HomeSort by relevance Sort by last modified time
    Searched refs:Trap (Results 1 - 25 of 33) sorted by null

1 2

  /external/chromium_org/chrome/browser/ui/libgtk2ui/
x11_input_method_context_impl_gtk2_unittest.cc 16 libgtk2ui::X11InputMethodContextImplGtk2::GtkCommitSignalTrap trap; local
19 EXPECT_FALSE(trap.IsSignalCaught());
20 EXPECT_FALSE(trap.Trap(base::string16()));
21 EXPECT_FALSE(trap.IsSignalCaught());
24 trap.StartTrap('t');
25 EXPECT_FALSE(trap.Trap(base::UTF8ToUTF16("T")));
26 EXPECT_FALSE(trap.IsSignalCaught());
27 EXPECT_FALSE(trap.Trap(base::UTF8ToUTF16("true")))
    [all...]
x11_input_method_context_impl_gtk2.h 73 // The helper class to trap GTK+'s "commit" signal for direct input key
79 // (= 229) is fired. So we have to trap such "commit" signal for direct input
80 // key events. This class helps to trap such events.
85 // Enables the trap which monitors a direct input key event of |keyval|.
88 // Disables the trap.
95 bool Trap(const base::string16& text);
x11_input_method_context_impl_gtk2.cc 248 if (commit_signal_trap_.Trap(text_in_utf16))
303 bool X11InputMethodContextImplGtk2::GtkCommitSignalTrap::Trap(
  /external/chromium_org/sandbox/linux/seccomp-bpf/
trap.h 21 // The Trap class allows a BPF filter program to branch out to user space by
29 class SANDBOX_EXPORT Trap {
32 // user-space. The seccomp policy can request that a trap handler gets
46 // Registers a new trap handler and sets up the appropriate SIGSYS handler
62 // Returns the ErrorCode associate with a particular trap id.
77 Trap();
81 ~Trap();
90 static Trap* GetInstance();
104 static Trap* global_trap_;
114 DISALLOW_COPY_AND_ASSIGN(Trap);
    [all...]
errorcode_unittest.cc 25 ErrorCode e3 = sandbox.Trap(NULL, NULL);
40 SANDBOX_TEST(ErrorCode, Trap) {
42 ErrorCode e0 = sandbox.Trap(NULL, "a");
43 ErrorCode e1 = sandbox.Trap(NULL, "b");
47 ErrorCode e2 = sandbox.Trap(NULL, "a");
63 ErrorCode e4 = sandbox.Trap(NULL, "a");
64 ErrorCode e5 = sandbox.Trap(NULL, "b");
65 ErrorCode e6 = sandbox.Trap(NULL, "a");
84 ErrorCode e4 = sandbox.Trap(NULL, "a");
85 ErrorCode e5 = sandbox.Trap(NULL, "b")
    [all...]
trap.cc 5 #include "sandbox/linux/seccomp-bpf/trap.h"
70 Trap::Trap()
100 Trap* Trap::GetInstance() {
104 // Also, this is not a normal singleton. Once created, the global trap
107 global_trap_ = new Trap();
109 SANDBOX_DIE("Failed to allocate global trap handler");
115 void Trap::SigSysAction(int nr, siginfo_t* info, void* void_context) {
119 "for Trap() handling.")
325 Trap* trap = GetInstance(); local
    [all...]
errorcode.h 9 #include "sandbox/linux/seccomp-bpf/trap.h"
20 // handling a SECCOMP_RET_TRAP trap, or a complex constraint.
159 friend class Trap;
164 ErrorCode(Trap::TrapFnc fnc, const void* aux, bool safe, uint16_t id);
180 Trap::TrapFnc fnc_; // Callback function and arg, if trap was
sandbox_bpf.h 109 // We can use ErrorCode to request calling of a trap handler. This method
113 // for a description of how to pass data from SetSandboxPolicy() to a Trap()
115 ErrorCode Trap(Trap::TrapFnc fnc, const void* aux);
117 // Calls a user-space trap handler and disables all sandboxing for system
118 // calls made from this trap handler.
127 ErrorCode UnsafeTrap(Trap::TrapFnc fnc, const void* aux);
130 // the system call that triggered the trap. The ForwardSyscall() method
136 // directly suitable as a return value for a trap handler.
sandbox_bpf.cc 144 Trap::ErrorCodeFromTrapId(insn->k & SECCOMP_RET_DATA);
152 // A Trap() handler that returns an "errno" value. The value is encoded
165 // it rewrites the instruction to instead call a Trap() handler that does
180 insn->k = sandbox->Trap(ReturnErrno,
214 return sandbox_compiler->Trap(ReturnErrno, reinterpret_cast<void*>(err));
642 if (!Trap::EnableUnsafeTrapsInSigSysHandler()) {
    [all...]
errorcode.cc 30 ErrorCode::ErrorCode(Trap::TrapFnc fnc, const void* aux, bool safe, uint16_t id)
sandbox_bpf_unittest.cc 33 #include "sandbox/linux/seccomp-bpf/trap.h"
80 // any Trap() handlers. This is great for writing short and concise tests,
99 return sandbox->Trap(IncreaseCounter, counter_ptr_);
198 return sandbox->Trap(EnomemHandler, aux);
538 SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == false);
540 SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == false);
542 SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == true);
672 // ever tried to update them from inside a Trap() or UnsafeTrap() handler,
698 // An UnsafeTrap() (or for that matter, a Trap()) has to report error
724 // Test a trap handler that makes use of a broker process to open()
    [all...]
demo.cc 348 sandbox->Trap(DefaultHandler, NULL)));
383 return sandbox->Trap(DefaultHandler, NULL);
syscall_unittest.cc 81 // SIGSYS trap handler that will be called on __NR_uname.
98 return sandbox->Trap(CopySyscallArgsToAux, aux);
131 // We expect the trap handler to have copied the 6 arguments.
  /external/chromium_org/components/nacl/loader/nonsfi/
nonsfi_sandbox.cc 24 #include "sandbox/linux/seccomp-bpf/trap.h"
64 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL)),
72 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL),
74 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL))));
96 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL)))));
113 sb->Trap(sandbox::SIGSYSCloneFailure, NULL));
121 sb->Trap(sandbox::SIGSYSPrctlFailure, NULL));
139 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL)))));
150 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL),
164 sb->Trap(sandbox::CrashSIGSYS_Handler, NULL)
    [all...]
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
syscall_parameters_restrictions.cc 85 sandbox->Trap(SIGSYSCloneFailure, NULL),
102 sandbox->Trap(SIGSYSCloneFailure, NULL),
116 sandbox->Trap(SIGSYSPrctlFailure, NULL))));
124 sandbox->Trap(SIGSYSIoctlFailure, NULL)));
138 sandbox->Trap(CrashSIGSYS_Handler, NULL),
150 sandbox->Trap(CrashSIGSYS_Handler, NULL),
182 sandbox->Trap(CrashSIGSYS_Handler, NULL),
205 sandbox->Trap(CrashSIGSYS_Handler, NULL))))))))));
243 sandbox->Trap(SIGSYSKillFailure, NULL));
245 return sandbox->Trap(SIGSYSKillFailure, NULL)
    [all...]
baseline_policy.cc 157 sandbox->Trap(CrashSIGSYS_Handler, NULL));
189 return sandbox->Trap(CrashSIGSYS_Handler, NULL);
193 return sandbox->Trap(CrashSIGSYS_Handler, NULL);
  /external/mksh/src/
histrap.c 2 /* $OpenBSD: trap.c,v 1.23 2010/05/19 17:36:08 jasper Exp $ */
32 Trap sigtraps[NSIG + 1];
1073 Trap *
1077 Trap *p;
1116 * trap signal handler
1121 Trap *p = &sigtraps[i];
1124 trap = p->set = 1;
1127 if ((p->flags & TF_FATAL) && !p->trap) {
1155 Trap *p;
1167 * occurred for which a trap has been set or for which the TF_DFL_INTR fla
    [all...]
sh.h 743 EXTERN short trap_exstat; /* exit status before running a trap */
841 * trap handlers
843 typedef struct trap { struct
846 char *trap; /* trap command */ member in struct:trap
851 volatile sig_atomic_t set; /* trap pending */
852 } Trap;
854 /* values for Trap.flags */
856 #define TF_USER_SET BIT(1) /* user has (tried to) set trap */
863 #define TF_CHANGED BIT(8) /* used by runtrap() to detect trap changes *
879 EXTERN volatile sig_atomic_t trap; \/* traps pending? *\/ variable
    [all...]
  /external/chromium_org/content/common/sandbox_linux/
bpf_gpu_policy_linux.cc 192 return sandbox->Trap(GpuSIGSYS_Handler, broker_process_);
sandbox_seccomp_bpf_linux.cc 93 return sandbox->Trap(sandbox::CrashSIGSYS_Handler, NULL);
  /external/clang/lib/Sema/
SemaTemplateDeduction.cpp     [all...]
SemaExprMember.cpp     [all...]
SemaDeclCXX.cpp     [all...]
SemaStmt.cpp     [all...]
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
mapidbg.h 44 #define Trap() IFTRAP(DebugTrapFn(1,__FILE__,__LINE__,"Trap"))

Completed in 2545 milliseconds

1 2