/external/libchrome/sandbox/linux/seccomp-bpf/ |
H A D | trap_unittest.cc | 15 SANDBOX_TEST_ALLOW_NOISE(Trap, SigSysAction) { 16 // This creates a global Trap instance, and registers the signal handler 17 // (Trap::SigSysAction). 18 Trap::Registry();
|
H A D | trap.h | 20 // The Trap class allows a BPF filter program to branch out to user space by 28 class SANDBOX_EXPORT Trap : public bpf_dsl::TrapRegistry { class in namespace:sandbox 34 // Registry returns the trap registry used by Trap's SIGSYS handler, 55 Trap(); 59 ~Trap() = delete; 71 static Trap* global_trap_; 81 DISALLOW_COPY_AND_ASSIGN(Trap);
|
H A D | trap.cc | 79 Trap::Trap() function in class:sandbox::Trap 112 bpf_dsl::TrapRegistry* Trap::Registry() { 119 global_trap_ = new Trap(); 127 void Trap::SigSysAction(int nr, LinuxSigInfo* info, void* void_context) { 142 "for Trap() handling."); 147 void Trap::SigSys(int nr, LinuxSigInfo* info, ucontext_t* ctx) { 256 bool Trap::TrapKey::operator<(const TrapKey& o) const { 260 uint16_t Trap::Add(TrapFnc fnc, const void* aux, bool safe) { 358 bool Trap [all...] |
H A D | sandbox_bpf.cc | 119 return bpf_dsl::Trap(SandboxPanicTrap, error); 224 bpf_dsl::PolicyCompiler compiler(policy_.get(), Trap::Registry()); 225 if (Trap::SandboxDebuggingAllowedByUser()) {
|
H A D | syscall_unittest.cc | 31 using sandbox::bpf_dsl::Trap; 119 return Trap(CopySyscallArgsToAux, aux_);
|
/external/tpm2/ |
H A D | CpriCryptPri.c | 12 static void Trap(const char *function, int line, int code); 13 FAIL_FUNCTION TpmFailFunction = (FAIL_FUNCTION)&Trap; 23 Trap( function
|
/external/libchrome/sandbox/linux/seccomp-bpf-helpers/ |
H A D | sigsys_handlers.cc | 248 return bpf_dsl::Trap(CrashSIGSYS_Handler, NULL); 252 return bpf_dsl::Trap(SIGSYSCloneFailure, NULL); 256 return bpf_dsl::Trap(SIGSYSPrctlFailure, NULL); 260 return bpf_dsl::Trap(SIGSYSIoctlFailure, NULL); 264 return bpf_dsl::Trap(SIGSYSKillFailure, NULL); 268 return bpf_dsl::Trap(SIGSYSFutexFailure, NULL); 272 return bpf_dsl::Trap(SIGSYSSchedHandler, NULL);
|
/external/libchrome/sandbox/linux/bpf_dsl/ |
H A D | policy_compiler.h | 57 // Trap returns a CodeGen::Node to indicate the system call should 59 CodeGen::Node Trap(TrapRegistry::TrapFnc fnc, const void* aux, bool safe);
|
H A D | bpf_dsl_unittest.cc | 291 return Trap(UnameTrap, &count_); 451 ResultExpr trap = Trap(DummyTrap, nullptr); 465 ResultExpr safe = Trap(DummyTrap, nullptr);
|
H A D | bpf_dsl.cc | 58 return pc->Trap(func_, arg_, safe_); 262 ResultExpr Trap(TrapRegistry::TrapFnc trap_func, const void* aux) { function in namespace:sandbox::bpf_dsl
|
H A D | policy_compiler.cc | 62 // A Trap() handler that returns an "errno" value. The value is encoded 442 return Trap(ReturnErrno, reinterpret_cast<void*>(ret & SECCOMP_RET_DATA), 449 CodeGen::Node PolicyCompiler::Trap(TrapRegistry::TrapFnc fnc, function in class:sandbox::bpf_dsl::PolicyCompiler
|
H A D | bpf_dsl.h | 49 // .Else(Trap(SetFlagHandler, NULL)); 62 // | Trap(trap_func, aux) | UnsafeTrap(trap_func, aux) 103 // Trap specifies a result that the system call should be handled by 107 Trap(TrapRegistry::TrapFnc trap_func, const void* aux); 109 // UnsafeTrap is like Trap, except the policy is marked as "unsafe"
|
/external/mksh/src/ |
H A D | histrap.c | 32 Trap sigtraps[ksh_NSIG + 1]; 1115 Trap * 1119 Trap *p; 1176 Trap *p = &sigtraps[i]; 1209 Trap *p = sigtraps; 1230 Trap *p = sigtraps; 1249 Trap *p = sigtraps; 1280 runtrap(Trap *p, bool is_last) 1343 Trap *p = sigtraps; 1362 Trap * [all...] |
H A D | sh.h | 915 } Trap; typedef in typeref:struct:trap 917 /* values for Trap.flags */ 945 extern Trap sigtraps[ksh_NSIG + 1]; 1817 Trap *gettrap(const char *, bool, bool); 1823 void runtrap(Trap *, bool); 1826 void settrap(Trap *, const char *); 1829 int setsig(Trap *, sig_t, int); 1830 void setexecsig(Trap *, int);
|
H A D | funcs.c | 1344 Trap *t = NULL; 2337 Trap *p = sigtraps;
|
/external/clang/lib/Sema/ |
H A D | SemaTemplateDeduction.cpp | 2122 Sema::SFINAETrap Trap(S); 2230 if (Trap.hasErrorOccurred()) 2254 SFINAETrap Trap(*this); 2271 if (Trap.hasErrorOccurred()) 2292 Sema::SFINAETrap Trap(S); 2391 if (Trap.hasErrorOccurred()) 2420 SFINAETrap Trap(*this); 2435 if (Trap.hasErrorOccurred()) 2500 SFINAETrap Trap(*this); 2524 Builder) || Trap [all...] |
H A D | SemaExprMember.cpp | 1012 SFINAETrap Trap(*this, true); 1018 if (RetryExpr.isUsable() && !Trap.hasErrorOccurred()) { 1024 if (Trap.hasErrorOccurred())
|
H A D | SemaDeclCXX.cpp | 4709 DiagnosticErrorTrap Trap(S.Diags); 4711 if (Trap.hasErrorOccurred()) { 8951 DiagnosticErrorTrap Trap(Diags); 8953 Trap.hasErrorOccurred()) { 9293 DiagnosticErrorTrap Trap(Diags); 9295 Trap.hasErrorOccurred()) { 9423 DiagnosticErrorTrap Trap(Diags); 9427 if (CheckDestructor(Destructor) || Trap.hasErrorOccurred()) { 10173 DiagnosticErrorTrap Trap(Diags); 10332 if (Trap [all...] |
H A D | SemaStmt.cpp | 2104 Sema::SFINAETrap Trap(SemaRef); 2131 : Trap(SemaRef.Diags), D(D), Enabled(Enabled) {} 2133 if (Enabled && Trap.hasErrorOccurred()) 2137 DiagnosticErrorTrap Trap; member in struct:__anon1558::InvalidateOnErrorScope
|
H A D | SemaExprCXX.cpp | 6091 DiagnosticErrorTrap Trap(Diags); 6543 Sema::SFINAETrap Trap(SemaRef); 6545 if (Trap.hasErrorOccurred() || Res.isInvalid())
|
H A D | SemaOverload.cpp | 5914 SFINAETrap Trap(*this); 5950 if (InitializationFailed || Trap.hasErrorOccurred()) 5971 if (InitializationFailed || Trap.hasErrorOccurred())
|
H A D | SemaDecl.cpp | 6945 // Trap errors. 6946 Sema::SFINAETrap Trap(SemaRef); 6957 if (Trap.hasErrorOccurred())
|
/external/clang/lib/Driver/ |
H A D | Driver.cpp | 566 DiagnosticErrorTrap Trap(Diags); 631 if (Trap.hasErrorOccurred()) {
|
/external/clang/include/clang/Sema/ |
H A D | Sema.h | 6853 SFINAETrap Trap; member in class:clang::Sema::TentativeAnalysisScope 6857 : SemaRef(SemaRef), Trap(SemaRef, true),
|
/external/llvm/test/MC/PowerPC/ |
H A D | ppc64-encoding-ext.s | 3071 # Trap mnemonics
|