HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 501 - 525 of 990) sorted by null

<<21222324252627282930>>

  /external/chromium_org/third_party/WebKit/PerformanceTests/Parser/
html-parser-threaded.html 13 iframe.sandbox = ''; // Prevent external script loads which could cause write() to return before completing the parse.
  /external/chromium_org/third_party/WebKit/Source/core/html/
HTMLIFrameElement.idl 29 [Reflect, TreatNullAs=NullString] attribute DOMString sandbox;
  /external/chromium_org/tools/cr/cr/base/
linux.py 31 CHROME_DEVEL_SANDBOX='/usr/local/sbin/chrome-devel-sandbox',
  /external/chromium_org/tools/perf/measurements/
skpicture_printer.py 27 '--no-sandbox',
  /external/llvm/lib/Target/Mips/MCTargetDesc/
MipsMCNaCl.h 17 // Log2 of the NaCl MIPS sandbox's instruction bundle size.
  /external/chromium_org/sandbox/win/tests/integration_tests/
integration_tests_test.cc 8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/target_services.h"
10 #include "sandbox/win/src/sandbox_factory.h"
11 #include "sandbox/win/tests/common/controller.h"
13 namespace sandbox { namespace
306 } // namespace sandbox
  /external/chromium_org/content/gpu/
gpu_main.cc 44 #include "sandbox/win/src/sandbox.h"
83 bool StartSandboxWindows(const sandbox::SandboxInterfaceInfo*);
227 // initializing a GL context, so start the sandbox early.
243 // On Mac, if the sandbox is enabled, then GLSurface::InitializeOneOff()
244 // is called from the sandbox warmup code before getting here.
389 // Warm up the random subsystem, which needs to be done pre-sandbox on all
469 TRACE_EVENT0("gpu", "Initialize sandbox");
503 bool StartSandboxWindows(const sandbox::SandboxInterfaceInfo* sandbox_info) {
509 sandbox::TargetServices* target_services = sandbox_info->target_services
    [all...]
  /external/chromium_org/sandbox/win/src/
file_policy_test.cc 12 #include "sandbox/win/src/nt_internals.h"
13 #include "sandbox/win/src/sandbox.h"
14 #include "sandbox/win/src/sandbox_factory.h"
15 #include "sandbox/win/src/sandbox_policy.h"
16 #include "sandbox/win/src/win_utils.h"
17 #include "sandbox/win/tests/common/controller.h"
18 #include "sandbox/win/tests/common/test_utils.h"
25 namespace sandbox { namespace
599 } // namespace sandbox
    [all...]
sandbox_policy.h 12 #include "sandbox/win/src/sandbox_types.h"
13 #include "sandbox/win/src/security_level.h"
15 namespace sandbox { namespace
89 // Important: most of the sandbox-provided security relies on this single
156 // Sets the integrity level of the process in the sandbox. Both the initial
158 // is set to a level higher than the current level, the sandbox will fail
165 // Sets the integrity level of the process in the sandbox. The integrity level
168 // process in the sandbox. If the integrity level is set to a level higher
169 // than the current level, the sandbox will fail to start.
243 } // namespace sandbox
    [all...]
process_mitigations.cc 5 #include "sandbox/win/src/process_mitigations.h"
10 #include "sandbox/win/src/nt_internals.h"
11 #include "sandbox/win/src/win_utils.h"
28 namespace sandbox { namespace
321 } // namespace sandbox
restricted_token.h 13 #include "sandbox/win/src/restricted_token_utils.h"
14 #include "sandbox/win/src/security_level.h"
15 #include "sandbox/win/src/sid.h"
25 namespace sandbox { namespace
197 } // namespace sandbox
sharedmem_ipc_server.cc 8 #include "sandbox/win/src/sharedmem_ipc_server.h"
9 #include "sandbox/win/src/sharedmem_ipc_client.h"
10 #include "sandbox/win/src/sandbox.h"
11 #include "sandbox/win/src/sandbox_types.h"
12 #include "sandbox/win/src/crosscall_params.h"
13 #include "sandbox/win/src/crosscall_server.h"
20 namespace sandbox { namespace
420 } // namespace sandbox
policy_opcodes_unittest.cc 5 #include "sandbox/win/src/sandbox_types.h"
6 #include "sandbox/win/src/sandbox_nt_types.h"
7 #include "sandbox/win/src/policy_engine_params.h"
8 #include "sandbox/win/src/policy_engine_opcodes.h"
18 namespace sandbox { namespace
343 } // namespace sandbox
  /external/chromium_org/chrome/common/extensions/docs/templates/articles/
sencha_framework.html 30 <li><a href="app_external#sandboxing">Sandbox</a> app's logic.</li>
50 The "sandbox" field is used
51 to sandbox the app's main logic in a unique origin.
76 "sandbox": {
77 "pages": ["sandbox.html"]
117 <h2 id="three">Sandbox app's logic</h2>
124 that acts as a sandbox environment:
127 &lt;iframe id="sandbox-frame" sandbox="allow-scripts" src="sandbox.html">&lt;/iframe
    [all...]
tut_migration_to_manifest_v2.html 92 <li>Define the <a href="manifest/sandbox">sandbox</a> property.</li>
102 <li>Create a sandbox entry in your manifest and
103 run the affected code in the sandbox,
324 Chrome provides a sandbox for pages to run in their own origin,
331 <li>Create a sandbox entry in your manifest file.</li>
332 <li>In the sandbox entry,
333 list the pages you want to run in the sandbox.</li>
  /external/chromium_org/content/public/common/
content_switches.cc 34 const char kAllowNoSandboxJob[] = "allow-no-sandbox-job";
37 const char kAllowSandboxDebugging[] = "allow-sandbox-debugging";
178 // Disable the GPU process sandbox.
179 const char kDisableGpuSandbox[] = "disable-gpu-sandbox";
252 // Disable the seccomp filter sandbox (seccomp-bpf) (Linux only).
253 const char kDisableSeccompFilterSandbox[] = "disable-seccomp-filter-sandbox";
258 // Disable the setuid sandbox (Linux only).
259 const char kDisableSetuidSandbox[] = "disable-setuid-sandbox";
454 // Cause the OS X sandbox write to syslog every time an access to a resource
455 // is denied by the sandbox
    [all...]
  /external/chromium_org/native_client_sdk/doc_generated/reference/sandbox_internals/
arm-32-bit-sandbox.html 3 <section id="arm-32-bit-sandbox">
4 <span id="id1"></span><h1 id="arm-32-bit-sandbox"><span id="id1"></span>ARM 32-bit Sandbox</h1>
7 ARM processors. The ARM sandbox is an extension of earlier work on
10 see in this document the sandbox model is beautifully simple, meaning
12 <p>As an implementation detail, the Native Client 32-bit ARM sandbox is
17 sandbox to execute code on ARM. Note that the Portable Native Client
18 compiler itself is also untrusted: it too runs in the ARM sandbox
135 malicious source, inside a sandbox created by a trusted runtime. The
140 untrusted program, but it allows control to escape from the sandbox in
    [all...]
  /external/chromium_org/content/browser/zygote_host/
zygote_host_impl_linux.cc 41 #include "sandbox/linux/suid/client/setuid_sandbox_client.h"
42 #include "sandbox/linux/suid/common/sandbox.h"
144 // A non empty sandbox_cmd means we want a SUID sandbox.
147 // Start up the sandbox host process and get the file descriptor for the
154 scoped_ptr<sandbox::SetuidSandboxClient>
155 sandbox_client(sandbox::SetuidSandboxClient::Create());
168 // The SUID sandbox will execute the zygote in a new PID namespace, and
192 // Reap the sandbox.
196 // Not using the SUID sandbox
    [all...]
  /external/chromium_org/native_client_sdk/src/doc/reference/sandbox_internals/
arm-32-bit-sandbox.rst 1 .. _arm-32-bit-sandbox:
4 ARM 32-bit Sandbox
9 ARM processors. The ARM sandbox is an extension of earlier work on
12 see in this document the sandbox model is beautifully simple, meaning
15 As an implementation detail, the Native Client 32-bit ARM sandbox is
20 sandbox to execute code on ARM. Note that the Portable Native Client
21 compiler itself is also untrusted: it too runs in the ARM sandbox
121 malicious source, inside a sandbox created by a trusted runtime. The
126 untrusted program, but it allows control to escape from the sandbox in a
184 sandbox. The *indirect branch* pseudo-instruction, in turn, ensures tha
    [all...]
  /docs/source.android.com/src/devices/tech/security/
enhancements43.jd 11 <li><strong>Android sandbox reinforced with SELinux.</strong>
12 This release strengthens the Android sandbox using the SELinux
  /external/chromium_org/
BUILD.gn 43 "//sandbox",
131 "//sandbox",
  /external/chromium_org/chrome/common/
OWNERS 8 # Mac Sandbox profiles.
13 # new sandbox escapes.
  /external/chromium_org/chrome/common/extensions/docs/templates/json/
manifest.json 153 "sandbox": {
154 "documentation": "manifest/sandbox.html",
  /external/chromium_org/chrome/test/android/javatests/src/org/chromium/chrome/test/util/
ApplicationData.java 34 * framework does not try to create it for sandbox processes and fail.
55 // will try to create it otherwise and will fail for sandbox processes with
  /external/chromium_org/content/common/
sandbox_mac_system_access_unittest.mm 42 // Shouldn't be able to open the pasteboard in the sandbox.
110 // Opening /dev/urandom succeeds under the sandbox.

Completed in 5300 milliseconds

<<21222324252627282930>>