HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 26 - 50 of 523) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/selinux/policycoreutils/sandbox/
sandbox.8 1 .TH SANDBOX "8" "May 2010" "sandbox" "User Commands"
3 sandbox \- Run cmd under an SELinux sandbox
5 .B sandbox
9 .B sandbox
16 application within a tightly confined SELinux domain. The default sandbox domain only allows applications the ability to read and write stdin, stdout and any other file descriptors handed to it. It is not allowed to open any other files. The \-M option will mount an alternate homedir and tmpdir to be used by the sandbox.
19 .I policycoreutils-sandbox
21 .B sandbox \-
    [all...]
  /external/libchrome/sandbox/linux/seccomp-bpf-helpers/
syscall_parameters_restrictions_unittests.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
21 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
22 #include "sandbox/linux/bpf_dsl/policy.h"
23 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
24 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
25 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
26 #include "sandbox/linux/seccomp-bpf/syscall.h"
27 #include "sandbox/linux/services/syscall_wrappers.h"
28 #include "sandbox/linux/system_headers/linux_syscalls.h"
29 #include "sandbox/linux/system_headers/linux_time.h
36 namespace sandbox { namespace
    [all...]
baseline_policy.h 9 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h"
10 #include "sandbox/linux/bpf_dsl/policy.h"
11 #include "sandbox/sandbox_export.h"
13 namespace sandbox { namespace
15 // This is a helper to build seccomp-bpf policies, i.e. policies for a sandbox
47 } // namespace sandbox.
baseline_policy_unittest.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
30 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
31 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
32 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
33 #include "sandbox/linux/seccomp-bpf/syscall.h"
34 #include "sandbox/linux/services/syscall_wrappers.h"
35 #include "sandbox/linux/services/thread_helpers.h"
36 #include "sandbox/linux/system_headers/linux_futex.h"
37 #include "sandbox/linux/system_headers/linux_syscalls.h"
38 #include "sandbox/linux/tests/test_utils.h
45 namespace sandbox { namespace
    [all...]
  /external/libchrome/sandbox/linux/services/
resource_limits_unittests.cc 5 #include "sandbox/linux/services/resource_limits.h"
13 #include "sandbox/linux/tests/test_utils.h"
14 #include "sandbox/linux/tests/unit_tests.h"
17 namespace sandbox { namespace
43 } // namespace sandbox
init_process_reaper.h 9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
23 } // namespace sandbox.
resource_limits.cc 5 #include "sandbox/linux/services/resource_limits.h"
12 namespace sandbox { namespace
26 } // namespace sandbox
namespace_utils_unittest.cc 5 #include "sandbox/linux/services/namespace_utils.h"
15 #include "sandbox/linux/services/credentials.h"
16 #include "sandbox/linux/tests/unit_tests.h"
19 namespace sandbox { namespace
72 } // namespace sandbox.
  /external/libchrome/sandbox/linux/bpf_dsl/
errorcode.h 9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
35 } // namespace sandbox
verifier.h 13 #include "sandbox/sandbox_export.h"
17 namespace sandbox { namespace
32 // is used for purposes other than verifying the output of the sandbox's
43 } // namespace sandbox
  /external/libchrome/sandbox/linux/seccomp-bpf/
bpf_tests_unittest.cc 5 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
17 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
18 #include "sandbox/linux/bpf_dsl/policy.h"
19 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
20 #include "sandbox/linux/services/syscall_wrappers.h"
21 #include "sandbox/linux/system_headers/linux_syscalls.h"
22 #include "sandbox/linux/tests/unit_tests.h"
25 using sandbox::bpf_dsl::Allow;
26 using sandbox::bpf_dsl::Error;
27 using sandbox::bpf_dsl::ResultExpr
29 namespace sandbox { namespace
    [all...]
sandbox_bpf.h 13 #include "sandbox/linux/bpf_dsl/codegen.h"
14 #include "sandbox/sandbox_export.h"
16 namespace sandbox { namespace
33 // Ownership of |policy| is transfered here to the sandbox object.
36 // NOTE: Setting a policy and starting the sandbox is a one-way operation.
37 // The kernel does not provide any option for unloading a loaded sandbox. The
38 // sandbox remains engaged even when the object is destructed.
46 // the sandbox, and enters Seccomp mode.
47 // The calling process must provide a |level| to tell the sandbox which type
49 // SINGLE_THREADED will only sandbox the calling thread. Since it would be
    [all...]
sandbox_bpf.cc 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
19 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
20 #include "sandbox/linux/bpf_dsl/codegen.h"
21 #include "sandbox/linux/bpf_dsl/policy.h"
22 #include "sandbox/linux/bpf_dsl/policy_compiler.h"
23 #include "sandbox/linux/bpf_dsl/seccomp_macros.h"
24 #include "sandbox/linux/bpf_dsl/syscall_set.h"
25 #include "sandbox/linux/seccomp-bpf/die.h"
26 #include "sandbox/linux/seccomp-bpf/syscall.h"
27 #include "sandbox/linux/seccomp-bpf/trap.h
36 namespace sandbox { namespace
    [all...]
die.h 9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
15 #define SANDBOX_DIE(m) sandbox::Die::SandboxDie(m, __FILE__, __LINE__)
19 #define RAW_SANDBOX_DIE(m) sandbox::Die::RawSandboxDie(m)
22 #define SANDBOX_INFO(m) sandbox::Die::SandboxInfo(m, __FILE__, __LINE__)
26 // Terminate the program, even if the current sandbox policy prevents some
66 } // namespace sandbox
trap.h 14 #include "sandbox/linux/bpf_dsl/trap_registry.h"
15 #include "sandbox/linux/system_headers/linux_signal.h"
16 #include "sandbox/sandbox_export.h"
18 namespace sandbox { namespace
26 // time. For the purposes of our sandbox, this assertion should always be
27 // true. Threads are incompatible with the seccomp sandbox anyway.
84 } // namespace sandbox
  /external/libchrome/sandbox/linux/syscall_broker/
broker_channel.cc 5 #include "sandbox/linux/syscall_broker/broker_channel.h"
12 namespace sandbox { namespace
35 } // namespace sandbox
broker_host.h 9 #include "sandbox/linux/syscall_broker/broker_channel.h"
11 namespace sandbox { namespace
39 } // namespace sandbox
broker_channel.h 11 namespace sandbox { namespace
29 } // namespace sandbox
  /external/libchrome/sandbox/win/src/
interceptors.h 9 #include "sandbox/win/src/interceptors_64.h"
12 namespace sandbox { namespace
53 } // namespace sandbox
sandbox_factory.h 9 #include "sandbox/win/src/sandbox.h"
29 // The Sandbox library needs to be linked against the main executable, but
33 // the Sandbox API calls are made.
34 namespace sandbox { namespace
49 } // namespace sandbox
ipc_tags.h 8 namespace sandbox { namespace
38 } // namespace sandbox
policy_params.h 8 #include "sandbox/win/src/policy_engine_params.h"
10 namespace sandbox { namespace
19 typedef sandbox::ParameterSet type##Array [type::PolParamLast];
65 } // namespace sandbox
  /external/autotest/client/site_tests/security_SandboxStatus/
control 16 Checks the status of the sandbox by looking at chrome://sandbox and
  /external/libchrome/sandbox/
sandbox.gyp 26 # A 'default' to accomodate the "sandbox" target.
29 'target_name': 'sandbox',
  /external/compiler-rt/test/asan/TestCases/Darwin/
sandbox-symbolizer.cc 1 // In a non-forking sandbox, we can't spawn an external symbolizer, but dladdr()
7 // RUN: not %run sandbox-exec -p '(version 1)(allow default)(deny process-fork)' %t 2>&1 | FileCheck %s
8 // RUN: not %run sandbox-exec -p '(version 1)(allow default)(deny mach-priv-task-port)' %t 2>&1 | FileCheck %s
9 // RUN: env ASAN_SYMBOLIZER_PATH="" not %run sandbox-exec -p '(version 1)(allow default)(deny mach-priv-task-port)' %t 2>&1 | FileCheck %s
11 // RUN: not %run sandbox-exec -p '(version 1)(allow default)(deny process-fork)' %t 2>&1 | FileCheck %s
12 // RUN: not %run sandbox-exec -p '(version 1)(allow default)(deny mach-priv-task-port)' %t 2>&1 | FileCheck %s
13 // RUN: env ASAN_SYMBOLIZER_PATH="" not %run sandbox-exec -p '(version 1)(allow default)(deny mach-priv-task-port)' %t 2>&1 | FileCheck %s

Completed in 119 milliseconds

12 3 4 5 6 7 8 91011>>