/external/libchrome/sandbox/linux/services/ |
namespace_sandbox.cc | 5 #include "sandbox/linux/services/namespace_sandbox.h" 26 #include "sandbox/linux/services/credentials.h" 27 #include "sandbox/linux/services/namespace_utils.h" 28 #include "sandbox/linux/services/syscall_wrappers.h" 29 #include "sandbox/linux/system_headers/linux_signal.h" 31 namespace sandbox { namespace 245 } // namespace sandbox
|
init_process_reaper.cc | 5 #include "sandbox/linux/services/init_process_reaper.h" 18 namespace sandbox { namespace 101 } // namespace sandbox.
|
proc_util.cc | 5 #include "sandbox/linux/services/proc_util.h" 19 namespace sandbox { namespace 119 } // namespace sandbox
|
syscall_wrappers.h | 14 #include "sandbox/sandbox_export.h" 21 namespace sandbox { namespace 83 } // namespace sandbox
|
yama.cc | 5 #include "sandbox/linux/services/yama.h" 28 namespace sandbox { namespace 117 } // namespace sandbox
|
credentials.h | 20 #include "sandbox/linux/system_headers/capability.h" 21 #include "sandbox/sandbox_export.h" 23 namespace sandbox { namespace 105 } // namespace sandbox.
|
scoped_process_unittest.cc | 5 #include "sandbox/linux/services/scoped_process.h" 23 #include "sandbox/linux/tests/unit_tests.h" 26 namespace sandbox { namespace 129 } // namespace sandbox
|
thread_helpers_unittests.cc | 5 #include "sandbox/linux/services/thread_helpers.h" 21 #include "sandbox/linux/tests/unit_tests.h" 26 namespace sandbox { namespace 153 } // namespace sandbox
|
namespace_sandbox.h | 17 #include "sandbox/sandbox_export.h" 19 namespace sandbox { namespace 22 // namespace. Before using a namespace sandbox, check for namespaces support 65 // Versions which take namespace sandbox options. These allow fine grained 113 // Returns whether the namespace sandbox created a new user, PID, and network 124 } // namespace sandbox
|
/external/libchrome/sandbox/linux/syscall_broker/ |
broker_host.cc | 5 #include "sandbox/linux/syscall_broker/broker_host.h" 25 #include "sandbox/linux/syscall_broker/broker_common.h" 26 #include "sandbox/linux/syscall_broker/broker_policy.h" 27 #include "sandbox/linux/system_headers/linux_syscalls.h" 30 namespace sandbox { namespace 42 // process' system calls profile to be able to loosely sandbox it. 232 } // namespace sandbox
|
broker_policy.cc | 5 #include "sandbox/linux/syscall_broker/broker_policy.h" 16 #include "sandbox/linux/syscall_broker/broker_common.h" 18 namespace sandbox { namespace 100 } // namespace sandbox
|
/external/libchrome/sandbox/linux/bpf_dsl/ |
bpf_dsl.cc | 5 #include "sandbox/linux/bpf_dsl/bpf_dsl.h" 15 #include "sandbox/linux/bpf_dsl/bpf_dsl_impl.h" 16 #include "sandbox/linux/bpf_dsl/errorcode.h" 17 #include "sandbox/linux/bpf_dsl/policy_compiler.h" 18 #include "sandbox/linux/system_headers/linux_seccomp.h" 20 namespace sandbox { namespace 345 } // namespace sandbox 347 template class scoped_refptr<const sandbox::bpf_dsl::internal::BoolExprImpl>; 348 template class scoped_refptr<const sandbox::bpf_dsl::internal::ResultExprImpl>;
|
codegen.h | 16 #include "sandbox/sandbox_export.h" 20 namespace sandbox { namespace 46 // // any C++ destructors after starting the sandbox. 120 } // namespace sandbox
|
/external/libchrome/sandbox/mac/ |
message_server.h | 11 #include "sandbox/mac/xpc.h" 13 namespace sandbox { namespace 74 } // namespace sandbox
|
sandbox_mac.gypi | 8 'target_name': 'sandbox', 57 'generate_stubs_project': 'sandbox/mac', 100 'sandbox',
|
xpc_stubs.sig | 5 // This file contains declarations of public XPC functions used in the sandbox.
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/fps/ |
test_verify_signature.py | 6 params = 'expiry=08%2F2015&signature=ynDukZ9%2FG77uSJVb5YM0cadwHVwYKPMKOO3PNvgADbv6VtymgBxeOWEhED6KGHsGSvSJnMWDN%2FZl639AkRe9Ry%2F7zmn9CmiM%2FZkp1XtshERGTqi2YL10GwQpaH17MQqOX3u1cW4LlyFoLy4celUFBPq1WM2ZJnaNZRJIEY%2FvpeVnCVK8VIPdY3HMxPAkNi5zeF2BbqH%2BL2vAWef6vfHkNcJPlOuOl6jP4E%2B58F24ni%2B9ek%2FQH18O4kw%2FUJ7ZfKwjCCI13%2BcFybpofcKqddq8CuUJj5Ii7Pdw1fje7ktzHeeNhF0r9siWcYmd4JaxTP3NmLJdHFRq2T%2FgsF3vK9m3gw%3D%3D&signatureVersion=2&signatureMethod=RSA-SHA1&certificateUrl=https%3A%2F%2Ffps.sandbox.amazonaws.com%2Fcerts%2F090909%2FPKICert.pem&tokenID=A5BB3HUNAZFJ5CRXIPH72LIODZUNAUZIVP7UB74QNFQDSQ9MN4HPIKISQZWPLJXF&status=SC&callerReference=callerReferenceMultiUse1'
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/mturk/ |
_init_environment.py | 5 mturk_host = 'mechanicalturk.sandbox.amazonaws.com'
|
create_hit_with_qualifications.py | 7 conn = MTurkConnection(host='mechanicalturk.sandbox.amazonaws.com')
|
/external/compiler-rt/test/asan/TestCases/Posix/ |
coverage-sandboxing.cc | 9 // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t a 2>&1 | FileCheck %s --check-prefix=CHECK-sandbox 12 // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t a b 2>&1 | FileCheck %s --check-prefix=CHECK-sandbox 85 // CHECK-sandbox: PID: [[PID:[0-9]+]] 86 // CHECK-sandbox: 258 PCs written to packed file
|
/external/libchrome/base/files/ |
scoped_file.cc | 28 // It's especially problematic on Linux with the setuid sandbox, where
|
/external/libchrome/base/debug/ |
debugger.h | 23 // On OS X, the underlying mechanism doesn't work when the sandbox is enabled. 27 // BEFORE the sandbox is enabled.
|
/external/llvm/lib/Target/Mips/MCTargetDesc/ |
MipsNaClELFStreamer.cpp | 11 // as required by NaCl's SFI sandbox. It inserts address-masking instructions 103 // Sandbox indirect branch or return instruction by inserting mask operation 114 // Sandbox memory access or SP change. Insert mask operation before and/or 121 // Sandbox memory access. 127 // Sandbox SP change. 140 // Sandbox indirect jumps. 148 // Sandbox loads, stores and SP changes. 168 // Sandbox calls by aligning call and branch delay to the bundle end.
|
/frameworks/base/docs/html/training/permissions/ |
index.jd | 36 app in a limited access sandbox. If the app wants to use resources or 37 information outside of its sandbox, the app has to explicitly request
|
/external/selinux/policycoreutils/ |
ChangeLog | 9 * sandbox: Fix sandbox to propagate specified MCS/MLS Security Level, from Miroslav Grepl. 36 * Ensure XDG_RUNTIME_DIR is passed through to the sandbox in seunshare, 38 * Remove cgroups from sandbox, from Dan Walsh 66 * Add message to tell user to install sandbox policy from Dan Walsh. 130 * Improve sandbox support for home dir symlinks and file caps from Dan Walsh. 131 * Switch sandbox to openbox window manager from Dan Walsh. 143 * sandbox: use sepolicy to look for sandbox_t 151 * sandbox: Copy /var/tmp to /tmp as they are the same inside 168 * sandbox: seunshare: do not reassign realloc valu [all...] |