SANDBOX_DIE 146 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE( SANDBOX_DIE 151 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE("Cannot append instructions after a return statement"); SANDBOX_DIE 168 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE("ErrorCodes can only be used in return expressions"); SANDBOX_DIE 172 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE("ErrorCode is not suitable for returning from a BPF program"); SANDBOX_DIE 184 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE("Expected a BPF_JMP instruction"); SANDBOX_DIE 189 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE("Branches must jump to a valid instruction"); SANDBOX_DIE 203 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE("Cannot append instructions in the middle of a sequence"); SANDBOX_DIE 212 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE("Cannot append instructions after a jump"); SANDBOX_DIE 216 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE("Cannot append instructions after a return statement"); SANDBOX_DIE 218 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE("Cannot append instructions in the middle of a sequence"); SANDBOX_DIE 272 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE( SANDBOX_DIE 299 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE( SANDBOX_DIE 320 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE("Found a jump inside of a basic block"); SANDBOX_DIE 337 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE( SANDBOX_DIE 366 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE("Internal compiler error; cannot compute basic blocks"); SANDBOX_DIE 643 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE("Internal compiler error; cyclic graph detected"); SANDBOX_DIE 722 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE("Internal compiler error; invalid basic block encountered"); SANDBOX_DIE 755 sandbox/linux/seccomp-bpf/codegen.cc SANDBOX_DIE( SANDBOX_DIE 21 sandbox/linux/seccomp-bpf/errorcode.cc SANDBOX_DIE("Invalid use of ErrorCode object"); SANDBOX_DIE 47 sandbox/linux/seccomp-bpf/errorcode.cc SANDBOX_DIE("Invalid opcode in BPF sandbox rules"); SANDBOX_DIE 53 sandbox/linux/seccomp-bpf/errorcode.cc SANDBOX_DIE("Dereferencing invalid ErrorCode"); SANDBOX_DIE 65 sandbox/linux/seccomp-bpf/errorcode.cc SANDBOX_DIE("Corrupted ErrorCode"); SANDBOX_DIE 75 sandbox/linux/seccomp-bpf/errorcode.cc SANDBOX_DIE("Dereferencing invalid ErrorCode"); SANDBOX_DIE 99 sandbox/linux/seccomp-bpf/errorcode.cc SANDBOX_DIE("Corrupted ErrorCode"); SANDBOX_DIE 202 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE(static_cast<char*>(aux)); SANDBOX_DIE 260 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("sigprocmask() failed"); SANDBOX_DIE 264 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("pipe() failed"); SANDBOX_DIE 268 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("Process started without standard file descriptors"); SANDBOX_DIE 284 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("fork() failed unexpectedly"); SANDBOX_DIE 299 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE(NULL); SANDBOX_DIE 313 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE(NULL); SANDBOX_DIE 321 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE(NULL); SANDBOX_DIE 332 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE(NULL); SANDBOX_DIE 337 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("close() failed"); SANDBOX_DIE 340 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("sigprocmask() failed"); SANDBOX_DIE 344 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("waitpid() failed unexpectedly"); SANDBOX_DIE 361 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE(buf); SANDBOX_DIE 365 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("close() failed"); SANDBOX_DIE 435 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE( SANDBOX_DIE 439 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE( SANDBOX_DIE 451 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("Cannot start sandbox, if process is already multi-threaded"); SANDBOX_DIE 459 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("Failed to close file descriptor for /proc"); SANDBOX_DIE 475 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE( SANDBOX_DIE 487 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("Cannot change policy after sandbox has started"); SANDBOX_DIE 496 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("Cannot change policy after sandbox has started"); SANDBOX_DIE 531 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE(quiet_ ? NULL : "Kernel refuses to enable no-new-privs"); SANDBOX_DIE 534 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE(quiet_ ? NULL : "Kernel refuses to turn on BPF filters"); SANDBOX_DIE 554 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("Out of memory"); SANDBOX_DIE 602 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE( SANDBOX_DIE 622 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE( SANDBOX_DIE 633 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("We'd rather die than enable unsafe traps"); SANDBOX_DIE 730 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE(err); SANDBOX_DIE 752 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("Invalid seccomp policy"); SANDBOX_DIE 770 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("Invalid set of system call ranges"); SANDBOX_DIE 801 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE( SANDBOX_DIE 943 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE("Not implemented"); SANDBOX_DIE 953 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SANDBOX_DIE( SANDBOX_DIE 55 sandbox/linux/seccomp-bpf/trap.cc SANDBOX_DIE("Failed to block SIGBUS"); SANDBOX_DIE 81 sandbox/linux/seccomp-bpf/trap.cc SANDBOX_DIE("Failed to configure SIGSYS handler"); SANDBOX_DIE 96 sandbox/linux/seccomp-bpf/trap.cc SANDBOX_DIE("Failed to configure SIGSYS handler"); SANDBOX_DIE 109 sandbox/linux/seccomp-bpf/trap.cc SANDBOX_DIE("Failed to allocate global trap handler"); SANDBOX_DIE 237 sandbox/linux/seccomp-bpf/trap.cc SANDBOX_DIE( SANDBOX_DIE 268 sandbox/linux/seccomp-bpf/trap.cc SANDBOX_DIE("Too many SECCOMP_RET_TRAP callback instances"); SANDBOX_DIE 129 sandbox/linux/seccomp-bpf/verifier.cc SANDBOX_DIE(