/external/libchrome/sandbox/linux/seccomp-bpf/ |
trap_unittest.cc | 5 #include "sandbox/linux/seccomp-bpf/trap.h" 15 SANDBOX_TEST_ALLOW_NOISE(Trap, SigSysAction) { 16 // This creates a global Trap instance, and registers the signal handler 17 // (Trap::SigSysAction). 18 Trap::Registry();
|
trap.h | 20 // The Trap class allows a BPF filter program to branch out to user space by 28 class SANDBOX_EXPORT Trap : public bpf_dsl::TrapRegistry { 34 // Registry returns the trap registry used by Trap's SIGSYS handler, 55 Trap(); 59 ~Trap() = delete; 71 static Trap* global_trap_; 81 DISALLOW_COPY_AND_ASSIGN(Trap);
|
trap.cc | 5 #include "sandbox/linux/seccomp-bpf/trap.h" 79 Trap::Trap() 112 bpf_dsl::TrapRegistry* Trap::Registry() { 116 // Also, this is not a normal singleton. Once created, the global trap 119 global_trap_ = new Trap(); 121 SANDBOX_DIE("Failed to allocate global trap handler"); 127 void Trap::SigSysAction(int nr, LinuxSigInfo* info, void* void_context) { 142 "for Trap() handling."); 147 void Trap::SigSys(int nr, LinuxSigInfo* info, ucontext_t* ctx) 223 const TrapKey& trap = trap_array_[info->si_errno - 1]; local [all...] |
sandbox_bpf.cc | 27 #include "sandbox/linux/seccomp-bpf/trap.h" 119 return bpf_dsl::Trap(SandboxPanicTrap, error); 224 bpf_dsl::PolicyCompiler compiler(policy_.get(), Trap::Registry()); 225 if (Trap::SandboxDebuggingAllowedByUser()) {
|
syscall_unittest.cc | 31 using sandbox::bpf_dsl::Trap; 101 // SIGSYS trap handler that will be called on __NR_uname. 119 return Trap(CopySyscallArgsToAux, aux_); 158 // We expect the trap handler to have copied the 6 arguments.
|
/external/tpm2/ |
CpriCryptPri.c | 12 static void Trap(const char *function, int line, int code); 13 FAIL_FUNCTION TpmFailFunction = (FAIL_FUNCTION)&Trap; 23 Trap(
|
/external/v8/test/mjsunit/es6/ |
proxies-prevent-extensions.js | 7 // No trap. 22 // "Undefined" trap. 37 // Invalid trap. 52 // Trap returns trueish and target is extensible. 55 // Trap returns trueish but target is not extensible. 62 // Trap returns falsish. 79 // Trap returns trueish but target is extensible. 82 // Trap returns trueish and target is not extensible.
|
proxies-is-extensible.js | 7 // No trap. 22 // "Undefined" trap. 37 // Invalid trap. 52 // Trap returns trueish and target is extensible. 55 // Trap returns trueish but target is not extensible. 66 // Trap returns falsish but target is extensible. 69 // Trap returns falsish and target is not extensible.
|
proxies-define-property.js | 5 // Check basic call to trap. 35 // Step 6: Trap isn't callable. 39 // Step 7: Trap is undefined. 48 // Step 9: Property name is passed to the trap as a string. 54 // Step 10: Trap returns false. 58 // Step 15a: Trap returns true for adding a property to a non-extensible target. 63 // Step 15b: Trap returns true for adding a non-configurable property. 73 // Step 16a: Trap returns true for non-compatible property descriptor. 78 // Step 16b: Trap returns true for overwriting a configurable property
|
proxies-delete-property.js | 36 // No trap. 52 // "Undefined" trap. 68 // Invalid trap. 84 // Trap returns trueish and target doesn't own property. 89 // Trap returns trueish and target property is configurable. 95 // Trap returns trueish but target property is not configurable. 123 // Trap returns trueish but target property is not configurable. In contrast 124 // to above, here the target property was configurable before the trap call. 150 // Trap returns falsish and target doesn't own property. 159 // Trap returns falsish and target property is configurable [all...] |
proxies-has.js | 25 // Step 7: Fall through to target if trap is undefined. 42 // Step 9b i. Trap result must confirm presence of non-configurable properties 48 // Step 9b iii. Trap result must confirm presence of all own properties of
|
proxies-set.js | 79 // No trap. 88 // "Undefined" trap. 98 // Check that setting on a proxy without "set" trap correctly triggers its 99 // "getOwnProperty" trap and its "defineProperty" trap. 180 // Trap returns trueish and property does not exist in target. 185 // Trap returns trueish and target property is configurable or writable data. 207 // Trap returns trueish but target property is frozen data. 228 // Trap returns trueish and target property is configurable accessor. 234 // Trap returns trueish and target property is non-configurable accessor [all...] |
proxies-get-own-property-descriptor.js | 105 // Step 6: Trap is not callable. 109 // Step 8: Trap throws. 113 // Step 9: Trap result is neither undefined nor an object.
|
/external/libchrome/sandbox/linux/seccomp-bpf-helpers/ |
sigsys_handlers.cc | 248 return bpf_dsl::Trap(CrashSIGSYS_Handler, NULL); 252 return bpf_dsl::Trap(SIGSYSCloneFailure, NULL); 256 return bpf_dsl::Trap(SIGSYSPrctlFailure, NULL); 260 return bpf_dsl::Trap(SIGSYSIoctlFailure, NULL); 264 return bpf_dsl::Trap(SIGSYSKillFailure, NULL); 268 return bpf_dsl::Trap(SIGSYSFutexFailure, NULL); 272 return bpf_dsl::Trap(SIGSYSSchedHandler, NULL);
|
/external/libchrome/sandbox/linux/bpf_dsl/ |
policy_compiler.h | 33 // Compile registers any trap handlers needed by the policy and 57 // Trap returns a CodeGen::Node to indicate the system call should 58 // instead invoke a trap handler. 59 CodeGen::Node Trap(TrapRegistry::TrapFnc fnc, const void* aux, bool safe);
|
bpf_dsl_unittest.cc | 291 return Trap(UnameTrap, &count_); 451 ResultExpr trap = Trap(DummyTrap, nullptr); local 452 EXPECT_FALSE(trap->IsAllow()); 453 EXPECT_TRUE(trap->IsDeny()); 465 ResultExpr safe = Trap(DummyTrap, nullptr);
|
bpf_dsl.cc | 58 return pc->Trap(func_, arg_, safe_); 262 ResultExpr Trap(TrapRegistry::TrapFnc trap_func, const void* aux) {
|
policy_compiler.cc | 62 // A Trap() handler that returns an "errno" value. The value is encoded 160 // the trap registry a second chance to complain before we add the backdoor. 442 return Trap(ReturnErrno, reinterpret_cast<void*>(ret & SECCOMP_RET_DATA), 449 CodeGen::Node PolicyCompiler::Trap(TrapRegistry::TrapFnc fnc,
|
bpf_dsl.h | 49 // .Else(Trap(SetFlagHandler, NULL)); 62 // | Trap(trap_func, aux) | UnsafeTrap(trap_func, aux) 103 // Trap specifies a result that the system call should be handled by 107 Trap(TrapRegistry::TrapFnc trap_func, const void* aux); 109 // UnsafeTrap is like Trap, except the policy is marked as "unsafe"
|
/external/mksh/src/ |
histrap.c | 2 /* $OpenBSD: trap.c,v 1.23 2010/05/19 17:36:08 jasper Exp $ */ 32 Trap sigtraps[ksh_NSIG + 1]; 1065 sigtraps[ksh_SIGEXIT].mess = "Exit trap"; 1115 Trap * 1119 Trap *p; 1171 * trap signal handler 1176 Trap *p = &sigtraps[i]; 1179 trap = p->set = 1; 1182 if ((p->flags & TF_FATAL) && !p->trap) { 1209 Trap *p = sigtraps [all...] |
sh.h | 803 EXTERN short trap_exstat; /* exit status before running a trap */ 904 * trap handlers 906 typedef struct trap { struct 909 char *trap; /* trap command */ member in struct:trap 914 volatile sig_atomic_t set; /* trap pending */ 915 } Trap; 917 /* values for Trap.flags */ 919 #define TF_USER_SET BIT(1) /* user has (tried to) set trap */ 926 #define TF_CHANGED BIT(8) /* used by runtrap() to detect trap changes * 942 EXTERN volatile sig_atomic_t trap; \/* traps pending? *\/ variable [all...] |
/external/clang/lib/Sema/ |
SemaTemplateDeduction.cpp | [all...] |
SemaExprMember.cpp | [all...] |
SemaDeclCXX.cpp | [all...] |
SemaStmt.cpp | [all...] |