/external/libchrome/base/threading/ |
platform_thread_mac.mm | 55 // pthread_setname() fails (harmlessly) in the sandbox, ignore when it does.
|
/external/libyuv/files/source/ |
cpu_id.cc | 142 // This will occur for Chrome sandbox for Pepper or Render process.
|
/external/skia/site/user/ |
tips.md | 99 1. Launch Chrome or Chromium with `--no-sandbox --enable-gpu-benchmarking`
|
/external/smali/smalidea/ |
build.gradle | 87 def sandboxDir = "${buildDir}/sandbox"
|
/ndk/sources/host-tools/make-3.81/tests/ |
README | 89 fourth serious problem is that it doesn't create its own sandbox when
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/editors/layout/gle2/ |
RenderLogger.java | 313 // Append the given message to the ADT log. Bypass the sandbox if necessary
|
RenderService.java | 223 * @param credential the sandbox credential 251 * @param credential the sandbox credential
|
/docs/source.android.com/src/security/overview/ |
app-security.jd | 66 <p>All applications on Android run in an Application Sandbox, described earlier in this document. 322 its Application Sandbox. The signed application certificate defines which user 340 relationship with a shared Application Sandbox is allowed via the <a href="https://developer.android.com/guide/topics/manifest/manifest-element.html#uid">shared UID
|
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
generate.py | 125 SANDBOX = 4 140 poltype[SANDBOX] = _("Sandbox") 790 if self.type != SANDBOX: [all...] |
/external/autotest/client/bin/ |
site_utils.py | 77 8602 ? 00:00:00 chrome-sandbox 80 chrome-sandbox would not be matched. 132 31478 ? 0:00 /opt/google/chrome/chrome-sandbox /opt/google/chrome/ [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/mturk/ |
connection.py | 51 if config.has_option('MTurk', 'sandbox') and config.get('MTurk', 'sandbox') == 'True': 52 host = 'mechanicalturk.sandbox.amazonaws.com' [all...] |
/external/google-breakpad/src/build/ |
common.gypi | 164 # This is the location of the sandbox binary. Chrome looks for this before 166 # sandbox the zygote process and, thus, all renderer processes. 184 # Set to 1 to turn on seccomp sandbox by default. [all...] |
/external/tcpdump/ |
configure.in | 200 AC_ARG_WITH(sandbox-capsicum, 201 AS_HELP_STRING([--with-sandbox-capsicum], 223 AC_MSG_CHECKING([whether to sandbox using capsicum])
|
/external/chromium-trace/catapult/third_party/beautifulsoup4/bs4/builder/ |
__init__.py | 251 "iframe" : ["sandbox"],
|
/external/libchrome/sandbox/linux/bpf_dsl/ |
seccomp_macros.h | 22 #include "sandbox/linux/system_headers/linux_seccomp.h" // For AUDIT_ARCH_*
|
/external/libgdx/gdx/src/com/badlogic/gdx/utils/ |
SharedLibraryLoader.java | 200 // We are running in the OS X sandbox.
|
/external/selinux/policycoreutils/sepolicy/ |
sepolicy-bash-completion.sh | 83 [generate]='-a --admin --admin_user --application --cgi --confined_admin --customize -d --domain --dbus --desktop_user -h --help --inetd --init -n --name --newtype -p --path --sandbox -T --test --term_user -u --user -w --writepath --x_user'
|
/frameworks/base/core/java/android/os/ |
Process.java | 848 * app-specific sandbox. It is different from {@link #myUserHandle} in that 849 * a uid identifies a specific app sandbox in a specific user. 868 * @return Whether the uid corresponds to an application sandbox running in 876 * Returns whether the current process is in an isolated sandbox. [all...] |
/frameworks/base/docs/html/guide/topics/security/ |
permissions.jd | 95 <p>Because each Android application operates in a process sandbox, applications 98 the basic sandbox. Applications statically declare the permissions they 101 <p>The application sandbox does not depend on the technology used to build 290 or resources outside the app's sandbox, but where there's very little risk [all...] |
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/editors/layout/ |
ProjectCallback.java | 106 * @param credential the sandbox credential 673 // Append the given message to the ADT log. Bypass the sandbox if necessary
|
/external/chromium-trace/catapult/catapult_build/ |
run_dev_server_tests.py | 267 '--no-sandbox',
|
/external/libchrome/sandbox/win/src/sidestep/ |
mini_disassembler.cpp | 11 #include "sandbox/win/src/sidestep/mini_disassembler.h"
|
/external/libcxx/include/ |
__config | 127 // NaCl's sandbox (which PNaCl also runs in) doesn't allow filesystem access,
|
/external/llvm/lib/Target/Mips/ |
MipsRegisterInfo.cpp | 158 // Reserve registers for the NaCl sandbox.
|
/frameworks/base/docs/html/google/play/billing/ |
billing_reference.jd | 233 purchase made through the In-app Billing Sandbox, {@code orderId} is
|