arch_seccomp_data 37 content/common/sandbox_linux/bpf_gpu_policy_linux.cc using sandbox::arch_seccomp_data; arch_seccomp_data 80 content/common/sandbox_linux/bpf_gpu_policy_linux.cc intptr_t GpuSIGSYS_Handler(const struct arch_seccomp_data& args, arch_seccomp_data 69 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc intptr_t CrashSIGSYS_Handler(const struct arch_seccomp_data& args, void* aux) { arch_seccomp_data 97 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc intptr_t SIGSYSCloneFailure(const struct arch_seccomp_data& args, void* aux) { arch_seccomp_data 116 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc intptr_t SIGSYSPrctlFailure(const struct arch_seccomp_data& args, arch_seccomp_data 130 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc intptr_t SIGSYSIoctlFailure(const struct arch_seccomp_data& args, arch_seccomp_data 18 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h struct arch_seccomp_data; arch_seccomp_data 24 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h CrashSIGSYS_Handler(const struct arch_seccomp_data& args, void* aux); arch_seccomp_data 32 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h SIGSYSCloneFailure(const struct arch_seccomp_data& args, void* aux); arch_seccomp_data 36 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h SIGSYSPrctlFailure(const struct arch_seccomp_data& args, void* aux); arch_seccomp_data 40 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h SIGSYSIoctlFailure(const struct arch_seccomp_data& args, void* aux); arch_seccomp_data 62 sandbox/linux/seccomp-bpf/codegen.cc if (iter->k == offsetof(struct arch_seccomp_data, nr)) { arch_seccomp_data 64 sandbox/linux/seccomp-bpf/codegen.cc } else if (iter->k == offsetof(struct arch_seccomp_data, arch)) { arch_seccomp_data 67 sandbox/linux/seccomp-bpf/codegen.cc offsetof(struct arch_seccomp_data, instruction_pointer)) { arch_seccomp_data 70 sandbox/linux/seccomp-bpf/codegen.cc offsetof(struct arch_seccomp_data, instruction_pointer) + arch_seccomp_data 73 sandbox/linux/seccomp-bpf/codegen.cc } else if (iter->k >= offsetof(struct arch_seccomp_data, args) && arch_seccomp_data 74 sandbox/linux/seccomp-bpf/codegen.cc iter->k < offsetof(struct arch_seccomp_data, args) + 48 && arch_seccomp_data 75 sandbox/linux/seccomp-bpf/codegen.cc (iter->k - offsetof(struct arch_seccomp_data, args)) % 4 == arch_seccomp_data 80 sandbox/linux/seccomp-bpf/codegen.cc (int)(iter->k - offsetof(struct arch_seccomp_data, args)) / 8, arch_seccomp_data 81 sandbox/linux/seccomp-bpf/codegen.cc (iter->k - offsetof(struct arch_seccomp_data, args)) % 8 ? 'M' arch_seccomp_data 35 sandbox/linux/seccomp-bpf/demo.cc using sandbox::arch_seccomp_data; arch_seccomp_data 220 sandbox/linux/seccomp-bpf/demo.cc intptr_t DefaultHandler(const struct arch_seccomp_data& data, void *) { arch_seccomp_data 14 sandbox/linux/seccomp-bpf/errorcode.h struct arch_seccomp_data; arch_seccomp_data 116 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_NR_IDX (offsetof(struct arch_seccomp_data, nr)) arch_seccomp_data 117 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARCH_IDX (offsetof(struct arch_seccomp_data, arch)) arch_seccomp_data 118 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_IP_MSB_IDX (offsetof(struct arch_seccomp_data, \ arch_seccomp_data 120 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_IP_LSB_IDX (offsetof(struct arch_seccomp_data, \ arch_seccomp_data 122 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARG_MSB_IDX(nr) (offsetof(struct arch_seccomp_data, args) + \ arch_seccomp_data 124 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARG_LSB_IDX(nr) (offsetof(struct arch_seccomp_data, args) + \ arch_seccomp_data 143 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_NR_IDX (offsetof(struct arch_seccomp_data, nr)) arch_seccomp_data 144 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARCH_IDX (offsetof(struct arch_seccomp_data, arch)) arch_seccomp_data 145 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_IP_MSB_IDX (offsetof(struct arch_seccomp_data, \ arch_seccomp_data 147 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_IP_LSB_IDX (offsetof(struct arch_seccomp_data, \ arch_seccomp_data 149 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARG_MSB_IDX(nr) (offsetof(struct arch_seccomp_data, args) + \ arch_seccomp_data 151 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARG_LSB_IDX(nr) (offsetof(struct arch_seccomp_data, args) + \ arch_seccomp_data 181 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_NR_IDX (offsetof(struct arch_seccomp_data, nr)) arch_seccomp_data 182 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARCH_IDX (offsetof(struct arch_seccomp_data, arch)) arch_seccomp_data 183 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_IP_MSB_IDX (offsetof(struct arch_seccomp_data, \ arch_seccomp_data 185 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_IP_LSB_IDX (offsetof(struct arch_seccomp_data, \ arch_seccomp_data 187 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARG_MSB_IDX(nr) (offsetof(struct arch_seccomp_data, args) + \ arch_seccomp_data 189 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARG_LSB_IDX(nr) (offsetof(struct arch_seccomp_data, args) + \ arch_seccomp_data 142 sandbox/linux/seccomp-bpf/sandbox_bpf.cc intptr_t ReturnErrno(const struct arch_seccomp_data&, void* aux) { arch_seccomp_data 201 sandbox/linux/seccomp-bpf/sandbox_bpf.cc intptr_t BPFFailure(const struct arch_seccomp_data&, void* aux) { arch_seccomp_data 992 sandbox/linux/seccomp-bpf/sandbox_bpf.cc intptr_t SandboxBPF::ForwardSyscall(const struct arch_seccomp_data& args) { arch_seccomp_data 146 sandbox/linux/seccomp-bpf/sandbox_bpf.h static intptr_t ForwardSyscall(const struct arch_seccomp_data& args); arch_seccomp_data 80 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc intptr_t FakeGetPid(const struct arch_seccomp_data& args, void* aux) { arch_seccomp_data 165 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc intptr_t EnomemHandler(const struct arch_seccomp_data& args, void* aux) { arch_seccomp_data 437 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc intptr_t CountSyscalls(const struct arch_seccomp_data& args, void* aux) { arch_seccomp_data 513 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc intptr_t PrctlHandler(const struct arch_seccomp_data& args, void*) { arch_seccomp_data 565 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc intptr_t AllowRedirectedSyscall(const struct arch_seccomp_data& args, void*) { arch_seccomp_data 667 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc struct arch_seccomp_data args = {}; arch_seccomp_data 701 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc intptr_t BrokerOpenTrapHandler(const struct arch_seccomp_data& args, arch_seccomp_data 1629 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc intptr_t PthreadTrapHandler(const struct arch_seccomp_data& args, void* aux) { arch_seccomp_data 72 sandbox/linux/seccomp-bpf/syscall_unittest.cc intptr_t CopySyscallArgsToAux(const struct arch_seccomp_data& args, void* aux) { arch_seccomp_data 187 sandbox/linux/seccomp-bpf/trap.cc struct arch_seccomp_data data = { arch_seccomp_data 44 sandbox/linux/seccomp-bpf/trap.h typedef intptr_t (*TrapFnc)(const struct arch_seccomp_data& args, void* aux); arch_seccomp_data 19 sandbox/linux/seccomp-bpf/verifier.cc const struct arch_seccomp_data& d) arch_seccomp_data 22 sandbox/linux/seccomp-bpf/verifier.cc const struct arch_seccomp_data& data; arch_seccomp_data 33 sandbox/linux/seccomp-bpf/verifier.cc const struct arch_seccomp_data& data) { arch_seccomp_data 81 sandbox/linux/seccomp-bpf/verifier.cc struct arch_seccomp_data* data, arch_seccomp_data 227 sandbox/linux/seccomp-bpf/verifier.cc if (insn.k < sizeof(struct arch_seccomp_data) && (insn.k & 3) == 0) { arch_seccomp_data 377 sandbox/linux/seccomp-bpf/verifier.cc struct arch_seccomp_data data = {static_cast<int>(sysnum), arch_seccomp_data 399 sandbox/linux/seccomp-bpf/verifier.cc const struct arch_seccomp_data& data, arch_seccomp_data 40 sandbox/linux/seccomp-bpf/verifier.h const struct arch_seccomp_data& data,