Searched refs:UnsafeTrap (Results 1 - 3 of 3) sorted by relevance
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
H A D | sandbox_bpf.h | 129 // If even a single system call returns "UnsafeTrap", the security of 131 ErrorCode UnsafeTrap(Trap::TrapFnc fnc, const void *aux); 133 // From within an UnsafeTrap() it is often useful to be able to execute
|
H A D | sandbox_bpf_unittest.cc | 445 // The use of UnsafeTrap() causes us to print a warning message. This is 454 // use of UnsafeTrap() 470 return sandbox->UnsafeTrap(CountSyscalls, aux); 519 // Handle prctl() inside an UnsafeTrap() 520 return sandbox->UnsafeTrap(PrctlHandler, NULL); 561 // use of UnsafeTrap() 573 return sandbox->UnsafeTrap(AllowRedirectedSyscall, aux); 587 // value in the implementation of UnsafeTrap(). This is obviously a bit 610 // ever tried to update them from inside a Trap() or UnsafeTrap() handler, 613 // works, even if we have a policy in place that makes use of UnsafeTrap() [all...] |
H A D | sandbox_bpf.cc | 132 // Checks whether the "insn" returns an UnsafeTrap() ErrorCode. If so, it 165 // When inside an UnsafeTrap() callback, we want to allow all system calls. 564 // If there is at least one UnsafeTrap() in our program, the entire sandbox 568 // UnsafeTrap(). 584 SANDBOX_DIE("Support for UnsafeTrap() has not yet been ported to this " 603 SANDBOX_DIE("Invalid seccomp policy; if using UnsafeTrap(), you must " 608 // We should never be able to get here, as UnsafeTrap() should never 957 ErrorCode Sandbox::UnsafeTrap(Trap::TrapFnc fnc, const void *aux) { function in class:playground2::Sandbox
|
Completed in 103 milliseconds