SandboxSyscall 25 sandbox/linux/seccomp-bpf/die.cc SandboxSyscall(__NR_exit_group, 1); SandboxSyscall 33 sandbox/linux/seccomp-bpf/die.cc SandboxSyscall(__NR_prctl, PR_SET_DUMPABLE, (void*)0, (void*)0, (void*)0); SandboxSyscall 43 sandbox/linux/seccomp-bpf/die.cc SandboxSyscall(__NR_exit_group, 1); SandboxSyscall 78 sandbox/linux/seccomp-bpf/die.cc HANDLE_EINTR(SandboxSyscall(__NR_write, 2, s.c_str(), s.length()))); SandboxSyscall 601 sandbox/linux/seccomp-bpf/sandbox_bpf.cc if (SandboxSyscall(-1) == -1 && errno == ENOSYS) { SandboxSyscall 640 sandbox/linux/seccomp-bpf/sandbox_bpf.cc static_cast<uintptr_t>(SandboxSyscall(-1)); SandboxSyscall 993 sandbox/linux/seccomp-bpf/sandbox_bpf.cc return SandboxSyscall(args.nr, SandboxSyscall 1128 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SandboxSyscall( SandboxSyscall 1192 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 0, 0x55555555) == -1); SandboxSyscall 1193 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 0, 0xAAAAAAAA) == -2); SandboxSyscall 1198 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x55555555AAAAAAAAULL) == -1); SandboxSyscall 1199 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x5555555500000000ULL) == -2); SandboxSyscall 1200 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x5555555511111111ULL) == -2); SandboxSyscall 1201 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x11111111AAAAAAAAULL) == -2); SandboxSyscall 1203 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x55555555) == -2); SandboxSyscall 1215 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SandboxSyscall(__NR_uname, 0, 0x5555555555555555ULL); SandboxSyscall 1240 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 0xFFFFFFFF) == -1); SandboxSyscall 1241 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, -1) == -1); SandboxSyscall 1242 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, -1LL) == -1); SandboxSyscall 1253 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 0xFFFFFFFF00000000LL) == -1); SandboxSyscall 1335 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, (testcase), (arg)) == (expected_value)) SandboxSyscall 1743 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SandboxSyscall(__NR_futex, arg, FUTEX_WAKE, 1, 0, 0, 0); SandboxSyscall 1762 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc while (SandboxSyscall(__NR_futex, &thread_ran, FUTEX_WAIT, 0, 0, 0, 0) == SandboxSyscall 1773 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_clone, SandboxSyscall 20 sandbox/linux/seccomp-bpf/syscall.h SANDBOX_EXPORT intptr_t SandboxSyscall(int nr, SandboxSyscall 51 sandbox/linux/seccomp-bpf/syscall.h SANDBOX_EXPORT inline intptr_t SandboxSyscall(int nr, SandboxSyscall 62 sandbox/linux/seccomp-bpf/syscall.h SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3, T4 p4, T5 p5) { SandboxSyscall 63 sandbox/linux/seccomp-bpf/syscall.h return SandboxSyscall(nr, SandboxSyscall 80 sandbox/linux/seccomp-bpf/syscall.h SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3, T4 p4, T5 p5) SandboxSyscall 84 sandbox/linux/seccomp-bpf/syscall.h SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3, T4 p4, T5 p5) { SandboxSyscall 85 sandbox/linux/seccomp-bpf/syscall.h return SandboxSyscall(nr, SandboxSyscall 96 sandbox/linux/seccomp-bpf/syscall.h SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3, T4 p4) SandboxSyscall 100 sandbox/linux/seccomp-bpf/syscall.h SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3, T4 p4) { SandboxSyscall 101 sandbox/linux/seccomp-bpf/syscall.h return SandboxSyscall(nr, p0, p1, p2, p3, p4, 0); SandboxSyscall 106 sandbox/linux/seccomp-bpf/syscall.h SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3) SandboxSyscall 110 sandbox/linux/seccomp-bpf/syscall.h SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3) { SandboxSyscall 111 sandbox/linux/seccomp-bpf/syscall.h return SandboxSyscall(nr, p0, p1, p2, p3, 0, 0); SandboxSyscall 115 sandbox/linux/seccomp-bpf/syscall.h SANDBOX_EXPORT inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2) SandboxSyscall 118 sandbox/linux/seccomp-bpf/syscall.h SANDBOX_EXPORT inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2) { SandboxSyscall 119 sandbox/linux/seccomp-bpf/syscall.h return SandboxSyscall(nr, p0, p1, p2, 0, 0, 0); SandboxSyscall 123 sandbox/linux/seccomp-bpf/syscall.h SANDBOX_EXPORT inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1) SandboxSyscall 126 sandbox/linux/seccomp-bpf/syscall.h SANDBOX_EXPORT inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1) { SandboxSyscall 127 sandbox/linux/seccomp-bpf/syscall.h return SandboxSyscall(nr, p0, p1, 0, 0, 0, 0); SandboxSyscall 131 sandbox/linux/seccomp-bpf/syscall.h SANDBOX_EXPORT inline intptr_t SandboxSyscall(int nr, T0 p0) SandboxSyscall 134 sandbox/linux/seccomp-bpf/syscall.h SANDBOX_EXPORT inline intptr_t SandboxSyscall(int nr, T0 p0) { SandboxSyscall 135 sandbox/linux/seccomp-bpf/syscall.h return SandboxSyscall(nr, p0, 0, 0, 0, 0, 0); SandboxSyscall 138 sandbox/linux/seccomp-bpf/syscall.h SANDBOX_EXPORT inline intptr_t SandboxSyscall(int nr) SandboxSyscall 140 sandbox/linux/seccomp-bpf/syscall.h SANDBOX_EXPORT inline intptr_t SandboxSyscall(int nr) { SandboxSyscall 141 sandbox/linux/seccomp-bpf/syscall.h return SandboxSyscall(nr, 0, 0, 0, 0, 0, 0); SandboxSyscall 38 sandbox/linux/seccomp-bpf/syscall_unittest.cc EXPECT_NE(SandboxSyscall(-1), syscall(-1)); SandboxSyscall 44 sandbox/linux/seccomp-bpf/syscall_unittest.cc EXPECT_EQ(0x80CDu, ((uint16_t*)SandboxSyscall(-1))[-1]); // INT 0x80 SandboxSyscall 46 sandbox/linux/seccomp-bpf/syscall_unittest.cc EXPECT_EQ(0x050Fu, ((uint16_t*)SandboxSyscall(-1))[-1]); // SYSCALL SandboxSyscall 49 sandbox/linux/seccomp-bpf/syscall_unittest.cc EXPECT_EQ(0xDF00u, ((uint16_t*)SandboxSyscall(-1))[-1]); // SWI 0 SandboxSyscall 51 sandbox/linux/seccomp-bpf/syscall_unittest.cc EXPECT_EQ(0xEF000000u, ((uint32_t*)SandboxSyscall(-1))[-1]); // SVC 0 SandboxSyscall 60 sandbox/linux/seccomp-bpf/syscall_unittest.cc EXPECT_EQ(SandboxSyscall(__NR_getpid), syscall(__NR_getpid)); SandboxSyscall 66 sandbox/linux/seccomp-bpf/syscall_unittest.cc ASSERT_GE(new_fd = SandboxSyscall(__NR_dup, 2), 0); SandboxSyscall 67 sandbox/linux/seccomp-bpf/syscall_unittest.cc int close_return_value = IGNORE_EINTR(SandboxSyscall(__NR_close, new_fd)); SandboxSyscall 110 sandbox/linux/seccomp-bpf/syscall_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, SandboxSyscall 134 sandbox/linux/seccomp-bpf/syscall_unittest.cc ASSERT_LE(0, fd = SandboxSyscall(__NR_open, "/dev/null", O_RDWR, 0L)); SandboxSyscall 140 sandbox/linux/seccomp-bpf/syscall_unittest.cc SandboxSyscall(kMMapNr, SandboxSyscall 152 sandbox/linux/seccomp-bpf/syscall_unittest.cc SandboxSyscall(kMMapNr, SandboxSyscall 162 sandbox/linux/seccomp-bpf/syscall_unittest.cc EXPECT_EQ(0, SandboxSyscall(__NR_munmap, addr1, 4096L)); SandboxSyscall 163 sandbox/linux/seccomp-bpf/syscall_unittest.cc EXPECT_EQ(0, IGNORE_EINTR(SandboxSyscall(__NR_close, fd))); SandboxSyscall 167 sandbox/linux/seccomp-bpf/syscall_unittest.cc ASSERT_GE(fd = SandboxSyscall(__NR_open, "/proc/self/exe", O_RDONLY, 0L), 0); SandboxSyscall 170 sandbox/linux/seccomp-bpf/syscall_unittest.cc addr2 = reinterpret_cast<char*>(SandboxSyscall( SandboxSyscall 173 sandbox/linux/seccomp-bpf/syscall_unittest.cc addr3 = reinterpret_cast<char*>(SandboxSyscall(kMMapNr, SandboxSyscall 190 sandbox/linux/seccomp-bpf/syscall_unittest.cc EXPECT_EQ(8192, SandboxSyscall(__NR_read, fd, buf, 8192L)); SandboxSyscall 194 sandbox/linux/seccomp-bpf/syscall_unittest.cc EXPECT_EQ(0, SandboxSyscall(__NR_munmap, addr2, 8192L)); SandboxSyscall 195 sandbox/linux/seccomp-bpf/syscall_unittest.cc EXPECT_EQ(0, SandboxSyscall(__NR_munmap, addr3, 4096L)); SandboxSyscall 196 sandbox/linux/seccomp-bpf/syscall_unittest.cc EXPECT_EQ(0, IGNORE_EINTR(SandboxSyscall(__NR_close, fd))); SandboxSyscall 171 sandbox/linux/seccomp-bpf/trap.cc rc = SandboxSyscall(sigsys.nr,