/external/mksh/src/ |
H A D | funcs.c | 1312 Trap *t = NULL; 2262 Trap *p;
|
H A D | histrap.c | 32 Trap sigtraps[NSIG + 1]; 1075 Trap * 1079 Trap *p; 1123 Trap *p = &sigtraps[i]; 1157 Trap *p; 1176 Trap *p; 1193 Trap *p; 1221 runtrap(Trap *p, bool is_last) 1284 Trap *p; 1301 Trap * [all...] |
H A D | sh.h | 867 } Trap; typedef in typeref:struct:trap 869 /* values for Trap.flags */ 897 extern Trap sigtraps[NSIG+1]; 1745 Trap *gettrap(const char *, bool); 1751 void runtrap(Trap *, bool); 1754 void settrap(Trap *, const char *); 1757 int setsig(Trap *, sig_t, int); 1758 void setexecsig(Trap *, int);
|
/external/llvm/test/MC/PowerPC/ |
H A D | ppc64-encoding-ext.s | 3071 # Trap mnemonics
|
/external/clang/lib/Sema/ |
H A D | SemaExprCXX.cpp | 5629 DiagnosticErrorTrap Trap(Diags);
|
H A D | SemaExprMember.cpp | 962 SFINAETrap Trap(*this, true); 968 if (RetryExpr.isUsable() && !Trap.hasErrorOccurred()) { 975 if (Trap.hasErrorOccurred())
|
H A D | SemaOverload.cpp | 5694 SFINAETrap Trap(*this); 5727 if (InitializationFailed || Trap.hasErrorOccurred())
|
H A D | SemaStmt.cpp | 2048 Sema::SFINAETrap Trap(SemaRef); 2076 : Trap(SemaRef.Diags), D(D), Enabled(Enabled) {} 2078 if (Enabled && Trap.hasErrorOccurred()) 2082 DiagnosticErrorTrap Trap; member in struct:__anon18096::InvalidateOnErrorScope
|
H A D | SemaTemplateDeduction.cpp | 2152 Sema::SFINAETrap Trap(S); 2260 if (Trap.hasErrorOccurred()) 2284 SFINAETrap Trap(*this); 2301 if (Trap.hasErrorOccurred()) 2322 Sema::SFINAETrap Trap(S); 2421 if (Trap.hasErrorOccurred()) 2450 SFINAETrap Trap(*this); 2465 if (Trap.hasErrorOccurred()) 2530 SFINAETrap Trap(*this); 2554 Builder) || Trap [all...] |
H A D | SemaDecl.cpp | 6346 // Trap errors. 6347 Sema::SFINAETrap Trap(SemaRef); 6358 if (Trap.hasErrorOccurred())
|
H A D | SemaDeclCXX.cpp | 8479 DiagnosticErrorTrap Trap(Diags); 8481 Trap.hasErrorOccurred()) { 8816 DiagnosticErrorTrap Trap(Diags); 8818 Trap.hasErrorOccurred()) { 8940 DiagnosticErrorTrap Trap(Diags); 8944 if (CheckDestructor(Destructor) || Trap.hasErrorOccurred()) { 9630 DiagnosticErrorTrap Trap(Diags); 9787 if (Trap.hasErrorOccurred()) { 10036 DiagnosticErrorTrap Trap(Diags); 10209 if (Trap [all...] |
/external/clang/include/clang/Sema/ |
H A D | Sema.h | 6484 SFINAETrap Trap; member in class:clang::Sema::TentativeAnalysisScope 6488 : SemaRef(SemaRef), Trap(SemaRef, true),
|
/external/clang/lib/Driver/ |
H A D | Driver.cpp | 436 DiagnosticErrorTrap Trap(Diags); 502 if (Trap.hasErrorOccurred()) {
|
/external/chromium_org/sandbox/linux/bpf_dsl/ |
H A D | bpf_dsl.cc | 86 TrapResultExprImpl(Trap::TrapFnc func, const void* arg) 92 return sb->Trap(func_, arg_); 98 Trap::TrapFnc func_; 106 UnsafeTrapResultExprImpl(Trap::TrapFnc func, const void* arg) 118 Trap::TrapFnc func_; 292 ResultExpr Trap(Trap::TrapFnc trap_func, const void* aux) { function in namespace:sandbox::bpf_dsl 296 ResultExpr UnsafeTrap(Trap::TrapFnc trap_func, const void* aux) { 379 ResultExpr SandboxBPFDSLPolicy::Trap(Trap function in class:sandbox::bpf_dsl::SandboxBPFDSLPolicy [all...] |
H A D | bpf_dsl.h | 51 // .Else(Trap(SetFlagHandler, NULL)); 64 // | Trap(trap_func, aux) | UnsafeTrap(trap_func, aux) 116 // Helper method so policies can just write Trap(func, aux). 117 static ResultExpr Trap(Trap::TrapFnc trap_func, const void* aux); 141 // Trap specifies a result that the system call should be handled by 144 SANDBOX_EXPORT ResultExpr Trap(Trap::TrapFnc trap_func, const void* aux); 146 // UnsafeTrap is like Trap, except the policy is marked as "unsafe" 154 SANDBOX_EXPORT ResultExpr UnsafeTrap(Trap [all...] |
H A D | bpf_dsl_more_unittest.cc | 99 // any Trap() handlers. This is great for writing short and concise tests, 119 return Trap(IncreaseCounter, counter_ptr_); 229 return Trap(EnomemHandler, aux_); 572 SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == false); 574 SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == false); 576 SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == true); 697 // ever tried to update them from inside a Trap() or UnsafeTrap() handler, 723 // An UnsafeTrap() (or for that matter, a Trap()) has to report error 826 return Trap(BrokerOpenTrapHandler, iob_->broker_process()); 1875 Allow()).Else(Trap(PthreadTrapHandle [all...] |
H A D | bpf_dsl_unittest.cc | 197 return Trap(UnameTrap, &count_);
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
H A D | errorcode.cc | 35 ErrorCode::ErrorCode(Trap::TrapFnc fnc, const void* aux, bool safe) 40 err_(SECCOMP_RET_TRAP + Trap::MakeTrap(fnc, aux, safe)) {
|
H A D | errorcode.h | 150 friend class Trap; 155 ErrorCode(Trap::TrapFnc fnc, const void* aux, bool safe); 171 Trap::TrapFnc fnc_; // Callback function and arg, if trap was
|
H A D | errorcode_unittest.cc | 28 ErrorCode e3 = sandbox.Trap(NULL, NULL); 43 SANDBOX_TEST(ErrorCode, Trap) { 45 ErrorCode e0 = sandbox.Trap(NULL, "a"); 46 ErrorCode e1 = sandbox.Trap(NULL, "b"); 50 ErrorCode e2 = sandbox.Trap(NULL, "a"); 66 ErrorCode e4 = sandbox.Trap(NULL, "a"); 67 ErrorCode e5 = sandbox.Trap(NULL, "b"); 68 ErrorCode e6 = sandbox.Trap(NULL, "a"); 87 ErrorCode e4 = sandbox.Trap(NULL, "a"); 88 ErrorCode e5 = sandbox.Trap(NUL [all...] |
H A D | sandbox_bpf.cc | 177 if (!Trap::IsSafeTrapId(insn->k & SECCOMP_RET_DATA)) { 184 // A Trap() handler that returns an "errno" value. The value is encoded 197 // it rewrites the instruction to instead call a Trap() handler that does 212 insn->k = sandbox->Trap(ReturnErrno, 244 return sandbox_compiler->Trap(ReturnErrno, reinterpret_cast<void*>(err)); 738 if (!Trap::EnableUnsafeTrapsInSigSysHandler()) { 1054 ErrorCode SandboxBPF::Trap(Trap::TrapFnc fnc, const void* aux) { function in class:sandbox::SandboxBPF 1055 return ErrorCode(fnc, aux, true /* Safe Trap */); 1058 ErrorCode SandboxBPF::UnsafeTrap(Trap [all...] |
H A D | sandbox_bpf.h | 98 // for a description of how to pass data from SetSandboxPolicy() to a Trap() 100 static ErrorCode Trap(Trap::TrapFnc fnc, const void* aux); 112 static ErrorCode UnsafeTrap(Trap::TrapFnc fnc, const void* aux);
|
H A D | syscall_unittest.cc | 111 return sandbox->Trap(CopySyscallArgsToAux, aux_);
|
H A D | trap.cc | 77 Trap::Trap() function in class:sandbox::Trap 107 Trap* Trap::GetInstance() { 114 global_trap_ = new Trap(); 122 void Trap::SigSysAction(int nr, siginfo_t* info, void* void_context) { 126 "for Trap() handling."); 131 void Trap::SigSys(int nr, siginfo_t* info, void* void_context) { 243 bool Trap::TrapKey::operator<(const TrapKey& o) const { 253 uint16_t Trap [all...] |
H A D | trap.h | 26 // The Trap class allows a BPF filter program to branch out to user space by 34 class SANDBOX_EXPORT Trap { class in namespace:sandbox 84 Trap(); 88 ~Trap(); 97 static Trap* GetInstance(); 111 static Trap* global_trap_; 121 DISALLOW_COPY_AND_ASSIGN(Trap);
|