HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 226 - 250 of 523) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/boringssl/src/include/openssl/
rand.h 42 * if, due to a sandbox, /dev/urandom isn't available. If used, it must be
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/fps/
test.py 24 self.fps = FPSConnection(host='fps.sandbox.amazonaws.com')
  /external/compiler-rt/lib/sanitizer_common/
sanitizer_procmaps.h 41 // In some cases, e.g. when running under a sandbox on Linux, ASan is unable
  /external/libchrome/base/debug/
stack_trace.h 31 // In sandboxed processes, this has to be called before the sandbox is turned
  /external/libchrome/sandbox/linux/bpf_dsl/
codegen_unittest.cc 5 #include "sandbox/linux/bpf_dsl/codegen.h"
17 #include "sandbox/linux/system_headers/linux_filter.h"
20 namespace sandbox { namespace
404 } // namespace sandbox
  /external/libchrome/sandbox/linux/seccomp-bpf/
syscall.cc 5 #include "sandbox/linux/seccomp-bpf/syscall.h"
11 #include "sandbox/linux/bpf_dsl/seccomp_macros.h"
13 namespace sandbox { namespace
421 } // namespace sandbox
  /external/libchrome/sandbox/win/wow_helper/
wow_helper.vcproj 189 Name="sandbox"
wow_helper.pdb 16 ??BINDSTATUS_FINDINGRESOURCE???88?.1+??I??C~?B?@?\?'?* CIL **?'?Microsoft (R) LINKJh:\ch1\src\sandbox\wow_helper\x64\Release\service64_resolver.obj:D?'?'?Microsoft (R) Optimizing CompilerJ ??scoped_ptr<char>::~scoped_ptr<char> ?OthisZ?uog0sandbox::Service64ResolverThunk::IsFunctionAService@PeOthisXOlocal_thunk0?Ofunction_codeP#OreadV|
19 f sandbox::Service64ResolverThunk::GetThunkSizeeOthisVX@:d?sandbox::Service64ResolverThunk::ResolveTarget 0ZOthis8@Omodule@?Ofunction_nameH?OaddressZHc?sandbox::Service64ResolverThunk::ResolveInterceptorZOthis"@Ointerceptor_module?Ointerceptor_name COaddressN???b?sandbox::Service64ResolverThunk::SetupP`ZOthish@Otarget_module"p@Ointerceptor_modulex?Otarget_name??Ointerceptor_name&?@Ointerceptor_entry_point?Othunk_storage?#Ostorage_bytes?#Ostorage_used`?Othunk_buffer^h?`sandbox::Service64ResolverThunk::Setup'::`1'::dtor$0 N<G?sandbox::ResolverThunk::ResolveTarget8Othis@Omodule?Ofunction_name ?OaddressR$E?sandbox::ResolverThunk::ResolveInterceptor8Othis"@Ointerceptor_module?Ointerceptor_name COaddressB| ??Ksandbox::ResolverThunk::Init 08Othis8@Otarget_modu (…)
    [all...]
  /external/minijail/
elfparse.c 92 * static interpreters escaping the sandbox.
  /external/selinux/libsemanage/src/
semanage_store.h 39 /* sandbox filenames and paths */
  /external/selinux/policycoreutils/sepolicy/
Makefile 13 SHAREDIR ?= $(PREFIX)/share/sandbox
sepolicy.py 44 usage_dict = {' --newtype': ('-t [TYPES [TYPES ...]]',), ' --customize': ('-d DOMAIN', '-a ADMIN_DOMAIN', "[ -w WRITEPATHS ]",), ' --admin_user': ('[-r TRANSITION_ROLE ]', "[ -w WRITEPATHS ]",), ' --application': ('COMMAND', "[ -w WRITEPATHS ]",), ' --cgi': ('COMMAND', "[ -w WRITEPATHS ]",), ' --confined_admin': ('-a ADMIN_DOMAIN', "[ -w WRITEPATHS ]",), ' --dbus': ('COMMAND', "[ -w WRITEPATHS ]",), ' --desktop_user': ('', "[ -w WRITEPATHS ]",), ' --inetd': ('COMMAND', "[ -w WRITEPATHS ]",), ' --init': ('COMMAND', "[ -w WRITEPATHS ]",), ' --sandbox': ("[ -w WRITEPATHS ]",), ' --term_user': ("[ -w WRITEPATHS ]",), ' --x_user': ("[ -w WRITEPATHS ]",)}
507 from sepolicy.generate import policy, AUSER, RUSER, EUSER, USERS, SANDBOX, APPLICATIONS, NEWTYPE
593 from sepolicy.generate import DAEMON, get_poltype_desc, poltype, DAEMON, DBUS, INETD, CGI, SANDBOX, USER, EUSER, TUSER, XUSER, LUSER, AUSER, RUSER, NEWTYPE
658 group.add_argument("--sandbox", dest="policytype", const=SANDBOX,
660 help=_("Generate '%s' policy") % poltype[SANDBOX])
  /docs/source.android.com/src/security/
index.jd 66 restricted by the Application Sandbox.</p>
89 Application Sandbox. Applications get a dedicated part of the filesystem in
  /docs/source.android.com/src/security/selinux/
index.jd 30 sandboxes. Each application runs in its own sandbox. Prior to Android 4.3,
34 the Android application sandbox.</p>
  /external/chromium-trace/catapult/telemetry/telemetry/internal/platform/profiler/
perf_profiler.py 219 '--no-sandbox',
220 '--allow-sandbox-debugging',
strace_profiler.py 233 '--no-sandbox',
234 '--allow-sandbox-debugging'
  /external/libvpx/libvpx/third_party/libyuv/source/
cpu_id.cc 132 // This will occur for Chrome sandbox for Pepper or Render process.
161 // This will occur for Chrome sandbox for Pepper or Render process.
  /external/autotest/client/cros/
enterprise_policy_base.py 19 '--google-apis-url=https://www-googleapis-test.sandbox.google.com',
23 'https://cloudprint-nightly-ps.sandbox.google.com/cloudprint'),
27 'https://cloudprint-nightly-ps.sandbox.google.com/cloudprint'),
42 'cr-dev': 'https://cros-dev.sandbox.google.com/devicemanagement/data/api',
43 'cr-auto': 'https://cros-auto.sandbox.google.com/devicemanagement/data/api',
  /external/libchrome/sandbox/linux/seccomp-bpf-helpers/
syscall_sets.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
8 #include "sandbox/linux/system_headers/linux_syscalls.h"
10 namespace sandbox { namespace
819 // These give a lot of ambient authority and bypass the setuid sandbox.
1060 } // namespace sandbox.
  /external/apache-xml/src/main/java/org/apache/xml/serializer/
OutputPropertiesFactory.java 401 // Repeat IOException handling for sandbox/applet case -sc
456 // No-op for sandbox/applet case, leave null -sc
469 // No-op for sandbox/applet case, leave null -sc
  /external/autotest/client/cros/bluetooth/
bluetooth_semiauto_helper.py 222 sandbox = 'SANDBOX:<input type="text"/>'
223 html = '<h3>%s</h3>%s' % (message, sandbox)
  /external/google-breakpad/src/processor/
stackwalker_amd64.cc 278 // Apply constraints from Native Client's x86-64 sandbox. These
279 // registers have the 4GB-aligned sandbox base address (from r15)
  /external/llvm/docs/HistoricalNotes/
2000-11-18-EarlyDesignIdeasResp.txt 35 * To keep things "safe" ie to enforce a sandbox on Java/foreign code,
48 for value add. The nice safe "sandbox" VM can be provided as a layer
  /external/llvm/test/Object/
nm-trivial-object.test 156 macho-pa: 0000000000000000 - 00 0000 SO /Volumes/SandBox/
158 macho-pa: 0000000053c8408d - 03 0001 OSO /Volumes/SandBox/hello.o
  /docs/source.android.com/src/security/overview/
index.jd 76 <li>Mandatory application sandbox for all applications</li>

Completed in 489 milliseconds

1 2 3 4 5 6 7 8 91011>>