/external/chromium_org/chrome/browser/ui/libgtk2ui/ |
x11_input_method_context_impl_gtk2_unittest.cc | 16 libgtk2ui::X11InputMethodContextImplGtk2::GtkCommitSignalTrap trap; local 19 EXPECT_FALSE(trap.IsSignalCaught()); 20 EXPECT_FALSE(trap.Trap(base::string16())); 21 EXPECT_FALSE(trap.IsSignalCaught()); 24 trap.StartTrap('t'); 25 EXPECT_FALSE(trap.Trap(base::UTF8ToUTF16("T"))); 26 EXPECT_FALSE(trap.IsSignalCaught()); 27 EXPECT_FALSE(trap.Trap(base::UTF8ToUTF16("true"))) [all...] |
x11_input_method_context_impl_gtk2.h | 73 // The helper class to trap GTK+'s "commit" signal for direct input key 79 // (= 229) is fired. So we have to trap such "commit" signal for direct input 80 // key events. This class helps to trap such events. 85 // Enables the trap which monitors a direct input key event of |keyval|. 88 // Disables the trap. 95 bool Trap(const base::string16& text);
|
x11_input_method_context_impl_gtk2.cc | 248 if (commit_signal_trap_.Trap(text_in_utf16)) 303 bool X11InputMethodContextImplGtk2::GtkCommitSignalTrap::Trap(
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
trap.h | 21 // The Trap class allows a BPF filter program to branch out to user space by 29 class SANDBOX_EXPORT Trap { 32 // user-space. The seccomp policy can request that a trap handler gets 46 // Registers a new trap handler and sets up the appropriate SIGSYS handler 62 // Returns the ErrorCode associate with a particular trap id. 77 Trap(); 81 ~Trap(); 90 static Trap* GetInstance(); 104 static Trap* global_trap_; 114 DISALLOW_COPY_AND_ASSIGN(Trap); [all...] |
errorcode_unittest.cc | 25 ErrorCode e3 = sandbox.Trap(NULL, NULL); 40 SANDBOX_TEST(ErrorCode, Trap) { 42 ErrorCode e0 = sandbox.Trap(NULL, "a"); 43 ErrorCode e1 = sandbox.Trap(NULL, "b"); 47 ErrorCode e2 = sandbox.Trap(NULL, "a"); 63 ErrorCode e4 = sandbox.Trap(NULL, "a"); 64 ErrorCode e5 = sandbox.Trap(NULL, "b"); 65 ErrorCode e6 = sandbox.Trap(NULL, "a"); 84 ErrorCode e4 = sandbox.Trap(NULL, "a"); 85 ErrorCode e5 = sandbox.Trap(NULL, "b") [all...] |
trap.cc | 5 #include "sandbox/linux/seccomp-bpf/trap.h" 70 Trap::Trap() 100 Trap* Trap::GetInstance() { 104 // Also, this is not a normal singleton. Once created, the global trap 107 global_trap_ = new Trap(); 109 SANDBOX_DIE("Failed to allocate global trap handler"); 115 void Trap::SigSysAction(int nr, siginfo_t* info, void* void_context) { 119 "for Trap() handling.") 325 Trap* trap = GetInstance(); local [all...] |
errorcode.h | 9 #include "sandbox/linux/seccomp-bpf/trap.h" 20 // handling a SECCOMP_RET_TRAP trap, or a complex constraint. 159 friend class Trap; 164 ErrorCode(Trap::TrapFnc fnc, const void* aux, bool safe, uint16_t id); 180 Trap::TrapFnc fnc_; // Callback function and arg, if trap was
|
sandbox_bpf.h | 109 // We can use ErrorCode to request calling of a trap handler. This method 113 // for a description of how to pass data from SetSandboxPolicy() to a Trap() 115 ErrorCode Trap(Trap::TrapFnc fnc, const void* aux); 117 // Calls a user-space trap handler and disables all sandboxing for system 118 // calls made from this trap handler. 127 ErrorCode UnsafeTrap(Trap::TrapFnc fnc, const void* aux); 130 // the system call that triggered the trap. The ForwardSyscall() method 136 // directly suitable as a return value for a trap handler.
|
sandbox_bpf.cc | 144 Trap::ErrorCodeFromTrapId(insn->k & SECCOMP_RET_DATA); 152 // A Trap() handler that returns an "errno" value. The value is encoded 165 // it rewrites the instruction to instead call a Trap() handler that does 180 insn->k = sandbox->Trap(ReturnErrno, 214 return sandbox_compiler->Trap(ReturnErrno, reinterpret_cast<void*>(err)); 642 if (!Trap::EnableUnsafeTrapsInSigSysHandler()) { [all...] |
errorcode.cc | 30 ErrorCode::ErrorCode(Trap::TrapFnc fnc, const void* aux, bool safe, uint16_t id)
|
sandbox_bpf_unittest.cc | 33 #include "sandbox/linux/seccomp-bpf/trap.h" 80 // any Trap() handlers. This is great for writing short and concise tests, 99 return sandbox->Trap(IncreaseCounter, counter_ptr_); 198 return sandbox->Trap(EnomemHandler, aux); 538 SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == false); 540 SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == false); 542 SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == true); 672 // ever tried to update them from inside a Trap() or UnsafeTrap() handler, 698 // An UnsafeTrap() (or for that matter, a Trap()) has to report error 724 // Test a trap handler that makes use of a broker process to open() [all...] |
demo.cc | 348 sandbox->Trap(DefaultHandler, NULL))); 383 return sandbox->Trap(DefaultHandler, NULL);
|
syscall_unittest.cc | 81 // SIGSYS trap handler that will be called on __NR_uname. 98 return sandbox->Trap(CopySyscallArgsToAux, aux); 131 // We expect the trap handler to have copied the 6 arguments.
|
/external/chromium_org/components/nacl/loader/nonsfi/ |
nonsfi_sandbox.cc | 24 #include "sandbox/linux/seccomp-bpf/trap.h" 64 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL)), 72 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL), 74 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL)))); 96 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL))))); 113 sb->Trap(sandbox::SIGSYSCloneFailure, NULL)); 121 sb->Trap(sandbox::SIGSYSPrctlFailure, NULL)); 139 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL))))); 150 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL), 164 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL) [all...] |
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
syscall_parameters_restrictions.cc | 85 sandbox->Trap(SIGSYSCloneFailure, NULL), 102 sandbox->Trap(SIGSYSCloneFailure, NULL), 116 sandbox->Trap(SIGSYSPrctlFailure, NULL)))); 124 sandbox->Trap(SIGSYSIoctlFailure, NULL))); 138 sandbox->Trap(CrashSIGSYS_Handler, NULL), 150 sandbox->Trap(CrashSIGSYS_Handler, NULL), 182 sandbox->Trap(CrashSIGSYS_Handler, NULL), 205 sandbox->Trap(CrashSIGSYS_Handler, NULL)))))))))); 243 sandbox->Trap(SIGSYSKillFailure, NULL)); 245 return sandbox->Trap(SIGSYSKillFailure, NULL) [all...] |
baseline_policy.cc | 157 sandbox->Trap(CrashSIGSYS_Handler, NULL)); 189 return sandbox->Trap(CrashSIGSYS_Handler, NULL); 193 return sandbox->Trap(CrashSIGSYS_Handler, NULL);
|
/external/mksh/src/ |
histrap.c | 2 /* $OpenBSD: trap.c,v 1.23 2010/05/19 17:36:08 jasper Exp $ */ 32 Trap sigtraps[NSIG + 1]; 1073 Trap * 1077 Trap *p; 1116 * trap signal handler 1121 Trap *p = &sigtraps[i]; 1124 trap = p->set = 1; 1127 if ((p->flags & TF_FATAL) && !p->trap) { 1155 Trap *p; 1167 * occurred for which a trap has been set or for which the TF_DFL_INTR fla [all...] |
sh.h | 743 EXTERN short trap_exstat; /* exit status before running a trap */ 841 * trap handlers 843 typedef struct trap { struct 846 char *trap; /* trap command */ member in struct:trap 851 volatile sig_atomic_t set; /* trap pending */ 852 } Trap; 854 /* values for Trap.flags */ 856 #define TF_USER_SET BIT(1) /* user has (tried to) set trap */ 863 #define TF_CHANGED BIT(8) /* used by runtrap() to detect trap changes * 879 EXTERN volatile sig_atomic_t trap; \/* traps pending? *\/ variable [all...] |
/external/chromium_org/content/common/sandbox_linux/ |
bpf_gpu_policy_linux.cc | 192 return sandbox->Trap(GpuSIGSYS_Handler, broker_process_);
|
sandbox_seccomp_bpf_linux.cc | 93 return sandbox->Trap(sandbox::CrashSIGSYS_Handler, NULL);
|
/external/clang/lib/Sema/ |
SemaTemplateDeduction.cpp | [all...] |
SemaExprMember.cpp | [all...] |
SemaDeclCXX.cpp | [all...] |
SemaStmt.cpp | [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
mapidbg.h | 44 #define Trap() IFTRAP(DebugTrapFn(1,__FILE__,__LINE__,"Trap"))
|