HomeSort by relevance Sort by last modified time
    Searched refs:Trap (Results 1 - 25 of 33) sorted by null

1 2

  /external/libchrome/sandbox/linux/seccomp-bpf/
trap_unittest.cc 5 #include "sandbox/linux/seccomp-bpf/trap.h"
15 SANDBOX_TEST_ALLOW_NOISE(Trap, SigSysAction) {
16 // This creates a global Trap instance, and registers the signal handler
17 // (Trap::SigSysAction).
18 Trap::Registry();
trap.h 20 // The Trap class allows a BPF filter program to branch out to user space by
28 class SANDBOX_EXPORT Trap : public bpf_dsl::TrapRegistry {
34 // Registry returns the trap registry used by Trap's SIGSYS handler,
55 Trap();
59 ~Trap() = delete;
71 static Trap* global_trap_;
81 DISALLOW_COPY_AND_ASSIGN(Trap);
trap.cc 5 #include "sandbox/linux/seccomp-bpf/trap.h"
79 Trap::Trap()
112 bpf_dsl::TrapRegistry* Trap::Registry() {
116 // Also, this is not a normal singleton. Once created, the global trap
119 global_trap_ = new Trap();
121 SANDBOX_DIE("Failed to allocate global trap handler");
127 void Trap::SigSysAction(int nr, LinuxSigInfo* info, void* void_context) {
142 "for Trap() handling.");
147 void Trap::SigSys(int nr, LinuxSigInfo* info, ucontext_t* ctx)
223 const TrapKey& trap = trap_array_[info->si_errno - 1]; local
    [all...]
sandbox_bpf.cc 27 #include "sandbox/linux/seccomp-bpf/trap.h"
119 return bpf_dsl::Trap(SandboxPanicTrap, error);
224 bpf_dsl::PolicyCompiler compiler(policy_.get(), Trap::Registry());
225 if (Trap::SandboxDebuggingAllowedByUser()) {
syscall_unittest.cc 31 using sandbox::bpf_dsl::Trap;
101 // SIGSYS trap handler that will be called on __NR_uname.
119 return Trap(CopySyscallArgsToAux, aux_);
158 // We expect the trap handler to have copied the 6 arguments.
  /external/tpm2/
CpriCryptPri.c 12 static void Trap(const char *function, int line, int code);
13 FAIL_FUNCTION TpmFailFunction = (FAIL_FUNCTION)&Trap;
23 Trap(
  /external/v8/test/mjsunit/es6/
proxies-prevent-extensions.js 7 // No trap.
22 // "Undefined" trap.
37 // Invalid trap.
52 // Trap returns trueish and target is extensible.
55 // Trap returns trueish but target is not extensible.
62 // Trap returns falsish.
79 // Trap returns trueish but target is extensible.
82 // Trap returns trueish and target is not extensible.
proxies-is-extensible.js 7 // No trap.
22 // "Undefined" trap.
37 // Invalid trap.
52 // Trap returns trueish and target is extensible.
55 // Trap returns trueish but target is not extensible.
66 // Trap returns falsish but target is extensible.
69 // Trap returns falsish and target is not extensible.
proxies-define-property.js 5 // Check basic call to trap.
35 // Step 6: Trap isn't callable.
39 // Step 7: Trap is undefined.
48 // Step 9: Property name is passed to the trap as a string.
54 // Step 10: Trap returns false.
58 // Step 15a: Trap returns true for adding a property to a non-extensible target.
63 // Step 15b: Trap returns true for adding a non-configurable property.
73 // Step 16a: Trap returns true for non-compatible property descriptor.
78 // Step 16b: Trap returns true for overwriting a configurable property
proxies-delete-property.js 36 // No trap.
52 // "Undefined" trap.
68 // Invalid trap.
84 // Trap returns trueish and target doesn't own property.
89 // Trap returns trueish and target property is configurable.
95 // Trap returns trueish but target property is not configurable.
123 // Trap returns trueish but target property is not configurable. In contrast
124 // to above, here the target property was configurable before the trap call.
150 // Trap returns falsish and target doesn't own property.
159 // Trap returns falsish and target property is configurable
    [all...]
proxies-has.js 25 // Step 7: Fall through to target if trap is undefined.
42 // Step 9b i. Trap result must confirm presence of non-configurable properties
48 // Step 9b iii. Trap result must confirm presence of all own properties of
proxies-set.js 79 // No trap.
88 // "Undefined" trap.
98 // Check that setting on a proxy without "set" trap correctly triggers its
99 // "getOwnProperty" trap and its "defineProperty" trap.
180 // Trap returns trueish and property does not exist in target.
185 // Trap returns trueish and target property is configurable or writable data.
207 // Trap returns trueish but target property is frozen data.
228 // Trap returns trueish and target property is configurable accessor.
234 // Trap returns trueish and target property is non-configurable accessor
    [all...]
proxies-get-own-property-descriptor.js 105 // Step 6: Trap is not callable.
109 // Step 8: Trap throws.
113 // Step 9: Trap result is neither undefined nor an object.
  /external/libchrome/sandbox/linux/seccomp-bpf-helpers/
sigsys_handlers.cc 248 return bpf_dsl::Trap(CrashSIGSYS_Handler, NULL);
252 return bpf_dsl::Trap(SIGSYSCloneFailure, NULL);
256 return bpf_dsl::Trap(SIGSYSPrctlFailure, NULL);
260 return bpf_dsl::Trap(SIGSYSIoctlFailure, NULL);
264 return bpf_dsl::Trap(SIGSYSKillFailure, NULL);
268 return bpf_dsl::Trap(SIGSYSFutexFailure, NULL);
272 return bpf_dsl::Trap(SIGSYSSchedHandler, NULL);
  /external/libchrome/sandbox/linux/bpf_dsl/
policy_compiler.h 33 // Compile registers any trap handlers needed by the policy and
57 // Trap returns a CodeGen::Node to indicate the system call should
58 // instead invoke a trap handler.
59 CodeGen::Node Trap(TrapRegistry::TrapFnc fnc, const void* aux, bool safe);
bpf_dsl_unittest.cc 291 return Trap(UnameTrap, &count_);
451 ResultExpr trap = Trap(DummyTrap, nullptr); local
452 EXPECT_FALSE(trap->IsAllow());
453 EXPECT_TRUE(trap->IsDeny());
465 ResultExpr safe = Trap(DummyTrap, nullptr);
bpf_dsl.cc 58 return pc->Trap(func_, arg_, safe_);
262 ResultExpr Trap(TrapRegistry::TrapFnc trap_func, const void* aux) {
policy_compiler.cc 62 // A Trap() handler that returns an "errno" value. The value is encoded
160 // the trap registry a second chance to complain before we add the backdoor.
442 return Trap(ReturnErrno, reinterpret_cast<void*>(ret & SECCOMP_RET_DATA),
449 CodeGen::Node PolicyCompiler::Trap(TrapRegistry::TrapFnc fnc,
bpf_dsl.h 49 // .Else(Trap(SetFlagHandler, NULL));
62 // | Trap(trap_func, aux) | UnsafeTrap(trap_func, aux)
103 // Trap specifies a result that the system call should be handled by
107 Trap(TrapRegistry::TrapFnc trap_func, const void* aux);
109 // UnsafeTrap is like Trap, except the policy is marked as "unsafe"
  /external/mksh/src/
histrap.c 2 /* $OpenBSD: trap.c,v 1.23 2010/05/19 17:36:08 jasper Exp $ */
32 Trap sigtraps[ksh_NSIG + 1];
1065 sigtraps[ksh_SIGEXIT].mess = "Exit trap";
1115 Trap *
1119 Trap *p;
1171 * trap signal handler
1176 Trap *p = &sigtraps[i];
1179 trap = p->set = 1;
1182 if ((p->flags & TF_FATAL) && !p->trap) {
1209 Trap *p = sigtraps
    [all...]
sh.h 803 EXTERN short trap_exstat; /* exit status before running a trap */
904 * trap handlers
906 typedef struct trap { struct
909 char *trap; /* trap command */ member in struct:trap
914 volatile sig_atomic_t set; /* trap pending */
915 } Trap;
917 /* values for Trap.flags */
919 #define TF_USER_SET BIT(1) /* user has (tried to) set trap */
926 #define TF_CHANGED BIT(8) /* used by runtrap() to detect trap changes *
942 EXTERN volatile sig_atomic_t trap; \/* traps pending? *\/ variable
    [all...]
  /external/clang/lib/Sema/
SemaTemplateDeduction.cpp     [all...]
SemaExprMember.cpp     [all...]
SemaDeclCXX.cpp     [all...]
SemaStmt.cpp     [all...]

Completed in 402 milliseconds

1 2