HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 126 - 150 of 523) sorted by null

1 2 3 4 56 7 8 91011>>

  /external/libchrome/sandbox/linux/seccomp-bpf/
trap.cc 5 #include "sandbox/linux/seccomp-bpf/trap.h"
21 #include "sandbox/linux/bpf_dsl/seccomp_macros.h"
22 #include "sandbox/linux/seccomp-bpf/die.h"
23 #include "sandbox/linux/seccomp-bpf/syscall.h"
24 #include "sandbox/linux/services/syscall_wrappers.h"
25 #include "sandbox/linux/system_headers/linux_seccomp.h"
26 #include "sandbox/linux/system_headers/linux_signal.h"
63 sandbox::sys_sigprocmask(LINUX_SIG_BLOCK, &mask, NULL)) {
77 namespace sandbox { namespace
114 // to avoid race conditions. Normally, this is a non-issue as the sandbox
    [all...]
syscall.h 12 #include "sandbox/linux/system_headers/linux_signal.h"
13 #include "sandbox/sandbox_export.h"
15 namespace sandbox { namespace
24 // This is primarily meant to be useful for writing sandbox policy
164 } // namespace sandbox
  /external/autotest/client/cros/
webstore_test.py 46 TestEnv = enum('staging', 'pnl', 'prod', 'sandbox')
105 TestEnv.sandbox: 'staging.sandbox',
110 TestEnv.sandbox: 'download-staging.sandbox',
111 TestEnv.pnl: 'omaha.sandbox'
130 def initialize(self, test_env=TestEnv.sandbox,
148 TestEnv.sandbox:
149 'https://webstore-staging.sandbox.google.com/webstore',
251 '//iframe[contains(@src, "sandbox.google.com/checkout")]'
    [all...]
  /external/libchrome/sandbox/linux/
BUILD.gn 30 # We have two principal targets: sandbox and sandbox_linux_unittests
33 # the setuid sandbox and is its own target.
35 group("sandbox") {
111 ":sandbox",
296 # The setuid sandbox for Linux.
299 "suid/common/sandbox.h",
303 "suid/sandbox.c",
423 "suid/common/sandbox.h",
437 "suid/common/sandbox.h",
462 isolate_file = "//sandbox/sandbox_linux_unittests_android.isolate
    [all...]
sandbox_linux.gypi 37 # We have two principal targets: sandbox and sandbox_linux_unittests
40 # the setuid sandbox and is its own target.
42 'target_name': 'sandbox',
196 # The setuid sandbox, for Linux
200 'suid/common/sandbox.h',
204 'suid/sandbox.c',
305 'suid/common/sandbox.h',
348 '<(SHARED_INTERMEDIATE_DIR)/sandbox/linux/bpf_dsl/golden/golden_files.h',
353 '<(SHARED_INTERMEDIATE_DIR)/sandbox/linux/bpf_dsl/golden/golden_files.h',
  /external/libchrome/sandbox/linux/bpf_dsl/
policy_compiler.cc 5 #include "sandbox/linux/bpf_dsl/policy_compiler.h"
16 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
17 #include "sandbox/linux/bpf_dsl/bpf_dsl_impl.h"
18 #include "sandbox/linux/bpf_dsl/codegen.h"
19 #include "sandbox/linux/bpf_dsl/policy.h"
20 #include "sandbox/linux/bpf_dsl/seccomp_macros.h"
21 #include "sandbox/linux/bpf_dsl/syscall_set.h"
22 #include "sandbox/linux/system_headers/linux_filter.h"
23 #include "sandbox/linux/system_headers/linux_seccomp.h"
24 #include "sandbox/linux/system_headers/linux_syscalls.h
26 namespace sandbox { namespace
    [all...]
bpf_dsl.h 16 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h"
17 #include "sandbox/linux/bpf_dsl/cons.h"
18 #include "sandbox/linux/bpf_dsl/trap_registry.h"
19 #include "sandbox/sandbox_export.h"
21 // The sandbox::bpf_dsl namespace provides a domain-specific language
30 // #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
32 // using namespace sandbox::bpf_dsl;
76 namespace sandbox { namespace
113 // the sandbox. It should never be used in production, but it can be
114 // very useful to diagnose code that is incompatible with the sandbox
    [all...]
syscall_set.h 13 #include "sandbox/sandbox_export.h"
15 namespace sandbox { namespace
101 } // namespace sandbox
codegen.cc 5 #include "sandbox/linux/bpf_dsl/codegen.h"
14 #include "sandbox/linux/system_headers/linux_filter.h"
46 namespace sandbox { namespace
161 } // namespace sandbox
syscall_set.cc 5 #include "sandbox/linux/bpf_dsl/syscall_set.h"
11 #include "sandbox/linux/bpf_dsl/linux_syscall_ranges.h"
13 namespace sandbox { namespace
146 } // namespace sandbox
  /external/libchrome/sandbox/linux/services/
credentials_unittest.cc 5 #include "sandbox/linux/services/credentials.h"
25 #include "sandbox/linux/services/proc_util.h"
26 #include "sandbox/linux/services/syscall_wrappers.h"
27 #include "sandbox/linux/system_headers/capability.h"
28 #include "sandbox/linux/tests/unit_tests.h"
31 namespace sandbox { namespace
270 } // namespace sandbox.
credentials.cc 5 #include "sandbox/linux/services/credentials.h"
27 #include "sandbox/linux/services/namespace_utils.h"
28 #include "sandbox/linux/services/proc_util.h"
29 #include "sandbox/linux/services/syscall_wrappers.h"
30 #include "sandbox/linux/services/thread_helpers.h"
31 #include "sandbox/linux/system_headers/capability.h"
32 #include "sandbox/linux/system_headers/linux_signal.h"
35 namespace sandbox { namespace
335 } // namespace sandbox.
yama_unittests.cc 18 #include "sandbox/linux/services/scoped_process.h"
19 #include "sandbox/linux/services/yama.h"
20 #include "sandbox/linux/tests/unit_tests.h"
23 namespace sandbox { namespace
172 } // namespace sandbox
namespace_utils.cc 5 #include "sandbox/linux/services/namespace_utils.h"
25 namespace sandbox { namespace
118 } // namespace sandbox
syscall_wrappers.cc 5 #include "sandbox/linux/services/syscall_wrappers.h"
20 #include "sandbox/linux/system_headers/capability.h"
21 #include "sandbox/linux/system_headers/linux_signal.h"
22 #include "sandbox/linux/system_headers/linux_syscalls.h"
25 namespace sandbox { namespace
261 } // namespace sandbox
thread_helpers.cc 5 #include "sandbox/linux/services/thread_helpers.h"
24 #include "sandbox/linux/services/proc_util.h"
26 namespace sandbox { namespace
200 } // namespace sandbox
  /external/libchrome/sandbox/win/src/
policy_engine_params.h 10 #include "sandbox/win/src/internal_types.h"
11 #include "sandbox/win/src/nt_internals.h"
12 #include "sandbox/win/src/sandbox_nt_util.h"
18 namespace sandbox { namespace
200 } // namespace sandbox
  /external/selinux/policycoreutils/sandbox/
sandbox 40 SANDBOXSH = "/usr/share/sandbox/sandboxX.sh"
117 dlg.set_title(_("Sandbox Message"))
195 class Sandbox:
306 sandbox [-h] [-l level ] [-[X|M] [-H homedir] [-T tempdir]] [-I includefile ] [-W windowmanager ] [ -w windowsize ] [[-i file ] ...] [ -t type ] command
308 sandbox [-h] [-l level ] [-[X|M] [-H homedir] [-T tempdir]] [-I includefile ] [-W windowmanager ] [ -w windowsize ] [[-i file ] ...] [ -t type ] -S
317 help=_("include file in sandbox"))
320 help=_("read list of files to include in sandbox from INCLUDEFILE"))
322 help=_("run sandbox with SELinux type"))
332 default=False, help=_("run complete desktop session within sandbox"))
339 default=False, help=_("run X application within a sandbox"))
    [all...]
  /external/llvm/test/CodeGen/ARM/
debug-info-blocks.ll 116 !2 = !DIFile(filename: "header.h", directory: "/Volumes/Sandbox/llvm")
120 !6 = !DIFile(filename: "header2.h", directory: "/Volumes/Sandbox/llvm")
124 !10 = !DIFile(filename: "header3.h", directory: "/Volumes/Sandbox/llvm")
129 !15 = !DIFile(filename: "Private.h", directory: "/Volumes/Sandbox/llvm")
134 !20 = !DIFile(filename: "header4.h", directory: "/Volumes/Sandbox/llvm")
138 !24 = !DIFile(filename: "MyLibrary.m", directory: "/Volumes/Sandbox/llvm")
154 !40 = !DIFile(filename: "MyLibrary.i", directory: "/Volumes/Sandbox/llvm")
175 !61 = !DIFile(filename: "header11.h", directory: "/Volumes/Sandbox/llvm")
179 !65 = !DIFile(filename: "NSO.h", directory: "/Volumes/Sandbox/llvm")
191 !77 = !DIFile(filename: "header12.h", directory: "/Volumes/Sandbox/llvm"
    [all...]
  /external/libchrome/sandbox/linux/syscall_broker/
broker_file_permission.h 11 #include "sandbox/sandbox_export.h"
13 namespace sandbox { namespace
117 } // namespace sandbox
broker_policy.h 15 #include "sandbox/linux/syscall_broker/broker_file_permission.h"
17 namespace sandbox { namespace
87 } // namespace sandbox
  /external/libchrome/sandbox/linux/seccomp-bpf-helpers/
sigsys_handlers.cc 7 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
17 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
18 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
19 #include "sandbox/linux/seccomp-bpf/syscall.h"
20 #include "sandbox/linux/services/syscall_wrappers.h"
21 #include "sandbox/linux/system_headers/linux_syscalls.h"
110 namespace sandbox { namespace
299 } // namespace sandbox.
  /external/autotest/test_suites/
control.security 18 robustness when dealing with poorly formed HTTP responses, renderer sandbox,
  /external/compiler-rt/test/asan/TestCases/Linux/
read_binary_name_regtest.c 2 // the binary name because of sandbox restrictions.
  /external/libchrome/base/
rand_util_posix.cc 21 // it if we are later put in a sandbox. This class wraps the file descriptor so

Completed in 1045 milliseconds

1 2 3 4 56 7 8 91011>>