HomeSort by relevance Sort by last modified time
    Searched full:sandbox (Results 1 - 25 of 523) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/libchrome/sandbox/linux/seccomp-bpf/
DEPS 2 "+sandbox/linux/bpf_dsl",
3 "+sandbox/linux/services",
4 "+sandbox/linux/system_headers",
trap_unittest.cc 5 #include "sandbox/linux/seccomp-bpf/trap.h"
9 #include "sandbox/linux/tests/unit_tests.h"
12 namespace sandbox { namespace
28 } // namespace sandbox
  /external/libchrome/sandbox/linux/integration_tests/
DEPS 2 "+sandbox/linux/bpf_dsl",
3 "+sandbox/linux/seccomp-bpf",
4 "+sandbox/linux/services",
5 "+sandbox/linux/syscall_broker",
6 "+sandbox/linux/system_headers",
  /external/libchrome/sandbox/linux/bpf_dsl/
DEPS 2 "+sandbox/linux/system_headers",
policy.cc 5 #include "sandbox/linux/bpf_dsl/policy.h"
9 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
11 namespace sandbox { namespace
19 } // namespace sandbox
policy.h 9 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h"
10 #include "sandbox/sandbox_export.h"
12 namespace sandbox { namespace
15 // Interface to implement to define a BPF sandbox policy.
21 // User extension point for writing custom sandbox policies.
35 } // namespace sandbox
dump_bpf.h 7 #include "sandbox/linux/bpf_dsl/codegen.h"
8 #include "sandbox/sandbox_export.h"
10 namespace sandbox { namespace
24 } // namespace sandbox
bpf_dsl_forward.h 9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
35 } // namespace sandbox
38 scoped_refptr<const sandbox::bpf_dsl::internal::BoolExprImpl>;
40 scoped_refptr<const sandbox::bpf_dsl::internal::ResultExprImpl>;
  /external/libchrome/sandbox/linux/seccomp-bpf-helpers/
DEPS 2 "+sandbox/linux/bpf_dsl",
3 "+sandbox/linux/seccomp-bpf",
4 "+sandbox/linux/services",
5 "+sandbox/linux/system_headers",
  /external/libchrome/sandbox/linux/services/
DEPS 2 "+sandbox/linux/system_headers",
resource_limits.h 12 #include "sandbox/sandbox_export.h"
14 namespace sandbox { namespace
27 } // namespace sandbox
  /external/libchrome/sandbox/linux/suid/client/
DEPS 2 "+sandbox/linux/services",
  /external/libchrome/sandbox/linux/syscall_broker/
DEPS 2 "+sandbox/linux/system_headers",
  /external/libchrome/sandbox/
BUILD.gn 6 group("sandbox") {
9 "//sandbox/win:sandbox",
12 # TODO(GYP): Make sandbox compile w/ 10.6 SDK.
15 "//sandbox/mac:sandbox",
20 "//sandbox/linux:sandbox",
  /external/selinux/policycoreutils/sandbox/
sandbox.conf 2 NAME=sandbox
sandbox.5 1 .TH sandbox.conf "5" "June 2010" "sandbox.conf" "Linux System Administration"
3 sandbox.conf \- user config file for the SELinux sandbox
6 When running sandbox with the -C argument, it will be confined using control groups and a system administrator can specify how the sandbox is confined.
17 The name of the sandbox control group. Default is "sandbox".
21 Which cpus to assign sandbox to. The default is ALL, but users can specify a comma-separated list with dashes ("-") to represent ranges. Ex: 0-2,5
25 How much memory to allow sandbox to use. The default is 80%. Users can specify either a percentage or a value in the form of a nu (…)
    [all...]
sandbox.init 3 # Provides: sandbox
9 # sandbox: Set up / mountpoint to be shared, /var/tmp, /tmp, /home/sandbox unshared
13 # description: sandbox, xguest and other apps that want to use pam_namespace \
17 # If you do not use sandbox, xguest or pam_namespace you can turn \
24 LOCKFILE=/var/lock/subsys/sandbox
29 echo -n "Starting sandbox"
39 echo -n "Stopping sandbox"
test_sandbox.py 24 '"Sandbox should have succeeded for this test %r' % err)
27 "Verify that we can read file descriptors handed to sandbox"
29 p2 = Popen(['sandbox', 'grep', 'root'], stdin=p1.stdout, stdout=PIPE)
34 "Verify that we cannot send kill signal in the sandbox"
36 p = Popen(['sandbox', 'kill', '-HUP', str(pid)], stdout=PIPE, stderr=PIPE)
41 "Verify that we can't ping within the sandbox"
42 p = Popen(['sandbox', 'ping', '-c 1 ', '127.0.0.1'], stdout=PIPE, stderr=PIPE)
47 "Verify that we can't mkdir within the sandbox"
48 p = Popen(['sandbox', 'mkdir', '~/test'], stdout=PIPE, stderr=PIPE)
53 "Verify that we can't list homedir within the sandbox"
    [all...]
Makefile 11 SHAREDIR ?= $(PREFIX)/share/sandbox
16 all: sandbox seunshare sandboxX.sh start
22 install -m 755 sandbox $(BINDIR)
24 install -m 644 sandbox.8 $(MANDIR)/man8/
27 install -m 644 sandbox.5 $(MANDIR)/man5/
34 install -m 644 sandbox.conf $(SYSCONFDIR)/sandbox
  /external/libchrome/sandbox/linux/system_headers/
linux_syscalls.h 13 #include "sandbox/linux/system_headers/x86_64_linux_syscalls.h"
17 #include "sandbox/linux/system_headers/x86_32_linux_syscalls.h"
21 #include "sandbox/linux/system_headers/arm_linux_syscalls.h"
25 #include "sandbox/linux/system_headers/mips_linux_syscalls.h"
29 #include "sandbox/linux/system_headers/mips64_linux_syscalls.h"
33 #include "sandbox/linux/system_headers/arm64_linux_syscalls.h"
linux_ucontext.h 11 #include "sandbox/linux/system_headers/arm_linux_ucontext.h"
13 #include "sandbox/linux/system_headers/i386_linux_ucontext.h"
15 #include "sandbox/linux/system_headers/x86_64_linux_ucontext.h"
17 #include "sandbox/linux/system_headers/mips_linux_ucontext.h"
19 #include "sandbox/linux/system_headers/arm64_linux_ucontext.h"
  /external/autotest/client/site_tests/security_SandboxedServices/
exclude 7 chrome-sandbox
  /external/libchrome/sandbox/linux/
DEPS 11 # sandbox/ explicitly.
12 "-sandbox/linux",
15 # Anything included from sandbox/linux must be declared after this line or in
22 "+sandbox/sandbox_export.h",
24 "+sandbox/linux/tests",
  /external/libchrome/sandbox/win/src/
sandbox_nt_types.h 8 #include "sandbox/win/src/nt_internals.h"
10 namespace sandbox { namespace
43 } // namespace sandbox
  /external/autotest/client/site_tests/security_SuidBinaries/
baseline.suid 1 /opt/google/chrome/chrome-sandbox

Completed in 268 milliseconds

1 2 3 4 5 6 7 8 91011>>