Searched refs:UnsafeTrap (Results 1 - 3 of 3) sorted by relevance

/external/chromium_org/sandbox/linux/seccomp-bpf/
H A Dsandbox_bpf.h129 // If even a single system call returns "UnsafeTrap", the security of
131 ErrorCode UnsafeTrap(Trap::TrapFnc fnc, const void *aux);
133 // From within an UnsafeTrap() it is often useful to be able to execute
H A Dsandbox_bpf_unittest.cc445 // The use of UnsafeTrap() causes us to print a warning message. This is
454 // use of UnsafeTrap()
470 return sandbox->UnsafeTrap(CountSyscalls, aux);
519 // Handle prctl() inside an UnsafeTrap()
520 return sandbox->UnsafeTrap(PrctlHandler, NULL);
561 // use of UnsafeTrap()
573 return sandbox->UnsafeTrap(AllowRedirectedSyscall, aux);
587 // value in the implementation of UnsafeTrap(). This is obviously a bit
610 // ever tried to update them from inside a Trap() or UnsafeTrap() handler,
613 // works, even if we have a policy in place that makes use of UnsafeTrap()
[all...]
H A Dsandbox_bpf.cc132 // Checks whether the "insn" returns an UnsafeTrap() ErrorCode. If so, it
165 // When inside an UnsafeTrap() callback, we want to allow all system calls.
564 // If there is at least one UnsafeTrap() in our program, the entire sandbox
568 // UnsafeTrap().
584 SANDBOX_DIE("Support for UnsafeTrap() has not yet been ported to this "
603 SANDBOX_DIE("Invalid seccomp policy; if using UnsafeTrap(), you must "
608 // We should never be able to get here, as UnsafeTrap() should never
957 ErrorCode Sandbox::UnsafeTrap(Trap::TrapFnc fnc, const void *aux) { function in class:playground2::Sandbox

Completed in 103 milliseconds