Home
last modified time | relevance | path

Searched refs:sandbox (Results 1 – 25 of 149) sorted by relevance

123456

/external/selinux/policycoreutils/sandbox/
DMakefile11 SHAREDIR ?= $(PREFIX)/share/sandbox
16 all: sandbox seunshare sandboxX.sh start
22 install -m 755 sandbox $(BINDIR)
24 install -m 644 sandbox.8 $(MANDIR)/man8/
27 install -m 644 sandbox.5 $(MANDIR)/man5/
34 install -m 644 sandbox.conf $(SYSCONFDIR)/sandbox
Dsandbox.conf2 NAME=sandbox
Dsandbox.init24 LOCKFILE=/var/lock/subsys/sandbox
DsandboxX.sh30 /usr/share/sandbox/start $HOME/.sandboxrc
Dsandbox493 sandbox = Sandbox()
494 rc = sandbox.main()
/external/selinux/policycoreutils/
DChangeLog15 * Ensure XDG_RUNTIME_DIR is passed through to the sandbox in seunshare,
17 * Remove cgroups from sandbox, from Dan Walsh
45 * Add message to tell user to install sandbox policy from Dan Walsh.
109 * Improve sandbox support for home dir symlinks and file caps from Dan Walsh.
110 * Switch sandbox to openbox window manager from Dan Walsh.
122 * sandbox: use sepolicy to look for sandbox_t
130 * sandbox: Copy /var/tmp to /tmp as they are the same inside
147 * sandbox: seunshare: do not reassign realloc value
174 * sandbox: manpage update to describe standard types
184 * sandbox: Make sure Xephyr never listens on tcp ports
[all …]
DMakefile1 SUBDIRS = sepolicy setfiles semanage load_policy newrole run_init sandbox secon audit2allow sestatu…
/external/selinux/libsemanage/src/
Dsemanage_store.c876 const char *sandbox = semanage_path(SEMANAGE_TMP, SEMANAGE_TOPLEVEL); in semanage_make_sandbox() local
880 if (stat(sandbox, &buf) == -1) { in semanage_make_sandbox()
882 ERR(sh, "Error scanning directory %s.", sandbox); in semanage_make_sandbox()
888 if (semanage_remove_directory(sandbox) != 0) { in semanage_make_sandbox()
890 sandbox); in semanage_make_sandbox()
895 if (mkdir(sandbox, S_IRWXU) == -1 || in semanage_make_sandbox()
897 sandbox) == -1) { in semanage_make_sandbox()
898 ERR(sh, "Could not copy files to sandbox %s.", sandbox); in semanage_make_sandbox()
905 semanage_remove_directory(sandbox); in semanage_make_sandbox()
1622 const char *sandbox = semanage_path(SEMANAGE_TMP, SEMANAGE_TOPLEVEL); in semanage_commit_sandbox() local
[all …]
/external/openssh/
DAndroid.mk244 sandbox-null.c \
245 sandbox-rlimit.c \
246 sandbox-systrace.c \
Dsshd_config110 UsePrivilegeSeparation sandbox # Default for new installations.
Dconfigure.ac634 AC_CHECK_HEADERS([sandbox.h])
2965 # Decide which sandbox style to use
2967 AC_ARG_WITH([sandbox], optwith
2968 …[ --with-sandbox=style Specify privilege separation sandbox (no, darwin, rlimit, systrace, sec…
2980 # when calling select(2), which means we can't use the rlimit sandbox.
3067 AC_MSG_ERROR([systrace sandbox requires systrace headers and SYSTR_POLICY_KILL support])
3075 AC_MSG_ERROR([Darwin seatbelt sandbox requires sandbox.h and sandbox_init function])
3088 AC_MSG_ERROR([seccomp_filter sandbox not supported on $host])
3090 AC_MSG_ERROR([seccomp_filter sandbox requires PR_SET_NO_NEW_PRIVS])
3092 AC_MSG_ERROR([seccomp_filter sandbox requires seccomp headers])
[all …]
DChangeLog2584 - (djm) [sandbox-seccomp-filter.c] Allow mremap and exit for DietLibc;
3055 [sandbox-systrace.c]
3102 [sandbox-systrace.c]
3103 Permit use of SYS_sendsyslog from inside the sandbox. Clock is ticking,
3614 [sandbox-systrace.c]
3617 sandbox.
3626 [sandbox-systrace.c]
4352 - (djm) [sandbox-seccomp-filter.c] Soft-fail stat() syscalls. Add XXX to
4353 remind myself to add sandbox violation logging via the log socket.
4519 sandboxing, as running this code in the sandbox can cause violations;
[all …]
/external/llvm/docs/
DHowToCrossCompileLLVM.rst167 $ ./sandbox/bin/python sandbox/bin/lnt runtest nt \
168 --sandbox sandbox \
DReleaseProcess.rst111 ./sandbox/bin/python sandbox/bin/lnt runtest \
114 --sandbox sandbox \
/external/selinux/policycoreutils/sepolicy/
DMakefile13 SHAREDIR ?= $(PREFIX)/share/sandbox
/external/sepolicy/
Dinstalld.te71 # Run dex2oat in its own sandbox.
Duntrusted_app.te29 # to their sandbox directory and then execute.
Dapp.te53 # App sandbox file accesses.
/external/llvm/docs/HistoricalNotes/
D2000-11-18-EarlyDesignIdeasResp.txt35 * To keep things "safe" ie to enforce a sandbox on Java/foreign code,
48 for value add. The nice safe "sandbox" VM can be provided as a layer
/external/google-breakpad/src/build/
Dcommon.gypi164 # This is the location of the sandbox binary. Chrome looks for this before
166 # sandbox the zygote process and, thus, all renderer processes.
184 # Set to 1 to turn on seccomp sandbox by default.
/external/libcxx/include/
D__config114 // NaCl's sandbox (which PNaCl also runs in) doesn't allow filesystem access,
/external/selinux/libsemanage/
DChangeLog284 - only install the sandbox upon commit if something was rebuilt
/external/selinux/policycoreutils/po/
Dte.po3383 "allow unconfined users to transition to the chrome sandbox domains when "
3384 "running chrome-sandbox"
3386 "chrome-sandbox నడుచునప్పుడు chrome sandbox డొమైన్లకు అన్‌నిర్భందిత వాడుకరులను బదిలీకరణకు "
Dko.po3477 "allow unconfined users to transition to the chrome sandbox domains when "
3478 "running chrome-sandbox"
3480 "제한되지 않은 사용자가 chrome-sandbox를 실행할 때 chrome sandbox 도메인으로 "
Dja.po3549 "allow unconfined users to transition to the chrome sandbox domains when "
3550 "running chrome-sandbox"
3552 "制限されていないユーザーが chrome-sandbox を実行しているとき chrome sandbox "

123456