HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 101 - 125 of 523) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/libchrome/sandbox/linux/services/
namespace_sandbox.cc 5 #include "sandbox/linux/services/namespace_sandbox.h"
26 #include "sandbox/linux/services/credentials.h"
27 #include "sandbox/linux/services/namespace_utils.h"
28 #include "sandbox/linux/services/syscall_wrappers.h"
29 #include "sandbox/linux/system_headers/linux_signal.h"
31 namespace sandbox { namespace
245 } // namespace sandbox
init_process_reaper.cc 5 #include "sandbox/linux/services/init_process_reaper.h"
18 namespace sandbox { namespace
101 } // namespace sandbox.
proc_util.cc 5 #include "sandbox/linux/services/proc_util.h"
19 namespace sandbox { namespace
119 } // namespace sandbox
syscall_wrappers.h 14 #include "sandbox/sandbox_export.h"
21 namespace sandbox { namespace
83 } // namespace sandbox
yama.cc 5 #include "sandbox/linux/services/yama.h"
28 namespace sandbox { namespace
117 } // namespace sandbox
credentials.h 20 #include "sandbox/linux/system_headers/capability.h"
21 #include "sandbox/sandbox_export.h"
23 namespace sandbox { namespace
105 } // namespace sandbox.
scoped_process_unittest.cc 5 #include "sandbox/linux/services/scoped_process.h"
23 #include "sandbox/linux/tests/unit_tests.h"
26 namespace sandbox { namespace
129 } // namespace sandbox
thread_helpers_unittests.cc 5 #include "sandbox/linux/services/thread_helpers.h"
21 #include "sandbox/linux/tests/unit_tests.h"
26 namespace sandbox { namespace
153 } // namespace sandbox
namespace_sandbox.h 17 #include "sandbox/sandbox_export.h"
19 namespace sandbox { namespace
22 // namespace. Before using a namespace sandbox, check for namespaces support
65 // Versions which take namespace sandbox options. These allow fine grained
113 // Returns whether the namespace sandbox created a new user, PID, and network
124 } // namespace sandbox
  /external/libchrome/sandbox/linux/syscall_broker/
broker_host.cc 5 #include "sandbox/linux/syscall_broker/broker_host.h"
25 #include "sandbox/linux/syscall_broker/broker_common.h"
26 #include "sandbox/linux/syscall_broker/broker_policy.h"
27 #include "sandbox/linux/system_headers/linux_syscalls.h"
30 namespace sandbox { namespace
42 // process' system calls profile to be able to loosely sandbox it.
232 } // namespace sandbox
broker_policy.cc 5 #include "sandbox/linux/syscall_broker/broker_policy.h"
16 #include "sandbox/linux/syscall_broker/broker_common.h"
18 namespace sandbox { namespace
100 } // namespace sandbox
  /external/libchrome/sandbox/linux/bpf_dsl/
bpf_dsl.cc 5 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
15 #include "sandbox/linux/bpf_dsl/bpf_dsl_impl.h"
16 #include "sandbox/linux/bpf_dsl/errorcode.h"
17 #include "sandbox/linux/bpf_dsl/policy_compiler.h"
18 #include "sandbox/linux/system_headers/linux_seccomp.h"
20 namespace sandbox { namespace
345 } // namespace sandbox
347 template class scoped_refptr<const sandbox::bpf_dsl::internal::BoolExprImpl>;
348 template class scoped_refptr<const sandbox::bpf_dsl::internal::ResultExprImpl>;
codegen.h 16 #include "sandbox/sandbox_export.h"
20 namespace sandbox { namespace
46 // // any C++ destructors after starting the sandbox.
120 } // namespace sandbox
  /external/libchrome/sandbox/mac/
message_server.h 11 #include "sandbox/mac/xpc.h"
13 namespace sandbox { namespace
74 } // namespace sandbox
sandbox_mac.gypi 8 'target_name': 'sandbox',
57 'generate_stubs_project': 'sandbox/mac',
100 'sandbox',
xpc_stubs.sig 5 // This file contains declarations of public XPC functions used in the sandbox.
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/fps/
test_verify_signature.py 6 params = 'expiry=08%2F2015&signature=ynDukZ9%2FG77uSJVb5YM0cadwHVwYKPMKOO3PNvgADbv6VtymgBxeOWEhED6KGHsGSvSJnMWDN%2FZl639AkRe9Ry%2F7zmn9CmiM%2FZkp1XtshERGTqi2YL10GwQpaH17MQqOX3u1cW4LlyFoLy4celUFBPq1WM2ZJnaNZRJIEY%2FvpeVnCVK8VIPdY3HMxPAkNi5zeF2BbqH%2BL2vAWef6vfHkNcJPlOuOl6jP4E%2B58F24ni%2B9ek%2FQH18O4kw%2FUJ7ZfKwjCCI13%2BcFybpofcKqddq8CuUJj5Ii7Pdw1fje7ktzHeeNhF0r9siWcYmd4JaxTP3NmLJdHFRq2T%2FgsF3vK9m3gw%3D%3D&signatureVersion=2&signatureMethod=RSA-SHA1&certificateUrl=https%3A%2F%2Ffps.sandbox.amazonaws.com%2Fcerts%2F090909%2FPKICert.pem&tokenID=A5BB3HUNAZFJ5CRXIPH72LIODZUNAUZIVP7UB74QNFQDSQ9MN4HPIKISQZWPLJXF&status=SC&callerReference=callerReferenceMultiUse1'
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/mturk/
_init_environment.py 5 mturk_host = 'mechanicalturk.sandbox.amazonaws.com'
create_hit_with_qualifications.py 7 conn = MTurkConnection(host='mechanicalturk.sandbox.amazonaws.com')
  /external/compiler-rt/test/asan/TestCases/Posix/
coverage-sandboxing.cc 9 // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t a 2>&1 | FileCheck %s --check-prefix=CHECK-sandbox
12 // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t a b 2>&1 | FileCheck %s --check-prefix=CHECK-sandbox
85 // CHECK-sandbox: PID: [[PID:[0-9]+]]
86 // CHECK-sandbox: 258 PCs written to packed file
  /external/libchrome/base/files/
scoped_file.cc 28 // It's especially problematic on Linux with the setuid sandbox, where
  /external/libchrome/base/debug/
debugger.h 23 // On OS X, the underlying mechanism doesn't work when the sandbox is enabled.
27 // BEFORE the sandbox is enabled.
  /external/llvm/lib/Target/Mips/MCTargetDesc/
MipsNaClELFStreamer.cpp 11 // as required by NaCl's SFI sandbox. It inserts address-masking instructions
103 // Sandbox indirect branch or return instruction by inserting mask operation
114 // Sandbox memory access or SP change. Insert mask operation before and/or
121 // Sandbox memory access.
127 // Sandbox SP change.
140 // Sandbox indirect jumps.
148 // Sandbox loads, stores and SP changes.
168 // Sandbox calls by aligning call and branch delay to the bundle end.
  /frameworks/base/docs/html/training/permissions/
index.jd 36 app in a limited access sandbox. If the app wants to use resources or
37 information outside of its sandbox, the app has to explicitly request
  /external/selinux/policycoreutils/
ChangeLog 9 * sandbox: Fix sandbox to propagate specified MCS/MLS Security Level, from Miroslav Grepl.
36 * Ensure XDG_RUNTIME_DIR is passed through to the sandbox in seunshare,
38 * Remove cgroups from sandbox, from Dan Walsh
66 * Add message to tell user to install sandbox policy from Dan Walsh.
130 * Improve sandbox support for home dir symlinks and file caps from Dan Walsh.
131 * Switch sandbox to openbox window manager from Dan Walsh.
143 * sandbox: use sepolicy to look for sandbox_t
151 * sandbox: Copy /var/tmp to /tmp as they are the same inside
168 * sandbox: seunshare: do not reassign realloc valu
    [all...]

Completed in 2350 milliseconds

1 2 3 45 6 7 8 91011>>