arch_seccomp_data   37 content/common/sandbox_linux/bpf_gpu_policy_linux.cc using sandbox::arch_seccomp_data;
arch_seccomp_data   80 content/common/sandbox_linux/bpf_gpu_policy_linux.cc intptr_t GpuSIGSYS_Handler(const struct arch_seccomp_data& args,
arch_seccomp_data   69 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc intptr_t CrashSIGSYS_Handler(const struct arch_seccomp_data& args, void* aux) {
arch_seccomp_data   97 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc intptr_t SIGSYSCloneFailure(const struct arch_seccomp_data& args, void* aux) {
arch_seccomp_data  116 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc intptr_t SIGSYSPrctlFailure(const struct arch_seccomp_data& args,
arch_seccomp_data  130 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc intptr_t SIGSYSIoctlFailure(const struct arch_seccomp_data& args,
arch_seccomp_data   18 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h struct arch_seccomp_data;
arch_seccomp_data   24 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h     CrashSIGSYS_Handler(const struct arch_seccomp_data& args, void* aux);
arch_seccomp_data   32 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h     SIGSYSCloneFailure(const struct arch_seccomp_data& args, void* aux);
arch_seccomp_data   36 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h     SIGSYSPrctlFailure(const struct arch_seccomp_data& args, void* aux);
arch_seccomp_data   40 sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h     SIGSYSIoctlFailure(const struct arch_seccomp_data& args, void* aux);
arch_seccomp_data   62 sandbox/linux/seccomp-bpf/codegen.cc           if (iter->k == offsetof(struct arch_seccomp_data, nr)) {
arch_seccomp_data   64 sandbox/linux/seccomp-bpf/codegen.cc           } else if (iter->k == offsetof(struct arch_seccomp_data, arch)) {
arch_seccomp_data   67 sandbox/linux/seccomp-bpf/codegen.cc                      offsetof(struct arch_seccomp_data, instruction_pointer)) {
arch_seccomp_data   70 sandbox/linux/seccomp-bpf/codegen.cc                      offsetof(struct arch_seccomp_data, instruction_pointer) +
arch_seccomp_data   73 sandbox/linux/seccomp-bpf/codegen.cc           } else if (iter->k >= offsetof(struct arch_seccomp_data, args) &&
arch_seccomp_data   74 sandbox/linux/seccomp-bpf/codegen.cc                      iter->k < offsetof(struct arch_seccomp_data, args) + 48 &&
arch_seccomp_data   75 sandbox/linux/seccomp-bpf/codegen.cc                      (iter->k - offsetof(struct arch_seccomp_data, args)) % 4 ==
arch_seccomp_data   80 sandbox/linux/seccomp-bpf/codegen.cc                 (int)(iter->k - offsetof(struct arch_seccomp_data, args)) / 8,
arch_seccomp_data   81 sandbox/linux/seccomp-bpf/codegen.cc                 (iter->k - offsetof(struct arch_seccomp_data, args)) % 8 ? 'M'
arch_seccomp_data   35 sandbox/linux/seccomp-bpf/demo.cc using sandbox::arch_seccomp_data;
arch_seccomp_data  220 sandbox/linux/seccomp-bpf/demo.cc intptr_t DefaultHandler(const struct arch_seccomp_data& data, void *) {
arch_seccomp_data   14 sandbox/linux/seccomp-bpf/errorcode.h struct arch_seccomp_data;
arch_seccomp_data  116 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_NR_IDX          (offsetof(struct arch_seccomp_data, nr))
arch_seccomp_data  117 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARCH_IDX        (offsetof(struct arch_seccomp_data, arch))
arch_seccomp_data  118 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_IP_MSB_IDX      (offsetof(struct arch_seccomp_data,           \
arch_seccomp_data  120 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_IP_LSB_IDX      (offsetof(struct arch_seccomp_data,           \
arch_seccomp_data  122 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARG_MSB_IDX(nr) (offsetof(struct arch_seccomp_data, args) +   \
arch_seccomp_data  124 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARG_LSB_IDX(nr) (offsetof(struct arch_seccomp_data, args) +   \
arch_seccomp_data  143 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_NR_IDX          (offsetof(struct arch_seccomp_data, nr))
arch_seccomp_data  144 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARCH_IDX        (offsetof(struct arch_seccomp_data, arch))
arch_seccomp_data  145 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_IP_MSB_IDX      (offsetof(struct arch_seccomp_data,           \
arch_seccomp_data  147 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_IP_LSB_IDX      (offsetof(struct arch_seccomp_data,           \
arch_seccomp_data  149 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARG_MSB_IDX(nr) (offsetof(struct arch_seccomp_data, args) +   \
arch_seccomp_data  151 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARG_LSB_IDX(nr) (offsetof(struct arch_seccomp_data, args) +   \
arch_seccomp_data  181 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_NR_IDX          (offsetof(struct arch_seccomp_data, nr))
arch_seccomp_data  182 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARCH_IDX        (offsetof(struct arch_seccomp_data, arch))
arch_seccomp_data  183 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_IP_MSB_IDX      (offsetof(struct arch_seccomp_data,           \
arch_seccomp_data  185 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_IP_LSB_IDX      (offsetof(struct arch_seccomp_data,           \
arch_seccomp_data  187 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARG_MSB_IDX(nr) (offsetof(struct arch_seccomp_data, args) +   \
arch_seccomp_data  189 sandbox/linux/seccomp-bpf/linux_seccomp.h #define SECCOMP_ARG_LSB_IDX(nr) (offsetof(struct arch_seccomp_data, args) +   \
arch_seccomp_data  142 sandbox/linux/seccomp-bpf/sandbox_bpf.cc intptr_t ReturnErrno(const struct arch_seccomp_data&, void* aux) {
arch_seccomp_data  201 sandbox/linux/seccomp-bpf/sandbox_bpf.cc intptr_t BPFFailure(const struct arch_seccomp_data&, void* aux) {
arch_seccomp_data  992 sandbox/linux/seccomp-bpf/sandbox_bpf.cc intptr_t SandboxBPF::ForwardSyscall(const struct arch_seccomp_data& args) {
arch_seccomp_data  146 sandbox/linux/seccomp-bpf/sandbox_bpf.h   static intptr_t ForwardSyscall(const struct arch_seccomp_data& args);
arch_seccomp_data   80 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc intptr_t FakeGetPid(const struct arch_seccomp_data& args, void* aux) {
arch_seccomp_data  165 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc intptr_t EnomemHandler(const struct arch_seccomp_data& args, void* aux) {
arch_seccomp_data  437 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc intptr_t CountSyscalls(const struct arch_seccomp_data& args, void* aux) {
arch_seccomp_data  513 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc intptr_t PrctlHandler(const struct arch_seccomp_data& args, void*) {
arch_seccomp_data  565 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc intptr_t AllowRedirectedSyscall(const struct arch_seccomp_data& args, void*) {
arch_seccomp_data  667 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   struct arch_seccomp_data args = {};
arch_seccomp_data  701 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc intptr_t BrokerOpenTrapHandler(const struct arch_seccomp_data& args,
arch_seccomp_data 1629 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc intptr_t PthreadTrapHandler(const struct arch_seccomp_data& args, void* aux) {
arch_seccomp_data   72 sandbox/linux/seccomp-bpf/syscall_unittest.cc intptr_t CopySyscallArgsToAux(const struct arch_seccomp_data& args, void* aux) {
arch_seccomp_data  187 sandbox/linux/seccomp-bpf/trap.cc     struct arch_seccomp_data data = {
arch_seccomp_data   44 sandbox/linux/seccomp-bpf/trap.h   typedef intptr_t (*TrapFnc)(const struct arch_seccomp_data& args, void* aux);
arch_seccomp_data   19 sandbox/linux/seccomp-bpf/verifier.cc         const struct arch_seccomp_data& d)
arch_seccomp_data   22 sandbox/linux/seccomp-bpf/verifier.cc   const struct arch_seccomp_data& data;
arch_seccomp_data   33 sandbox/linux/seccomp-bpf/verifier.cc                            const struct arch_seccomp_data& data) {
arch_seccomp_data   81 sandbox/linux/seccomp-bpf/verifier.cc                      struct arch_seccomp_data* data,
arch_seccomp_data  227 sandbox/linux/seccomp-bpf/verifier.cc   if (insn.k < sizeof(struct arch_seccomp_data) && (insn.k & 3) == 0) {
arch_seccomp_data  377 sandbox/linux/seccomp-bpf/verifier.cc     struct arch_seccomp_data data = {static_cast<int>(sysnum),
arch_seccomp_data  399 sandbox/linux/seccomp-bpf/verifier.cc                                const struct arch_seccomp_data& data,
arch_seccomp_data   40 sandbox/linux/seccomp-bpf/verifier.h                               const struct arch_seccomp_data& data,