HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 651 - 675 of 990) sorted by null

<<21222324252627282930>>

  /external/chromium_org/content/
DEPS 44 "+sandbox",
  /external/chromium_org/extensions/common/manifest_handlers/
sandboxed_page_info.cc 25 "sandbox allow-scripts allow-forms allow-popups";
  /external/chromium_org/native_client_sdk/doc_generated/
index.html 7 <div class="big-intro"><p><strong>Native Client</strong> is a sandbox for running compiled C and C++ code in the
  /external/chromium_org/native_client_sdk/src/gonacl_appengine/static/bullet/
fullscreen.html 56 Client</a> is a sandbox for running compiled C and C++ code in the
  /external/chromium_org/sandbox/linux/suid/
linux_util.c 13 #include "sandbox/linux/suid/linux_util.h"
  /external/chromium_org/sandbox/win/src/
restricted_token_unittest.cc 11 #include "sandbox/win/src/restricted_token.h"
12 #include "sandbox/win/src/sid.h"
15 namespace sandbox { namespace
588 } // namespace sandbox
  /external/chromium_org/sandbox/win/wow_helper/
wow_helper.vcproj 189 Name="sandbox"
  /external/chromium_org/third_party/WebKit/Source/core/html/
HTMLIFrameElement.cpp 85 document().addConsoleMessage(OtherMessageSource, ErrorMessageLevel, "Error while parsing the 'sandbox' attribute: " + invalidTokens);
  /external/chromium_org/third_party/WebKit/Source/platform/
PlatformKeyboardEvent.cpp 77 // FIXME: Does this even work inside the sandbox?
  /external/chromium_org/third_party/WebKit/Source/platform/fonts/mac/
MemoryActivatedFont.h 56 // by the sandbox.
  /external/chromium_org/third_party/WebKit/public/
README 31 Blink is designed to run in a sandbox and interacts with the operating system
  /external/chromium_org/third_party/tcmalloc/chromium/src/base/
spinlock_linux-inl.h 46 // is necessary to make the code compatible with the seccomp sandbox,
  /external/chromium_org/tools/ipc_fuzzer/
play_testcase.py 69 '--no-sandbox',
  /external/compiler-rt/lib/sanitizer_common/
sanitizer_procmaps.h 38 // In some cases, e.g. when running under a sandbox on Linux, ASan is unable
  /external/lldb/test/pexpect-2.4/examples/
fix_cvs_files.py 11 Run this on a CHECKED OUT module sandbox, not on the repository itself. After
  /external/llvm/test/DebugInfo/X86/
dbg-declare.ll 55 !26 = metadata !{metadata !"20020104-2.c", metadata !"/Volumes/Sandbox/llvm"}
  /external/sepolicy/
installd.te 62 # Run dex2oat in its own sandbox.
untrusted_app.te 29 # to their sandbox directory and then execute.
  /docs/source.android.com/src/devices/tech/security/
se-linux.jd 30 sandboxes. Each application runs in its own sandbox. Prior to Android 4.3,
34 the Android application sandbox.</p>
  /external/chromium_org/components/nacl/browser/
nacl_process_host.cc 171 // TODO(bbudge) Handle the --no-sandbox case.
405 // We don't switch off sandbox automatically for security reasons.
406 SendErrorToRenderer("NaCl's GDB debug stub requires --no-sandbox flag"
644 // SetKnownToValidate to create a hole in the SFI sandbox.
694 // If we are on 64-bit Windows, the NaCl process's sandbox is
695 // managed by a different process from the renderer's sandbox. We
696 // need to inform the renderer's sandbox about the NaCl process so
849 // round trip out of the sandbox, we create an FD here.
    [all...]
  /external/chromium_org/content/browser/
BUILD.gn 144 deps += [ "//sandbox" ]
207 deps += [ "//sandbox/linux:libc_urandom_override" ]
  /external/chromium_org/ppapi/proxy/
flash_resource.cc 130 // require filesystem access prohibited by the sandbox.
131 // TODO(shess): Figure out why OSX needs the access, the sandbox warmup should
  /external/chromium_org/sandbox/
sandbox_services_headers.target.darwin-arm.mk 111 $(LOCAL_PATH)/sandbox \
213 $(LOCAL_PATH)/sandbox \
sandbox_services_headers.target.darwin-x86.mk 106 $(LOCAL_PATH)/sandbox \
202 $(LOCAL_PATH)/sandbox \
sandbox_services_headers.target.darwin-x86_64.mk 105 $(LOCAL_PATH)/sandbox \
200 $(LOCAL_PATH)/sandbox \

Completed in 692 milliseconds

<<21222324252627282930>>