Lines Matching refs:sandbox
5 #include "sandbox/linux/seccomp-bpf/verifier.h"
11 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
12 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
13 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
14 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
16 namespace sandbox {
38 uint32_t EvaluateErrorCode(SandboxBPF* sandbox,
49 return sandbox->Unexpected64bitArgument().err();
53 sandbox, equal ? *code.passed() : *code.failed(), data);
59 bool VerifyErrorCode(SandboxBPF* sandbox,
70 } else if (computed_ret != EvaluateErrorCode(sandbox, root_code, *data)) {
96 sandbox, program, data, root_code, *code.passed(), err)) {
109 sandbox, program, data, root_code, *code.passed(), err)) {
116 sandbox, program, data, root_code, *code.passed(), err)) {
125 sandbox, program, data, root_code, *code.failed(), err)) {
132 sandbox, program, data, root_code, *code.failed(), err)) {
143 if (!VerifyErrorCode(sandbox,
147 sandbox->Unexpected64bitArgument(),
155 if (!VerifyErrorCode(sandbox,
159 sandbox->Unexpected64bitArgument(),
312 bool Verifier::VerifyBPF(SandboxBPF* sandbox,
340 ? policy.EvaluateSyscall(sandbox, sysnum)
341 : policy.InvalidSyscall(sandbox);
342 if (!VerifyErrorCode(sandbox, program, &data, code, code, err)) {
397 } // namespace sandbox