/external/chromium_org/sandbox/ |
sandbox_services_headers.target.linux-arm.mk | 111 $(LOCAL_PATH)/sandbox \ 213 $(LOCAL_PATH)/sandbox \
|
sandbox_services_headers.target.linux-x86.mk | 106 $(LOCAL_PATH)/sandbox \ 202 $(LOCAL_PATH)/sandbox \
|
sandbox_services_headers.target.linux-x86_64.mk | 105 $(LOCAL_PATH)/sandbox \ 200 $(LOCAL_PATH)/sandbox \
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
FrameLoader.h | 153 // The following sandbox flags will be forced, regardless of changes to 154 // the sandbox attribute of any parent frames.
|
/external/chromium_org/third_party/libyuv/source/ |
cpu_id.cc | 127 // This will occur for Chrome sandbox for Pepper or Render process. 150 // This will occur for Chrome sandbox for Pepper or Render process.
|
/external/chromium_org/tools/telemetry/telemetry/core/platform/profiler/ |
perf_profiler.py | 206 '--no-sandbox', 207 '--allow-sandbox-debugging',
|
strace_profiler.py | 232 '--no-sandbox', 233 '--allow-sandbox-debugging'
|
/external/chromium_org/gpu/config/ |
software_rendering_list_json.cc | 908 "description": "Accelerated video decode interferes with GPU sandbox on older Intel drivers", 1007 "description": "Accelerated video decode on Intel driver 10.18.10.3308 is incompatible with the GPU sandbox", 1023 "description": "Accelerated video decode on AMD driver 13.152.1.8000 is incompatible with the GPU sandbox", 1039 "description": "Accelerated video decode interferes with GPU sandbox on certain AMD drivers", 1056 "description": "Accelerated video decode interferes with GPU sandbox on certain NVIDIA drivers", 1073 "description": "Accelerated video decode interferes with GPU sandbox on certain NVIDIA drivers",
|
/docs/source.android.com/src/devices/tech/security/ |
index.jd | 85 Application Sandbox. Applications get a dedicated part of the filesystem in 186 <li>Mandatory application sandbox for all applications</li> 196 restricted by the Application Sandbox.</p> 204 native code is constrained by the Application Sandbox. Whether that code is 234 <h2 id="the-application-sandbox">The Application Sandbox</h2> 241 <p>This sets up a kernel-level Application Sandbox. The kernel enforces security 249 sandbox is simple, auditable, and based on decades-old UNIX-style user 251 <p>Since the Application Sandbox is in the kernel, this security model extends to 255 Sandbox. On some platforms, developers are constrained to a specifi [all...] |
/external/chromium_org/native_client_sdk/src/doc/devguide/devcycle/ |
debugging.rst | 114 ``--no-sandbox`` flag. You must also be careful that each variable points to 333 version of the NaCl sandbox on your system, you can translate the 362 #. Launch Chrome with these three required flags: ``--enable-nacl --enable-nacl-debug --no-sandbox``. 367 chrome --enable-nacl --enable-nacl-debug --no-sandbox --disable-hang-monitor localhost:5103 379 ``--no-sandbox`` 380 Turns off the Chrome sandbox (not the Native Client sandbox). This enables
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
codegen_unittest.cc | 11 #include "sandbox/linux/seccomp-bpf/codegen.h" 12 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 13 #include "sandbox/linux/tests/unit_tests.h" 15 namespace sandbox { namespace 538 } // namespace sandbox
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
syscall_sets.cc | 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 8 #include "sandbox/linux/services/linux_syscalls.h" 10 namespace sandbox { namespace 769 // These give a lot of ambient authority and bypass the setuid sandbox. 980 } // namespace sandbox.
|
/external/apache-xml/src/main/java/org/apache/xml/serializer/ |
OutputPropertiesFactory.java | 401 // Repeat IOException handling for sandbox/applet case -sc 456 // No-op for sandbox/applet case, leave null -sc 469 // No-op for sandbox/applet case, leave null -sc
|
/external/chromium_org/chrome/common/extensions/docs/templates/json/ |
chrome_sidenav.json | 860 "title": "Sandbox Internals", 864 "title": "ARM 32-bit Sandbox", 865 "href": "/native-client/reference/sandbox_internals/arm-32-bit-sandbox"
|
/external/chromium_org/chrome/installer/linux/common/ |
installer.include | 139 # sandbox 140 # Rename sandbox binary with hyphen instead of underscore because that's what 143 "${STAGEDIR}/${INSTALLDIR}/${PROGNAME}-sandbox"
|
/external/chromium_org/chrome/utility/ |
printing_handler.cc | 143 // used by the Chrome PDF plugin that will fail in the sandbox. 150 // CreateDC fails behind the sandbox, but not CreateCompatibleDC. 183 // Patch the IAT for handling specific APIs known to fail in the sandbox.
|
/external/chromium_org/components/nacl/loader/ |
nacl_listener.cc | 52 // On Mac OS X, shm_open() works in the sandbox but does not give us 64 // ftruncate() is disallowed by the Mac OS X sandbox and 482 // Windows when the sandbox is enabled.
|
/external/chromium_org/content/public/test/ |
test_launcher.cc | 41 #include "sandbox/win/src/sandbox_factory.h" 42 #include "sandbox/win/src/sandbox_types.h" 452 sandbox::SandboxInterfaceInfo sandbox_info = {0};
|
/external/chromium_org/native_client_sdk/doc_generated/reference/ |
pnacl-undefined-behavior.html | 191 <li><p class="first">Null pointer/reference has behavior determined by the NaCl sandbox:</p> 207 load/stores might be forced back into sandbox range, or eliminated 208 entirely if they fall out of the sandbox.</li>
|
/external/chromium_org/native_client_sdk/src/doc/reference/ |
pnacl-undefined-behavior.rst | 195 * Null pointer/reference has behavior determined by the NaCl sandbox: 210 load/stores might be forced back into sandbox range, or eliminated 211 entirely if they fall out of the sandbox.
|
/external/chromium_org/ppapi/native_client/tools/browser_tester/browsertester/ |
browserlauncher.py | 305 # Chrome process can't access file within sandbox 310 cmd.append('--no-sandbox') 315 cmd.append('--no-sandbox')
|
/external/chromium_org/sandbox/win/src/ |
policy_engine_opcodes.h | 8 #include "sandbox/win/src/policy_engine_params.h" 46 namespace sandbox { namespace 378 } // namespace sandbox
|
/external/chromium_org/content/browser/ |
browser_main_loop.cc | 116 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 141 scoped_ptr<sandbox::SetuidSandboxClient> setuid_sandbox_client( 142 sandbox::SetuidSandboxClient::Create()); 150 "Running without the SUID sandbox! See " 152 "for more information on developing with the sandbox on."; 164 // Tickle the sandbox host and zygote host so they fork now. [all...] |
/external/chromium_org/chrome/renderer/ |
chrome_render_process_observer.cc | 122 // CreateDC fails behind the sandbox, but not CreateCompatibleDC. 290 // after we engage the sandbox.
|
/external/chromium_org/chrome_elf/create_file/ |
chrome_create_file_unittest.cc | 23 #include "sandbox/win/src/interception_internal.h" 24 #include "sandbox/win/src/nt_internals.h"
|