Home | History | Annotate | Download | only in seccomp-bpf

Lines Matching defs:sandbox

7 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
8 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
9 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
10 #include "sandbox/linux/seccomp-bpf/verifier.h"
13 namespace sandbox {
31 uint32_t EvaluateErrorCode(SandboxBPF* sandbox,
42 return sandbox->Unexpected64bitArgument().err();
46 return EvaluateErrorCode(sandbox,
54 return EvaluateErrorCode(sandbox,
63 return EvaluateErrorCode(sandbox,
79 bool VerifyErrorCode(SandboxBPF* sandbox,
90 } else if (computed_ret != EvaluateErrorCode(sandbox, root_code, *data)) {
112 sandbox, program, data, root_code, *code.passed(), err)) {
120 sandbox, program, data, root_code, *code.failed(), err)) {
138 if (!VerifyErrorCode(sandbox,
142 sandbox->Unexpected64bitArgument(),
155 sandbox, program, data, root_code, *code.failed(), err)) {
196 sandbox, program, data, root_code, passed, err)) {
201 sandbox, program, data, root_code, passed, err)) {
206 sandbox, program, data, root_code, failed, err)) {
363 bool Verifier::VerifyBPF(SandboxBPF* sandbox,
391 ? policy.EvaluateSyscall(sandbox, sysnum)
392 : policy.InvalidSyscall(sandbox);
393 if (!VerifyErrorCode(sandbox, program, &data, code, code, err)) {
448 } // namespace sandbox