HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 676 - 700 of 990) sorted by null

<<21222324252627282930>>

  /external/chromium_org/sandbox/
sandbox_services_headers.target.linux-arm.mk 111 $(LOCAL_PATH)/sandbox \
213 $(LOCAL_PATH)/sandbox \
sandbox_services_headers.target.linux-x86.mk 106 $(LOCAL_PATH)/sandbox \
202 $(LOCAL_PATH)/sandbox \
sandbox_services_headers.target.linux-x86_64.mk 105 $(LOCAL_PATH)/sandbox \
200 $(LOCAL_PATH)/sandbox \
  /external/chromium_org/third_party/WebKit/Source/core/loader/
FrameLoader.h 153 // The following sandbox flags will be forced, regardless of changes to
154 // the sandbox attribute of any parent frames.
  /external/chromium_org/third_party/libyuv/source/
cpu_id.cc 127 // This will occur for Chrome sandbox for Pepper or Render process.
150 // This will occur for Chrome sandbox for Pepper or Render process.
  /external/chromium_org/tools/telemetry/telemetry/core/platform/profiler/
perf_profiler.py 206 '--no-sandbox',
207 '--allow-sandbox-debugging',
strace_profiler.py 232 '--no-sandbox',
233 '--allow-sandbox-debugging'
  /external/chromium_org/gpu/config/
software_rendering_list_json.cc 908 "description": "Accelerated video decode interferes with GPU sandbox on older Intel drivers",
1007 "description": "Accelerated video decode on Intel driver 10.18.10.3308 is incompatible with the GPU sandbox",
1023 "description": "Accelerated video decode on AMD driver 13.152.1.8000 is incompatible with the GPU sandbox",
1039 "description": "Accelerated video decode interferes with GPU sandbox on certain AMD drivers",
1056 "description": "Accelerated video decode interferes with GPU sandbox on certain NVIDIA drivers",
1073 "description": "Accelerated video decode interferes with GPU sandbox on certain NVIDIA drivers",
  /docs/source.android.com/src/devices/tech/security/
index.jd 85 Application Sandbox. Applications get a dedicated part of the filesystem in
186 <li>Mandatory application sandbox for all applications</li>
196 restricted by the Application Sandbox.</p>
204 native code is constrained by the Application Sandbox. Whether that code is
234 <h2 id="the-application-sandbox">The Application Sandbox</h2>
241 <p>This sets up a kernel-level Application Sandbox. The kernel enforces security
249 sandbox is simple, auditable, and based on decades-old UNIX-style user
251 <p>Since the Application Sandbox is in the kernel, this security model extends to
255 Sandbox. On some platforms, developers are constrained to a specifi
    [all...]
  /external/chromium_org/native_client_sdk/src/doc/devguide/devcycle/
debugging.rst 114 ``--no-sandbox`` flag. You must also be careful that each variable points to
333 version of the NaCl sandbox on your system, you can translate the
362 #. Launch Chrome with these three required flags: ``--enable-nacl --enable-nacl-debug --no-sandbox``.
367 chrome --enable-nacl --enable-nacl-debug --no-sandbox --disable-hang-monitor localhost:5103
379 ``--no-sandbox``
380 Turns off the Chrome sandbox (not the Native Client sandbox). This enables
  /external/chromium_org/sandbox/linux/seccomp-bpf/
codegen_unittest.cc 11 #include "sandbox/linux/seccomp-bpf/codegen.h"
12 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
13 #include "sandbox/linux/tests/unit_tests.h"
15 namespace sandbox { namespace
538 } // namespace sandbox
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
syscall_sets.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
8 #include "sandbox/linux/services/linux_syscalls.h"
10 namespace sandbox { namespace
769 // These give a lot of ambient authority and bypass the setuid sandbox.
980 } // namespace sandbox.
  /external/apache-xml/src/main/java/org/apache/xml/serializer/
OutputPropertiesFactory.java 401 // Repeat IOException handling for sandbox/applet case -sc
456 // No-op for sandbox/applet case, leave null -sc
469 // No-op for sandbox/applet case, leave null -sc
  /external/chromium_org/chrome/common/extensions/docs/templates/json/
chrome_sidenav.json 860 "title": "Sandbox Internals",
864 "title": "ARM 32-bit Sandbox",
865 "href": "/native-client/reference/sandbox_internals/arm-32-bit-sandbox"
  /external/chromium_org/chrome/installer/linux/common/
installer.include 139 # sandbox
140 # Rename sandbox binary with hyphen instead of underscore because that's what
143 "${STAGEDIR}/${INSTALLDIR}/${PROGNAME}-sandbox"
  /external/chromium_org/chrome/utility/
printing_handler.cc 143 // used by the Chrome PDF plugin that will fail in the sandbox.
150 // CreateDC fails behind the sandbox, but not CreateCompatibleDC.
183 // Patch the IAT for handling specific APIs known to fail in the sandbox.
  /external/chromium_org/components/nacl/loader/
nacl_listener.cc 52 // On Mac OS X, shm_open() works in the sandbox but does not give us
64 // ftruncate() is disallowed by the Mac OS X sandbox and
482 // Windows when the sandbox is enabled.
  /external/chromium_org/content/public/test/
test_launcher.cc 41 #include "sandbox/win/src/sandbox_factory.h"
42 #include "sandbox/win/src/sandbox_types.h"
452 sandbox::SandboxInterfaceInfo sandbox_info = {0};
  /external/chromium_org/native_client_sdk/doc_generated/reference/
pnacl-undefined-behavior.html 191 <li><p class="first">Null pointer/reference has behavior determined by the NaCl sandbox:</p>
207 load/stores might be forced back into sandbox range, or eliminated
208 entirely if they fall out of the sandbox.</li>
  /external/chromium_org/native_client_sdk/src/doc/reference/
pnacl-undefined-behavior.rst 195 * Null pointer/reference has behavior determined by the NaCl sandbox:
210 load/stores might be forced back into sandbox range, or eliminated
211 entirely if they fall out of the sandbox.
  /external/chromium_org/ppapi/native_client/tools/browser_tester/browsertester/
browserlauncher.py 305 # Chrome process can't access file within sandbox
310 cmd.append('--no-sandbox')
315 cmd.append('--no-sandbox')
  /external/chromium_org/sandbox/win/src/
policy_engine_opcodes.h 8 #include "sandbox/win/src/policy_engine_params.h"
46 namespace sandbox { namespace
378 } // namespace sandbox
  /external/chromium_org/content/browser/
browser_main_loop.cc 116 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
141 scoped_ptr<sandbox::SetuidSandboxClient> setuid_sandbox_client(
142 sandbox::SetuidSandboxClient::Create());
150 "Running without the SUID sandbox! See "
152 "for more information on developing with the sandbox on.";
164 // Tickle the sandbox host and zygote host so they fork now.
    [all...]
  /external/chromium_org/chrome/renderer/
chrome_render_process_observer.cc 122 // CreateDC fails behind the sandbox, but not CreateCompatibleDC.
290 // after we engage the sandbox.
  /external/chromium_org/chrome_elf/create_file/
chrome_create_file_unittest.cc 23 #include "sandbox/win/src/interception_internal.h"
24 #include "sandbox/win/src/nt_internals.h"

Completed in 720 milliseconds

<<21222324252627282930>>