/external/libbrillo/brillo/minijail/ |
minijail.cc | 29 void Minijail::Destroy(struct minijail* jail) { 30 minijail_destroy(jail); 33 void Minijail::DropRoot(struct minijail* jail, uid_t uid, gid_t gid) { 34 minijail_change_uid(jail, uid); 35 minijail_change_gid(jail, gid); 38 bool Minijail::DropRoot(struct minijail* jail, 43 return !minijail_change_user(jail, user) && 44 !minijail_change_group(jail, group); 47 void Minijail::EnterNewPidNamespace(struct minijail* jail) { 48 minijail_namespace_pids(jail); [all...] |
minijail.h | 32 virtual void Destroy(struct minijail* jail); 35 virtual void DropRoot(struct minijail* jail, uid_t uid, gid_t gid); 38 virtual bool DropRoot(struct minijail* jail, 43 virtual void EnterNewPidNamespace(struct minijail* jail); 46 virtual void MountTmp(struct minijail* jail); 50 virtual void UseSeccompFilter(struct minijail* jail, const char* path); 53 virtual void UseCapabilities(struct minijail* jail, uint64_t capmask); 56 virtual void ResetSignalMask(struct minijail* jail); 59 virtual void Enter(struct minijail* jail); 62 virtual bool Run(struct minijail* jail, std::vector<char*> args, pid_t* pid) [all...] |
mock_minijail.h | 26 bool(struct minijail* jail, 29 MOCK_METHOD2(UseSeccompFilter, void(struct minijail* jail, const char* path)); 30 MOCK_METHOD2(UseCapabilities, void(struct minijail* jail, uint64_t capmask)); 31 MOCK_METHOD1(ResetSignalMask, void(struct minijail* jail)); 32 MOCK_METHOD1(Enter, void(struct minijail* jail)); 34 bool(struct minijail* jail, 38 bool(struct minijail* jail, 42 bool(struct minijail* jail, 46 bool(struct minijail* jail, 50 bool(struct minijail* jail, [all...] |
/frameworks/av/services/minijail/ |
minijail.cpp | 83 ScopedMinijail jail{minijail_new()}; 84 if (!jail) { 88 minijail_no_new_privs(jail.get()); 89 minijail_log_seccomp_filter_failures(jail.get()); 90 minijail_use_seccomp_filter(jail.get()); 92 minijail_parse_seccomp_filters_from_fd(jail.get(), policy_fd.release()); 93 minijail_enter(jail.get());
|
/external/autotest/client/site_tests/security_DeviceJail_AllowDeny/ |
security_DeviceJail_AllowDeny.py | 13 Ensures that if device jail is present, it is functioning properly 26 with device_jail_utils.JailDevice(dev_path) as jail: 28 f = jail.expect_open(device_jail_utils.REQUEST_ALLOW) 30 raise error.TestError('Failed to open allowed jail') 35 f = jail.expect_open(device_jail_utils.REQUEST_DENY) 37 raise error.TestError('Successfully opened denied jail')
|
/external/autotest/client/site_tests/security_Minijail_seccomp/ |
security_Minijail_seccomp.py | 13 Jail = namedtuple("Jail", "user policy nnp") 25 def run_test(self, exe, args, jail, expected_ret, pretty_msg): 28 if jail.user: 29 cmdline += ' -u %s' % jail.user 31 if jail.nnp: 34 cmdline += ' -S %s/%s %s/%s' % (self.bindir, jail.policy, 52 Jail(None, "policy", nnp=False), 55 Jail("chronos", "policy", nnp=False), 58 Jail("chronos", privdrop_policy, nnp=False) [all...] |
/system/tpm/attestation/server/ |
main.cc | 51 struct minijail* jail = minijail->New(); local 53 minijail->DropRoot(jail, kAttestationUser, kAttestationGroup); 54 minijail_inherit_usergroups(jail); 55 minijail->UseSeccompFilter(jail, kAttestationSeccompPath); 56 minijail->Enter(jail); 57 minijail->Destroy(jail);
|
/system/tpm/trunks/ |
trunksd.cc | 59 struct minijail* jail = minijail->New(); local 60 minijail->DropRoot(jail, kTrunksUser, kTrunksGroup); 61 minijail->UseSeccompFilter(jail, kTrunksSeccompPath); 62 minijail->Enter(jail); 63 minijail->Destroy(jail);
|
/system/core/adb/daemon/ |
main.cpp | 98 ScopedMinijail jail(minijail_new()); 114 minijail_set_supplementary_gids(jail.get(), arraysize(groups), groups); 119 drop_capabilities_bounding_set_if_needed(jail.get()); 121 minijail_change_gid(jail.get(), AID_SHELL); 122 minijail_change_uid(jail.get(), AID_SHELL); 124 minijail_enter(jail.get()); 129 minijail_enter(jail.get());
|
/external/autotest/client/site_tests/security_DeviceJail_Lockdown/ |
security_DeviceJail_Lockdown.py | 65 with device_jail_utils.JailDevice(dev_path) as jail: 66 f = jail.expect_open(device_jail_utils.REQUEST_ALLOW_WITH_LOCKDOWN) 68 raise error.TestError('Failed to open allowed jail')
|
/external/autotest/client/site_tests/security_DeviceJail_Detach/ |
security_DeviceJail_Detach.py | 61 with device_jail_utils.JailDevice(dev_path) as jail: 63 f = jail.expect_open(device_jail_utils.REQUEST_ALLOW_WITH_DETACH) 65 raise error.TestError('Failed to open allowed jail')
|
/frameworks/base/core/java/android/appwidget/ |
AppWidgetHostView.java | 216 final ParcelableSparseArray jail = new ParcelableSparseArray(); local 217 super.dispatchSaveInstanceState(jail); 218 container.put(generateId(), jail); local 230 ParcelableSparseArray jail = null; local 232 jail = (ParcelableSparseArray) parcelable; 235 if (jail == null) jail = new ParcelableSparseArray(); 238 super.dispatchRestoreInstanceState(jail);
|
/prebuilts/go/darwin-x86/src/syscall/ |
zsysnum_dragonfly_amd64.go | 202 SYS_JAIL = 338 // { int jail(struct jail *jail); }
|
zsysnum_freebsd_386.go | 198 SYS_JAIL = 338 // { int jail(struct jail *jail); }
|
zsysnum_freebsd_amd64.go | 198 SYS_JAIL = 338 // { int jail(struct jail *jail); }
|
zsysnum_freebsd_arm.go | 198 SYS_JAIL = 338 // { int jail(struct jail *jail); }
|
/prebuilts/go/linux-x86/src/syscall/ |
zsysnum_dragonfly_amd64.go | 202 SYS_JAIL = 338 // { int jail(struct jail *jail); }
|
zsysnum_freebsd_386.go | 198 SYS_JAIL = 338 // { int jail(struct jail *jail); }
|
zsysnum_freebsd_amd64.go | 198 SYS_JAIL = 338 // { int jail(struct jail *jail); }
|
zsysnum_freebsd_arm.go | 198 SYS_JAIL = 338 // { int jail(struct jail *jail); }
|
/packages/apps/Launcher3/src/com/android/launcher3/ |
CellLayout.java | 433 ParcelableSparseArray jail = getJailedArray(container); local 434 super.dispatchSaveInstanceState(jail); 435 container.put(R.id.cell_layout_jail_id, jail); [all...] |
/external/robolectric/v3/runtime/ |
android-all-4.1.2_r1-robolectric-0.jar | |
android-all-4.2.2_r1.2-robolectric-0.jar | |
android-all-4.3_r2-robolectric-0.jar | |
/prebuilts/misc/common/robolectric/lib/ |
android-all-4.1.2_r1-robolectric-0.jar | |