OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:sandbox
(Results
51 - 75
of
523
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/libchrome/sandbox/linux/services/
syscall_wrappers_unittest.cc
5
#include "
sandbox
/linux/services/syscall_wrappers.h"
17
#include "
sandbox
/linux/system_headers/linux_signal.h"
18
#include "
sandbox
/linux/tests/test_utils.h"
19
#include "
sandbox
/linux/tests/unit_tests.h"
23
namespace
sandbox
{
namespace
100
} // namespace
sandbox
namespace_utils.h
13
#include "
sandbox
/sandbox_export.h"
15
namespace
sandbox
{
namespace
34
// not work from within a
sandbox
.
52
} // namespace
sandbox
namespace_sandbox_unittest.cc
5
#include "
sandbox
/linux/services/namespace_sandbox.h"
23
#include "
sandbox
/linux/services/credentials.h"
24
#include "
sandbox
/linux/services/namespace_utils.h"
25
#include "
sandbox
/linux/services/proc_util.h"
26
#include "
sandbox
/linux/tests/unit_tests.h"
30
namespace
sandbox
{
namespace
115
CHECK(
sandbox
::Credentials::MoveToNewUserNS());
116
CHECK(
sandbox
::Credentials::DropFileSystemAccess(ProcUtil::OpenProc().get()));
157
CHECK(
sandbox
::Credentials::MoveToNewUserNS());
179
CHECK(
sandbox
::Credentials::MoveToNewUserNS())
[
all
...]
proc_util.h
10
#include "
sandbox
/sandbox_export.h"
12
namespace
sandbox
{
namespace
40
} // namespace
sandbox
thread_helpers.h
9
#include "
sandbox
/sandbox_export.h"
13
namespace
sandbox
{
namespace
45
} // namespace
sandbox
proc_util_unittest.cc
5
#include "
sandbox
/linux/services/proc_util.h"
14
namespace
sandbox
{
namespace
62
} // namespace
sandbox
scoped_process.h
11
#include "
sandbox
/sandbox_export.h"
13
namespace
sandbox
{
namespace
53
} // namespace
sandbox
yama.h
9
#include "
sandbox
/sandbox_export.h"
11
namespace
sandbox
{
namespace
55
} // namespace
sandbox
/prebuilts/go/darwin-x86/test/fixedbugs/
bug366.go
28
// integer divide by zero in golang.org
sandbox
33
// integer divide by zero in golang.org
sandbox
/prebuilts/go/linux-x86/test/fixedbugs/
bug366.go
28
// integer divide by zero in golang.org
sandbox
33
// integer divide by zero in golang.org
sandbox
/external/autotest/client/site_tests/security_SandboxStatus/
security_SandboxStatus.py
13
"""Verify
sandbox
status."""
36
'''Checks that chrome://
sandbox
shows "You are adequately sandboxed."'''
37
url = 'chrome://
sandbox
'
57
'''Open various
sandbox
-related pages and test that we are sandboxed.'''
/external/autotest/site_utils/admin/apache/
site-misc-directives
9
RewriteRule /results/([0-9].*) https://
sandbox
.google.com/storage/chromeos-autotest-results/$1 [R=301,L]
/external/libchrome/sandbox/linux/bpf_dsl/
bpf_dsl_impl.h
10
#include "
sandbox
/linux/bpf_dsl/codegen.h"
11
#include "
sandbox
/sandbox_export.h"
13
namespace
sandbox
{
namespace
67
} // namespace
sandbox
syscall_set_unittest.cc
5
#include "
sandbox
/linux/bpf_dsl/syscall_set.h"
11
#include "
sandbox
/linux/bpf_dsl/linux_syscall_ranges.h"
12
#include "
sandbox
/linux/tests/unit_tests.h"
14
namespace
sandbox
{
namespace
126
} // namespace
sandbox
/external/libchrome/sandbox/linux/seccomp-bpf-helpers/
syscall_parameters_restrictions.cc
5
#include "
sandbox
/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
26
#include "
sandbox
/linux/bpf_dsl/bpf_dsl.h"
27
#include "
sandbox
/linux/bpf_dsl/seccomp_macros.h"
28
#include "
sandbox
/linux/seccomp-bpf-helpers/sigsys_handlers.h"
29
#include "
sandbox
/linux/seccomp-bpf/sandbox_bpf.h"
30
#include "
sandbox
/linux/system_headers/linux_futex.h"
31
#include "
sandbox
/linux/system_headers/linux_syscalls.h"
32
#include "
sandbox
/linux/system_headers/linux_time.h"
102
using
sandbox
::bpf_dsl::Allow;
103
using
sandbox
::bpf_dsl::Arg
109
namespace
sandbox
{
namespace
[
all
...]
baseline_policy.cc
5
#include "
sandbox
/linux/seccomp-bpf-helpers/baseline_policy.h"
16
#include "
sandbox
/linux/bpf_dsl/bpf_dsl.h"
17
#include "
sandbox
/linux/seccomp-bpf-helpers/sigsys_handlers.h"
18
#include "
sandbox
/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
19
#include "
sandbox
/linux/seccomp-bpf-helpers/syscall_sets.h"
20
#include "
sandbox
/linux/seccomp-bpf/sandbox_bpf.h"
21
#include "
sandbox
/linux/services/syscall_wrappers.h"
22
#include "
sandbox
/linux/system_headers/linux_syscalls.h"
31
using
sandbox
::bpf_dsl::Allow;
32
using
sandbox
::bpf_dsl::Arg
37
namespace
sandbox
{
namespace
[
all
...]
/external/libchrome/sandbox/win/src/
interception_internal.h
7
// http://dev.chromium.org/developers/design-documents/
sandbox
.
14
#include "
sandbox
/win/src/sandbox_types.h"
16
namespace
sandbox
{
namespace
76
} // namespace
sandbox
/external/selinux/policycoreutils/
Makefile
1
SUBDIRS = sepolicy setfiles semanage load_policy newrole run_init
sandbox
secon audit2allow sestatus semodule_package semodule semodule_link semodule_expand semodule_deps sepolgen-ifgen setsebool scripts po man gui hll
/system/sepolicy/
otapreopt_chroot.te
10
# Allow to transition to postinstall_ota, to run otapreopt in its own
sandbox
.
/external/libchrome/sandbox/linux/seccomp-bpf/
bpf_tests.h
11
#include "
sandbox
/linux/seccomp-bpf/bpf_tester_compatibility_delegate.h"
12
#include "
sandbox
/linux/tests/unit_tests.h"
14
namespace
sandbox
{
namespace
35
sandbox
::SandboxBPFTestRunner bpf_test_runner( \
36
new
sandbox
::BPFTesterSimpleDelegate<bpf_policy_class_name>( \
38
sandbox
::UnitTests::RunTestInProcess(&bpf_test_runner, death); \
54
sandbox
::SandboxBPFTestRunner bpf_test_runner( \
56
sandbox
::UnitTests::RunTestInProcess(&bpf_test_runner, death); \
89
sandbox
::SandboxBPFTestRunner bpf_test_runner( \
90
new
sandbox
::BPFTesterCompatibilityDelegate<policy, aux>(
[
all
...]
die.cc
5
#include "
sandbox
/linux/seccomp-bpf/die.h"
18
#include "
sandbox
/linux/seccomp-bpf/syscall.h"
19
#include "
sandbox
/linux/services/syscall_wrappers.h"
20
#include "
sandbox
/linux/system_headers/linux_signal.h"
22
namespace
sandbox
{
namespace
93
} // namespace
sandbox
bpf_tester_compatibility_delegate.h
10
#include "
sandbox
/linux/seccomp-bpf/sandbox_bpf_test_runner.h"
12
namespace
sandbox
{
namespace
53
} // namespace
sandbox
/external/libchrome/sandbox/linux/suid/common/
sandbox.h
9
namespace
sandbox
{
namespace
13
// (e.g. Chrome) to construct a command line for the
sandbox
.
38
} // namespace
sandbox
/external/libchrome/sandbox/linux/syscall_broker/
broker_client.cc
5
#include "
sandbox
/linux/syscall_broker/broker_client.h"
20
#include "
sandbox
/linux/syscall_broker/broker_channel.h"
21
#include "
sandbox
/linux/syscall_broker/broker_common.h"
22
#include "
sandbox
/linux/syscall_broker/broker_policy.h"
28
namespace
sandbox
{
namespace
146
} // namespace
sandbox
broker_process.cc
5
#include "
sandbox
/linux/syscall_broker/broker_process.h"
26
#include "
sandbox
/linux/syscall_broker/broker_channel.h"
27
#include "
sandbox
/linux/syscall_broker/broker_client.h"
28
#include "
sandbox
/linux/syscall_broker/broker_host.h"
30
namespace
sandbox
{
namespace
121
} // namespace
sandbox
.
Completed in 338 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>