/external/syzkaller/pkg/csource/ |
options.go | 23 Sandbox string `json:"sandbox"` 47 switch opts.Sandbox { 50 return fmt.Errorf("unknown sandbox %v", opts.Sandbox) 68 if opts.Sandbox == "" { 70 return errors.New("EnableTun without sandbox") 73 return errors.New("EnableCgroups without sandbox") 76 return errors.New("EnableNetdev without sandbox") 79 if opts.Sandbox == sandboxNamespace && !opts.UseTmpDir [all...] |
options_test.go | 30 `{"threaded":true,"collide":true,"repeat":true,"procs":10,"sandbox":"namespace", 38 Sandbox: "namespace", 50 "{Threaded:true Collide:true Repeat:true Procs:1 Sandbox:none Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true HandleSegv:true WaitRepeat:true Debug:false Repro:false}": { 55 Sandbox: "none", 65 "{Threaded:true Collide:true Repeat:true Procs:1 Sandbox: Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true HandleSegv:true WaitRepeat:true Debug:false Repro:false}": { 70 Sandbox: "", 80 "{Threaded:false Collide:true Repeat:true Procs:1 Sandbox:namespace Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true EnableCgroups:true HandleSegv:true WaitRepeat:true Debug:false Repro:false}": { 85 Sandbox: "namespace", 116 Sandbox: "none", 142 if fldName == "Sandbox" { [all...] |
common.go | 71 "SYZ_SANDBOX_NONE": opts.Sandbox == sandboxNone, 72 "SYZ_SANDBOX_SETUID": opts.Sandbox == sandboxSetuid, 73 "SYZ_SANDBOX_NAMESPACE": opts.Sandbox == sandboxNamespace,
|
csource_test.go | 66 Sandbox: "none",
|
/external/robolectric-shadows/robolectric/src/main/java/org/robolectric/internal/ |
SdkEnvironment.java | 4 import org.robolectric.internal.bytecode.Sandbox; 13 public class SdkEnvironment extends Sandbox {
|
/external/robolectric-shadows/sandbox/src/main/java/org/robolectric/internal/bytecode/ |
Sandbox.java | 9 public class Sandbox { 15 public Sandbox(ClassLoader robolectricClassLoader) {
|
/external/syzkaller/pkg/osutil/ |
osutil_appengine.go | 12 func Sandbox(cmd *exec.Cmd, user, net bool) error {
|
osutil_akaros.go | 23 func Sandbox(cmd *exec.Cmd, user, net bool) error {
|
osutil_bsd.go | 20 func Sandbox(cmd *exec.Cmd, user, net bool) error {
|
osutil_darwin.go | 20 func Sandbox(cmd *exec.Cmd, user, net bool) error {
|
osutil_fuchsia.go | 37 func Sandbox(cmd *exec.Cmd, user, net bool) error {
|
osutil_windows.go | 37 func Sandbox(cmd *exec.Cmd, user, net bool) error {
|
osutil_linux.go | 36 func Sandbox(cmd *exec.Cmd, user, net bool) error { 93 return false, 0, 0, fmt.Errorf("user %q is not found, can't sandbox command", sandboxUsername)
|
/build/soong/ui/build/ |
sandbox_linux.go | 26 type Sandbox struct { 34 noSandbox = Sandbox{} 35 basicSandbox = Sandbox{ 42 ninjaSandbox = Sandbox{ 60 if !c.Sandbox.Enabled { 65 if c.Sandbox.DisableWhenUsingGoma && c.config.UseGoma() { 161 if c.Sandbox.AllowBuildBrokenUsesNetwork && c.config.BuildBrokenUsesNetwork() { 162 c.ctx.Printf("AllowBuildBrokenUsesNetwork: %v", c.Sandbox.AllowBuildBrokenUsesNetwork)
|
sandbox_darwin.go | 21 type Sandbox string 25 globalSandbox = "build/soong/ui/build/sandbox/darwin/global.sb" 35 if p, err := exec.LookPath("sandbox-exec"); err == nil { 41 if c.Sandbox == "" { 44 c.ctx.Verboseln("sandbox-exec not found, disabling sandboxing") 58 "sandbox-exec", "-f", string(c.Sandbox),
|
exec.go | 28 Sandbox Sandbox 39 Sandbox: noSandbox,
|
soong.go | 46 cmd.Sandbox = soongSandbox 60 cmd.Sandbox = soongSandbox 122 cmd.Sandbox = soongSandbox
|
/external/robolectric-shadows/junit/src/main/java/org/robolectric/internal/ |
SandboxTestRunner.java | 30 import org.robolectric.internal.bytecode.Sandbox; 142 protected Sandbox getSandbox(FrameworkMethod method) { 145 return new Sandbox(sandboxClassLoader); 199 protected void configureSandbox(Sandbox sandbox, FrameworkMethod method) { 210 sandbox.replaceShadowMap(shadowMap); 212 sandbox.configure(createClassHandler(shadowMap, sandbox), getInterceptors()); 225 Sandbox sandbox = getSandbox(method) [all...] |
/external/robolectric-shadows/robolectric/src/test/java/org/robolectric/ |
TestRunnerSequenceTest.java | 28 import org.robolectric.internal.bytecode.Sandbox; 170 @Override protected void configureSandbox(Sandbox sandbox, FrameworkMethod frameworkMethod) { 172 super.configureSandbox(sandbox, frameworkMethod);
|
/external/syzkaller/pkg/repro/ |
repro_test.go | 76 Sandbox: "namespace",
|
repro.go | 426 // Simplify repro options (threaded, collide, sandbox, etc). 547 ctx.cfg.TargetOS, ctx.cfg.TargetArch, opts.Sandbox, opts.Repeat, 790 if opts.Sandbox == "none" { 793 opts.Sandbox = "none" 800 if opts.Sandbox == "" { 803 opts.Sandbox = "" 839 if !opts.UseTmpDir || opts.Sandbox == "namespace" || opts.EnableCgroups {
|
/external/syzkaller/pkg/vcs/ |
vcs.go | 95 if err := osutil.Sandbox(cmd, true, true); err != nil { 104 if err := osutil.Sandbox(cmd, true, true); err != nil { 116 if err := osutil.Sandbox(cmd, true, true); err != nil { 148 if err := osutil.Sandbox(cmd, true, false); err != nil {
|
/external/robolectric-shadows/robolectric/src/main/java/org/robolectric/ |
RobolectricTestRunner.java | 46 import org.robolectric.internal.bytecode.Sandbox; 159 * @param sandbox the {@link SdkConfig} in effect for this test 165 protected ClassHandler createClassHandler(ShadowMap shadowMap, Sandbox sandbox) { 166 return new ShadowWrangler(shadowMap, ((SdkEnvironment) sandbox).getSdkConfig().getApiLevel(), getInterceptors()); 231 protected void configureSandbox(Sandbox sandbox, FrameworkMethod method) { 232 SdkEnvironment sdkEnvironment = (SdkEnvironment) sandbox; 239 super.configureSandbox(sandbox, method); 347 protected void beforeTest(Sandbox sandbox, FrameworkMethod method, Method bootstrappedMethod) throws Throwable [all...] |
/external/syzkaller/pkg/build/ |
linux.go | 50 if err := osutil.Sandbox(cmd, true, true); err != nil { 65 if err := osutil.Sandbox(cmd, true, true); err != nil { 120 if err := osutil.Sandbox(cmd, true, true); err != nil {
|
/external/syzkaller/pkg/mgrconfig/ |
mgrconfig.go | 59 // Type of sandbox to use during fuzzing: 65 Sandbox string `json:"sandbox"` 140 Sandbox: "none", 178 switch cfg.Sandbox { 181 return fmt.Errorf("config param sandbox must contain one of none/setuid/namespace")
|