HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 51 - 75 of 523) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/libchrome/sandbox/linux/services/
syscall_wrappers_unittest.cc 5 #include "sandbox/linux/services/syscall_wrappers.h"
17 #include "sandbox/linux/system_headers/linux_signal.h"
18 #include "sandbox/linux/tests/test_utils.h"
19 #include "sandbox/linux/tests/unit_tests.h"
23 namespace sandbox { namespace
100 } // namespace sandbox
namespace_utils.h 13 #include "sandbox/sandbox_export.h"
15 namespace sandbox { namespace
34 // not work from within a sandbox.
52 } // namespace sandbox
namespace_sandbox_unittest.cc 5 #include "sandbox/linux/services/namespace_sandbox.h"
23 #include "sandbox/linux/services/credentials.h"
24 #include "sandbox/linux/services/namespace_utils.h"
25 #include "sandbox/linux/services/proc_util.h"
26 #include "sandbox/linux/tests/unit_tests.h"
30 namespace sandbox { namespace
115 CHECK(sandbox::Credentials::MoveToNewUserNS());
116 CHECK(sandbox::Credentials::DropFileSystemAccess(ProcUtil::OpenProc().get()));
157 CHECK(sandbox::Credentials::MoveToNewUserNS());
179 CHECK(sandbox::Credentials::MoveToNewUserNS())
    [all...]
proc_util.h 10 #include "sandbox/sandbox_export.h"
12 namespace sandbox { namespace
40 } // namespace sandbox
thread_helpers.h 9 #include "sandbox/sandbox_export.h"
13 namespace sandbox { namespace
45 } // namespace sandbox
proc_util_unittest.cc 5 #include "sandbox/linux/services/proc_util.h"
14 namespace sandbox { namespace
62 } // namespace sandbox
scoped_process.h 11 #include "sandbox/sandbox_export.h"
13 namespace sandbox { namespace
53 } // namespace sandbox
yama.h 9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
55 } // namespace sandbox
  /prebuilts/go/darwin-x86/test/fixedbugs/
bug366.go 28 // integer divide by zero in golang.org sandbox
33 // integer divide by zero in golang.org sandbox
  /prebuilts/go/linux-x86/test/fixedbugs/
bug366.go 28 // integer divide by zero in golang.org sandbox
33 // integer divide by zero in golang.org sandbox
  /external/autotest/client/site_tests/security_SandboxStatus/
security_SandboxStatus.py 13 """Verify sandbox status."""
36 '''Checks that chrome://sandbox shows "You are adequately sandboxed."'''
37 url = 'chrome://sandbox'
57 '''Open various sandbox-related pages and test that we are sandboxed.'''
  /external/autotest/site_utils/admin/apache/
site-misc-directives 9 RewriteRule /results/([0-9].*) https://sandbox.google.com/storage/chromeos-autotest-results/$1 [R=301,L]
  /external/libchrome/sandbox/linux/bpf_dsl/
bpf_dsl_impl.h 10 #include "sandbox/linux/bpf_dsl/codegen.h"
11 #include "sandbox/sandbox_export.h"
13 namespace sandbox { namespace
67 } // namespace sandbox
syscall_set_unittest.cc 5 #include "sandbox/linux/bpf_dsl/syscall_set.h"
11 #include "sandbox/linux/bpf_dsl/linux_syscall_ranges.h"
12 #include "sandbox/linux/tests/unit_tests.h"
14 namespace sandbox { namespace
126 } // namespace sandbox
  /external/libchrome/sandbox/linux/seccomp-bpf-helpers/
syscall_parameters_restrictions.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
26 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
27 #include "sandbox/linux/bpf_dsl/seccomp_macros.h"
28 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
29 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
30 #include "sandbox/linux/system_headers/linux_futex.h"
31 #include "sandbox/linux/system_headers/linux_syscalls.h"
32 #include "sandbox/linux/system_headers/linux_time.h"
102 using sandbox::bpf_dsl::Allow;
103 using sandbox::bpf_dsl::Arg
109 namespace sandbox { namespace
    [all...]
baseline_policy.cc 5 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
16 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
17 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
18 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
19 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
20 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
21 #include "sandbox/linux/services/syscall_wrappers.h"
22 #include "sandbox/linux/system_headers/linux_syscalls.h"
31 using sandbox::bpf_dsl::Allow;
32 using sandbox::bpf_dsl::Arg
37 namespace sandbox { namespace
    [all...]
  /external/libchrome/sandbox/win/src/
interception_internal.h 7 // http://dev.chromium.org/developers/design-documents/sandbox .
14 #include "sandbox/win/src/sandbox_types.h"
16 namespace sandbox { namespace
76 } // namespace sandbox
  /external/selinux/policycoreutils/
Makefile 1 SUBDIRS = sepolicy setfiles semanage load_policy newrole run_init sandbox secon audit2allow sestatus semodule_package semodule semodule_link semodule_expand semodule_deps sepolgen-ifgen setsebool scripts po man gui hll
  /system/sepolicy/
otapreopt_chroot.te 10 # Allow to transition to postinstall_ota, to run otapreopt in its own sandbox.
  /external/libchrome/sandbox/linux/seccomp-bpf/
bpf_tests.h 11 #include "sandbox/linux/seccomp-bpf/bpf_tester_compatibility_delegate.h"
12 #include "sandbox/linux/tests/unit_tests.h"
14 namespace sandbox { namespace
35 sandbox::SandboxBPFTestRunner bpf_test_runner( \
36 new sandbox::BPFTesterSimpleDelegate<bpf_policy_class_name>( \
38 sandbox::UnitTests::RunTestInProcess(&bpf_test_runner, death); \
54 sandbox::SandboxBPFTestRunner bpf_test_runner( \
56 sandbox::UnitTests::RunTestInProcess(&bpf_test_runner, death); \
89 sandbox::SandboxBPFTestRunner bpf_test_runner( \
90 new sandbox::BPFTesterCompatibilityDelegate<policy, aux>(
    [all...]
die.cc 5 #include "sandbox/linux/seccomp-bpf/die.h"
18 #include "sandbox/linux/seccomp-bpf/syscall.h"
19 #include "sandbox/linux/services/syscall_wrappers.h"
20 #include "sandbox/linux/system_headers/linux_signal.h"
22 namespace sandbox { namespace
93 } // namespace sandbox
bpf_tester_compatibility_delegate.h 10 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_test_runner.h"
12 namespace sandbox { namespace
53 } // namespace sandbox
  /external/libchrome/sandbox/linux/suid/common/
sandbox.h 9 namespace sandbox { namespace
13 // (e.g. Chrome) to construct a command line for the sandbox.
38 } // namespace sandbox
  /external/libchrome/sandbox/linux/syscall_broker/
broker_client.cc 5 #include "sandbox/linux/syscall_broker/broker_client.h"
20 #include "sandbox/linux/syscall_broker/broker_channel.h"
21 #include "sandbox/linux/syscall_broker/broker_common.h"
22 #include "sandbox/linux/syscall_broker/broker_policy.h"
28 namespace sandbox { namespace
146 } // namespace sandbox
broker_process.cc 5 #include "sandbox/linux/syscall_broker/broker_process.h"
26 #include "sandbox/linux/syscall_broker/broker_channel.h"
27 #include "sandbox/linux/syscall_broker/broker_client.h"
28 #include "sandbox/linux/syscall_broker/broker_host.h"
30 namespace sandbox { namespace
121 } // namespace sandbox.

Completed in 338 milliseconds

1 23 4 5 6 7 8 91011>>