/external/libchrome/base/ |
base.isolate | 8 # exception is the Windows sandbox (?).
|
/external/libchrome/base/power_monitor/ |
power_monitor_device_source.h | 47 // and before the Sandbox is initialized.
|
/external/libchrome/dbus/ |
file_descriptor.h | 74 // We disallow directories to avoid potential sandbox escapes.
|
/external/libchrome/sandbox/linux/suid/ |
process_util_linux.c | 13 #include "sandbox/linux/suid/process_util.h"
|
/external/libchrome/sandbox/win/src/ |
sandbox.vcproj | 5 Name="sandbox" 7 RootNamespace="sandbox" 564 RelativePath=".\sandbox.cc" 568 RelativePath=".\sandbox.h"
|
crosscall_client.h | 11 #include "sandbox/win/src/crosscall_params.h" 12 #include "sandbox/win/src/sandbox.h" 42 namespace sandbox { namespace 524 } // namespace sandbox
|
/external/llvm/docs/ |
HowToCrossCompileLLVM.rst | 167 $ ./sandbox/bin/python sandbox/bin/lnt runtest nt \ 168 --sandbox sandbox \
|
ReleaseProcess.rst | 111 ./sandbox/bin/python sandbox/bin/lnt runtest \ 114 --sandbox sandbox \
|
/hardware/bsp/intel/peripheral/libupm/src/mg811/ |
mg811.cxx | 7 * and sandbox electronics (http://sandboxelectronics.com/?p=147).
|
/sdk/eclipse/ |
dictionary.txt | 261 sandbox
|
/external/chromium-trace/catapult/telemetry/telemetry/internal/platform/profiler/ |
vtune_profiler.py | 145 '--no-sandbox', 146 '--allow-sandbox-debugging',
|
/external/llvm/test/DebugInfo/X86/ |
empty-and-one-elem-array.ll | 70 !6 = !DIFile(filename: "test.c", directory: "/Volumes/Sandbox/llvm") 96 !32 = !DIFile(filename: "test.c", directory: "/Volumes/Sandbox/llvm")
|
/external/minijail/ |
minijail0.1 | 3 minijail0 \- sandbox a process 9 Runs PROGRAM inside a sandbox.
|
/external/webrtc/webrtc/base/ |
systeminfo.cc | 88 // is running in a sandbox, we may only be able to read the value once (before 89 // the sandbox is initialized) and not thereafter.
|
/frameworks/base/docs/html/google/play/billing/ |
index.jd | 48 <li><strong>IAB Sandbox</strong>—The In-app Billing Sandbox now supports
|
/frameworks/base/docs/html/training/permissions/ |
declaring.jd | 36 Every Android app runs in a limited-access sandbox. If an app needs to use 37 resources or information outside of its own sandbox, the app has to request
|
/prebuilts/go/darwin-x86/misc/nacl/ |
README | 19 Native Client programs are executed inside a sandbox, the NaCl runtime. This 75 script which sets up a Native Client environment and invokes the NaCl sandbox.
|
/prebuilts/go/linux-x86/misc/nacl/ |
README | 19 Native Client programs are executed inside a sandbox, the NaCl runtime. This 75 script which sets up a Native Client environment and invokes the NaCl sandbox.
|
/external/selinux/libsemanage/src/ |
semanage_store.c | 27 * local module store. Sandbox routines, used by both source and 94 * a sandbox */ 873 /********************* sandbox management routines *********************/ 875 /* Creates a sandbox for a single client. Returns 0 if a 876 * sandbox was created, -1 on error. 880 const char *sandbox = semanage_path(SEMANAGE_TMP, SEMANAGE_TOPLEVEL); local 884 if (stat(sandbox, &buf) == -1) { 886 ERR(sh, "Error scanning directory %s.", sandbox); 891 /* remove the old sandbox */ 892 if (semanage_remove_directory(sandbox) != 0) 1617 const char *sandbox = semanage_path(SEMANAGE_TMP, SEMANAGE_TOPLEVEL); local [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/bin/ |
mturk | 97 dest = 'sandbox', action = 'store_false', default = True, 98 help = 'use the production site (default: use the sandbox)') 106 init(args.sandbox, args.nicknames_path) 108 def init(sandbox = False, nicknames_path = default_nicknames_path): 111 mturk_website = 'workersandbox.mturk.com' if sandbox else 'www.mturk.com' 113 host = 'mechanicalturk.sandbox.amazonaws.com' if sandbox else 'mechanicalturk.amazonaws.com')
|
/external/libchrome/sandbox/linux/syscall_broker/ |
broker_process_unittest.cc | 5 #include "sandbox/linux/syscall_broker/broker_process.h" 29 #include "sandbox/linux/syscall_broker/broker_client.h" 30 #include "sandbox/linux/tests/scoped_temporary_file.h" 31 #include "sandbox/linux/tests/test_utils.h" 32 #include "sandbox/linux/tests/unit_tests.h" 35 namespace sandbox { namespace 658 } // namespace sandbox
|
/external/google-breakpad/src/client/linux/minidump_writer/ |
linux_ptrace_dumper.cc | 78 // the seccomp sandbox. Not only does this cause difficulties down the line 83 // the seccomp sandbox's trusted code. 284 // it was part of the seccomp sandbox's trusted code, it is OK to
|
/docs/source.android.com/src/security/enhancements/ |
enhancements50.jd | 18 <li><strong>Android sandbox reinforced with SELinux</strong>. Android now
|
/external/autotest/client/cros/ |
chrome_binary_test.py | 20 CHROME_SANDBOX = '/opt/google/chrome/chrome-sandbox'
|
/external/autotest/client/site_tests/security_BundledExtensions/ |
baseline | 103 "https://www-googleapis-test.sandbox.google.com/*",
|