OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:SANDBOX_DIE
(Results
1 - 6
of
6
) sorted by null
/external/chromium_org/sandbox/linux/seccomp-bpf/
errorcode.cc
21
SANDBOX_DIE
("Invalid use of ErrorCode object");
47
SANDBOX_DIE
("Invalid opcode in BPF sandbox rules");
53
SANDBOX_DIE
("Dereferencing invalid ErrorCode");
65
SANDBOX_DIE
("Corrupted ErrorCode");
75
SANDBOX_DIE
("Dereferencing invalid ErrorCode");
99
SANDBOX_DIE
("Corrupted ErrorCode");
sandbox_bpf.cc
202
SANDBOX_DIE
(static_cast<char*>(aux));
260
SANDBOX_DIE
("sigprocmask() failed");
264
SANDBOX_DIE
("pipe() failed");
268
SANDBOX_DIE
("Process started without standard file descriptors");
284
SANDBOX_DIE
("fork() failed unexpectedly");
299
SANDBOX_DIE
(NULL);
313
SANDBOX_DIE
(NULL);
321
SANDBOX_DIE
(NULL);
332
SANDBOX_DIE
(NULL);
337
SANDBOX_DIE
("close() failed")
[
all
...]
codegen.cc
145
SANDBOX_DIE
(
150
SANDBOX_DIE
("Cannot append instructions after a return statement");
167
SANDBOX_DIE
("ErrorCodes can only be used in return expressions");
171
SANDBOX_DIE
("ErrorCode is not suitable for returning from a BPF program");
183
SANDBOX_DIE
("Expected a BPF_JMP instruction");
188
SANDBOX_DIE
("Branches must jump to a valid instruction");
202
SANDBOX_DIE
("Cannot append instructions in the middle of a sequence");
211
SANDBOX_DIE
("Cannot append instructions after a jump");
215
SANDBOX_DIE
("Cannot append instructions after a return statement");
217
SANDBOX_DIE
("Cannot append instructions in the middle of a sequence")
[
all
...]
die.h
14
#define
SANDBOX_DIE
(m) sandbox::Die::SandboxDie(m, __FILE__, __LINE__)
27
// Most users would want to call
SANDBOX_DIE
() instead, as it logs extra
32
// This method gets called by
SANDBOX_DIE
(). There is normally no reason
47
// We generally want to run all exit handlers. This means, on
SANDBOX_DIE
()
trap.cc
55
SANDBOX_DIE
("Failed to block SIGBUS");
81
SANDBOX_DIE
("Failed to configure SIGSYS handler");
93
SANDBOX_DIE
("Failed to configure SIGSYS handler");
106
SANDBOX_DIE
("Failed to allocate global trap handler");
155
//
SANDBOX_DIE
() can call LOG(FATAL). This is not normally async-signal
229
// This
SANDBOX_DIE
() can optionally be removed. It won't break security,
231
// to understand. Removing the
SANDBOX_DIE
() allows callers to easyly check
234
SANDBOX_DIE
(
265
SANDBOX_DIE
("Too many SECCOMP_RET_TRAP callback instances");
verifier.cc
129
SANDBOX_DIE
(
Completed in 33 milliseconds