Searched refs:sandbox (Results 1 – 25 of 149) sorted by relevance
123456
/external/selinux/policycoreutils/sandbox/ |
D | Makefile | 11 SHAREDIR ?= $(PREFIX)/share/sandbox 16 all: sandbox seunshare sandboxX.sh start 22 install -m 755 sandbox $(BINDIR) 24 install -m 644 sandbox.8 $(MANDIR)/man8/ 27 install -m 644 sandbox.5 $(MANDIR)/man5/ 34 install -m 644 sandbox.conf $(SYSCONFDIR)/sandbox
|
D | sandbox.conf | 2 NAME=sandbox
|
D | sandbox.init | 24 LOCKFILE=/var/lock/subsys/sandbox
|
D | sandboxX.sh | 30 /usr/share/sandbox/start $HOME/.sandboxrc
|
D | sandbox | 493 sandbox = Sandbox() 494 rc = sandbox.main()
|
/external/selinux/policycoreutils/ |
D | ChangeLog | 15 * Ensure XDG_RUNTIME_DIR is passed through to the sandbox in seunshare, 17 * Remove cgroups from sandbox, from Dan Walsh 45 * Add message to tell user to install sandbox policy from Dan Walsh. 109 * Improve sandbox support for home dir symlinks and file caps from Dan Walsh. 110 * Switch sandbox to openbox window manager from Dan Walsh. 122 * sandbox: use sepolicy to look for sandbox_t 130 * sandbox: Copy /var/tmp to /tmp as they are the same inside 147 * sandbox: seunshare: do not reassign realloc value 174 * sandbox: manpage update to describe standard types 184 * sandbox: Make sure Xephyr never listens on tcp ports [all …]
|
D | Makefile | 1 SUBDIRS = sepolicy setfiles semanage load_policy newrole run_init sandbox secon audit2allow sestatu…
|
/external/selinux/libsemanage/src/ |
D | semanage_store.c | 876 const char *sandbox = semanage_path(SEMANAGE_TMP, SEMANAGE_TOPLEVEL); in semanage_make_sandbox() local 880 if (stat(sandbox, &buf) == -1) { in semanage_make_sandbox() 882 ERR(sh, "Error scanning directory %s.", sandbox); in semanage_make_sandbox() 888 if (semanage_remove_directory(sandbox) != 0) { in semanage_make_sandbox() 890 sandbox); in semanage_make_sandbox() 895 if (mkdir(sandbox, S_IRWXU) == -1 || in semanage_make_sandbox() 897 sandbox) == -1) { in semanage_make_sandbox() 898 ERR(sh, "Could not copy files to sandbox %s.", sandbox); in semanage_make_sandbox() 905 semanage_remove_directory(sandbox); in semanage_make_sandbox() 1622 const char *sandbox = semanage_path(SEMANAGE_TMP, SEMANAGE_TOPLEVEL); in semanage_commit_sandbox() local [all …]
|
/external/openssh/ |
D | Android.mk | 244 sandbox-null.c \ 245 sandbox-rlimit.c \ 246 sandbox-systrace.c \
|
D | sshd_config | 110 UsePrivilegeSeparation sandbox # Default for new installations.
|
D | configure.ac | 634 AC_CHECK_HEADERS([sandbox.h]) 2965 # Decide which sandbox style to use 2967 AC_ARG_WITH([sandbox], optwith 2968 …[ --with-sandbox=style Specify privilege separation sandbox (no, darwin, rlimit, systrace, sec… 2980 # when calling select(2), which means we can't use the rlimit sandbox. 3067 AC_MSG_ERROR([systrace sandbox requires systrace headers and SYSTR_POLICY_KILL support]) 3075 AC_MSG_ERROR([Darwin seatbelt sandbox requires sandbox.h and sandbox_init function]) 3088 AC_MSG_ERROR([seccomp_filter sandbox not supported on $host]) 3090 AC_MSG_ERROR([seccomp_filter sandbox requires PR_SET_NO_NEW_PRIVS]) 3092 AC_MSG_ERROR([seccomp_filter sandbox requires seccomp headers]) [all …]
|
D | ChangeLog | 2584 - (djm) [sandbox-seccomp-filter.c] Allow mremap and exit for DietLibc; 3055 [sandbox-systrace.c] 3102 [sandbox-systrace.c] 3103 Permit use of SYS_sendsyslog from inside the sandbox. Clock is ticking, 3614 [sandbox-systrace.c] 3617 sandbox. 3626 [sandbox-systrace.c] 4352 - (djm) [sandbox-seccomp-filter.c] Soft-fail stat() syscalls. Add XXX to 4353 remind myself to add sandbox violation logging via the log socket. 4519 sandboxing, as running this code in the sandbox can cause violations; [all …]
|
/external/llvm/docs/ |
D | HowToCrossCompileLLVM.rst | 167 $ ./sandbox/bin/python sandbox/bin/lnt runtest nt \ 168 --sandbox sandbox \
|
D | ReleaseProcess.rst | 111 ./sandbox/bin/python sandbox/bin/lnt runtest \ 114 --sandbox sandbox \
|
/external/selinux/policycoreutils/sepolicy/ |
D | Makefile | 13 SHAREDIR ?= $(PREFIX)/share/sandbox
|
/external/sepolicy/ |
D | installd.te | 71 # Run dex2oat in its own sandbox.
|
D | untrusted_app.te | 29 # to their sandbox directory and then execute.
|
D | app.te | 53 # App sandbox file accesses.
|
/external/llvm/docs/HistoricalNotes/ |
D | 2000-11-18-EarlyDesignIdeasResp.txt | 35 * To keep things "safe" ie to enforce a sandbox on Java/foreign code, 48 for value add. The nice safe "sandbox" VM can be provided as a layer
|
/external/google-breakpad/src/build/ |
D | common.gypi | 164 # This is the location of the sandbox binary. Chrome looks for this before 166 # sandbox the zygote process and, thus, all renderer processes. 184 # Set to 1 to turn on seccomp sandbox by default.
|
/external/libcxx/include/ |
D | __config | 114 // NaCl's sandbox (which PNaCl also runs in) doesn't allow filesystem access,
|
/external/selinux/libsemanage/ |
D | ChangeLog | 284 - only install the sandbox upon commit if something was rebuilt
|
/external/selinux/policycoreutils/po/ |
D | te.po | 3383 "allow unconfined users to transition to the chrome sandbox domains when " 3384 "running chrome-sandbox" 3386 "chrome-sandbox నడుచునప్పుడు chrome sandbox డొమైన్లకు అన్నిర్భందిత వాడుకరులను బదిలీకరణకు "
|
D | ko.po | 3477 "allow unconfined users to transition to the chrome sandbox domains when " 3478 "running chrome-sandbox" 3480 "제한되지 않은 사용자가 chrome-sandbox를 실행할 때 chrome sandbox 도메인으로 "
|
D | ja.po | 3549 "allow unconfined users to transition to the chrome sandbox domains when " 3550 "running chrome-sandbox" 3552 "制限されていないユーザーが chrome-sandbox を実行しているとき chrome sandbox "
|
123456