/external/libchrome/sandbox/linux/seccomp-bpf/ |
DEPS | 2 "+sandbox/linux/bpf_dsl", 3 "+sandbox/linux/services", 4 "+sandbox/linux/system_headers",
|
trap_unittest.cc | 5 #include "sandbox/linux/seccomp-bpf/trap.h" 9 #include "sandbox/linux/tests/unit_tests.h" 12 namespace sandbox { namespace 28 } // namespace sandbox
|
/external/libchrome/sandbox/linux/integration_tests/ |
DEPS | 2 "+sandbox/linux/bpf_dsl", 3 "+sandbox/linux/seccomp-bpf", 4 "+sandbox/linux/services", 5 "+sandbox/linux/syscall_broker", 6 "+sandbox/linux/system_headers",
|
/external/libchrome/sandbox/linux/bpf_dsl/ |
DEPS | 2 "+sandbox/linux/system_headers",
|
policy.cc | 5 #include "sandbox/linux/bpf_dsl/policy.h" 9 #include "sandbox/linux/bpf_dsl/bpf_dsl.h" 11 namespace sandbox { namespace 19 } // namespace sandbox
|
policy.h | 9 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h" 10 #include "sandbox/sandbox_export.h" 12 namespace sandbox { namespace 15 // Interface to implement to define a BPF sandbox policy. 21 // User extension point for writing custom sandbox policies. 35 } // namespace sandbox
|
dump_bpf.h | 7 #include "sandbox/linux/bpf_dsl/codegen.h" 8 #include "sandbox/sandbox_export.h" 10 namespace sandbox { namespace 24 } // namespace sandbox
|
bpf_dsl_forward.h | 9 #include "sandbox/sandbox_export.h" 11 namespace sandbox { namespace 35 } // namespace sandbox 38 scoped_refptr<const sandbox::bpf_dsl::internal::BoolExprImpl>; 40 scoped_refptr<const sandbox::bpf_dsl::internal::ResultExprImpl>;
|
/external/libchrome/sandbox/linux/seccomp-bpf-helpers/ |
DEPS | 2 "+sandbox/linux/bpf_dsl", 3 "+sandbox/linux/seccomp-bpf", 4 "+sandbox/linux/services", 5 "+sandbox/linux/system_headers",
|
/external/libchrome/sandbox/linux/services/ |
DEPS | 2 "+sandbox/linux/system_headers",
|
resource_limits.h | 12 #include "sandbox/sandbox_export.h" 14 namespace sandbox { namespace 27 } // namespace sandbox
|
/external/libchrome/sandbox/linux/suid/client/ |
DEPS | 2 "+sandbox/linux/services",
|
/external/libchrome/sandbox/linux/syscall_broker/ |
DEPS | 2 "+sandbox/linux/system_headers",
|
/external/libchrome/sandbox/ |
BUILD.gn | 6 group("sandbox") { 9 "//sandbox/win:sandbox", 12 # TODO(GYP): Make sandbox compile w/ 10.6 SDK. 15 "//sandbox/mac:sandbox", 20 "//sandbox/linux:sandbox",
|
/external/selinux/policycoreutils/sandbox/ |
sandbox.conf | 2 NAME=sandbox
|
sandbox.5 | 1 .TH sandbox.conf "5" "June 2010" "sandbox.conf" "Linux System Administration" 3 sandbox.conf \- user config file for the SELinux sandbox 6 When running sandbox with the -C argument, it will be confined using control groups and a system administrator can specify how the sandbox is confined. 17 The name of the sandbox control group. Default is "sandbox". 21 Which cpus to assign sandbox to. The default is ALL, but users can specify a comma-separated list with dashes ("-") to represent ranges. Ex: 0-2,5 25 How much memory to allow sandbox to use. The default is 80%. Users can specify either a percentage or a value in the form of a nu (…) [all...] |
sandbox.init | 3 # Provides: sandbox 9 # sandbox: Set up / mountpoint to be shared, /var/tmp, /tmp, /home/sandbox unshared 13 # description: sandbox, xguest and other apps that want to use pam_namespace \ 17 # If you do not use sandbox, xguest or pam_namespace you can turn \ 24 LOCKFILE=/var/lock/subsys/sandbox 29 echo -n "Starting sandbox" 39 echo -n "Stopping sandbox"
|
test_sandbox.py | 24 '"Sandbox should have succeeded for this test %r' % err) 27 "Verify that we can read file descriptors handed to sandbox" 29 p2 = Popen(['sandbox', 'grep', 'root'], stdin=p1.stdout, stdout=PIPE) 34 "Verify that we cannot send kill signal in the sandbox" 36 p = Popen(['sandbox', 'kill', '-HUP', str(pid)], stdout=PIPE, stderr=PIPE) 41 "Verify that we can't ping within the sandbox" 42 p = Popen(['sandbox', 'ping', '-c 1 ', '127.0.0.1'], stdout=PIPE, stderr=PIPE) 47 "Verify that we can't mkdir within the sandbox" 48 p = Popen(['sandbox', 'mkdir', '~/test'], stdout=PIPE, stderr=PIPE) 53 "Verify that we can't list homedir within the sandbox" [all...] |
Makefile | 11 SHAREDIR ?= $(PREFIX)/share/sandbox 16 all: sandbox seunshare sandboxX.sh start 22 install -m 755 sandbox $(BINDIR) 24 install -m 644 sandbox.8 $(MANDIR)/man8/ 27 install -m 644 sandbox.5 $(MANDIR)/man5/ 34 install -m 644 sandbox.conf $(SYSCONFDIR)/sandbox
|
/external/libchrome/sandbox/linux/system_headers/ |
linux_syscalls.h | 13 #include "sandbox/linux/system_headers/x86_64_linux_syscalls.h" 17 #include "sandbox/linux/system_headers/x86_32_linux_syscalls.h" 21 #include "sandbox/linux/system_headers/arm_linux_syscalls.h" 25 #include "sandbox/linux/system_headers/mips_linux_syscalls.h" 29 #include "sandbox/linux/system_headers/mips64_linux_syscalls.h" 33 #include "sandbox/linux/system_headers/arm64_linux_syscalls.h"
|
linux_ucontext.h | 11 #include "sandbox/linux/system_headers/arm_linux_ucontext.h" 13 #include "sandbox/linux/system_headers/i386_linux_ucontext.h" 15 #include "sandbox/linux/system_headers/x86_64_linux_ucontext.h" 17 #include "sandbox/linux/system_headers/mips_linux_ucontext.h" 19 #include "sandbox/linux/system_headers/arm64_linux_ucontext.h"
|
/external/autotest/client/site_tests/security_SandboxedServices/ |
exclude | 7 chrome-sandbox
|
/external/libchrome/sandbox/linux/ |
DEPS | 11 # sandbox/ explicitly. 12 "-sandbox/linux", 15 # Anything included from sandbox/linux must be declared after this line or in 22 "+sandbox/sandbox_export.h", 24 "+sandbox/linux/tests",
|
/external/libchrome/sandbox/win/src/ |
sandbox_nt_types.h | 8 #include "sandbox/win/src/nt_internals.h" 10 namespace sandbox { namespace 43 } // namespace sandbox
|
/external/autotest/client/site_tests/security_SuidBinaries/ |
baseline.suid | 1 /opt/google/chrome/chrome-sandbox
|