HomeSort by relevance Sort by last modified time
    Searched refs:bpf_dsl (Results 1 - 25 of 30) sorted by null

1 2

  /external/libchrome/sandbox/linux/seccomp-bpf-helpers/
syscall_parameters_restrictions.h 11 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h"
16 // bpf_dsl::ResultExpr suitable to restrict certain system call parameters.
24 SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictCloneToThreadsAndEPERMFork();
28 SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictPrctl();
32 SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictIoctl();
38 SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictMmapFlags();
42 SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictMprotectFlags();
49 SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictFcntlCommands();
54 SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictSocketcallCommand();
60 SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictKillTarget(pid_t target_pid
    [all...]
baseline_policy.h 9 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h"
10 #include "sandbox/linux/bpf_dsl/policy.h"
26 class SANDBOX_EXPORT BaselinePolicy : public bpf_dsl::Policy {
34 bpf_dsl::ResultExpr EvaluateSyscall(int system_call_number) const override;
35 bpf_dsl::ResultExpr InvalidSyscall() const override;
sigsys_handlers.h 11 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h"
62 // Variants of the above functions for use with bpf_dsl.
63 SANDBOX_EXPORT bpf_dsl::ResultExpr CrashSIGSYS();
64 SANDBOX_EXPORT bpf_dsl::ResultExpr CrashSIGSYSClone();
65 SANDBOX_EXPORT bpf_dsl::ResultExpr CrashSIGSYSPrctl();
66 SANDBOX_EXPORT bpf_dsl::ResultExpr CrashSIGSYSIoctl();
67 SANDBOX_EXPORT bpf_dsl::ResultExpr CrashSIGSYSKill();
68 SANDBOX_EXPORT bpf_dsl::ResultExpr CrashSIGSYSFutex();
69 SANDBOX_EXPORT bpf_dsl::ResultExpr RewriteSchedSIGSYS();
sigsys_handlers.cc 17 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
247 bpf_dsl::ResultExpr CrashSIGSYS() {
248 return bpf_dsl::Trap(CrashSIGSYS_Handler, NULL);
251 bpf_dsl::ResultExpr CrashSIGSYSClone() {
252 return bpf_dsl::Trap(SIGSYSCloneFailure, NULL);
255 bpf_dsl::ResultExpr CrashSIGSYSPrctl() {
256 return bpf_dsl::Trap(SIGSYSPrctlFailure, NULL);
259 bpf_dsl::ResultExpr CrashSIGSYSIoctl() {
260 return bpf_dsl::Trap(SIGSYSIoctlFailure, NULL)
    [all...]
syscall_parameters_restrictions_unittests.cc 21 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
22 #include "sandbox/linux/bpf_dsl/policy.h"
43 using sandbox::bpf_dsl::Allow;
44 using sandbox::bpf_dsl::ResultExpr;
46 class RestrictClockIdPolicy : public bpf_dsl::Policy {
111 class RestrictSchedPolicy : public bpf_dsl::Policy {
177 class RestrictPrlimit64Policy : public bpf_dsl::Policy {
206 class RestrictGetrusagePolicy : public bpf_dsl::Policy {
syscall_parameters_restrictions.cc 26 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
27 #include "sandbox/linux/bpf_dsl/seccomp_macros.h"
102 using sandbox::bpf_dsl::Allow;
103 using sandbox::bpf_dsl::Arg;
104 using sandbox::bpf_dsl::BoolExpr;
105 using sandbox::bpf_dsl::Error;
106 using sandbox::bpf_dsl::If;
107 using sandbox::bpf_dsl::ResultExpr;
baseline_policy.cc 16 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
31 using sandbox::bpf_dsl::Allow;
32 using sandbox::bpf_dsl::Arg;
33 using sandbox::bpf_dsl::Error;
34 using sandbox::bpf_dsl::If;
35 using sandbox::bpf_dsl::ResultExpr;
  /external/libchrome/sandbox/linux/bpf_dsl/
policy.cc 5 #include "sandbox/linux/bpf_dsl/policy.h"
9 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
12 namespace bpf_dsl { namespace in namespace:sandbox
18 } // namespace bpf_dsl
bpf_dsl_forward.h 12 namespace bpf_dsl { namespace in namespace:sandbox
15 // types defined in bpf_dsl.h. It's intended for use in user headers
16 // that need to reference bpf_dsl types, but don't require definitions.
34 } // namespace bpf_dsl
38 scoped_refptr<const sandbox::bpf_dsl::internal::BoolExprImpl>;
40 scoped_refptr<const sandbox::bpf_dsl::internal::ResultExprImpl>;
errorcode.h 12 namespace bpf_dsl { namespace in namespace:sandbox
34 } // namespace bpf_dsl
dump_bpf.h 7 #include "sandbox/linux/bpf_dsl/codegen.h"
11 namespace bpf_dsl { namespace in namespace:sandbox
23 } // namespace bpf_dsl
policy.h 9 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h"
13 namespace bpf_dsl { namespace in namespace:sandbox
34 } // namespace bpf_dsl
trap_registry.h 23 namespace bpf_dsl { namespace in namespace:sandbox
70 } // namespace bpf_dsl
verifier.h 20 namespace bpf_dsl { namespace in namespace:sandbox
42 } // namespace bpf_dsl
bpf_dsl_impl.h 10 #include "sandbox/linux/bpf_dsl/codegen.h"
14 namespace bpf_dsl { namespace in namespace:sandbox
66 } // namespace bpf_dsl
policy_compiler.h 14 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h"
15 #include "sandbox/linux/bpf_dsl/codegen.h"
16 #include "sandbox/linux/bpf_dsl/trap_registry.h"
20 namespace bpf_dsl { namespace in namespace:sandbox
23 // PolicyCompiler implements the bpf_dsl compiler, allowing users to
24 // transform bpf_dsl policies into BPF programs to be executed by the
28 using PanicFunc = bpf_dsl::ResultExpr (*)(const char* error);
51 // Functions below are meant for use within bpf_dsl itself.
150 } // namespace bpf_dsl
bpf_dsl.h 16 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h"
17 #include "sandbox/linux/bpf_dsl/cons.h"
18 #include "sandbox/linux/bpf_dsl/trap_registry.h"
21 // The sandbox::bpf_dsl namespace provides a domain-specific language
30 // #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
32 // using namespace sandbox::bpf_dsl;
77 namespace bpf_dsl { namespace in namespace:sandbox
256 // BoolExpr is defined in bpf_dsl, since it's merely a typedef for
259 using bpf_dsl::Not
    [all...]
bpf_dsl.cc 5 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
15 #include "sandbox/linux/bpf_dsl/bpf_dsl_impl.h"
16 #include "sandbox/linux/bpf_dsl/errorcode.h"
17 #include "sandbox/linux/bpf_dsl/policy_compiler.h"
21 namespace bpf_dsl { namespace in namespace:sandbox
344 } // namespace bpf_dsl
347 template class scoped_refptr<const sandbox::bpf_dsl::internal::BoolExprImpl>;
348 template class scoped_refptr<const sandbox::bpf_dsl::internal::ResultExprImpl>;
  /external/libchrome/sandbox/linux/seccomp-bpf/
sandbox_bpf.h 13 #include "sandbox/linux/bpf_dsl/codegen.h"
18 namespace bpf_dsl { namespace in namespace:sandbox
23 // bpf_dsl::Policy object to the current process.
35 explicit SandboxBPF(bpf_dsl::Policy* policy);
107 scoped_ptr<bpf_dsl::Policy> policy_;
bpf_tester_compatibility_delegate.h 31 scoped_ptr<bpf_dsl::Policy> GetSandboxBPFPolicy() override {
36 return scoped_ptr<bpf_dsl::Policy>(new Policy(&aux_));
bpf_tests_unittest.cc 17 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
18 #include "sandbox/linux/bpf_dsl/policy.h"
25 using sandbox::bpf_dsl::Allow;
26 using sandbox::bpf_dsl::Error;
27 using sandbox::bpf_dsl::ResultExpr;
44 class EmptyClassTakingPolicy : public bpf_dsl::Policy {
85 class EnosysPtracePolicy : public bpf_dsl::Policy {
116 scoped_ptr<bpf_dsl::Policy> GetSandboxBPFPolicy() override {
117 return scoped_ptr<bpf_dsl::Policy>(new EnosysPtracePolicy())
    [all...]
trap.h 14 #include "sandbox/linux/bpf_dsl/trap_registry.h"
28 class SANDBOX_EXPORT Trap : public bpf_dsl::TrapRegistry {
36 static bpf_dsl::TrapRegistry* Registry();
sandbox_bpf.cc 19 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
20 #include "sandbox/linux/bpf_dsl/codegen.h"
21 #include "sandbox/linux/bpf_dsl/policy.h"
22 #include "sandbox/linux/bpf_dsl/policy_compiler.h"
23 #include "sandbox/linux/bpf_dsl/seccomp_macros.h"
24 #include "sandbox/linux/bpf_dsl/syscall_set.h"
118 bpf_dsl::ResultExpr SandboxPanic(const char* error) {
119 return bpf_dsl::Trap(SandboxPanicTrap, error);
124 SandboxBPF::SandboxBPF(bpf_dsl::Policy* policy
    [all...]
bpf_tests.h 107 scoped_ptr<bpf_dsl::Policy> GetSandboxBPFPolicy() override {
108 return scoped_ptr<bpf_dsl::Policy>(new PolicyClass());
syscall_unittest.cc 22 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
23 #include "sandbox/linux/bpf_dsl/policy.h"
29 using sandbox::bpf_dsl::Allow;
30 using sandbox::bpf_dsl::ResultExpr;
31 using sandbox::bpf_dsl::Trap;
111 class CopyAllArgsOnUnamePolicy : public bpf_dsl::Policy {

Completed in 192 milliseconds

1 2