/external/chromium_org/chrome/browser/ui/libgtk2ui/ |
H A D | x11_input_method_context_impl_gtk2_unittest.cc | 20 EXPECT_FALSE(trap.Trap(base::string16())); 25 EXPECT_FALSE(trap.Trap(base::UTF8ToUTF16("T"))); 27 EXPECT_FALSE(trap.Trap(base::UTF8ToUTF16("true"))); 32 EXPECT_FALSE(trap.Trap(base::UTF8ToUTF16("t"))); 38 EXPECT_FALSE(trap.Trap(base::UTF8ToUTF16("t"))); 42 EXPECT_TRUE(trap.Trap(base::UTF8ToUTF16("t"))); 48 // Many times calls to Trap() are okay. 49 EXPECT_FALSE(trap.Trap(base::UTF8ToUTF16("f"))); 51 EXPECT_TRUE(trap.Trap(base::UTF8ToUTF16("t")));
|
H A D | x11_input_method_context_impl_gtk2.h | 120 bool Trap(const base::string16& text);
|
H A D | x11_input_method_context_impl_gtk2.cc | 310 if (commit_signal_trap_.Trap(text_in_utf16)) 365 bool X11InputMethodContextImplGtk2::GtkCommitSignalTrap::Trap( function in class:libgtk2ui::X11InputMethodContextImplGtk2::GtkCommitSignalTrap
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
H A D | trap.h | 26 // The Trap class allows a BPF filter program to branch out to user space by 34 class SANDBOX_EXPORT Trap { class in namespace:sandbox 84 Trap(); 88 ~Trap(); 97 static Trap* GetInstance(); 111 static Trap* global_trap_; 121 DISALLOW_COPY_AND_ASSIGN(Trap);
|
H A D | errorcode_unittest.cc | 28 ErrorCode e3 = sandbox.Trap(NULL, NULL); 43 SANDBOX_TEST(ErrorCode, Trap) { 45 ErrorCode e0 = sandbox.Trap(NULL, "a"); 46 ErrorCode e1 = sandbox.Trap(NULL, "b"); 50 ErrorCode e2 = sandbox.Trap(NULL, "a"); 66 ErrorCode e4 = sandbox.Trap(NULL, "a"); 67 ErrorCode e5 = sandbox.Trap(NULL, "b"); 68 ErrorCode e6 = sandbox.Trap(NULL, "a"); 87 ErrorCode e4 = sandbox.Trap(NULL, "a"); 88 ErrorCode e5 = sandbox.Trap(NUL [all...] |
H A D | trap.cc | 77 Trap::Trap() function in class:sandbox::Trap 107 Trap* Trap::GetInstance() { 114 global_trap_ = new Trap(); 122 void Trap::SigSysAction(int nr, siginfo_t* info, void* void_context) { 126 "for Trap() handling."); 131 void Trap::SigSys(int nr, siginfo_t* info, void* void_context) { 243 bool Trap::TrapKey::operator<(const TrapKey& o) const { 253 uint16_t Trap [all...] |
H A D | errorcode.h | 150 friend class Trap; 155 ErrorCode(Trap::TrapFnc fnc, const void* aux, bool safe); 171 Trap::TrapFnc fnc_; // Callback function and arg, if trap was
|
H A D | sandbox_bpf.h | 98 // for a description of how to pass data from SetSandboxPolicy() to a Trap() 100 static ErrorCode Trap(Trap::TrapFnc fnc, const void* aux); 112 static ErrorCode UnsafeTrap(Trap::TrapFnc fnc, const void* aux);
|
H A D | errorcode.cc | 35 ErrorCode::ErrorCode(Trap::TrapFnc fnc, const void* aux, bool safe) 40 err_(SECCOMP_RET_TRAP + Trap::MakeTrap(fnc, aux, safe)) {
|
H A D | sandbox_bpf.cc | 177 if (!Trap::IsSafeTrapId(insn->k & SECCOMP_RET_DATA)) { 184 // A Trap() handler that returns an "errno" value. The value is encoded 197 // it rewrites the instruction to instead call a Trap() handler that does 212 insn->k = sandbox->Trap(ReturnErrno, 244 return sandbox_compiler->Trap(ReturnErrno, reinterpret_cast<void*>(err)); 738 if (!Trap::EnableUnsafeTrapsInSigSysHandler()) { 1054 ErrorCode SandboxBPF::Trap(Trap::TrapFnc fnc, const void* aux) { function in class:sandbox::SandboxBPF 1055 return ErrorCode(fnc, aux, true /* Safe Trap */); 1058 ErrorCode SandboxBPF::UnsafeTrap(Trap [all...] |
H A D | syscall_unittest.cc | 111 return sandbox->Trap(CopySyscallArgsToAux, aux_);
|
/external/chromium_org/sandbox/linux/bpf_dsl/ |
H A D | bpf_dsl.cc | 86 TrapResultExprImpl(Trap::TrapFnc func, const void* arg) 92 return sb->Trap(func_, arg_); 98 Trap::TrapFnc func_; 106 UnsafeTrapResultExprImpl(Trap::TrapFnc func, const void* arg) 118 Trap::TrapFnc func_; 292 ResultExpr Trap(Trap::TrapFnc trap_func, const void* aux) { function in namespace:sandbox::bpf_dsl 296 ResultExpr UnsafeTrap(Trap::TrapFnc trap_func, const void* aux) { 379 ResultExpr SandboxBPFDSLPolicy::Trap(Trap function in class:sandbox::bpf_dsl::SandboxBPFDSLPolicy [all...] |
H A D | bpf_dsl.h | 51 // .Else(Trap(SetFlagHandler, NULL)); 64 // | Trap(trap_func, aux) | UnsafeTrap(trap_func, aux) 116 // Helper method so policies can just write Trap(func, aux). 117 static ResultExpr Trap(Trap::TrapFnc trap_func, const void* aux); 141 // Trap specifies a result that the system call should be handled by 144 SANDBOX_EXPORT ResultExpr Trap(Trap::TrapFnc trap_func, const void* aux); 146 // UnsafeTrap is like Trap, except the policy is marked as "unsafe" 154 SANDBOX_EXPORT ResultExpr UnsafeTrap(Trap [all...] |
H A D | bpf_dsl_more_unittest.cc | 99 // any Trap() handlers. This is great for writing short and concise tests, 119 return Trap(IncreaseCounter, counter_ptr_); 229 return Trap(EnomemHandler, aux_); 572 SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == false); 574 SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == false); 576 SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == true); 697 // ever tried to update them from inside a Trap() or UnsafeTrap() handler, 723 // An UnsafeTrap() (or for that matter, a Trap()) has to report error 826 return Trap(BrokerOpenTrapHandler, iob_->broker_process()); 1875 Allow()).Else(Trap(PthreadTrapHandle [all...] |
H A D | bpf_dsl_unittest.cc | 197 return Trap(UnameTrap, &count_);
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
H A D | sigsys_handlers.cc | 248 return bpf_dsl::Trap(CrashSIGSYS_Handler, NULL); 252 return bpf_dsl::Trap(SIGSYSCloneFailure, NULL); 256 return bpf_dsl::Trap(SIGSYSPrctlFailure, NULL); 260 return bpf_dsl::Trap(SIGSYSIoctlFailure, NULL); 264 return bpf_dsl::Trap(SIGSYSKillFailure, NULL); 268 return bpf_dsl::Trap(SIGSYSFutexFailure, NULL); 272 return bpf_dsl::Trap(SIGSYSSchedHandler, NULL);
|
/external/mksh/src/ |
H A D | histrap.c | 32 Trap sigtraps[NSIG + 1]; 1075 Trap * 1079 Trap *p; 1123 Trap *p = &sigtraps[i]; 1157 Trap *p; 1176 Trap *p; 1193 Trap *p; 1221 runtrap(Trap *p, bool is_last) 1284 Trap *p; 1301 Trap * [all...] |
H A D | sh.h | 867 } Trap; typedef in typeref:struct:trap 869 /* values for Trap.flags */ 897 extern Trap sigtraps[NSIG+1]; 1745 Trap *gettrap(const char *, bool); 1751 void runtrap(Trap *, bool); 1754 void settrap(Trap *, const char *); 1757 int setsig(Trap *, sig_t, int); 1758 void setexecsig(Trap *, int);
|
H A D | funcs.c | 1312 Trap *t = NULL; 2262 Trap *p;
|
/external/chromium_org/content/common/sandbox_linux/ |
H A D | bpf_gpu_policy_linux.cc | 197 return Trap(GpuSIGSYS_Handler, broker_process_);
|
/external/clang/lib/Sema/ |
H A D | SemaTemplateDeduction.cpp | 2152 Sema::SFINAETrap Trap(S); 2260 if (Trap.hasErrorOccurred()) 2284 SFINAETrap Trap(*this); 2301 if (Trap.hasErrorOccurred()) 2322 Sema::SFINAETrap Trap(S); 2421 if (Trap.hasErrorOccurred()) 2450 SFINAETrap Trap(*this); 2465 if (Trap.hasErrorOccurred()) 2530 SFINAETrap Trap(*this); 2554 Builder) || Trap [all...] |
H A D | SemaExprMember.cpp | 962 SFINAETrap Trap(*this, true); 968 if (RetryExpr.isUsable() && !Trap.hasErrorOccurred()) { 975 if (Trap.hasErrorOccurred())
|
H A D | SemaDeclCXX.cpp | 8479 DiagnosticErrorTrap Trap(Diags); 8481 Trap.hasErrorOccurred()) { 8816 DiagnosticErrorTrap Trap(Diags); 8818 Trap.hasErrorOccurred()) { 8940 DiagnosticErrorTrap Trap(Diags); 8944 if (CheckDestructor(Destructor) || Trap.hasErrorOccurred()) { 9630 DiagnosticErrorTrap Trap(Diags); 9787 if (Trap.hasErrorOccurred()) { 10036 DiagnosticErrorTrap Trap(Diags); 10209 if (Trap [all...] |
H A D | SemaStmt.cpp | 2048 Sema::SFINAETrap Trap(SemaRef); 2076 : Trap(SemaRef.Diags), D(D), Enabled(Enabled) {} 2078 if (Enabled && Trap.hasErrorOccurred()) 2082 DiagnosticErrorTrap Trap; member in struct:__anon18096::InvalidateOnErrorScope
|
/external/clang/lib/Driver/ |
H A D | Driver.cpp | 436 DiagnosticErrorTrap Trap(Diags); 502 if (Trap.hasErrorOccurred()) {
|