OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:bpf_dsl
(Results
1 - 25
of
30
) sorted by null
1
2
/external/libchrome/sandbox/linux/seccomp-bpf-helpers/
syscall_parameters_restrictions.h
11
#include "sandbox/linux/
bpf_dsl
/bpf_dsl_forward.h"
16
//
bpf_dsl
::ResultExpr suitable to restrict certain system call parameters.
24
SANDBOX_EXPORT
bpf_dsl
::ResultExpr RestrictCloneToThreadsAndEPERMFork();
28
SANDBOX_EXPORT
bpf_dsl
::ResultExpr RestrictPrctl();
32
SANDBOX_EXPORT
bpf_dsl
::ResultExpr RestrictIoctl();
38
SANDBOX_EXPORT
bpf_dsl
::ResultExpr RestrictMmapFlags();
42
SANDBOX_EXPORT
bpf_dsl
::ResultExpr RestrictMprotectFlags();
49
SANDBOX_EXPORT
bpf_dsl
::ResultExpr RestrictFcntlCommands();
54
SANDBOX_EXPORT
bpf_dsl
::ResultExpr RestrictSocketcallCommand();
60
SANDBOX_EXPORT
bpf_dsl
::ResultExpr RestrictKillTarget(pid_t target_pid
[
all
...]
baseline_policy.h
9
#include "sandbox/linux/
bpf_dsl
/bpf_dsl_forward.h"
10
#include "sandbox/linux/
bpf_dsl
/policy.h"
26
class SANDBOX_EXPORT BaselinePolicy : public
bpf_dsl
::Policy {
34
bpf_dsl
::ResultExpr EvaluateSyscall(int system_call_number) const override;
35
bpf_dsl
::ResultExpr InvalidSyscall() const override;
sigsys_handlers.h
11
#include "sandbox/linux/
bpf_dsl
/bpf_dsl_forward.h"
62
// Variants of the above functions for use with
bpf_dsl
.
63
SANDBOX_EXPORT
bpf_dsl
::ResultExpr CrashSIGSYS();
64
SANDBOX_EXPORT
bpf_dsl
::ResultExpr CrashSIGSYSClone();
65
SANDBOX_EXPORT
bpf_dsl
::ResultExpr CrashSIGSYSPrctl();
66
SANDBOX_EXPORT
bpf_dsl
::ResultExpr CrashSIGSYSIoctl();
67
SANDBOX_EXPORT
bpf_dsl
::ResultExpr CrashSIGSYSKill();
68
SANDBOX_EXPORT
bpf_dsl
::ResultExpr CrashSIGSYSFutex();
69
SANDBOX_EXPORT
bpf_dsl
::ResultExpr RewriteSchedSIGSYS();
sigsys_handlers.cc
17
#include "sandbox/linux/
bpf_dsl
/
bpf_dsl
.h"
247
bpf_dsl
::ResultExpr CrashSIGSYS() {
248
return
bpf_dsl
::Trap(CrashSIGSYS_Handler, NULL);
251
bpf_dsl
::ResultExpr CrashSIGSYSClone() {
252
return
bpf_dsl
::Trap(SIGSYSCloneFailure, NULL);
255
bpf_dsl
::ResultExpr CrashSIGSYSPrctl() {
256
return
bpf_dsl
::Trap(SIGSYSPrctlFailure, NULL);
259
bpf_dsl
::ResultExpr CrashSIGSYSIoctl() {
260
return
bpf_dsl
::Trap(SIGSYSIoctlFailure, NULL)
[
all
...]
syscall_parameters_restrictions_unittests.cc
21
#include "sandbox/linux/
bpf_dsl
/
bpf_dsl
.h"
22
#include "sandbox/linux/
bpf_dsl
/policy.h"
43
using sandbox::
bpf_dsl
::Allow;
44
using sandbox::
bpf_dsl
::ResultExpr;
46
class RestrictClockIdPolicy : public
bpf_dsl
::Policy {
111
class RestrictSchedPolicy : public
bpf_dsl
::Policy {
177
class RestrictPrlimit64Policy : public
bpf_dsl
::Policy {
206
class RestrictGetrusagePolicy : public
bpf_dsl
::Policy {
syscall_parameters_restrictions.cc
26
#include "sandbox/linux/
bpf_dsl
/
bpf_dsl
.h"
27
#include "sandbox/linux/
bpf_dsl
/seccomp_macros.h"
102
using sandbox::
bpf_dsl
::Allow;
103
using sandbox::
bpf_dsl
::Arg;
104
using sandbox::
bpf_dsl
::BoolExpr;
105
using sandbox::
bpf_dsl
::Error;
106
using sandbox::
bpf_dsl
::If;
107
using sandbox::
bpf_dsl
::ResultExpr;
baseline_policy.cc
16
#include "sandbox/linux/
bpf_dsl
/
bpf_dsl
.h"
31
using sandbox::
bpf_dsl
::Allow;
32
using sandbox::
bpf_dsl
::Arg;
33
using sandbox::
bpf_dsl
::Error;
34
using sandbox::
bpf_dsl
::If;
35
using sandbox::
bpf_dsl
::ResultExpr;
/external/libchrome/sandbox/linux/bpf_dsl/
policy.cc
5
#include "sandbox/linux/
bpf_dsl
/policy.h"
9
#include "sandbox/linux/
bpf_dsl
/
bpf_dsl
.h"
12
namespace
bpf_dsl
{
namespace in namespace:sandbox
18
} // namespace
bpf_dsl
bpf_dsl_forward.h
12
namespace
bpf_dsl
{
namespace in namespace:sandbox
15
// types defined in
bpf_dsl
.h. It's intended for use in user headers
16
// that need to reference
bpf_dsl
types, but don't require definitions.
34
} // namespace
bpf_dsl
38
scoped_refptr<const sandbox::
bpf_dsl
::internal::BoolExprImpl>;
40
scoped_refptr<const sandbox::
bpf_dsl
::internal::ResultExprImpl>;
errorcode.h
12
namespace
bpf_dsl
{
namespace in namespace:sandbox
34
} // namespace
bpf_dsl
dump_bpf.h
7
#include "sandbox/linux/
bpf_dsl
/codegen.h"
11
namespace
bpf_dsl
{
namespace in namespace:sandbox
23
} // namespace
bpf_dsl
policy.h
9
#include "sandbox/linux/
bpf_dsl
/bpf_dsl_forward.h"
13
namespace
bpf_dsl
{
namespace in namespace:sandbox
34
} // namespace
bpf_dsl
trap_registry.h
23
namespace
bpf_dsl
{
namespace in namespace:sandbox
70
} // namespace
bpf_dsl
verifier.h
20
namespace
bpf_dsl
{
namespace in namespace:sandbox
42
} // namespace
bpf_dsl
bpf_dsl_impl.h
10
#include "sandbox/linux/
bpf_dsl
/codegen.h"
14
namespace
bpf_dsl
{
namespace in namespace:sandbox
66
} // namespace
bpf_dsl
policy_compiler.h
14
#include "sandbox/linux/
bpf_dsl
/bpf_dsl_forward.h"
15
#include "sandbox/linux/
bpf_dsl
/codegen.h"
16
#include "sandbox/linux/
bpf_dsl
/trap_registry.h"
20
namespace
bpf_dsl
{
namespace in namespace:sandbox
23
// PolicyCompiler implements the
bpf_dsl
compiler, allowing users to
24
// transform
bpf_dsl
policies into BPF programs to be executed by the
28
using PanicFunc =
bpf_dsl
::ResultExpr (*)(const char* error);
51
// Functions below are meant for use within
bpf_dsl
itself.
150
} // namespace
bpf_dsl
bpf_dsl.h
16
#include "sandbox/linux/
bpf_dsl
/bpf_dsl_forward.h"
17
#include "sandbox/linux/
bpf_dsl
/cons.h"
18
#include "sandbox/linux/
bpf_dsl
/trap_registry.h"
21
// The sandbox::
bpf_dsl
namespace provides a domain-specific language
30
// #include "sandbox/linux/
bpf_dsl
/
bpf_dsl
.h"
32
// using namespace sandbox::
bpf_dsl
;
77
namespace
bpf_dsl
{
namespace in namespace:sandbox
256
// BoolExpr is defined in
bpf_dsl
, since it's merely a typedef for
259
using
bpf_dsl
::Not
[
all
...]
bpf_dsl.cc
5
#include "sandbox/linux/
bpf_dsl
/
bpf_dsl
.h"
15
#include "sandbox/linux/
bpf_dsl
/bpf_dsl_impl.h"
16
#include "sandbox/linux/
bpf_dsl
/errorcode.h"
17
#include "sandbox/linux/
bpf_dsl
/policy_compiler.h"
21
namespace
bpf_dsl
{
namespace in namespace:sandbox
344
} // namespace
bpf_dsl
347
template class scoped_refptr<const sandbox::
bpf_dsl
::internal::BoolExprImpl>;
348
template class scoped_refptr<const sandbox::
bpf_dsl
::internal::ResultExprImpl>;
/external/libchrome/sandbox/linux/seccomp-bpf/
sandbox_bpf.h
13
#include "sandbox/linux/
bpf_dsl
/codegen.h"
18
namespace
bpf_dsl
{
namespace in namespace:sandbox
23
//
bpf_dsl
::Policy object to the current process.
35
explicit SandboxBPF(
bpf_dsl
::Policy* policy);
107
scoped_ptr<
bpf_dsl
::Policy> policy_;
bpf_tester_compatibility_delegate.h
31
scoped_ptr<
bpf_dsl
::Policy> GetSandboxBPFPolicy() override {
36
return scoped_ptr<
bpf_dsl
::Policy>(new Policy(&aux_));
bpf_tests_unittest.cc
17
#include "sandbox/linux/
bpf_dsl
/
bpf_dsl
.h"
18
#include "sandbox/linux/
bpf_dsl
/policy.h"
25
using sandbox::
bpf_dsl
::Allow;
26
using sandbox::
bpf_dsl
::Error;
27
using sandbox::
bpf_dsl
::ResultExpr;
44
class EmptyClassTakingPolicy : public
bpf_dsl
::Policy {
85
class EnosysPtracePolicy : public
bpf_dsl
::Policy {
116
scoped_ptr<
bpf_dsl
::Policy> GetSandboxBPFPolicy() override {
117
return scoped_ptr<
bpf_dsl
::Policy>(new EnosysPtracePolicy())
[
all
...]
trap.h
14
#include "sandbox/linux/
bpf_dsl
/trap_registry.h"
28
class SANDBOX_EXPORT Trap : public
bpf_dsl
::TrapRegistry {
36
static
bpf_dsl
::TrapRegistry* Registry();
sandbox_bpf.cc
19
#include "sandbox/linux/
bpf_dsl
/
bpf_dsl
.h"
20
#include "sandbox/linux/
bpf_dsl
/codegen.h"
21
#include "sandbox/linux/
bpf_dsl
/policy.h"
22
#include "sandbox/linux/
bpf_dsl
/policy_compiler.h"
23
#include "sandbox/linux/
bpf_dsl
/seccomp_macros.h"
24
#include "sandbox/linux/
bpf_dsl
/syscall_set.h"
118
bpf_dsl
::ResultExpr SandboxPanic(const char* error) {
119
return
bpf_dsl
::Trap(SandboxPanicTrap, error);
124
SandboxBPF::SandboxBPF(
bpf_dsl
::Policy* policy
[
all
...]
bpf_tests.h
107
scoped_ptr<
bpf_dsl
::Policy> GetSandboxBPFPolicy() override {
108
return scoped_ptr<
bpf_dsl
::Policy>(new PolicyClass());
syscall_unittest.cc
22
#include "sandbox/linux/
bpf_dsl
/
bpf_dsl
.h"
23
#include "sandbox/linux/
bpf_dsl
/policy.h"
29
using sandbox::
bpf_dsl
::Allow;
30
using sandbox::
bpf_dsl
::ResultExpr;
31
using sandbox::
bpf_dsl
::Trap;
111
class CopyAllArgsOnUnamePolicy : public
bpf_dsl
::Policy {
Completed in 192 milliseconds
1
2