HomeSort by relevance Sort by last modified time
    Searched refs:SANDBOX_DIE (Results 1 - 6 of 6) sorted by null

  /external/chromium_org/sandbox/linux/seccomp-bpf/
errorcode.cc 21 SANDBOX_DIE("Invalid use of ErrorCode object");
47 SANDBOX_DIE("Invalid opcode in BPF sandbox rules");
53 SANDBOX_DIE("Dereferencing invalid ErrorCode");
65 SANDBOX_DIE("Corrupted ErrorCode");
75 SANDBOX_DIE("Dereferencing invalid ErrorCode");
99 SANDBOX_DIE("Corrupted ErrorCode");
sandbox_bpf.cc 202 SANDBOX_DIE(static_cast<char*>(aux));
260 SANDBOX_DIE("sigprocmask() failed");
264 SANDBOX_DIE("pipe() failed");
268 SANDBOX_DIE("Process started without standard file descriptors");
284 SANDBOX_DIE("fork() failed unexpectedly");
299 SANDBOX_DIE(NULL);
313 SANDBOX_DIE(NULL);
321 SANDBOX_DIE(NULL);
332 SANDBOX_DIE(NULL);
337 SANDBOX_DIE("close() failed")
    [all...]
codegen.cc 145 SANDBOX_DIE(
150 SANDBOX_DIE("Cannot append instructions after a return statement");
167 SANDBOX_DIE("ErrorCodes can only be used in return expressions");
171 SANDBOX_DIE("ErrorCode is not suitable for returning from a BPF program");
183 SANDBOX_DIE("Expected a BPF_JMP instruction");
188 SANDBOX_DIE("Branches must jump to a valid instruction");
202 SANDBOX_DIE("Cannot append instructions in the middle of a sequence");
211 SANDBOX_DIE("Cannot append instructions after a jump");
215 SANDBOX_DIE("Cannot append instructions after a return statement");
217 SANDBOX_DIE("Cannot append instructions in the middle of a sequence")
    [all...]
die.h 14 #define SANDBOX_DIE(m) sandbox::Die::SandboxDie(m, __FILE__, __LINE__)
27 // Most users would want to call SANDBOX_DIE() instead, as it logs extra
32 // This method gets called by SANDBOX_DIE(). There is normally no reason
47 // We generally want to run all exit handlers. This means, on SANDBOX_DIE()
trap.cc 55 SANDBOX_DIE("Failed to block SIGBUS");
81 SANDBOX_DIE("Failed to configure SIGSYS handler");
93 SANDBOX_DIE("Failed to configure SIGSYS handler");
106 SANDBOX_DIE("Failed to allocate global trap handler");
155 // SANDBOX_DIE() can call LOG(FATAL). This is not normally async-signal
229 // This SANDBOX_DIE() can optionally be removed. It won't break security,
231 // to understand. Removing the SANDBOX_DIE() allows callers to easyly check
234 SANDBOX_DIE(
265 SANDBOX_DIE("Too many SECCOMP_RET_TRAP callback instances");
verifier.cc 129 SANDBOX_DIE(

Completed in 33 milliseconds