/external/ltp/testscripts/ |
D | test_fs_bind.sh | 83 sandbox="${TMPDIR}/sandbox" 103 mkdir "${sandbox}" >& /dev/null 104 if [ ! -d "${sandbox}" -o ! -x "${sandbox}" ]; then 105 tst_brkm TBROK true "$0: failed to make directory \"${sandbox}\"" 109 mount --bind "${sandbox}" "${sandbox}" >& /dev/null 111 tst_brkm TBROK true "$0: failed to perform bind mount on directory \"${sandbox}\"" 115 mount --make-private "${sandbox}" >& /dev/null 117 tst_brkm TBROK true "$0: failed to make private mountpoint on directory \"${sandbox}\"" 124 pushd "${sandbox}" > /dev/null && { 162 …mount --make-shared "${sandbox}" > /dev/null 2>&1 || "${FS_BIND_ROOT}/bin/smount" "${sandbox}" sha… [all …]
|
/external/python/setuptools/setuptools/tests/ |
D | test_sandbox.py | 9 import setuptools.sandbox 14 with setuptools.sandbox.DirectorySandbox(str(tmpdir)): 32 setuptools.sandbox._execfile(target, vars(namespace)) 39 setuptools.sandbox._execfile(str(setup_py), globals()) 44 with setuptools.sandbox.ExceptionSaver(): 48 with setuptools.sandbox.ExceptionSaver() as saved_exc: 60 with setuptools.sandbox.ExceptionSaver() as saved_exc: 70 with setuptools.sandbox.ExceptionSaver() as saved_exc: 81 with setuptools.sandbox.ExceptionSaver() as saved_exc: 84 with pytest.raises(setuptools.sandbox.UnpickleableException) as caught: [all …]
|
/external/selinux/sandbox/ |
D | Makefile | 10 SHAREDIR ?= $(PREFIX)/share/sandbox 15 all: sandbox seunshare sandboxX.sh start 21 install -m 755 sandbox $(DESTDIR)$(BINDIR) 23 install -m 644 sandbox.8 $(DESTDIR)$(MANDIR)/man8/ 26 install -m 644 sandbox.5 $(DESTDIR)$(MANDIR)/man5/ 41 install -m 644 sandbox.conf $(DESTDIR)$(SYSCONFDIR)/sandbox
|
D | sandbox.conf | 2 NAME=sandbox
|
/external/python/asn1crypto/dev/ |
D | build.py | 9 import setuptools.sandbox 56 setuptools.sandbox.run_setup(setup, ['-q', 'sdist']) 59 setuptools.sandbox.run_setup(setup, ['-q', 'bdist_wheel', '--universal']) 62 setuptools.sandbox.run_setup(setup, ['-q', 'clean']) 69 setuptools.sandbox.run_setup(tests_setup, ['-q', 'sdist']) 72 setuptools.sandbox.run_setup(tests_setup, ['-q', 'bdist_wheel', '--universal']) 75 setuptools.sandbox.run_setup(tests_setup, ['-q', 'clean'])
|
/external/perfetto/infra/ci/worker/ |
D | gce-startup-script.sh | 44 docker pull eu.gcr.io/perfetto-ci/sandbox 48 docker network rm sandbox 2>/dev/null || true # Handles the reboot case. 49 docker network create sandbox -o com.docker.network.bridge.name=sandbox 50 sudo iptables -I DOCKER-USER -i sandbox -d 169.254.0.0/16 -j REJECT 64 SANDBOX_TMP=/mnt/disks/sandbox-$i-tmp
|
/external/robolectric-shadows/junit/src/main/java/org/robolectric/internal/ |
D | SandboxTestRunner.java | 199 protected void configureSandbox(Sandbox sandbox, FrameworkMethod method) { 210 sandbox.replaceShadowMap(shadowMap); 212 sandbox.configure(createClassHandler(shadowMap, sandbox), getInterceptors()); 225 Sandbox sandbox = getSandbox(method); 230 configureSandbox(sandbox, method); 233 Thread.currentThread().setContextClassLoader(sandbox.getRobolectricClassLoader()); 236 Class bootstrappedTestClass = sandbox.bootstrappedClass(getTestClass().getJavaClass()); 252 beforeTest(sandbox, method, bootstrappedMethod); 292 …protected void beforeTest(Sandbox sandbox, FrameworkMethod method, Method bootstrappedMethod) thro… 342 protected ClassHandler createClassHandler(ShadowMap shadowMap, Sandbox sandbox) {
|
/external/perfetto/infra/ci/ |
D | Makefile | 36 build: build-worker build-sandbox 41 .PHONY: build-sandbox 42 build-sandbox: .deps/${BUILDER}-sandbox 60 .deps/${BUILDER}-sandbox: sandbox/* ${COMMON_DEPS} 61 ${BUILDER} build --rm --force-rm -t ${SANDBOX_IMG} sandbox
|
/external/grpc-grpc/src/objective-c/tests/ |
D | run_tests.sh | 59 HOST_PORT_REMOTE=grpc-test.sandbox.googleapis.com \ 127 HOST_PORT_REMOTE=grpc-test.sandbox.googleapis.com \ 138 HOST_PORT_REMOTE=grpc-test.sandbox.googleapis.com \
|
/external/python/jinja/docs/ |
D | sandbox.rst | 4 The Jinja sandbox can be used to evaluate untrusted code. Access to unsafe 20 .. module:: jinja2.sandbox 39 The Jinja sandbox alone is no solution for perfect security. Especially 45 Also the sandbox is only as good as the configuration. We strongly 80 from jinja2.sandbox import SandboxedEnvironment
|
/external/perfetto/docs/design-docs/ |
D | continuous-integration.md | 77 They are in a 1:1 relationship, each worker controls at most one sandbox 87 account and have R/W access to the DB. They can also spawn sandbox containers. 97 - Start the sandbox container, passing down the job config and the git revision 99 - Stream the sandbox stdout to the `/logs` sub-tree of the DB. 100 - Terminate the sandbox container prematurely in case of timeouts or job 114 Each sandbox does the following: 120 A sandbox container is almost completely stateless with the only exception of 239 ┗━ docker run sandbox-X ... 241 [sandbox-X] # From /infra/ci/sandbox/Dockerfile 242 ┗━ /infra/ci/sandbox/init.sh [all …]
|
/external/autotest/client/cros/ |
D | webstore_test.py | 113 TestEnv.sandbox: 'staging.sandbox', 118 TestEnv.sandbox: 'download-staging.sandbox', 138 def initialize(self, test_env=TestEnv.sandbox, 156 TestEnv.sandbox:
|
/external/libchrome/ipc/ |
D | ipc_send_fds_test.cc | 200 int error = sandbox::Seatbelt::Init( in DEFINE_IPC_CHANNEL_MOJO_TEST_CLIENT_WITH_CUSTOM_FIXTURE() 201 sandbox::Seatbelt::kProfilePureComputation, SANDBOX_NAMED, &error_buff); in DEFINE_IPC_CHANNEL_MOJO_TEST_CLIENT_WITH_CUSTOM_FIXTURE() 205 sandbox::Seatbelt::FreeError(error_buff); in DEFINE_IPC_CHANNEL_MOJO_TEST_CLIENT_WITH_CUSTOM_FIXTURE()
|
/external/robolectric-shadows/sandbox/ |
D | Android.bp | 2 // Compile Robolectric sandbox 30 // Compile Robolectric sandbox tests
|
/external/llvm-project/lldb/utils/lui/ |
D | sandbox.py | 70 sandbox = SandboxUI(screen, event_queue) 71 sandbox.eventLoop()
|
/external/python/jinja/tests/ |
D | test_security.py | 9 from jinja2.sandbox import ImmutableSandboxedEnvironment 10 from jinja2.sandbox import SandboxedEnvironment 11 from jinja2.sandbox import unsafe
|
/external/robolectric-shadows/robolectric/src/main/java/org/robolectric/ |
D | RobolectricTestRunner.java | 165 protected ClassHandler createClassHandler(ShadowMap shadowMap, Sandbox sandbox) { in createClassHandler() argument 166 …return new ShadowWrangler(shadowMap, ((SdkEnvironment) sandbox).getSdkConfig().getApiLevel(), getI… in createClassHandler() 231 protected void configureSandbox(Sandbox sandbox, FrameworkMethod method) { in configureSandbox() argument 232 SdkEnvironment sdkEnvironment = (SdkEnvironment) sandbox; in configureSandbox() 239 super.configureSandbox(sandbox, method); in configureSandbox() 347 …protected void beforeTest(Sandbox sandbox, FrameworkMethod method, Method bootstrappedMethod) thro… in beforeTest() argument 348 SdkEnvironment sdkEnvironment = (SdkEnvironment) sandbox; in beforeTest()
|
/external/boringssl/src/ |
D | SANDBOXING.md | 6 breaks platform abstractions. A syscall-filtering sandbox may, for instance, be 20 would be a sandbox escape. 25 each sandbox imposes different constraints, so, above all, sandboxed consumers 48 atomics-based fast path. If a sandbox blocks a necessary pthreads syscall, it 69 space (and any copies made via `fork`). If a syscall-filtering sandbox is 134 locale. BoringSSL may trigger these paths and assumes the sandbox environment
|
/external/ltp/testcases/kernel/fs/fs_bind/ |
D | CHANGELOG | 13 Made tests run in the sandbox directory rather than in testcases/working 25 Logged the sandbox contents before and after, took a diff, and removed the 28 sandbox. This happens after the mount cleanups otherwise it could fail.
|
/external/crosvm/devices/ |
D | TEST_MAPPING | 3 // Failed in TH sandbox
|
/external/crosvm/x86_64/ |
D | TEST_MAPPING | 3 // Failed in TH sandbox
|
/external/crosvm/hypervisor/ |
D | TEST_MAPPING | 3 // Failed in TH sandbox
|
/external/crosvm/sys_util/ |
D | TEST_MAPPING | 3 // Failed in TH sandbox
|
/external/crosvm/net_util/ |
D | TEST_MAPPING | 3 // Failed in TH sandbox
|
/external/crosvm/cros_async/ |
D | TEST_MAPPING | 3 // Failed in TH sandbox
|