/system/libhidl/minijail/ |
HardwareMinijail.cpp | 31 struct minijail* jail = minijail_new(); local 32 if (jail == NULL) { 36 minijail_no_new_privs(jail); 37 minijail_log_seccomp_filter_failures(jail); 38 minijail_use_seccomp_filter(jail); 39 minijail_parse_seccomp_filters(jail, seccomp_policy_path.c_str()); 40 minijail_enter(jail); 41 minijail_destroy(jail);
|
/external/libbrillo/brillo/minijail/ |
minijail.cc | 28 void Minijail::Destroy(struct minijail* jail) { 29 minijail_destroy(jail); 32 void Minijail::DropRoot(struct minijail* jail, uid_t uid, gid_t gid) { 33 minijail_change_uid(jail, uid); 34 minijail_change_gid(jail, gid); 37 bool Minijail::DropRoot(struct minijail* jail, 42 return !minijail_change_user(jail, user) && 43 !minijail_change_group(jail, group); 46 void Minijail::EnterNewPidNamespace(struct minijail* jail) { 47 minijail_namespace_pids(jail); [all...] |
minijail.h | 32 virtual void Destroy(struct minijail* jail); 35 virtual void DropRoot(struct minijail* jail, uid_t uid, gid_t gid); 38 virtual bool DropRoot(struct minijail* jail, 43 virtual void EnterNewPidNamespace(struct minijail* jail); 46 virtual void MountTmp(struct minijail* jail); 50 virtual void UseSeccompFilter(struct minijail* jail, const char* path); 53 virtual void UseCapabilities(struct minijail* jail, uint64_t capmask); 56 virtual void ResetSignalMask(struct minijail* jail); 59 virtual void Enter(struct minijail* jail); 62 virtual bool Run(struct minijail* jail, std::vector<char*> args, pid_t* pid) [all...] |
mock_minijail.h | 26 bool(struct minijail* jail, 29 MOCK_METHOD2(UseSeccompFilter, void(struct minijail* jail, const char* path)); 30 MOCK_METHOD2(UseCapabilities, void(struct minijail* jail, uint64_t capmask)); 31 MOCK_METHOD1(ResetSignalMask, void(struct minijail* jail)); 32 MOCK_METHOD1(Enter, void(struct minijail* jail)); 34 bool(struct minijail* jail, 38 bool(struct minijail* jail, 42 bool(struct minijail* jail, 46 bool(struct minijail* jail, 50 bool(struct minijail* jail, [all...] |
/packages/apps/TV/jni/minijail/ |
minijail.cpp | 41 ScopedMinijail jail{minijail_new()}; 42 if (!jail) { 46 minijail_no_new_privs(jail.get()); 47 minijail_log_seccomp_filter_failures(jail.get()); 48 minijail_use_seccomp_filter(jail.get()); 49 minijail_set_seccomp_filter_tsync(jail.get()); 51 minijail_parse_seccomp_filters_from_fd(jail.get(), policyFd); 52 minijail_enter(jail.get());
|
/frameworks/av/services/minijail/ |
minijail.cpp | 83 ScopedMinijail jail{minijail_new()}; 84 if (!jail) { 88 minijail_no_new_privs(jail.get()); 89 minijail_log_seccomp_filter_failures(jail.get()); 90 minijail_use_seccomp_filter(jail.get()); 92 minijail_parse_seccomp_filters_from_fd(jail.get(), policy_fd.release()); 93 minijail_enter(jail.get());
|
/external/autotest/client/site_tests/security_DeviceJail_AllowDeny/ |
security_DeviceJail_AllowDeny.py | 13 Ensures that if device jail is present, it is functioning properly 26 with device_jail_utils.JailDevice(dev_path) as jail: 28 f = jail.expect_open(device_jail_utils.REQUEST_ALLOW) 30 raise error.TestError('Failed to open allowed jail') 35 f = jail.expect_open(device_jail_utils.REQUEST_DENY) 37 raise error.TestError('Successfully opened denied jail')
|
/external/autotest/client/site_tests/security_Minijail_seccomp/ |
security_Minijail_seccomp.py | 13 Jail = namedtuple("Jail", "user policy nnp") 25 def run_test(self, exe, args, jail, expected_ret, pretty_msg): 28 if jail.user: 29 cmdline += ' -u %s' % jail.user 31 if jail.nnp: 34 cmdline += ' -S %s/%s %s/%s' % (self.bindir, jail.policy, 52 Jail(None, "policy", nnp=False), 55 Jail("chronos", "policy", nnp=False), 58 Jail("chronos", privdrop_policy, nnp=False) [all...] |
/system/tpm/attestation/server/ |
main.cc | 51 struct minijail* jail = minijail->New(); local 53 minijail->DropRoot(jail, kAttestationUser, kAttestationGroup); 54 minijail_inherit_usergroups(jail); 55 minijail->UseSeccompFilter(jail, kAttestationSeccompPath); 56 minijail->Enter(jail); 57 minijail->Destroy(jail);
|
/system/tpm/trunks/ |
trunksd.cc | 59 struct minijail* jail = minijail->New(); local 60 minijail->DropRoot(jail, kTrunksUser, kTrunksGroup); 61 minijail->UseSeccompFilter(jail, kTrunksSeccompPath); 62 minijail->Enter(jail); 63 minijail->Destroy(jail);
|
/system/core/adb/daemon/ |
main.cpp | 99 ScopedMinijail jail(minijail_new()); 115 minijail_set_supplementary_gids(jail.get(), arraysize(groups), groups); 123 minijail_use_caps(jail.get(), CAP_TO_MASK(CAP_SETUID) | CAP_TO_MASK(CAP_SETGID)); 126 minijail_change_gid(jail.get(), AID_SHELL); 127 minijail_change_uid(jail.get(), AID_SHELL); 129 minijail_enter(jail.get()); 154 minijail_enter(jail.get());
|
/external/autotest/client/site_tests/security_DeviceJail_Lockdown/ |
security_DeviceJail_Lockdown.py | 65 with device_jail_utils.JailDevice(dev_path) as jail: 66 f = jail.expect_open(device_jail_utils.REQUEST_ALLOW_WITH_LOCKDOWN) 68 raise error.TestError('Failed to open allowed jail')
|
/external/autotest/client/site_tests/security_DeviceJail_Detach/ |
security_DeviceJail_Detach.py | 61 with device_jail_utils.JailDevice(dev_path) as jail: 63 f = jail.expect_open(device_jail_utils.REQUEST_ALLOW_WITH_DETACH) 65 raise error.TestError('Failed to open allowed jail')
|
/frameworks/base/core/java/android/appwidget/ |
AppWidgetHostView.java | 56 private static final String KEY_JAILED_ARRAY = "jail"; 213 final SparseArray<Parcelable> jail = new SparseArray<>(); local 214 super.dispatchSaveInstanceState(jail); 217 bundle.putSparseParcelableArray(KEY_JAILED_ARRAY, jail); 230 SparseArray<Parcelable> jail = null; local 232 jail = ((Bundle) parcelable).getSparseParcelableArray(KEY_JAILED_ARRAY); 235 if (jail == null) jail = new SparseArray<>(); 238 super.dispatchRestoreInstanceState(jail);
|
/system/core/debuggerd/ |
debuggerd_test.cpp | 580 ScopedMinijail jail{minijail_new()}; 581 if (!jail) { 585 minijail_no_new_privs(jail.get()); 586 minijail_log_seccomp_filter_failures(jail.get()); 587 minijail_use_seccomp_filter(jail.get()); 588 minijail_parse_seccomp_filters_from_fd(jail.get(), policy_fd.release()); 599 std::thread thread([&jail, &thread_ready]() { 600 minijail_enter(jail.get()); 615 minijail_enter(jail.get());
|
/prebuilts/go/darwin-x86/src/syscall/ |
zsysnum_dragonfly_amd64.go | 202 SYS_JAIL = 338 // { int jail(struct jail *jail); }
|
zsysnum_freebsd_386.go | 198 SYS_JAIL = 338 // { int jail(struct jail *jail); }
|
zsysnum_freebsd_amd64.go | 198 SYS_JAIL = 338 // { int jail(struct jail *jail); }
|
zsysnum_freebsd_arm.go | 198 SYS_JAIL = 338 // { int jail(struct jail *jail); }
|
/prebuilts/go/linux-x86/src/syscall/ |
zsysnum_dragonfly_amd64.go | 202 SYS_JAIL = 338 // { int jail(struct jail *jail); }
|
zsysnum_freebsd_386.go | 198 SYS_JAIL = 338 // { int jail(struct jail *jail); }
|
zsysnum_freebsd_amd64.go | 198 SYS_JAIL = 338 // { int jail(struct jail *jail); }
|
zsysnum_freebsd_arm.go | 198 SYS_JAIL = 338 // { int jail(struct jail *jail); }
|
/packages/apps/Launcher3/src/com/android/launcher3/ |
CellLayout.java | 393 ParcelableSparseArray jail = getJailedArray(container); local 394 super.dispatchSaveInstanceState(jail); 395 container.put(R.id.cell_layout_jail_id, jail); [all...] |
/external/robolectric/v3/runtime/ |
android-all-4.1.2_r1-robolectric-0.jar | |