SandboxBPF         24 components/nacl/loader/nacl_sandbox_linux.cc using sandbox::SandboxBPF;
SandboxBPF         63 components/nacl/loader/nacl_sandbox_linux.cc   virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
SandboxBPF         72 components/nacl/loader/nacl_sandbox_linux.cc     sandbox::SandboxBPF* sb, int sysno) const {
SandboxBPF         30 content/common/sandbox_linux/bpf_cros_arm_gpu_policy_linux.cc using sandbox::SandboxBPF;
SandboxBPF        100 content/common/sandbox_linux/bpf_cros_arm_gpu_policy_linux.cc   virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
SandboxBPF        109 content/common/sandbox_linux/bpf_cros_arm_gpu_policy_linux.cc ErrorCode CrosArmGpuBrokerProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
SandboxBPF        128 content/common/sandbox_linux/bpf_cros_arm_gpu_policy_linux.cc ErrorCode CrosArmGpuProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
SandboxBPF         18 content/common/sandbox_linux/bpf_cros_arm_gpu_policy_linux.h   virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
SandboxBPF         35 content/common/sandbox_linux/bpf_gpu_policy_linux.cc using sandbox::SandboxBPF;
SandboxBPF        112 content/common/sandbox_linux/bpf_gpu_policy_linux.cc   virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
SandboxBPF        122 content/common/sandbox_linux/bpf_gpu_policy_linux.cc ErrorCode GpuBrokerProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
SandboxBPF        161 content/common/sandbox_linux/bpf_gpu_policy_linux.cc ErrorCode GpuProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
SandboxBPF         25 content/common/sandbox_linux/bpf_gpu_policy_linux.h   virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
SandboxBPF         36 content/common/sandbox_linux/bpf_ppapi_policy_linux.cc ErrorCode PpapiProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
SandboxBPF         18 content/common/sandbox_linux/bpf_ppapi_policy_linux.h   virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
SandboxBPF         36 content/common/sandbox_linux/bpf_renderer_policy_linux.cc ErrorCode RendererProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
SandboxBPF         18 content/common/sandbox_linux/bpf_renderer_policy_linux.h   virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
SandboxBPF         25 content/common/sandbox_linux/sandbox_bpf_base_policy_linux.cc ErrorCode SandboxBPFBasePolicy::EvaluateSyscall(SandboxBPF* sandbox_compiler,
SandboxBPF         14 content/common/sandbox_linux/sandbox_bpf_base_policy_linux.h using sandbox::SandboxBPF;
SandboxBPF         27 content/common/sandbox_linux/sandbox_bpf_base_policy_linux.h   virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
SandboxBPF         79 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc   virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
SandboxBPF         86 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc ErrorCode BlacklistDebugAndNumaPolicy::EvaluateSyscall(SandboxBPF* sandbox,
SandboxBPF         88 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF        103 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc   virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
SandboxBPF        113 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc ErrorCode AllowAllPolicy::EvaluateSyscall(SandboxBPF*, int sysno) const {
SandboxBPF        114 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF        160 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc   SandboxBPF sandbox;
SandboxBPF        252 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc   SandboxBPF::SandboxStatus bpf_sandbox_status =
SandboxBPF        253 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc       SandboxBPF::SupportsSeccompSandbox(-1);
SandboxBPF        258 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc   if (bpf_sandbox_status != SandboxBPF::STATUS_UNSUPPORTED) {
SandboxBPF         83 sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc ErrorCode EvaluateSyscallImpl(int fs_denied_errno, SandboxBPF* sandbox,
SandboxBPF        170 sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc ErrorCode BaselinePolicy::EvaluateSyscall(SandboxBPF* sandbox,
SandboxBPF         14 sandbox/linux/seccomp-bpf-helpers/baseline_policy.h class SandboxBPF;
SandboxBPF         34 sandbox/linux/seccomp-bpf-helpers/baseline_policy.h   virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
SandboxBPF         66 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc ErrorCode RestrictCloneToThreadsAndEPERMFork(SandboxBPF* sandbox) {
SandboxBPF         87 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc ErrorCode RestrictPrctl(SandboxBPF* sandbox) {
SandboxBPF         99 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc ErrorCode RestrictIoctl(SandboxBPF* sandbox) {
SandboxBPF        107 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc ErrorCode RestrictMmapFlags(SandboxBPF* sandbox) {
SandboxBPF        122 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc ErrorCode RestrictMprotectFlags(SandboxBPF* sandbox) {
SandboxBPF        134 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc ErrorCode RestrictFcntlCommands(SandboxBPF* sandbox) {
SandboxBPF        189 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc ErrorCode RestrictSocketcallCommand(SandboxBPF* sandbox) {
SandboxBPF         18 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h class SandboxBPF;
SandboxBPF         25 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h     RestrictCloneToThreadsAndEPERMFork(SandboxBPF* sandbox);
SandboxBPF         29 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h SANDBOX_EXPORT ErrorCode RestrictPrctl(SandboxBPF* sandbox);
SandboxBPF         33 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h SANDBOX_EXPORT ErrorCode RestrictIoctl(SandboxBPF* sandbox);
SandboxBPF         39 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h SANDBOX_EXPORT ErrorCode RestrictMmapFlags(SandboxBPF* sandbox);
SandboxBPF         43 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h SANDBOX_EXPORT ErrorCode RestrictMprotectFlags(SandboxBPF* sandbox);
SandboxBPF         50 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h SANDBOX_EXPORT ErrorCode RestrictFcntlCommands(SandboxBPF* sandbox);
SandboxBPF         55 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h SANDBOX_EXPORT ErrorCode RestrictSocketcallCommand(SandboxBPF* sandbox);
SandboxBPF         58 sandbox/linux/seccomp-bpf/bpf_tests.h     TestArgs(void (*t)(AuxType&), sandbox::SandboxBPF::EvaluateSyscall p)
SandboxBPF         62 sandbox/linux/seccomp-bpf/bpf_tests.h     sandbox::SandboxBPF::EvaluateSyscall policy() const { return policy_; }
SandboxBPF         68 sandbox/linux/seccomp-bpf/bpf_tests.h     sandbox::SandboxBPF::EvaluateSyscall policy_;
SandboxBPF         75 sandbox/linux/seccomp-bpf/bpf_tests.h     if (sandbox::SandboxBPF::SupportsSeccompSandbox(-1) ==
SandboxBPF         76 sandbox/linux/seccomp-bpf/bpf_tests.h         sandbox::SandboxBPF::STATUS_AVAILABLE) {
SandboxBPF         80 sandbox/linux/seccomp-bpf/bpf_tests.h       BPF_ASSERT(sandbox::SandboxBPF::SupportsSeccompSandbox(proc_fd) ==
SandboxBPF         81 sandbox/linux/seccomp-bpf/bpf_tests.h                  sandbox::SandboxBPF::STATUS_AVAILABLE);
SandboxBPF         84 sandbox/linux/seccomp-bpf/bpf_tests.h       sandbox::SandboxBPF sandbox;
SandboxBPF         87 sandbox/linux/seccomp-bpf/bpf_tests.h       sandbox.SandboxBPF::StartSandbox();
SandboxBPF        100 sandbox/linux/seccomp-bpf/bpf_tests.h       sandbox::SandboxBPF sandbox;
SandboxBPF        102 sandbox/linux/seccomp-bpf/bpf_tests.h       sandbox::SandboxBPF::Program* program =
SandboxBPF         52 sandbox/linux/seccomp-bpf/codegen.cc void CodeGen::PrintProgram(const SandboxBPF::Program& program) {
SandboxBPF         53 sandbox/linux/seccomp-bpf/codegen.cc   for (SandboxBPF::Program::const_iterator iter = program.begin();
SandboxBPF        733 sandbox/linux/seccomp-bpf/codegen.cc                                      SandboxBPF::Program* program) {
SandboxBPF        753 sandbox/linux/seccomp-bpf/codegen.cc void CodeGen::Compile(Instruction* instructions, SandboxBPF::Program* program) {
SandboxBPF         63 sandbox/linux/seccomp-bpf/codegen.h   static void PrintProgram(const SandboxBPF::Program& program);
SandboxBPF         94 sandbox/linux/seccomp-bpf/codegen.h   void Compile(Instruction* instructions, SandboxBPF::Program* program);
SandboxBPF        144 sandbox/linux/seccomp-bpf/codegen.h   void ConcatenateBasicBlocks(const BasicBlocks&, SandboxBPF::Program* program);
SandboxBPF         17 sandbox/linux/seccomp-bpf/codegen_unittest.cc class SandboxUnittestHelper : public SandboxBPF {
SandboxBPF         19 sandbox/linux/seccomp-bpf/codegen_unittest.cc   typedef SandboxBPF::Program Program;
SandboxBPF         34 sandbox/linux/seccomp-bpf/demo.cc using sandbox::SandboxBPF;
SandboxBPF        240 sandbox/linux/seccomp-bpf/demo.cc ErrorCode Evaluator(SandboxBPF* sandbox, int sysno, void *) {
SandboxBPF        416 sandbox/linux/seccomp-bpf/demo.cc   if (SandboxBPF::SupportsSeccompSandbox(proc_fd) !=
SandboxBPF        417 sandbox/linux/seccomp-bpf/demo.cc       SandboxBPF::STATUS_AVAILABLE) {
SandboxBPF        421 sandbox/linux/seccomp-bpf/demo.cc   SandboxBPF sandbox;
SandboxBPF        152 sandbox/linux/seccomp-bpf/errorcode.h   friend class SandboxBPF;
SandboxBPF         24 sandbox/linux/seccomp-bpf/errorcode_unittest.cc   SandboxBPF sandbox;
SandboxBPF         30 sandbox/linux/seccomp-bpf/errorcode_unittest.cc   SandboxBPF sandbox;
SandboxBPF         51 sandbox/linux/seccomp-bpf/errorcode_unittest.cc   SandboxBPF sandbox;
SandboxBPF         72 sandbox/linux/seccomp-bpf/errorcode_unittest.cc   SandboxBPF sandbox;
SandboxBPF         59 sandbox/linux/seccomp-bpf/sandbox_bpf.cc ErrorCode ProbeEvaluator(SandboxBPF*, int sysnum, void*) __attribute__((const));
SandboxBPF         60 sandbox/linux/seccomp-bpf/sandbox_bpf.cc ErrorCode ProbeEvaluator(SandboxBPF*, int sysnum, void*) {
SandboxBPF         80 sandbox/linux/seccomp-bpf/sandbox_bpf.cc ErrorCode AllowAllEvaluator(SandboxBPF*, int sysnum, void*) {
SandboxBPF         81 sandbox/linux/seccomp-bpf/sandbox_bpf.cc   if (!SandboxBPF::IsValidSyscallNumber(sysnum)) {
SandboxBPF        165 sandbox/linux/seccomp-bpf/sandbox_bpf.cc   SandboxBPF* sandbox = static_cast<SandboxBPF*>(aux);
SandboxBPF        185 sandbox/linux/seccomp-bpf/sandbox_bpf.cc   virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
SandboxBPF        208 sandbox/linux/seccomp-bpf/sandbox_bpf.cc   CompatibilityPolicy(SandboxBPF::EvaluateSyscall syscall_evaluator, void* aux)
SandboxBPF        213 sandbox/linux/seccomp-bpf/sandbox_bpf.cc   virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
SandboxBPF        219 sandbox/linux/seccomp-bpf/sandbox_bpf.cc   SandboxBPF::EvaluateSyscall syscall_evaluator_;
SandboxBPF        226 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SandboxBPF::SandboxBPF()
SandboxBPF        232 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SandboxBPF::~SandboxBPF() {
SandboxBPF        249 sandbox/linux/seccomp-bpf/sandbox_bpf.cc bool SandboxBPF::IsValidSyscallNumber(int sysnum) {
SandboxBPF        253 sandbox/linux/seccomp-bpf/sandbox_bpf.cc bool SandboxBPF::RunFunctionInPolicy(void (*code_in_sandbox)(),
SandboxBPF        371 sandbox/linux/seccomp-bpf/sandbox_bpf.cc bool SandboxBPF::KernelSupportSeccompBPF() {
SandboxBPF        376 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SandboxBPF::SandboxStatus SandboxBPF::SupportsSeccompSandbox(int proc_fd) {
SandboxBPF        411 sandbox/linux/seccomp-bpf/sandbox_bpf.cc     SandboxBPF sandbox;
SandboxBPF        431 sandbox/linux/seccomp-bpf/sandbox_bpf.cc void SandboxBPF::set_proc_fd(int proc_fd) { proc_fd_ = proc_fd; }
SandboxBPF        433 sandbox/linux/seccomp-bpf/sandbox_bpf.cc void SandboxBPF::StartSandbox() {
SandboxBPF        471 sandbox/linux/seccomp-bpf/sandbox_bpf.cc void SandboxBPF::PolicySanityChecks(SandboxBPFPolicy* policy) {
SandboxBPF        484 sandbox/linux/seccomp-bpf/sandbox_bpf.cc void SandboxBPF::SetSandboxPolicyDeprecated(EvaluateSyscall syscall_evaluator,
SandboxBPF        493 sandbox/linux/seccomp-bpf/sandbox_bpf.cc void SandboxBPF::SetSandboxPolicy(SandboxBPFPolicy* policy) {
SandboxBPF        502 sandbox/linux/seccomp-bpf/sandbox_bpf.cc void SandboxBPF::InstallFilter() {
SandboxBPF        543 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SandboxBPF::Program* SandboxBPF::AssembleFilter(bool force_verification) {
SandboxBPF        716 sandbox/linux/seccomp-bpf/sandbox_bpf.cc void SandboxBPF::VerifyProgram(const Program& program, bool has_unsafe_traps) {
SandboxBPF        734 sandbox/linux/seccomp-bpf/sandbox_bpf.cc void SandboxBPF::FindRanges(Ranges* ranges) {
SandboxBPF        762 sandbox/linux/seccomp-bpf/sandbox_bpf.cc Instruction* SandboxBPF::AssembleJumpTable(CodeGen* gen,
SandboxBPF        789 sandbox/linux/seccomp-bpf/sandbox_bpf.cc Instruction* SandboxBPF::RetExpression(CodeGen* gen, const ErrorCode& err) {
SandboxBPF        797 sandbox/linux/seccomp-bpf/sandbox_bpf.cc Instruction* SandboxBPF::CondExpression(CodeGen* gen, const ErrorCode& cond) {
SandboxBPF        980 sandbox/linux/seccomp-bpf/sandbox_bpf.cc ErrorCode SandboxBPF::Unexpected64bitArgument() {
SandboxBPF        984 sandbox/linux/seccomp-bpf/sandbox_bpf.cc ErrorCode SandboxBPF::Trap(Trap::TrapFnc fnc, const void* aux) {
SandboxBPF        988 sandbox/linux/seccomp-bpf/sandbox_bpf.cc ErrorCode SandboxBPF::UnsafeTrap(Trap::TrapFnc fnc, const void* aux) {
SandboxBPF        992 sandbox/linux/seccomp-bpf/sandbox_bpf.cc intptr_t SandboxBPF::ForwardSyscall(const struct arch_seccomp_data& args) {
SandboxBPF       1002 sandbox/linux/seccomp-bpf/sandbox_bpf.cc ErrorCode SandboxBPF::Cond(int argno,
SandboxBPF       1016 sandbox/linux/seccomp-bpf/sandbox_bpf.cc ErrorCode SandboxBPF::Kill(const char* msg) {
SandboxBPF       1020 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SandboxBPF::SandboxStatus SandboxBPF::status_ = STATUS_UNKNOWN;
SandboxBPF         45 sandbox/linux/seccomp-bpf/sandbox_bpf.h class SANDBOX_EXPORT SandboxBPF {
SandboxBPF         60 sandbox/linux/seccomp-bpf/sandbox_bpf.h   typedef ErrorCode (*EvaluateSyscall)(SandboxBPF* sandbox_compiler,
SandboxBPF         78 sandbox/linux/seccomp-bpf/sandbox_bpf.h   SandboxBPF();
SandboxBPF         79 sandbox/linux/seccomp-bpf/sandbox_bpf.h   ~SandboxBPF();
SandboxBPF        272 sandbox/linux/seccomp-bpf/sandbox_bpf.h   DISALLOW_COPY_AND_ASSIGN(SandboxBPF);
SandboxBPF         13 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h class SandboxBPF;
SandboxBPF         26 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h   virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
SandboxBPF         53 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc TEST(SandboxBPF, DISABLE_ON_TSAN(CallSupports)) {
SandboxBPF         57 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc       SandboxBPF::SupportsSeccompSandbox(-1) == SandboxBPF::STATUS_AVAILABLE;
SandboxBPF         68 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(CallSupportsTwice)) {
SandboxBPF         69 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   SandboxBPF::SupportsSeccompSandbox(-1);
SandboxBPF         70 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   SandboxBPF::SupportsSeccompSandbox(-1);
SandboxBPF         86 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode VerboseAPITestingPolicy(SandboxBPF* sandbox, int sysno, void* aux) {
SandboxBPF         87 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF         96 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(VerboseAPITesting)) {
SandboxBPF         97 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (SandboxBPF::SupportsSeccompSandbox(-1) ==
SandboxBPF         98 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc       sandbox::SandboxBPF::STATUS_AVAILABLE) {
SandboxBPF        100 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     SandboxBPF sandbox;
SandboxBPF        118 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode BlacklistNanosleepPolicy(SandboxBPF*, int sysno, void*) {
SandboxBPF        119 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF        132 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, ApplyBasicBlacklistPolicy, BlacklistNanosleepPolicy) {
SandboxBPF        142 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode WhitelistGetpidPolicy(SandboxBPF*, int sysno, void*) {
SandboxBPF        152 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, ApplyBasicWhitelistPolicy, WhitelistGetpidPolicy) {
SandboxBPF        172 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode BlacklistNanosleepPolicySigsys(SandboxBPF* sandbox,
SandboxBPF        175 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF        188 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF,
SandboxBPF        209 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode ErrnoTestPolicy(SandboxBPF*, int sysno, void*) {
SandboxBPF        210 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF        239 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, ErrnoTest, ErrnoTestPolicy) {
SandboxBPF        281 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode StackingPolicyPartOne(SandboxBPF* sandbox, int sysno, void*) {
SandboxBPF        282 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF        299 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode StackingPolicyPartTwo(SandboxBPF* sandbox, int sysno, void*) {
SandboxBPF        300 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF        317 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, StackingPolicy, StackingPolicyPartOne) {
SandboxBPF        327 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   SandboxBPF sandbox;
SandboxBPF        354 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode SyntheticPolicy(SandboxBPF*, int sysno, void*) {
SandboxBPF        355 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF        376 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, SyntheticPolicy, SyntheticPolicy) {
SandboxBPF        410 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode ArmPrivatePolicy(SandboxBPF*, int sysno, void*) {
SandboxBPF        411 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF        426 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, ArmPrivatePolicy, ArmPrivatePolicy) {
SandboxBPF        447 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   return SandboxBPF::ForwardSyscall(args);
SandboxBPF        450 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode GreyListedPolicy(SandboxBPF* sandbox, int sysno, void* aux) {
SandboxBPF        475 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   } else if (SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF        483 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, GreyListedPolicy, GreyListedPolicy, int /* BPF_AUX */) {
SandboxBPF        500 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SANDBOX_TEST(SandboxBPF, EnableUnsafeTrapsInSigSysHandler) {
SandboxBPF        519 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     return SandboxBPF::ForwardSyscall(args);
SandboxBPF        523 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode PrctlPolicy(SandboxBPF* sandbox, int sysno, void* aux) {
SandboxBPF        530 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   } else if (SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF        538 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, ForwardSyscall, PrctlPolicy) {
SandboxBPF        566 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   return SandboxBPF::ForwardSyscall(args);
SandboxBPF        569 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode RedirectAllSyscallsPolicy(SandboxBPF* sandbox, int sysno, void* aux) {
SandboxBPF        586 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   } else if (SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF        599 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, SigBus, RedirectAllSyscallsPolicy) {
SandboxBPF        622 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, SigMask, RedirectAllSyscallsPolicy) {
SandboxBPF        649 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, UnsafeTrapWithErrno, RedirectAllSyscallsPolicy) {
SandboxBPF        670 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(SandboxBPF::ForwardSyscall(args) == -EBADF);
SandboxBPF        724 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode DenyOpenPolicy(SandboxBPF* sandbox, int sysno, void* aux) {
SandboxBPF        726 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF        745 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF,
SandboxBPF        792 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode SimpleCondTestPolicy(SandboxBPF* sandbox, int sysno, void*) {
SandboxBPF        793 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF        830 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, SimpleCondTest, SimpleCondTestPolicy) {
SandboxBPF        884 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   ErrorCode Policy(SandboxBPF* sandbox, int sysno) {
SandboxBPF        885 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF       1044 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   ErrorCode ToErrorCode(SandboxBPF* sandbox, ArgValue* arg_value) {
SandboxBPF       1145 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode EqualityStressTestPolicy(SandboxBPF* sandbox, int sysno, void* aux) {
SandboxBPF       1149 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF,
SandboxBPF       1156 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode EqualityArgumentWidthPolicy(SandboxBPF* sandbox, int sysno, void*) {
SandboxBPF       1157 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF       1191 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, EqualityArgumentWidth, EqualityArgumentWidthPolicy) {
SandboxBPF       1211 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_DEATH_TEST(SandboxBPF,
SandboxBPF       1219 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode EqualityWithNegativeArgumentsPolicy(SandboxBPF* sandbox,
SandboxBPF       1222 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF       1237 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF,
SandboxBPF       1246 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_DEATH_TEST(SandboxBPF,
SandboxBPF       1256 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode AllBitTestPolicy(SandboxBPF* sandbox, int sysno, void *) {
SandboxBPF       1263 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF       1349 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, AllBitTests, AllBitTestPolicy) {
SandboxBPF       1452 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode AnyBitTestPolicy(SandboxBPF* sandbox, int sysno, void*) {
SandboxBPF       1459 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF       1526 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, AnyBitTests, AnyBitTestPolicy) {
SandboxBPF       1656 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode PthreadPolicyEquality(SandboxBPF* sandbox, int sysno, void* aux) {
SandboxBPF       1661 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF       1696 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode PthreadPolicyBitMask(SandboxBPF* sandbox, int sysno, void* aux) {
SandboxBPF       1701 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF       1780 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, PthreadEquality, PthreadPolicyEquality) { PthreadTest(); }
SandboxBPF       1782 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, PthreadBitMask, PthreadPolicyBitMask) { PthreadTest(); }
SandboxBPF         81 sandbox/linux/seccomp-bpf/syscall_unittest.cc ErrorCode CopyAllArgsOnUnamePolicy(SandboxBPF* sandbox, int sysno, void* aux) {
SandboxBPF         82 sandbox/linux/seccomp-bpf/syscall_unittest.cc   if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
SandboxBPF         31 sandbox/linux/seccomp-bpf/verifier.cc uint32_t EvaluateErrorCode(SandboxBPF* sandbox,
SandboxBPF         79 sandbox/linux/seccomp-bpf/verifier.cc bool VerifyErrorCode(SandboxBPF* sandbox,
SandboxBPF        363 sandbox/linux/seccomp-bpf/verifier.cc bool Verifier::VerifyBPF(SandboxBPF* sandbox,
SandboxBPF         26 sandbox/linux/seccomp-bpf/verifier.h   static bool VerifyBPF(SandboxBPF* sandbox,