OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:sandbox
(Results
1 - 25
of
127
) sorted by null
1
2
3
4
5
6
/external/selinux/sandbox/
sandbox.conf
2
NAME=
sandbox
Makefile
11
SHAREDIR ?= $(PREFIX)/share/
sandbox
16
all:
sandbox
seunshare sandboxX.sh start
22
install -m 755
sandbox
$(BINDIR)
24
install -m 644
sandbox
.8 $(MANDIR)/man8/
27
install -m 644
sandbox
.5 $(MANDIR)/man5/
34
install -m 644
sandbox
.conf $(SYSCONFDIR)/
sandbox
/external/libchrome/sandbox/linux/services/
init_process_reaper.h
9
#include "
sandbox
/sandbox_export.h"
11
namespace
sandbox
{
namespace
23
} // namespace
sandbox
.
proc_util.h
10
#include "
sandbox
/sandbox_export.h"
12
namespace
sandbox
{
namespace
40
} // namespace
sandbox
resource_limits.h
12
#include "
sandbox
/sandbox_export.h"
14
namespace
sandbox
{
namespace
27
} // namespace
sandbox
yama.h
9
#include "
sandbox
/sandbox_export.h"
11
namespace
sandbox
{
namespace
55
} // namespace
sandbox
namespace_utils.h
14
#include "
sandbox
/sandbox_export.h"
16
namespace
sandbox
{
namespace
35
// not work from within a
sandbox
.
53
} // namespace
sandbox
scoped_process.h
11
#include "
sandbox
/sandbox_export.h"
13
namespace
sandbox
{
namespace
53
} // namespace
sandbox
thread_helpers.h
9
#include "
sandbox
/sandbox_export.h"
13
namespace
sandbox
{
namespace
45
} // namespace
sandbox
/external/libchrome/sandbox/linux/bpf_dsl/
policy.cc
5
#include "
sandbox
/linux/bpf_dsl/policy.h"
9
#include "
sandbox
/linux/bpf_dsl/bpf_dsl.h"
11
namespace
sandbox
{
namespace
19
} // namespace
sandbox
bpf_dsl_forward.h
10
#include "
sandbox
/sandbox_export.h"
12
namespace
sandbox
{
namespace
36
} // namespace
sandbox
40
shared_ptr<const
sandbox
::bpf_dsl::internal::BoolExprImpl>;
42
shared_ptr<const
sandbox
::bpf_dsl::internal::ResultExprImpl>;
errorcode.h
9
#include "
sandbox
/sandbox_export.h"
11
namespace
sandbox
{
namespace
35
} // namespace
sandbox
dump_bpf.h
7
#include "
sandbox
/linux/bpf_dsl/codegen.h"
8
#include "
sandbox
/sandbox_export.h"
10
namespace
sandbox
{
namespace
24
} // namespace
sandbox
policy.h
9
#include "
sandbox
/linux/bpf_dsl/bpf_dsl_forward.h"
10
#include "
sandbox
/sandbox_export.h"
12
namespace
sandbox
{
namespace
15
// Interface to implement to define a BPF
sandbox
policy.
21
// User extension point for writing custom
sandbox
policies.
35
} // namespace
sandbox
trap_registry.h
11
#include "
sandbox
/sandbox_export.h"
13
namespace
sandbox
{
namespace
54
// guarantees provided by the
sandbox
policy. TrapRegistry
71
} // namespace
sandbox
verifier.h
13
#include "
sandbox
/sandbox_export.h"
17
namespace
sandbox
{
namespace
32
// is used for purposes other than verifying the output of the
sandbox
's
43
} // namespace
sandbox
/external/libchrome/sandbox/linux/seccomp-bpf/
trap_unittest.cc
5
#include "
sandbox
/linux/seccomp-bpf/trap.h"
9
#include "
sandbox
/linux/tests/unit_tests.h"
12
namespace
sandbox
{
namespace
28
} // namespace
sandbox
die.h
9
#include "
sandbox
/sandbox_export.h"
11
namespace
sandbox
{
namespace
15
#define SANDBOX_DIE(m)
sandbox
::Die::SandboxDie(m, __FILE__, __LINE__)
19
#define RAW_SANDBOX_DIE(m)
sandbox
::Die::RawSandboxDie(m)
22
#define SANDBOX_INFO(m)
sandbox
::Die::SandboxInfo(m, __FILE__, __LINE__)
26
// Terminate the program, even if the current
sandbox
policy prevents some
66
} // namespace
sandbox
bpf_tests.h
13
#include "
sandbox
/linux/seccomp-bpf/bpf_tester_compatibility_delegate.h"
14
#include "
sandbox
/linux/tests/unit_tests.h"
16
namespace
sandbox
{
namespace
37
sandbox
::SandboxBPFTestRunner bpf_test_runner( \
38
new
sandbox
::BPFTesterSimpleDelegate<bpf_policy_class_name>( \
40
sandbox
::UnitTests::RunTestInProcess(&bpf_test_runner, death); \
56
sandbox
::SandboxBPFTestRunner bpf_test_runner( \
58
sandbox
::UnitTests::RunTestInProcess(&bpf_test_runner, death); \
91
sandbox
::SandboxBPFTestRunner bpf_test_runner( \
92
new
sandbox
::BPFTesterCompatibilityDelegate<policy, aux>(
[
all
...]
/external/libchrome/sandbox/win/src/
sandbox_factory.h
9
#include "
sandbox
/win/src/
sandbox
.h"
29
// The
Sandbox
library needs to be linked against the main executable, but
33
// the
Sandbox
API calls are made.
34
namespace
sandbox
{
namespace
49
} // namespace
sandbox
/external/ltp/testscripts/
test_fs_bind.sh
84
sandbox
="${TMPDIR}/
sandbox
"
104
mkdir "${
sandbox
}" >& /dev/null
105
if [ ! -d "${
sandbox
}" -o ! -x "${
sandbox
}" ]; then
106
tst_brkm TBROK true "$0: failed to make directory \"${
sandbox
}\""
110
mount --bind "${
sandbox
}" "${
sandbox
}" >& /dev/null
112
tst_brkm TBROK true "$0: failed to perform bind mount on directory \"${
sandbox
}\""
116
mount --make-private "${
sandbox
}" >& /dev/nul
[
all
...]
/external/libchrome/sandbox/linux/suid/common/
sandbox.h
9
namespace
sandbox
{
namespace
13
// (e.g. Chrome) to construct a command line for the
sandbox
.
38
} // namespace
sandbox
/external/libchrome/sandbox/linux/syscall_broker/
broker_channel.h
11
namespace
sandbox
{
namespace
29
} // namespace
sandbox
broker_common.h
11
namespace
sandbox
{
namespace
39
} // namespace
sandbox
broker_host.h
9
#include "
sandbox
/linux/syscall_broker/broker_channel.h"
11
namespace
sandbox
{
namespace
39
} // namespace
sandbox
Completed in 752 milliseconds
1
2
3
4
5
6