HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 151 - 175 of 523) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/libchrome/sandbox/linux/syscall_broker/
broker_file_permission.cc 5 #include "sandbox/linux/syscall_broker/broker_file_permission.h"
14 #include "sandbox/linux/syscall_broker/broker_common.h"
16 namespace sandbox { namespace
244 } // namespace sandbox
broker_file_permission_unittest.cc 5 #include "sandbox/linux/syscall_broker/broker_file_permission.h"
15 #include "sandbox/linux/tests/test_utils.h"
16 #include "sandbox/linux/tests/unit_tests.h"
19 namespace sandbox { namespace
262 } // namespace sandbox
  /external/libchrome/sandbox/linux/system_headers/
arm_linux_ucontext.h 48 // We also need greg_t for the sandbox, include it in this header as well.
mips_linux_ucontext.h 16 // We also need greg_t for the sandbox, include it in this header as well.
linux_signal.h 83 #include "sandbox/linux/system_headers/linux_ucontext.h"
113 #include "sandbox/linux/system_headers/linux_ucontext.h"
  /external/libchrome/sandbox/mac/
xpc_stubs_header.fragment 12 #include "sandbox/sandbox_export.h"
  /external/llvm/lib/Target/Mips/MCTargetDesc/
MipsMCNaCl.h 17 // Log2 of the NaCl MIPS sandbox's instruction bundle size.
  /external/selinux/policycoreutils/sandbox/
seunshare.8 34 runcon(1), sandbox(8), selinux(8)
  /system/sepolicy/
installd.te 66 # Run dex2oat in its own sandbox.
69 # Run profman in its own sandbox.
72 # Run idmap in its own sandbox.
75 # Run otapreopt in its own sandbox.
autoplay_app.te 7 ### The autoplay_app domain is a reduced permissions sandbox allowing
40 # App sandbox file accesses.
  /system/update_engine/common/
platform_constants_chromeos.cc 25 "https://omaha.sandbox.google.com/service/update2";
  /external/libchrome/sandbox/win/src/
sandbox_policy.h 14 #include "sandbox/win/src/sandbox_types.h"
15 #include "sandbox/win/src/security_level.h"
17 namespace sandbox { namespace
91 // Important: most of the sandbox-provided security relies on this single
159 // Sets the integrity level of the process in the sandbox. Both the initial
161 // is set to a level higher than the current level, the sandbox will fail
168 // Sets the integrity level of the process in the sandbox. The integrity level
171 // process in the sandbox. If the integrity level is set to a level higher
172 // than the current level, the sandbox will fail to start.
256 } // namespace sandbox
    [all...]
  /docs/source.android.com/src/security/overview/
kernel-security.jd 30 native code is constrained by the Application Sandbox. Whether that code is
59 <h3 id="the-application-sandbox">The Application Sandbox</h3>
66 <p>This sets up a kernel-level Application Sandbox. The kernel enforces security
74 sandbox is simple, auditable, and based on decades-old UNIX-style user
76 <p>Since the Application Sandbox is in the kernel, this security model extends to
80 Sandbox. On some platforms, developers are constrained to a specific
91 <p>Like all security features, the Application Sandbox is not unbreakable.
92 However, to break out of the Application Sandbox in a properly configured
  /external/libchrome/sandbox/linux/suid/
sandbox.c 7 #include "sandbox/linux/suid/common/sandbox.h"
33 #include "sandbox/linux/suid/common/suid_unsafe_environment_variables.h"
34 #include "sandbox/linux/suid/process_util.h"
62 const char msg[] = "\nThe setuid sandbox got signaled, exiting.\n";
401 "The setuid sandbox provides API version %d, "
411 // use an old sandbox.
458 // Protect the core setuid sandbox functionality with an API version
465 "The setuid sandbox is not running as root. Common causes:\n"
  /docs/source.android.com/src/security/enhancements/
enhancements43.jd 11 <li><strong>Android sandbox reinforced with SELinux.</strong>
12 This release strengthens the Android sandbox using the SELinux
enhancements44.jd 11 <li><strong>Android sandbox reinforced with SELinux.</strong>
  /external/chromium-trace/catapult/telemetry/telemetry/internal/platform/profiler/
win_pgo_profiler.py 82 # The sandbox need to be disabled if we want to be able to gather the
84 options.AppendExtraBrowserArgs('--no-sandbox')
v8_profiler.py 30 options.AppendExtraBrowserArgs([cls._V8_ARG % dump_file, '--no-sandbox'])
  /external/libchrome/sandbox/win/src/sidestep/
ia32_modrm_map.cpp 9 #include "sandbox/win/src/sidestep/mini_disassembler.h"
10 #include "sandbox/win/src/sidestep/mini_disassembler_types.h"
  /external/llvm/test/DebugInfo/X86/
dbg-declare.ll 37 !6 = !DIFile(filename: "20020104-2.c", directory: "/Volumes/Sandbox/llvm")
55 !26 = !DIFile(filename: "20020104-2.c", directory: "/Volumes/Sandbox/llvm")
empty-array.ll 34 !6 = !DIFile(filename: "t.cpp", directory: "/Volumes/Sandbox/llvm")
46 !20 = !DIFile(filename: "t.cpp", directory: "/Volumes/Sandbox/llvm")
nondefault-subrange-array.ll 37 !6 = !DIFile(filename: "t.cpp", directory: "/Volumes/Sandbox/llvm")
49 !20 = !DIFile(filename: "t.cpp", directory: "/Volumes/Sandbox/llvm")
  /external/minijail/
minijail0.5 3 minijail0 \- sandbox a process
6 Runs PROGRAM inside a sandbox. See minijail(1) for details.
  /external/tlsdate/src/
seccomp.c 25 /* Linux seccomp_filter sandbox */
69 /* Returns 0 if the the sandbox is enabled using
  /external/google-breakpad/src/client/linux/dump_writer_common/
seccomp_unwinder.h 41 // redirected by the seccomp sandbox. If so, try to pop the stack frames

Completed in 1108 milliseconds

1 2 3 4 5 67 8 91011>>