/external/libchrome/sandbox/linux/seccomp-bpf/ |
trap.cc | 5 #include "sandbox/linux/seccomp-bpf/trap.h" 21 #include "sandbox/linux/bpf_dsl/seccomp_macros.h" 22 #include "sandbox/linux/seccomp-bpf/die.h" 23 #include "sandbox/linux/seccomp-bpf/syscall.h" 24 #include "sandbox/linux/services/syscall_wrappers.h" 25 #include "sandbox/linux/system_headers/linux_seccomp.h" 26 #include "sandbox/linux/system_headers/linux_signal.h" 63 sandbox::sys_sigprocmask(LINUX_SIG_BLOCK, &mask, NULL)) { 77 namespace sandbox { namespace 114 // to avoid race conditions. Normally, this is a non-issue as the sandbox [all...] |
syscall.h | 12 #include "sandbox/linux/system_headers/linux_signal.h" 13 #include "sandbox/sandbox_export.h" 15 namespace sandbox { namespace 24 // This is primarily meant to be useful for writing sandbox policy 164 } // namespace sandbox
|
/external/autotest/client/cros/ |
webstore_test.py | 46 TestEnv = enum('staging', 'pnl', 'prod', 'sandbox') 105 TestEnv.sandbox: 'staging.sandbox', 110 TestEnv.sandbox: 'download-staging.sandbox', 111 TestEnv.pnl: 'omaha.sandbox' 130 def initialize(self, test_env=TestEnv.sandbox, 148 TestEnv.sandbox: 149 'https://webstore-staging.sandbox.google.com/webstore', 251 '//iframe[contains(@src, "sandbox.google.com/checkout")]' [all...] |
/external/libchrome/sandbox/linux/ |
BUILD.gn | 30 # We have two principal targets: sandbox and sandbox_linux_unittests 33 # the setuid sandbox and is its own target. 35 group("sandbox") { 111 ":sandbox", 296 # The setuid sandbox for Linux. 299 "suid/common/sandbox.h", 303 "suid/sandbox.c", 423 "suid/common/sandbox.h", 437 "suid/common/sandbox.h", 462 isolate_file = "//sandbox/sandbox_linux_unittests_android.isolate [all...] |
sandbox_linux.gypi | 37 # We have two principal targets: sandbox and sandbox_linux_unittests 40 # the setuid sandbox and is its own target. 42 'target_name': 'sandbox', 196 # The setuid sandbox, for Linux 200 'suid/common/sandbox.h', 204 'suid/sandbox.c', 305 'suid/common/sandbox.h', 348 '<(SHARED_INTERMEDIATE_DIR)/sandbox/linux/bpf_dsl/golden/golden_files.h', 353 '<(SHARED_INTERMEDIATE_DIR)/sandbox/linux/bpf_dsl/golden/golden_files.h',
|
/external/libchrome/sandbox/linux/bpf_dsl/ |
policy_compiler.cc | 5 #include "sandbox/linux/bpf_dsl/policy_compiler.h" 16 #include "sandbox/linux/bpf_dsl/bpf_dsl.h" 17 #include "sandbox/linux/bpf_dsl/bpf_dsl_impl.h" 18 #include "sandbox/linux/bpf_dsl/codegen.h" 19 #include "sandbox/linux/bpf_dsl/policy.h" 20 #include "sandbox/linux/bpf_dsl/seccomp_macros.h" 21 #include "sandbox/linux/bpf_dsl/syscall_set.h" 22 #include "sandbox/linux/system_headers/linux_filter.h" 23 #include "sandbox/linux/system_headers/linux_seccomp.h" 24 #include "sandbox/linux/system_headers/linux_syscalls.h 26 namespace sandbox { namespace [all...] |
bpf_dsl.h | 16 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h" 17 #include "sandbox/linux/bpf_dsl/cons.h" 18 #include "sandbox/linux/bpf_dsl/trap_registry.h" 19 #include "sandbox/sandbox_export.h" 21 // The sandbox::bpf_dsl namespace provides a domain-specific language 30 // #include "sandbox/linux/bpf_dsl/bpf_dsl.h" 32 // using namespace sandbox::bpf_dsl; 76 namespace sandbox { namespace 113 // the sandbox. It should never be used in production, but it can be 114 // very useful to diagnose code that is incompatible with the sandbox [all...] |
syscall_set.h | 13 #include "sandbox/sandbox_export.h" 15 namespace sandbox { namespace 101 } // namespace sandbox
|
codegen.cc | 5 #include "sandbox/linux/bpf_dsl/codegen.h" 14 #include "sandbox/linux/system_headers/linux_filter.h" 46 namespace sandbox { namespace 161 } // namespace sandbox
|
syscall_set.cc | 5 #include "sandbox/linux/bpf_dsl/syscall_set.h" 11 #include "sandbox/linux/bpf_dsl/linux_syscall_ranges.h" 13 namespace sandbox { namespace 146 } // namespace sandbox
|
/external/libchrome/sandbox/linux/services/ |
credentials_unittest.cc | 5 #include "sandbox/linux/services/credentials.h" 25 #include "sandbox/linux/services/proc_util.h" 26 #include "sandbox/linux/services/syscall_wrappers.h" 27 #include "sandbox/linux/system_headers/capability.h" 28 #include "sandbox/linux/tests/unit_tests.h" 31 namespace sandbox { namespace 270 } // namespace sandbox.
|
credentials.cc | 5 #include "sandbox/linux/services/credentials.h" 27 #include "sandbox/linux/services/namespace_utils.h" 28 #include "sandbox/linux/services/proc_util.h" 29 #include "sandbox/linux/services/syscall_wrappers.h" 30 #include "sandbox/linux/services/thread_helpers.h" 31 #include "sandbox/linux/system_headers/capability.h" 32 #include "sandbox/linux/system_headers/linux_signal.h" 35 namespace sandbox { namespace 335 } // namespace sandbox.
|
yama_unittests.cc | 18 #include "sandbox/linux/services/scoped_process.h" 19 #include "sandbox/linux/services/yama.h" 20 #include "sandbox/linux/tests/unit_tests.h" 23 namespace sandbox { namespace 172 } // namespace sandbox
|
namespace_utils.cc | 5 #include "sandbox/linux/services/namespace_utils.h" 25 namespace sandbox { namespace 118 } // namespace sandbox
|
syscall_wrappers.cc | 5 #include "sandbox/linux/services/syscall_wrappers.h" 20 #include "sandbox/linux/system_headers/capability.h" 21 #include "sandbox/linux/system_headers/linux_signal.h" 22 #include "sandbox/linux/system_headers/linux_syscalls.h" 25 namespace sandbox { namespace 261 } // namespace sandbox
|
thread_helpers.cc | 5 #include "sandbox/linux/services/thread_helpers.h" 24 #include "sandbox/linux/services/proc_util.h" 26 namespace sandbox { namespace 200 } // namespace sandbox
|
/external/libchrome/sandbox/win/src/ |
policy_engine_params.h | 10 #include "sandbox/win/src/internal_types.h" 11 #include "sandbox/win/src/nt_internals.h" 12 #include "sandbox/win/src/sandbox_nt_util.h" 18 namespace sandbox { namespace 200 } // namespace sandbox
|
/external/selinux/policycoreutils/sandbox/ |
sandbox | 40 SANDBOXSH = "/usr/share/sandbox/sandboxX.sh" 117 dlg.set_title(_("Sandbox Message")) 195 class Sandbox: 306 sandbox [-h] [-l level ] [-[X|M] [-H homedir] [-T tempdir]] [-I includefile ] [-W windowmanager ] [ -w windowsize ] [[-i file ] ...] [ -t type ] command 308 sandbox [-h] [-l level ] [-[X|M] [-H homedir] [-T tempdir]] [-I includefile ] [-W windowmanager ] [ -w windowsize ] [[-i file ] ...] [ -t type ] -S 317 help=_("include file in sandbox")) 320 help=_("read list of files to include in sandbox from INCLUDEFILE")) 322 help=_("run sandbox with SELinux type")) 332 default=False, help=_("run complete desktop session within sandbox")) 339 default=False, help=_("run X application within a sandbox")) [all...] |
/external/llvm/test/CodeGen/ARM/ |
debug-info-blocks.ll | 116 !2 = !DIFile(filename: "header.h", directory: "/Volumes/Sandbox/llvm") 120 !6 = !DIFile(filename: "header2.h", directory: "/Volumes/Sandbox/llvm") 124 !10 = !DIFile(filename: "header3.h", directory: "/Volumes/Sandbox/llvm") 129 !15 = !DIFile(filename: "Private.h", directory: "/Volumes/Sandbox/llvm") 134 !20 = !DIFile(filename: "header4.h", directory: "/Volumes/Sandbox/llvm") 138 !24 = !DIFile(filename: "MyLibrary.m", directory: "/Volumes/Sandbox/llvm") 154 !40 = !DIFile(filename: "MyLibrary.i", directory: "/Volumes/Sandbox/llvm") 175 !61 = !DIFile(filename: "header11.h", directory: "/Volumes/Sandbox/llvm") 179 !65 = !DIFile(filename: "NSO.h", directory: "/Volumes/Sandbox/llvm") 191 !77 = !DIFile(filename: "header12.h", directory: "/Volumes/Sandbox/llvm" [all...] |
/external/libchrome/sandbox/linux/syscall_broker/ |
broker_file_permission.h | 11 #include "sandbox/sandbox_export.h" 13 namespace sandbox { namespace 117 } // namespace sandbox
|
broker_policy.h | 15 #include "sandbox/linux/syscall_broker/broker_file_permission.h" 17 namespace sandbox { namespace 87 } // namespace sandbox
|
/external/libchrome/sandbox/linux/seccomp-bpf-helpers/ |
sigsys_handlers.cc | 7 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 17 #include "sandbox/linux/bpf_dsl/bpf_dsl.h" 18 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 19 #include "sandbox/linux/seccomp-bpf/syscall.h" 20 #include "sandbox/linux/services/syscall_wrappers.h" 21 #include "sandbox/linux/system_headers/linux_syscalls.h" 110 namespace sandbox { namespace 299 } // namespace sandbox.
|
/external/autotest/test_suites/ |
control.security | 18 robustness when dealing with poorly formed HTTP responses, renderer sandbox,
|
/external/compiler-rt/test/asan/TestCases/Linux/ |
read_binary_name_regtest.c | 2 // the binary name because of sandbox restrictions.
|
/external/libchrome/base/ |
rand_util_posix.cc | 21 // it if we are later put in a sandbox. This class wraps the file descriptor so
|