SANDBOX_DIE       146 sandbox/linux/seccomp-bpf/codegen.cc     SANDBOX_DIE(
SANDBOX_DIE       151 sandbox/linux/seccomp-bpf/codegen.cc     SANDBOX_DIE("Cannot append instructions after a return statement");
SANDBOX_DIE       168 sandbox/linux/seccomp-bpf/codegen.cc     SANDBOX_DIE("ErrorCodes can only be used in return expressions");
SANDBOX_DIE       172 sandbox/linux/seccomp-bpf/codegen.cc     SANDBOX_DIE("ErrorCode is not suitable for returning from a BPF program");
SANDBOX_DIE       184 sandbox/linux/seccomp-bpf/codegen.cc     SANDBOX_DIE("Expected a BPF_JMP instruction");
SANDBOX_DIE       189 sandbox/linux/seccomp-bpf/codegen.cc     SANDBOX_DIE("Branches must jump to a valid instruction");
SANDBOX_DIE       203 sandbox/linux/seccomp-bpf/codegen.cc         SANDBOX_DIE("Cannot append instructions in the middle of a sequence");
SANDBOX_DIE       212 sandbox/linux/seccomp-bpf/codegen.cc         SANDBOX_DIE("Cannot append instructions after a jump");
SANDBOX_DIE       216 sandbox/linux/seccomp-bpf/codegen.cc     SANDBOX_DIE("Cannot append instructions after a return statement");
SANDBOX_DIE       218 sandbox/linux/seccomp-bpf/codegen.cc     SANDBOX_DIE("Cannot append instructions in the middle of a sequence");
SANDBOX_DIE       272 sandbox/linux/seccomp-bpf/codegen.cc         SANDBOX_DIE(
SANDBOX_DIE       299 sandbox/linux/seccomp-bpf/codegen.cc           SANDBOX_DIE(
SANDBOX_DIE       320 sandbox/linux/seccomp-bpf/codegen.cc       SANDBOX_DIE("Found a jump inside of a basic block");
SANDBOX_DIE       337 sandbox/linux/seccomp-bpf/codegen.cc     SANDBOX_DIE(
SANDBOX_DIE       366 sandbox/linux/seccomp-bpf/codegen.cc       SANDBOX_DIE("Internal compiler error; cannot compute basic blocks");
SANDBOX_DIE       643 sandbox/linux/seccomp-bpf/codegen.cc         SANDBOX_DIE("Internal compiler error; cyclic graph detected");
SANDBOX_DIE       722 sandbox/linux/seccomp-bpf/codegen.cc       SANDBOX_DIE("Internal compiler error; invalid basic block encountered");
SANDBOX_DIE       755 sandbox/linux/seccomp-bpf/codegen.cc     SANDBOX_DIE(
SANDBOX_DIE        21 sandbox/linux/seccomp-bpf/errorcode.cc       SANDBOX_DIE("Invalid use of ErrorCode object");
SANDBOX_DIE        47 sandbox/linux/seccomp-bpf/errorcode.cc     SANDBOX_DIE("Invalid opcode in BPF sandbox rules");
SANDBOX_DIE        53 sandbox/linux/seccomp-bpf/errorcode.cc     SANDBOX_DIE("Dereferencing invalid ErrorCode");
SANDBOX_DIE        65 sandbox/linux/seccomp-bpf/errorcode.cc     SANDBOX_DIE("Corrupted ErrorCode");
SANDBOX_DIE        75 sandbox/linux/seccomp-bpf/errorcode.cc     SANDBOX_DIE("Dereferencing invalid ErrorCode");
SANDBOX_DIE        99 sandbox/linux/seccomp-bpf/errorcode.cc       SANDBOX_DIE("Corrupted ErrorCode");
SANDBOX_DIE       202 sandbox/linux/seccomp-bpf/sandbox_bpf.cc   SANDBOX_DIE(static_cast<char*>(aux));
SANDBOX_DIE       260 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE("sigprocmask() failed");
SANDBOX_DIE       264 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE("pipe() failed");
SANDBOX_DIE       268 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE("Process started without standard file descriptors");
SANDBOX_DIE       284 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE("fork() failed unexpectedly");
SANDBOX_DIE       299 sandbox/linux/seccomp-bpf/sandbox_bpf.cc       SANDBOX_DIE(NULL);
SANDBOX_DIE       313 sandbox/linux/seccomp-bpf/sandbox_bpf.cc       SANDBOX_DIE(NULL);
SANDBOX_DIE       321 sandbox/linux/seccomp-bpf/sandbox_bpf.cc       SANDBOX_DIE(NULL);
SANDBOX_DIE       332 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE(NULL);
SANDBOX_DIE       337 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE("close() failed");
SANDBOX_DIE       340 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE("sigprocmask() failed");
SANDBOX_DIE       344 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE("waitpid() failed unexpectedly");
SANDBOX_DIE       361 sandbox/linux/seccomp-bpf/sandbox_bpf.cc       SANDBOX_DIE(buf);
SANDBOX_DIE       365 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE("close() failed");
SANDBOX_DIE       435 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE(
SANDBOX_DIE       439 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE(
SANDBOX_DIE       451 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE("Cannot start sandbox, if process is already multi-threaded");
SANDBOX_DIE       459 sandbox/linux/seccomp-bpf/sandbox_bpf.cc       SANDBOX_DIE("Failed to close file descriptor for /proc");
SANDBOX_DIE       475 sandbox/linux/seccomp-bpf/sandbox_bpf.cc       SANDBOX_DIE(
SANDBOX_DIE       487 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE("Cannot change policy after sandbox has started");
SANDBOX_DIE       496 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE("Cannot change policy after sandbox has started");
SANDBOX_DIE       531 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE(quiet_ ? NULL : "Kernel refuses to enable no-new-privs");
SANDBOX_DIE       534 sandbox/linux/seccomp-bpf/sandbox_bpf.cc       SANDBOX_DIE(quiet_ ? NULL : "Kernel refuses to turn on BPF filters");
SANDBOX_DIE       554 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE("Out of memory");
SANDBOX_DIE       602 sandbox/linux/seccomp-bpf/sandbox_bpf.cc         SANDBOX_DIE(
SANDBOX_DIE       622 sandbox/linux/seccomp-bpf/sandbox_bpf.cc         SANDBOX_DIE(
SANDBOX_DIE       633 sandbox/linux/seccomp-bpf/sandbox_bpf.cc         SANDBOX_DIE("We'd rather die than enable unsafe traps");
SANDBOX_DIE       730 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE(err);
SANDBOX_DIE       752 sandbox/linux/seccomp-bpf/sandbox_bpf.cc       SANDBOX_DIE("Invalid seccomp policy");
SANDBOX_DIE       770 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE("Invalid set of system call ranges");
SANDBOX_DIE       801 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SANDBOX_DIE(
SANDBOX_DIE       943 sandbox/linux/seccomp-bpf/sandbox_bpf.cc       SANDBOX_DIE("Not implemented");
SANDBOX_DIE       953 sandbox/linux/seccomp-bpf/sandbox_bpf.cc       SANDBOX_DIE(
SANDBOX_DIE        55 sandbox/linux/seccomp-bpf/trap.cc     SANDBOX_DIE("Failed to block SIGBUS");
SANDBOX_DIE        81 sandbox/linux/seccomp-bpf/trap.cc     SANDBOX_DIE("Failed to configure SIGSYS handler");
SANDBOX_DIE        96 sandbox/linux/seccomp-bpf/trap.cc     SANDBOX_DIE("Failed to configure SIGSYS handler");
SANDBOX_DIE       109 sandbox/linux/seccomp-bpf/trap.cc       SANDBOX_DIE("Failed to allocate global trap handler");
SANDBOX_DIE       237 sandbox/linux/seccomp-bpf/trap.cc     SANDBOX_DIE(
SANDBOX_DIE       268 sandbox/linux/seccomp-bpf/trap.cc       SANDBOX_DIE("Too many SECCOMP_RET_TRAP callback instances");
SANDBOX_DIE       129 sandbox/linux/seccomp-bpf/verifier.cc             SANDBOX_DIE(