Lines Matching full:sandbox
7 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
8 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
9 #include "sandbox/linux/seccomp-bpf/verifier.h"
15 using playground2::Sandbox;
38 uint32_t EvaluateErrorCode(Sandbox *sandbox, const ErrorCode& code,
48 return sandbox->Unexpected64bitArgument().err();
52 return EvaluateErrorCode(sandbox,
60 return EvaluateErrorCode(sandbox,
69 return EvaluateErrorCode(sandbox,
84 bool VerifyErrorCode(Sandbox *sandbox,
95 } else if (computed_ret != EvaluateErrorCode(sandbox, root_code, *data)) {
116 if (!VerifyErrorCode(sandbox, program, data, root_code,
124 if (!VerifyErrorCode(sandbox, program, data, root_code,
142 if (!VerifyErrorCode(sandbox, program, data, root_code,
143 sandbox->Unexpected64bitArgument(),
155 if (!VerifyErrorCode(sandbox, program, data, root_code,
192 if (!VerifyErrorCode(sandbox, program, data, root_code, passed, err)) {
196 if (!VerifyErrorCode(sandbox, program, data, root_code, passed, err)) {
200 if (!VerifyErrorCode(sandbox, program, data, root_code, failed, err)) {
361 bool Verifier::VerifyBPF(Sandbox *sandbox,
363 const Sandbox::Evaluators& evaluators,
370 Sandbox::EvaluateSyscall evaluate_syscall = evaluators.begin()->first;
394 ErrorCode code = evaluate_syscall(sandbox, sysnum, aux);
395 if (!VerifyErrorCode(sandbox, program, &data, code, code, err)) {