Home
last modified time | relevance | path

Searched refs:SandboxBPF (Results 1 – 5 of 5) sorted by relevance

/external/libchrome/sandbox/linux/seccomp-bpf/
Dsandbox_bpf.cc124 SandboxBPF::SandboxBPF(bpf_dsl::Policy* policy) in SandboxBPF() function in sandbox::SandboxBPF
128 SandboxBPF::~SandboxBPF() { in ~SandboxBPF()
132 bool SandboxBPF::SupportsSeccompSandbox(SeccompLevel level) { in SupportsSeccompSandbox()
149 bool SandboxBPF::StartSandbox(SeccompLevel seccomp_level) { in StartSandbox()
198 void SandboxBPF::SetProcFd(base::ScopedFD proc_fd) { in SetProcFd()
203 bool SandboxBPF::IsValidSyscallNumber(int sysnum) { in IsValidSyscallNumber()
208 bool SandboxBPF::IsRequiredForUnsafeTrap(int sysno) { in IsRequiredForUnsafeTrap()
213 intptr_t SandboxBPF::ForwardSyscall(const struct arch_seccomp_data& args) { in ForwardSyscall()
221 CodeGen::Program SandboxBPF::AssembleFilter() { in AssembleFilter()
232 void SandboxBPF::InstallFilter(bool must_sync_threads) { in InstallFilter()
Dsandbox_bpf.h26 class SANDBOX_EXPORT SandboxBPF {
35 explicit SandboxBPF(bpf_dsl::Policy* policy);
39 ~SandboxBPF();
109 DISALLOW_COPY_AND_ASSIGN(SandboxBPF);
Dbpf_tests_unittest.cc53 DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); in EvaluateSyscall()
95 CHECK(SandboxBPF::IsValidSyscallNumber(system_call_number)); in EvaluateSyscall()
Dsyscall_unittest.cc117 DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); in EvaluateSyscall()
/external/libchrome/sandbox/linux/seccomp-bpf-helpers/
Dbaseline_policy.cc272 DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); in EvaluateSyscall()