OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:sandboxed
(Results
1 - 25
of
57
) sorted by null
1
2
3
/external/autotest/client/site_tests/security_RendererSandbox/
control
3
PURPOSE = "Basic check to ensure renderer is
sandboxed
/jailed in Chromium OS."
6
sandboxed
/jailed.
16
This test simply checks if a page is loaded within the
sandboxed
/jailed
security_RendererSandbox.py
29
# which is not setuid
sandboxed
, as the pid of a renderer,
62
# Check if renderer is
sandboxed
.
/external/autotest/client/site_tests/security_SandboxStatus/
security_SandboxStatus.py
36
'''Checks that chrome://sandbox shows "You are adequately
sandboxed
."'''
41
text = 'You are adequately
sandboxed
.'
48
Checks that chrome://gpu has "
Sandboxed
" row, and "
Sandboxed
" is True.
54
raise error.TestFail('"
Sandboxed
" not True in %s' % url)
57
'''Open various sandbox-related pages and test that we are
sandboxed
.'''
/external/autotest/client/site_tests/security_SandboxedServices/
control
9
PURPOSE = "To maintain sensitive system services correctly
sandboxed
."
security_SandboxedServices.py
82
whether (and how) they are
sandboxed
.
139
each running service is
sandboxed
.
170
"""Inspects the process list, looking for root and
sandboxed
processes
172
confirms it's an exact match. Warns if we see root or
sandboxed
225
# If this process is supposed to be
sandboxed
228
# it's not
sandboxed
wrt the baseline.
/external/libchrome/sandbox/linux/syscall_broker/
broker_host.h
17
// The BrokerHost class should be embedded in a (presumably not
sandboxed
)
broker_client.h
18
// This class can be embedded in a
sandboxed
process and can be
20
// non-
sandboxed
process (which embeds BrokerHost).
/external/opencv3/3rdparty/jinja2/
sandbox.py
181
"""The
sandboxed
environment. It works like the regular environment but
182
tells the compiler to generate
sandboxed
code. Additionally subclasses of
190
sandboxed
= True
variable in class:SandboxedEnvironment
193
#: available on each instance of a
sandboxed
environment as
206
#: available on each instance of a
sandboxed
environment as
269
"""The
sandboxed
environment will call this method to check if the
305
"""Subscribe an object from
sandboxed
code."""
326
"""Subscribe an object from
sandboxed
code and prefer the
351
"""Call an object from
sandboxed
code."""
__init__.py
8
an optional
sandboxed
environment.
/external/libchrome/sandbox/linux/suid/common/
sandbox.h
27
// These are the magic byte values which the
sandboxed
process uses to request
/external/chromium-trace/catapult/third_party/webapp2/docs/tutorials/
virtualenv.rst
13
a "
sandboxed
environment" that serves almost the same purposes.
/external/libchrome/base/trace_event/
process_memory_totals_dump_provider.cc
60
// TODO(ssid): Fix crbug.com/461788 to write to the file from
sandboxed
/external/libchrome/sandbox/linux/seccomp-bpf-helpers/
baseline_policy.h
23
// code in a
sandboxed
environment.
syscall_parameters_restrictions.h
72
// of the
sandboxed
process or 0 (indicating the current thread). The following
/external/libchrome/sandbox/win/src/
interception_internal.h
6
// for the
sandboxed
process. For more details see:
sandbox_policy.h
54
// the
sandboxed
application is at least INTERACTIVE.
138
// Sets a hard limit on the size of the commit set for the
sandboxed
process.
175
// Sets the AppContainer to be used for the
sandboxed
process. Any capability
179
// launching the
sandboxed
process will fail. See BrokerServices for details
186
// Sets a capability to be enabled for the
sandboxed
process' AppContainer.
189
// Sets the LowBox token for
sandboxed
process. This is mutually exclusive
/build/core/combo/
HOST_darwin-x86_64.mk
24
# Statically-linked binaries are desirable for
sandboxed
environment
HOST_linux-x86_64.mk
40
# Statically-linked binaries are desirable for
sandboxed
environment
HOST_CROSS_windows-x86.mk
55
# Statically-linked binaries are desirable for
sandboxed
environment
HOST_CROSS_windows-x86_64.mk
55
# Statically-linked binaries are desirable for
sandboxed
environment
HOST_darwin-x86.mk
24
# Statically-linked binaries are desirable for
sandboxed
environment
HOST_linux-x86.mk
41
# Statically-linked binaries are desirable for
sandboxed
environment
/external/chromium-trace/catapult/telemetry/telemetry/testing/internal/
fake_gpu_info.py
39
'
sandboxed
': True,
/external/libchrome/base/debug/
stack_trace.h
31
// In
sandboxed
processes, this has to be called before the sandbox is turned
/external/libchrome/base/threading/
platform_thread_linux.cc
98
// We expect EPERM failures in
sandboxed
processes, just ignore those.
Completed in 752 milliseconds
1
2
3