/external/libchrome/sandbox/linux/syscall_broker/ |
broker_file_permission.cc | 5 #include "sandbox/linux/syscall_broker/broker_file_permission.h" 14 #include "sandbox/linux/syscall_broker/broker_common.h" 16 namespace sandbox { namespace 244 } // namespace sandbox
|
broker_file_permission_unittest.cc | 5 #include "sandbox/linux/syscall_broker/broker_file_permission.h" 15 #include "sandbox/linux/tests/test_utils.h" 16 #include "sandbox/linux/tests/unit_tests.h" 19 namespace sandbox { namespace 262 } // namespace sandbox
|
/external/libchrome/sandbox/linux/system_headers/ |
arm_linux_ucontext.h | 48 // We also need greg_t for the sandbox, include it in this header as well.
|
mips_linux_ucontext.h | 16 // We also need greg_t for the sandbox, include it in this header as well.
|
linux_signal.h | 83 #include "sandbox/linux/system_headers/linux_ucontext.h" 113 #include "sandbox/linux/system_headers/linux_ucontext.h"
|
/external/libchrome/sandbox/mac/ |
xpc_stubs_header.fragment | 12 #include "sandbox/sandbox_export.h"
|
/external/llvm/lib/Target/Mips/MCTargetDesc/ |
MipsMCNaCl.h | 17 // Log2 of the NaCl MIPS sandbox's instruction bundle size.
|
/external/selinux/policycoreutils/sandbox/ |
seunshare.8 | 34 runcon(1), sandbox(8), selinux(8)
|
/system/sepolicy/ |
installd.te | 66 # Run dex2oat in its own sandbox. 69 # Run profman in its own sandbox. 72 # Run idmap in its own sandbox. 75 # Run otapreopt in its own sandbox.
|
autoplay_app.te | 7 ### The autoplay_app domain is a reduced permissions sandbox allowing 40 # App sandbox file accesses.
|
/system/update_engine/common/ |
platform_constants_chromeos.cc | 25 "https://omaha.sandbox.google.com/service/update2";
|
/external/libchrome/sandbox/win/src/ |
sandbox_policy.h | 14 #include "sandbox/win/src/sandbox_types.h" 15 #include "sandbox/win/src/security_level.h" 17 namespace sandbox { namespace 91 // Important: most of the sandbox-provided security relies on this single 159 // Sets the integrity level of the process in the sandbox. Both the initial 161 // is set to a level higher than the current level, the sandbox will fail 168 // Sets the integrity level of the process in the sandbox. The integrity level 171 // process in the sandbox. If the integrity level is set to a level higher 172 // than the current level, the sandbox will fail to start. 256 } // namespace sandbox [all...] |
/docs/source.android.com/src/security/overview/ |
kernel-security.jd | 30 native code is constrained by the Application Sandbox. Whether that code is 59 <h3 id="the-application-sandbox">The Application Sandbox</h3> 66 <p>This sets up a kernel-level Application Sandbox. The kernel enforces security 74 sandbox is simple, auditable, and based on decades-old UNIX-style user 76 <p>Since the Application Sandbox is in the kernel, this security model extends to 80 Sandbox. On some platforms, developers are constrained to a specific 91 <p>Like all security features, the Application Sandbox is not unbreakable. 92 However, to break out of the Application Sandbox in a properly configured
|
/external/libchrome/sandbox/linux/suid/ |
sandbox.c | 7 #include "sandbox/linux/suid/common/sandbox.h" 33 #include "sandbox/linux/suid/common/suid_unsafe_environment_variables.h" 34 #include "sandbox/linux/suid/process_util.h" 62 const char msg[] = "\nThe setuid sandbox got signaled, exiting.\n"; 401 "The setuid sandbox provides API version %d, " 411 // use an old sandbox. 458 // Protect the core setuid sandbox functionality with an API version 465 "The setuid sandbox is not running as root. Common causes:\n"
|
/docs/source.android.com/src/security/enhancements/ |
enhancements43.jd | 11 <li><strong>Android sandbox reinforced with SELinux.</strong> 12 This release strengthens the Android sandbox using the SELinux
|
enhancements44.jd | 11 <li><strong>Android sandbox reinforced with SELinux.</strong>
|
/external/chromium-trace/catapult/telemetry/telemetry/internal/platform/profiler/ |
win_pgo_profiler.py | 82 # The sandbox need to be disabled if we want to be able to gather the 84 options.AppendExtraBrowserArgs('--no-sandbox')
|
v8_profiler.py | 30 options.AppendExtraBrowserArgs([cls._V8_ARG % dump_file, '--no-sandbox'])
|
/external/libchrome/sandbox/win/src/sidestep/ |
ia32_modrm_map.cpp | 9 #include "sandbox/win/src/sidestep/mini_disassembler.h" 10 #include "sandbox/win/src/sidestep/mini_disassembler_types.h"
|
/external/llvm/test/DebugInfo/X86/ |
dbg-declare.ll | 37 !6 = !DIFile(filename: "20020104-2.c", directory: "/Volumes/Sandbox/llvm") 55 !26 = !DIFile(filename: "20020104-2.c", directory: "/Volumes/Sandbox/llvm")
|
empty-array.ll | 34 !6 = !DIFile(filename: "t.cpp", directory: "/Volumes/Sandbox/llvm") 46 !20 = !DIFile(filename: "t.cpp", directory: "/Volumes/Sandbox/llvm")
|
nondefault-subrange-array.ll | 37 !6 = !DIFile(filename: "t.cpp", directory: "/Volumes/Sandbox/llvm") 49 !20 = !DIFile(filename: "t.cpp", directory: "/Volumes/Sandbox/llvm")
|
/external/minijail/ |
minijail0.5 | 3 minijail0 \- sandbox a process 6 Runs PROGRAM inside a sandbox. See minijail(1) for details.
|
/external/tlsdate/src/ |
seccomp.c | 25 /* Linux seccomp_filter sandbox */ 69 /* Returns 0 if the the sandbox is enabled using
|
/external/google-breakpad/src/client/linux/dump_writer_common/ |
seccomp_unwinder.h | 41 // redirected by the seccomp sandbox. If so, try to pop the stack frames
|