/external/chromium_org/third_party/WebKit/PerformanceTests/Parser/ |
html-parser-threaded.html | 13 iframe.sandbox = ''; // Prevent external script loads which could cause write() to return before completing the parse.
|
/external/chromium_org/third_party/WebKit/Source/core/html/ |
HTMLIFrameElement.idl | 29 [Reflect, TreatNullAs=NullString] attribute DOMString sandbox;
|
/external/chromium_org/tools/cr/cr/base/ |
linux.py | 31 CHROME_DEVEL_SANDBOX='/usr/local/sbin/chrome-devel-sandbox',
|
/external/chromium_org/tools/perf/measurements/ |
skpicture_printer.py | 27 '--no-sandbox',
|
/external/llvm/lib/Target/Mips/MCTargetDesc/ |
MipsMCNaCl.h | 17 // Log2 of the NaCl MIPS sandbox's instruction bundle size.
|
/external/chromium_org/sandbox/win/tests/integration_tests/ |
integration_tests_test.cc | 8 #include "sandbox/win/src/sandbox.h" 9 #include "sandbox/win/src/target_services.h" 10 #include "sandbox/win/src/sandbox_factory.h" 11 #include "sandbox/win/tests/common/controller.h" 13 namespace sandbox { namespace 306 } // namespace sandbox
|
/external/chromium_org/content/gpu/ |
gpu_main.cc | 44 #include "sandbox/win/src/sandbox.h" 83 bool StartSandboxWindows(const sandbox::SandboxInterfaceInfo*); 227 // initializing a GL context, so start the sandbox early. 243 // On Mac, if the sandbox is enabled, then GLSurface::InitializeOneOff() 244 // is called from the sandbox warmup code before getting here. 389 // Warm up the random subsystem, which needs to be done pre-sandbox on all 469 TRACE_EVENT0("gpu", "Initialize sandbox"); 503 bool StartSandboxWindows(const sandbox::SandboxInterfaceInfo* sandbox_info) { 509 sandbox::TargetServices* target_services = sandbox_info->target_services [all...] |
/external/chromium_org/sandbox/win/src/ |
file_policy_test.cc | 12 #include "sandbox/win/src/nt_internals.h" 13 #include "sandbox/win/src/sandbox.h" 14 #include "sandbox/win/src/sandbox_factory.h" 15 #include "sandbox/win/src/sandbox_policy.h" 16 #include "sandbox/win/src/win_utils.h" 17 #include "sandbox/win/tests/common/controller.h" 18 #include "sandbox/win/tests/common/test_utils.h" 25 namespace sandbox { namespace 599 } // namespace sandbox [all...] |
sandbox_policy.h | 12 #include "sandbox/win/src/sandbox_types.h" 13 #include "sandbox/win/src/security_level.h" 15 namespace sandbox { namespace 89 // Important: most of the sandbox-provided security relies on this single 156 // Sets the integrity level of the process in the sandbox. Both the initial 158 // is set to a level higher than the current level, the sandbox will fail 165 // Sets the integrity level of the process in the sandbox. The integrity level 168 // process in the sandbox. If the integrity level is set to a level higher 169 // than the current level, the sandbox will fail to start. 243 } // namespace sandbox [all...] |
process_mitigations.cc | 5 #include "sandbox/win/src/process_mitigations.h" 10 #include "sandbox/win/src/nt_internals.h" 11 #include "sandbox/win/src/win_utils.h" 28 namespace sandbox { namespace 321 } // namespace sandbox
|
restricted_token.h | 13 #include "sandbox/win/src/restricted_token_utils.h" 14 #include "sandbox/win/src/security_level.h" 15 #include "sandbox/win/src/sid.h" 25 namespace sandbox { namespace 197 } // namespace sandbox
|
sharedmem_ipc_server.cc | 8 #include "sandbox/win/src/sharedmem_ipc_server.h" 9 #include "sandbox/win/src/sharedmem_ipc_client.h" 10 #include "sandbox/win/src/sandbox.h" 11 #include "sandbox/win/src/sandbox_types.h" 12 #include "sandbox/win/src/crosscall_params.h" 13 #include "sandbox/win/src/crosscall_server.h" 20 namespace sandbox { namespace 420 } // namespace sandbox
|
policy_opcodes_unittest.cc | 5 #include "sandbox/win/src/sandbox_types.h" 6 #include "sandbox/win/src/sandbox_nt_types.h" 7 #include "sandbox/win/src/policy_engine_params.h" 8 #include "sandbox/win/src/policy_engine_opcodes.h" 18 namespace sandbox { namespace 343 } // namespace sandbox
|
/external/chromium_org/chrome/common/extensions/docs/templates/articles/ |
sencha_framework.html | 30 <li><a href="app_external#sandboxing">Sandbox</a> app's logic.</li> 50 The "sandbox" field is used 51 to sandbox the app's main logic in a unique origin. 76 "sandbox": { 77 "pages": ["sandbox.html"] 117 <h2 id="three">Sandbox app's logic</h2> 124 that acts as a sandbox environment: 127 <iframe id="sandbox-frame" sandbox="allow-scripts" src="sandbox.html"></iframe [all...] |
tut_migration_to_manifest_v2.html | 92 <li>Define the <a href="manifest/sandbox">sandbox</a> property.</li> 102 <li>Create a sandbox entry in your manifest and 103 run the affected code in the sandbox, 324 Chrome provides a sandbox for pages to run in their own origin, 331 <li>Create a sandbox entry in your manifest file.</li> 332 <li>In the sandbox entry, 333 list the pages you want to run in the sandbox.</li>
|
/external/chromium_org/content/public/common/ |
content_switches.cc | 34 const char kAllowNoSandboxJob[] = "allow-no-sandbox-job"; 37 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging"; 178 // Disable the GPU process sandbox. 179 const char kDisableGpuSandbox[] = "disable-gpu-sandbox"; 252 // Disable the seccomp filter sandbox (seccomp-bpf) (Linux only). 253 const char kDisableSeccompFilterSandbox[] = "disable-seccomp-filter-sandbox"; 258 // Disable the setuid sandbox (Linux only). 259 const char kDisableSetuidSandbox[] = "disable-setuid-sandbox"; 454 // Cause the OS X sandbox write to syslog every time an access to a resource 455 // is denied by the sandbox [all...] |
/external/chromium_org/native_client_sdk/doc_generated/reference/sandbox_internals/ |
arm-32-bit-sandbox.html | 3 <section id="arm-32-bit-sandbox"> 4 <span id="id1"></span><h1 id="arm-32-bit-sandbox"><span id="id1"></span>ARM 32-bit Sandbox</h1> 7 ARM processors. The ARM sandbox is an extension of earlier work on 10 see in this document the sandbox model is beautifully simple, meaning 12 <p>As an implementation detail, the Native Client 32-bit ARM sandbox is 17 sandbox to execute code on ARM. Note that the Portable Native Client 18 compiler itself is also untrusted: it too runs in the ARM sandbox 135 malicious source, inside a sandbox created by a trusted runtime. The 140 untrusted program, but it allows control to escape from the sandbox in [all...] |
/external/chromium_org/content/browser/zygote_host/ |
zygote_host_impl_linux.cc | 41 #include "sandbox/linux/suid/client/setuid_sandbox_client.h" 42 #include "sandbox/linux/suid/common/sandbox.h" 144 // A non empty sandbox_cmd means we want a SUID sandbox. 147 // Start up the sandbox host process and get the file descriptor for the 154 scoped_ptr<sandbox::SetuidSandboxClient> 155 sandbox_client(sandbox::SetuidSandboxClient::Create()); 168 // The SUID sandbox will execute the zygote in a new PID namespace, and 192 // Reap the sandbox. 196 // Not using the SUID sandbox [all...] |
/external/chromium_org/native_client_sdk/src/doc/reference/sandbox_internals/ |
arm-32-bit-sandbox.rst | 1 .. _arm-32-bit-sandbox: 4 ARM 32-bit Sandbox 9 ARM processors. The ARM sandbox is an extension of earlier work on 12 see in this document the sandbox model is beautifully simple, meaning 15 As an implementation detail, the Native Client 32-bit ARM sandbox is 20 sandbox to execute code on ARM. Note that the Portable Native Client 21 compiler itself is also untrusted: it too runs in the ARM sandbox 121 malicious source, inside a sandbox created by a trusted runtime. The 126 untrusted program, but it allows control to escape from the sandbox in a 184 sandbox. The *indirect branch* pseudo-instruction, in turn, ensures tha [all...] |
/docs/source.android.com/src/devices/tech/security/ |
enhancements43.jd | 11 <li><strong>Android sandbox reinforced with SELinux.</strong> 12 This release strengthens the Android sandbox using the SELinux
|
/external/chromium_org/ |
BUILD.gn | 43 "//sandbox", 131 "//sandbox",
|
/external/chromium_org/chrome/common/ |
OWNERS | 8 # Mac Sandbox profiles. 13 # new sandbox escapes.
|
/external/chromium_org/chrome/common/extensions/docs/templates/json/ |
manifest.json | 153 "sandbox": { 154 "documentation": "manifest/sandbox.html",
|
/external/chromium_org/chrome/test/android/javatests/src/org/chromium/chrome/test/util/ |
ApplicationData.java | 34 * framework does not try to create it for sandbox processes and fail. 55 // will try to create it otherwise and will fail for sandbox processes with
|
/external/chromium_org/content/common/ |
sandbox_mac_system_access_unittest.mm | 42 // Shouldn't be able to open the pasteboard in the sandbox. 110 // Opening /dev/urandom succeeds under the sandbox.
|