installd.te | 62 # Run dex2oat in its own sandbox.
|
untrusted_app.te | 29 # to their sandbox directory and then execute.
|
/docs/source.android.com/src/devices/tech/security/ |
se-linux.jd | 30 sandboxes. Each application runs in its own sandbox. Prior to Android 4.3, 34 the Android application sandbox.</p>
|
/external/chromium_org/components/nacl/browser/ |
nacl_process_host.cc | 171 // TODO(bbudge) Handle the --no-sandbox case. 405 // We don't switch off sandbox automatically for security reasons. 406 SendErrorToRenderer("NaCl's GDB debug stub requires --no-sandbox flag" 644 // SetKnownToValidate to create a hole in the SFI sandbox. 694 // If we are on 64-bit Windows, the NaCl process's sandbox is 695 // managed by a different process from the renderer's sandbox. We 696 // need to inform the renderer's sandbox about the NaCl process so 849 // round trip out of the sandbox, we create an FD here. [all...] |
/external/chromium_org/content/browser/ |
BUILD.gn | 144 deps += [ "//sandbox" ] 207 deps += [ "//sandbox/linux:libc_urandom_override" ]
|
/external/chromium_org/ppapi/proxy/ |
flash_resource.cc | 130 // require filesystem access prohibited by the sandbox. 131 // TODO(shess): Figure out why OSX needs the access, the sandbox warmup should
|
/external/chromium_org/sandbox/ |
sandbox_services_headers.target.darwin-arm.mk | 111 $(LOCAL_PATH)/sandbox \ 213 $(LOCAL_PATH)/sandbox \
|
sandbox_services_headers.target.darwin-x86.mk | 106 $(LOCAL_PATH)/sandbox \ 202 $(LOCAL_PATH)/sandbox \
|
sandbox_services_headers.target.darwin-x86_64.mk | 105 $(LOCAL_PATH)/sandbox \ 200 $(LOCAL_PATH)/sandbox \
|
Completed in 692 milliseconds
<<21222324252627282930>>