HomeSort by relevance Sort by last modified time
    Searched refs:sandbox (Results 1 - 25 of 127) sorted by null

1 2 3 4 5 6

  /external/selinux/sandbox/
sandbox.conf 2 NAME=sandbox
Makefile 11 SHAREDIR ?= $(PREFIX)/share/sandbox
16 all: sandbox seunshare sandboxX.sh start
22 install -m 755 sandbox $(BINDIR)
24 install -m 644 sandbox.8 $(MANDIR)/man8/
27 install -m 644 sandbox.5 $(MANDIR)/man5/
34 install -m 644 sandbox.conf $(SYSCONFDIR)/sandbox
  /external/libchrome/sandbox/linux/services/
init_process_reaper.h 9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
23 } // namespace sandbox.
proc_util.h 10 #include "sandbox/sandbox_export.h"
12 namespace sandbox { namespace
40 } // namespace sandbox
resource_limits.h 12 #include "sandbox/sandbox_export.h"
14 namespace sandbox { namespace
27 } // namespace sandbox
yama.h 9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
55 } // namespace sandbox
namespace_utils.h 14 #include "sandbox/sandbox_export.h"
16 namespace sandbox { namespace
35 // not work from within a sandbox.
53 } // namespace sandbox
scoped_process.h 11 #include "sandbox/sandbox_export.h"
13 namespace sandbox { namespace
53 } // namespace sandbox
thread_helpers.h 9 #include "sandbox/sandbox_export.h"
13 namespace sandbox { namespace
45 } // namespace sandbox
  /external/libchrome/sandbox/linux/bpf_dsl/
policy.cc 5 #include "sandbox/linux/bpf_dsl/policy.h"
9 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
11 namespace sandbox { namespace
19 } // namespace sandbox
bpf_dsl_forward.h 10 #include "sandbox/sandbox_export.h"
12 namespace sandbox { namespace
36 } // namespace sandbox
40 shared_ptr<const sandbox::bpf_dsl::internal::BoolExprImpl>;
42 shared_ptr<const sandbox::bpf_dsl::internal::ResultExprImpl>;
errorcode.h 9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
35 } // namespace sandbox
dump_bpf.h 7 #include "sandbox/linux/bpf_dsl/codegen.h"
8 #include "sandbox/sandbox_export.h"
10 namespace sandbox { namespace
24 } // namespace sandbox
policy.h 9 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h"
10 #include "sandbox/sandbox_export.h"
12 namespace sandbox { namespace
15 // Interface to implement to define a BPF sandbox policy.
21 // User extension point for writing custom sandbox policies.
35 } // namespace sandbox
trap_registry.h 11 #include "sandbox/sandbox_export.h"
13 namespace sandbox { namespace
54 // guarantees provided by the sandbox policy. TrapRegistry
71 } // namespace sandbox
verifier.h 13 #include "sandbox/sandbox_export.h"
17 namespace sandbox { namespace
32 // is used for purposes other than verifying the output of the sandbox's
43 } // namespace sandbox
  /external/libchrome/sandbox/linux/seccomp-bpf/
trap_unittest.cc 5 #include "sandbox/linux/seccomp-bpf/trap.h"
9 #include "sandbox/linux/tests/unit_tests.h"
12 namespace sandbox { namespace
28 } // namespace sandbox
die.h 9 #include "sandbox/sandbox_export.h"
11 namespace sandbox { namespace
15 #define SANDBOX_DIE(m) sandbox::Die::SandboxDie(m, __FILE__, __LINE__)
19 #define RAW_SANDBOX_DIE(m) sandbox::Die::RawSandboxDie(m)
22 #define SANDBOX_INFO(m) sandbox::Die::SandboxInfo(m, __FILE__, __LINE__)
26 // Terminate the program, even if the current sandbox policy prevents some
66 } // namespace sandbox
bpf_tests.h 13 #include "sandbox/linux/seccomp-bpf/bpf_tester_compatibility_delegate.h"
14 #include "sandbox/linux/tests/unit_tests.h"
16 namespace sandbox { namespace
37 sandbox::SandboxBPFTestRunner bpf_test_runner( \
38 new sandbox::BPFTesterSimpleDelegate<bpf_policy_class_name>( \
40 sandbox::UnitTests::RunTestInProcess(&bpf_test_runner, death); \
56 sandbox::SandboxBPFTestRunner bpf_test_runner( \
58 sandbox::UnitTests::RunTestInProcess(&bpf_test_runner, death); \
91 sandbox::SandboxBPFTestRunner bpf_test_runner( \
92 new sandbox::BPFTesterCompatibilityDelegate<policy, aux>(
    [all...]
  /external/libchrome/sandbox/win/src/
sandbox_factory.h 9 #include "sandbox/win/src/sandbox.h"
29 // The Sandbox library needs to be linked against the main executable, but
33 // the Sandbox API calls are made.
34 namespace sandbox { namespace
49 } // namespace sandbox
  /external/ltp/testscripts/
test_fs_bind.sh 84 sandbox="${TMPDIR}/sandbox"
104 mkdir "${sandbox}" >& /dev/null
105 if [ ! -d "${sandbox}" -o ! -x "${sandbox}" ]; then
106 tst_brkm TBROK true "$0: failed to make directory \"${sandbox}\""
110 mount --bind "${sandbox}" "${sandbox}" >& /dev/null
112 tst_brkm TBROK true "$0: failed to perform bind mount on directory \"${sandbox}\""
116 mount --make-private "${sandbox}" >& /dev/nul
    [all...]
  /external/libchrome/sandbox/linux/suid/common/
sandbox.h 9 namespace sandbox { namespace
13 // (e.g. Chrome) to construct a command line for the sandbox.
38 } // namespace sandbox
  /external/libchrome/sandbox/linux/syscall_broker/
broker_channel.h 11 namespace sandbox { namespace
29 } // namespace sandbox
broker_common.h 11 namespace sandbox { namespace
39 } // namespace sandbox
broker_host.h 9 #include "sandbox/linux/syscall_broker/broker_channel.h"
11 namespace sandbox { namespace
39 } // namespace sandbox

Completed in 752 milliseconds

1 2 3 4 5 6