SandboxBPF 24 components/nacl/loader/nacl_sandbox_linux.cc using sandbox::SandboxBPF; SandboxBPF 63 components/nacl/loader/nacl_sandbox_linux.cc virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, SandboxBPF 72 components/nacl/loader/nacl_sandbox_linux.cc sandbox::SandboxBPF* sb, int sysno) const { SandboxBPF 30 content/common/sandbox_linux/bpf_cros_arm_gpu_policy_linux.cc using sandbox::SandboxBPF; SandboxBPF 100 content/common/sandbox_linux/bpf_cros_arm_gpu_policy_linux.cc virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, SandboxBPF 109 content/common/sandbox_linux/bpf_cros_arm_gpu_policy_linux.cc ErrorCode CrosArmGpuBrokerProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox, SandboxBPF 128 content/common/sandbox_linux/bpf_cros_arm_gpu_policy_linux.cc ErrorCode CrosArmGpuProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox, SandboxBPF 18 content/common/sandbox_linux/bpf_cros_arm_gpu_policy_linux.h virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, SandboxBPF 35 content/common/sandbox_linux/bpf_gpu_policy_linux.cc using sandbox::SandboxBPF; SandboxBPF 112 content/common/sandbox_linux/bpf_gpu_policy_linux.cc virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, SandboxBPF 122 content/common/sandbox_linux/bpf_gpu_policy_linux.cc ErrorCode GpuBrokerProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox, SandboxBPF 161 content/common/sandbox_linux/bpf_gpu_policy_linux.cc ErrorCode GpuProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox, SandboxBPF 25 content/common/sandbox_linux/bpf_gpu_policy_linux.h virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, SandboxBPF 36 content/common/sandbox_linux/bpf_ppapi_policy_linux.cc ErrorCode PpapiProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox, SandboxBPF 18 content/common/sandbox_linux/bpf_ppapi_policy_linux.h virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, SandboxBPF 36 content/common/sandbox_linux/bpf_renderer_policy_linux.cc ErrorCode RendererProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox, SandboxBPF 18 content/common/sandbox_linux/bpf_renderer_policy_linux.h virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, SandboxBPF 25 content/common/sandbox_linux/sandbox_bpf_base_policy_linux.cc ErrorCode SandboxBPFBasePolicy::EvaluateSyscall(SandboxBPF* sandbox_compiler, SandboxBPF 14 content/common/sandbox_linux/sandbox_bpf_base_policy_linux.h using sandbox::SandboxBPF; SandboxBPF 27 content/common/sandbox_linux/sandbox_bpf_base_policy_linux.h virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, SandboxBPF 79 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, SandboxBPF 86 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc ErrorCode BlacklistDebugAndNumaPolicy::EvaluateSyscall(SandboxBPF* sandbox, SandboxBPF 88 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 103 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, SandboxBPF 113 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc ErrorCode AllowAllPolicy::EvaluateSyscall(SandboxBPF*, int sysno) const { SandboxBPF 114 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 160 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc SandboxBPF sandbox; SandboxBPF 252 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc SandboxBPF::SandboxStatus bpf_sandbox_status = SandboxBPF 253 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc SandboxBPF::SupportsSeccompSandbox(-1); SandboxBPF 258 content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc if (bpf_sandbox_status != SandboxBPF::STATUS_UNSUPPORTED) { SandboxBPF 83 sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc ErrorCode EvaluateSyscallImpl(int fs_denied_errno, SandboxBPF* sandbox, SandboxBPF 170 sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc ErrorCode BaselinePolicy::EvaluateSyscall(SandboxBPF* sandbox, SandboxBPF 14 sandbox/linux/seccomp-bpf-helpers/baseline_policy.h class SandboxBPF; SandboxBPF 34 sandbox/linux/seccomp-bpf-helpers/baseline_policy.h virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, SandboxBPF 66 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc ErrorCode RestrictCloneToThreadsAndEPERMFork(SandboxBPF* sandbox) { SandboxBPF 87 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc ErrorCode RestrictPrctl(SandboxBPF* sandbox) { SandboxBPF 99 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc ErrorCode RestrictIoctl(SandboxBPF* sandbox) { SandboxBPF 107 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc ErrorCode RestrictMmapFlags(SandboxBPF* sandbox) { SandboxBPF 122 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc ErrorCode RestrictMprotectFlags(SandboxBPF* sandbox) { SandboxBPF 134 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc ErrorCode RestrictFcntlCommands(SandboxBPF* sandbox) { SandboxBPF 189 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc ErrorCode RestrictSocketcallCommand(SandboxBPF* sandbox) { SandboxBPF 18 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h class SandboxBPF; SandboxBPF 25 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h RestrictCloneToThreadsAndEPERMFork(SandboxBPF* sandbox); SandboxBPF 29 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h SANDBOX_EXPORT ErrorCode RestrictPrctl(SandboxBPF* sandbox); SandboxBPF 33 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h SANDBOX_EXPORT ErrorCode RestrictIoctl(SandboxBPF* sandbox); SandboxBPF 39 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h SANDBOX_EXPORT ErrorCode RestrictMmapFlags(SandboxBPF* sandbox); SandboxBPF 43 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h SANDBOX_EXPORT ErrorCode RestrictMprotectFlags(SandboxBPF* sandbox); SandboxBPF 50 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h SANDBOX_EXPORT ErrorCode RestrictFcntlCommands(SandboxBPF* sandbox); SandboxBPF 55 sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h SANDBOX_EXPORT ErrorCode RestrictSocketcallCommand(SandboxBPF* sandbox); SandboxBPF 58 sandbox/linux/seccomp-bpf/bpf_tests.h TestArgs(void (*t)(AuxType&), sandbox::SandboxBPF::EvaluateSyscall p) SandboxBPF 62 sandbox/linux/seccomp-bpf/bpf_tests.h sandbox::SandboxBPF::EvaluateSyscall policy() const { return policy_; } SandboxBPF 68 sandbox/linux/seccomp-bpf/bpf_tests.h sandbox::SandboxBPF::EvaluateSyscall policy_; SandboxBPF 75 sandbox/linux/seccomp-bpf/bpf_tests.h if (sandbox::SandboxBPF::SupportsSeccompSandbox(-1) == SandboxBPF 76 sandbox/linux/seccomp-bpf/bpf_tests.h sandbox::SandboxBPF::STATUS_AVAILABLE) { SandboxBPF 80 sandbox/linux/seccomp-bpf/bpf_tests.h BPF_ASSERT(sandbox::SandboxBPF::SupportsSeccompSandbox(proc_fd) == SandboxBPF 81 sandbox/linux/seccomp-bpf/bpf_tests.h sandbox::SandboxBPF::STATUS_AVAILABLE); SandboxBPF 84 sandbox/linux/seccomp-bpf/bpf_tests.h sandbox::SandboxBPF sandbox; SandboxBPF 87 sandbox/linux/seccomp-bpf/bpf_tests.h sandbox.SandboxBPF::StartSandbox(); SandboxBPF 100 sandbox/linux/seccomp-bpf/bpf_tests.h sandbox::SandboxBPF sandbox; SandboxBPF 102 sandbox/linux/seccomp-bpf/bpf_tests.h sandbox::SandboxBPF::Program* program = SandboxBPF 52 sandbox/linux/seccomp-bpf/codegen.cc void CodeGen::PrintProgram(const SandboxBPF::Program& program) { SandboxBPF 53 sandbox/linux/seccomp-bpf/codegen.cc for (SandboxBPF::Program::const_iterator iter = program.begin(); SandboxBPF 733 sandbox/linux/seccomp-bpf/codegen.cc SandboxBPF::Program* program) { SandboxBPF 753 sandbox/linux/seccomp-bpf/codegen.cc void CodeGen::Compile(Instruction* instructions, SandboxBPF::Program* program) { SandboxBPF 63 sandbox/linux/seccomp-bpf/codegen.h static void PrintProgram(const SandboxBPF::Program& program); SandboxBPF 94 sandbox/linux/seccomp-bpf/codegen.h void Compile(Instruction* instructions, SandboxBPF::Program* program); SandboxBPF 144 sandbox/linux/seccomp-bpf/codegen.h void ConcatenateBasicBlocks(const BasicBlocks&, SandboxBPF::Program* program); SandboxBPF 17 sandbox/linux/seccomp-bpf/codegen_unittest.cc class SandboxUnittestHelper : public SandboxBPF { SandboxBPF 19 sandbox/linux/seccomp-bpf/codegen_unittest.cc typedef SandboxBPF::Program Program; SandboxBPF 34 sandbox/linux/seccomp-bpf/demo.cc using sandbox::SandboxBPF; SandboxBPF 240 sandbox/linux/seccomp-bpf/demo.cc ErrorCode Evaluator(SandboxBPF* sandbox, int sysno, void *) { SandboxBPF 416 sandbox/linux/seccomp-bpf/demo.cc if (SandboxBPF::SupportsSeccompSandbox(proc_fd) != SandboxBPF 417 sandbox/linux/seccomp-bpf/demo.cc SandboxBPF::STATUS_AVAILABLE) { SandboxBPF 421 sandbox/linux/seccomp-bpf/demo.cc SandboxBPF sandbox; SandboxBPF 152 sandbox/linux/seccomp-bpf/errorcode.h friend class SandboxBPF; SandboxBPF 24 sandbox/linux/seccomp-bpf/errorcode_unittest.cc SandboxBPF sandbox; SandboxBPF 30 sandbox/linux/seccomp-bpf/errorcode_unittest.cc SandboxBPF sandbox; SandboxBPF 51 sandbox/linux/seccomp-bpf/errorcode_unittest.cc SandboxBPF sandbox; SandboxBPF 72 sandbox/linux/seccomp-bpf/errorcode_unittest.cc SandboxBPF sandbox; SandboxBPF 59 sandbox/linux/seccomp-bpf/sandbox_bpf.cc ErrorCode ProbeEvaluator(SandboxBPF*, int sysnum, void*) __attribute__((const)); SandboxBPF 60 sandbox/linux/seccomp-bpf/sandbox_bpf.cc ErrorCode ProbeEvaluator(SandboxBPF*, int sysnum, void*) { SandboxBPF 80 sandbox/linux/seccomp-bpf/sandbox_bpf.cc ErrorCode AllowAllEvaluator(SandboxBPF*, int sysnum, void*) { SandboxBPF 81 sandbox/linux/seccomp-bpf/sandbox_bpf.cc if (!SandboxBPF::IsValidSyscallNumber(sysnum)) { SandboxBPF 165 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SandboxBPF* sandbox = static_cast<SandboxBPF*>(aux); SandboxBPF 185 sandbox/linux/seccomp-bpf/sandbox_bpf.cc virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, SandboxBPF 208 sandbox/linux/seccomp-bpf/sandbox_bpf.cc CompatibilityPolicy(SandboxBPF::EvaluateSyscall syscall_evaluator, void* aux) SandboxBPF 213 sandbox/linux/seccomp-bpf/sandbox_bpf.cc virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, SandboxBPF 219 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SandboxBPF::EvaluateSyscall syscall_evaluator_; SandboxBPF 226 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SandboxBPF::SandboxBPF() SandboxBPF 232 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SandboxBPF::~SandboxBPF() { SandboxBPF 249 sandbox/linux/seccomp-bpf/sandbox_bpf.cc bool SandboxBPF::IsValidSyscallNumber(int sysnum) { SandboxBPF 253 sandbox/linux/seccomp-bpf/sandbox_bpf.cc bool SandboxBPF::RunFunctionInPolicy(void (*code_in_sandbox)(), SandboxBPF 371 sandbox/linux/seccomp-bpf/sandbox_bpf.cc bool SandboxBPF::KernelSupportSeccompBPF() { SandboxBPF 376 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SandboxBPF::SandboxStatus SandboxBPF::SupportsSeccompSandbox(int proc_fd) { SandboxBPF 411 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SandboxBPF sandbox; SandboxBPF 431 sandbox/linux/seccomp-bpf/sandbox_bpf.cc void SandboxBPF::set_proc_fd(int proc_fd) { proc_fd_ = proc_fd; } SandboxBPF 433 sandbox/linux/seccomp-bpf/sandbox_bpf.cc void SandboxBPF::StartSandbox() { SandboxBPF 471 sandbox/linux/seccomp-bpf/sandbox_bpf.cc void SandboxBPF::PolicySanityChecks(SandboxBPFPolicy* policy) { SandboxBPF 484 sandbox/linux/seccomp-bpf/sandbox_bpf.cc void SandboxBPF::SetSandboxPolicyDeprecated(EvaluateSyscall syscall_evaluator, SandboxBPF 493 sandbox/linux/seccomp-bpf/sandbox_bpf.cc void SandboxBPF::SetSandboxPolicy(SandboxBPFPolicy* policy) { SandboxBPF 502 sandbox/linux/seccomp-bpf/sandbox_bpf.cc void SandboxBPF::InstallFilter() { SandboxBPF 543 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SandboxBPF::Program* SandboxBPF::AssembleFilter(bool force_verification) { SandboxBPF 716 sandbox/linux/seccomp-bpf/sandbox_bpf.cc void SandboxBPF::VerifyProgram(const Program& program, bool has_unsafe_traps) { SandboxBPF 734 sandbox/linux/seccomp-bpf/sandbox_bpf.cc void SandboxBPF::FindRanges(Ranges* ranges) { SandboxBPF 762 sandbox/linux/seccomp-bpf/sandbox_bpf.cc Instruction* SandboxBPF::AssembleJumpTable(CodeGen* gen, SandboxBPF 789 sandbox/linux/seccomp-bpf/sandbox_bpf.cc Instruction* SandboxBPF::RetExpression(CodeGen* gen, const ErrorCode& err) { SandboxBPF 797 sandbox/linux/seccomp-bpf/sandbox_bpf.cc Instruction* SandboxBPF::CondExpression(CodeGen* gen, const ErrorCode& cond) { SandboxBPF 980 sandbox/linux/seccomp-bpf/sandbox_bpf.cc ErrorCode SandboxBPF::Unexpected64bitArgument() { SandboxBPF 984 sandbox/linux/seccomp-bpf/sandbox_bpf.cc ErrorCode SandboxBPF::Trap(Trap::TrapFnc fnc, const void* aux) { SandboxBPF 988 sandbox/linux/seccomp-bpf/sandbox_bpf.cc ErrorCode SandboxBPF::UnsafeTrap(Trap::TrapFnc fnc, const void* aux) { SandboxBPF 992 sandbox/linux/seccomp-bpf/sandbox_bpf.cc intptr_t SandboxBPF::ForwardSyscall(const struct arch_seccomp_data& args) { SandboxBPF 1002 sandbox/linux/seccomp-bpf/sandbox_bpf.cc ErrorCode SandboxBPF::Cond(int argno, SandboxBPF 1016 sandbox/linux/seccomp-bpf/sandbox_bpf.cc ErrorCode SandboxBPF::Kill(const char* msg) { SandboxBPF 1020 sandbox/linux/seccomp-bpf/sandbox_bpf.cc SandboxBPF::SandboxStatus SandboxBPF::status_ = STATUS_UNKNOWN; SandboxBPF 45 sandbox/linux/seccomp-bpf/sandbox_bpf.h class SANDBOX_EXPORT SandboxBPF { SandboxBPF 60 sandbox/linux/seccomp-bpf/sandbox_bpf.h typedef ErrorCode (*EvaluateSyscall)(SandboxBPF* sandbox_compiler, SandboxBPF 78 sandbox/linux/seccomp-bpf/sandbox_bpf.h SandboxBPF(); SandboxBPF 79 sandbox/linux/seccomp-bpf/sandbox_bpf.h ~SandboxBPF(); SandboxBPF 272 sandbox/linux/seccomp-bpf/sandbox_bpf.h DISALLOW_COPY_AND_ASSIGN(SandboxBPF); SandboxBPF 13 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h class SandboxBPF; SandboxBPF 26 sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, SandboxBPF 53 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc TEST(SandboxBPF, DISABLE_ON_TSAN(CallSupports)) { SandboxBPF 57 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SandboxBPF::SupportsSeccompSandbox(-1) == SandboxBPF::STATUS_AVAILABLE; SandboxBPF 68 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(CallSupportsTwice)) { SandboxBPF 69 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SandboxBPF::SupportsSeccompSandbox(-1); SandboxBPF 70 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SandboxBPF::SupportsSeccompSandbox(-1); SandboxBPF 86 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode VerboseAPITestingPolicy(SandboxBPF* sandbox, int sysno, void* aux) { SandboxBPF 87 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 96 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(VerboseAPITesting)) { SandboxBPF 97 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (SandboxBPF::SupportsSeccompSandbox(-1) == SandboxBPF 98 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc sandbox::SandboxBPF::STATUS_AVAILABLE) { SandboxBPF 100 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SandboxBPF sandbox; SandboxBPF 118 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode BlacklistNanosleepPolicy(SandboxBPF*, int sysno, void*) { SandboxBPF 119 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 132 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, ApplyBasicBlacklistPolicy, BlacklistNanosleepPolicy) { SandboxBPF 142 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode WhitelistGetpidPolicy(SandboxBPF*, int sysno, void*) { SandboxBPF 152 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, ApplyBasicWhitelistPolicy, WhitelistGetpidPolicy) { SandboxBPF 172 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode BlacklistNanosleepPolicySigsys(SandboxBPF* sandbox, SandboxBPF 175 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 188 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, SandboxBPF 209 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode ErrnoTestPolicy(SandboxBPF*, int sysno, void*) { SandboxBPF 210 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 239 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, ErrnoTest, ErrnoTestPolicy) { SandboxBPF 281 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode StackingPolicyPartOne(SandboxBPF* sandbox, int sysno, void*) { SandboxBPF 282 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 299 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode StackingPolicyPartTwo(SandboxBPF* sandbox, int sysno, void*) { SandboxBPF 300 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 317 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, StackingPolicy, StackingPolicyPartOne) { SandboxBPF 327 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SandboxBPF sandbox; SandboxBPF 354 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode SyntheticPolicy(SandboxBPF*, int sysno, void*) { SandboxBPF 355 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 376 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, SyntheticPolicy, SyntheticPolicy) { SandboxBPF 410 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode ArmPrivatePolicy(SandboxBPF*, int sysno, void*) { SandboxBPF 411 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 426 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, ArmPrivatePolicy, ArmPrivatePolicy) { SandboxBPF 447 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc return SandboxBPF::ForwardSyscall(args); SandboxBPF 450 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode GreyListedPolicy(SandboxBPF* sandbox, int sysno, void* aux) { SandboxBPF 475 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc } else if (SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 483 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, GreyListedPolicy, GreyListedPolicy, int /* BPF_AUX */) { SandboxBPF 500 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SANDBOX_TEST(SandboxBPF, EnableUnsafeTrapsInSigSysHandler) { SandboxBPF 519 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc return SandboxBPF::ForwardSyscall(args); SandboxBPF 523 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode PrctlPolicy(SandboxBPF* sandbox, int sysno, void* aux) { SandboxBPF 530 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc } else if (SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 538 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, ForwardSyscall, PrctlPolicy) { SandboxBPF 566 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc return SandboxBPF::ForwardSyscall(args); SandboxBPF 569 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode RedirectAllSyscallsPolicy(SandboxBPF* sandbox, int sysno, void* aux) { SandboxBPF 586 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc } else if (SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 599 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, SigBus, RedirectAllSyscallsPolicy) { SandboxBPF 622 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, SigMask, RedirectAllSyscallsPolicy) { SandboxBPF 649 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, UnsafeTrapWithErrno, RedirectAllSyscallsPolicy) { SandboxBPF 670 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxBPF::ForwardSyscall(args) == -EBADF); SandboxBPF 724 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode DenyOpenPolicy(SandboxBPF* sandbox, int sysno, void* aux) { SandboxBPF 726 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 745 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, SandboxBPF 792 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode SimpleCondTestPolicy(SandboxBPF* sandbox, int sysno, void*) { SandboxBPF 793 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 830 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, SimpleCondTest, SimpleCondTestPolicy) { SandboxBPF 884 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode Policy(SandboxBPF* sandbox, int sysno) { SandboxBPF 885 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 1044 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode ToErrorCode(SandboxBPF* sandbox, ArgValue* arg_value) { SandboxBPF 1145 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode EqualityStressTestPolicy(SandboxBPF* sandbox, int sysno, void* aux) { SandboxBPF 1149 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, SandboxBPF 1156 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode EqualityArgumentWidthPolicy(SandboxBPF* sandbox, int sysno, void*) { SandboxBPF 1157 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 1191 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, EqualityArgumentWidth, EqualityArgumentWidthPolicy) { SandboxBPF 1211 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_DEATH_TEST(SandboxBPF, SandboxBPF 1219 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode EqualityWithNegativeArgumentsPolicy(SandboxBPF* sandbox, SandboxBPF 1222 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 1237 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, SandboxBPF 1246 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_DEATH_TEST(SandboxBPF, SandboxBPF 1256 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode AllBitTestPolicy(SandboxBPF* sandbox, int sysno, void *) { SandboxBPF 1263 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 1349 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, AllBitTests, AllBitTestPolicy) { SandboxBPF 1452 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode AnyBitTestPolicy(SandboxBPF* sandbox, int sysno, void*) { SandboxBPF 1459 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 1526 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, AnyBitTests, AnyBitTestPolicy) { SandboxBPF 1656 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode PthreadPolicyEquality(SandboxBPF* sandbox, int sysno, void* aux) { SandboxBPF 1661 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 1696 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc ErrorCode PthreadPolicyBitMask(SandboxBPF* sandbox, int sysno, void* aux) { SandboxBPF 1701 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 1780 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, PthreadEquality, PthreadPolicyEquality) { PthreadTest(); } SandboxBPF 1782 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_TEST(SandboxBPF, PthreadBitMask, PthreadPolicyBitMask) { PthreadTest(); } SandboxBPF 81 sandbox/linux/seccomp-bpf/syscall_unittest.cc ErrorCode CopyAllArgsOnUnamePolicy(SandboxBPF* sandbox, int sysno, void* aux) { SandboxBPF 82 sandbox/linux/seccomp-bpf/syscall_unittest.cc if (!SandboxBPF::IsValidSyscallNumber(sysno)) { SandboxBPF 31 sandbox/linux/seccomp-bpf/verifier.cc uint32_t EvaluateErrorCode(SandboxBPF* sandbox, SandboxBPF 79 sandbox/linux/seccomp-bpf/verifier.cc bool VerifyErrorCode(SandboxBPF* sandbox, SandboxBPF 363 sandbox/linux/seccomp-bpf/verifier.cc bool Verifier::VerifyBPF(SandboxBPF* sandbox, SandboxBPF 26 sandbox/linux/seccomp-bpf/verifier.h static bool VerifyBPF(SandboxBPF* sandbox,