Searched refs:SandboxBPF (Results 1 – 5 of 5) sorted by relevance
123 SandboxBPF::SandboxBPF(bpf_dsl::Policy* policy) in SandboxBPF() function in sandbox::SandboxBPF127 SandboxBPF::~SandboxBPF() { in ~SandboxBPF()131 bool SandboxBPF::SupportsSeccompSandbox(SeccompLevel level) { in SupportsSeccompSandbox()148 bool SandboxBPF::StartSandbox(SeccompLevel seccomp_level) { in StartSandbox()197 void SandboxBPF::SetProcFd(base::ScopedFD proc_fd) { in SetProcFd()202 bool SandboxBPF::IsValidSyscallNumber(int sysnum) { in IsValidSyscallNumber()207 bool SandboxBPF::IsRequiredForUnsafeTrap(int sysno) { in IsRequiredForUnsafeTrap()212 intptr_t SandboxBPF::ForwardSyscall(const struct arch_seccomp_data& args) { in ForwardSyscall()220 CodeGen::Program SandboxBPF::AssembleFilter() { in AssembleFilter()231 void SandboxBPF::InstallFilter(bool must_sync_threads) { in InstallFilter()
27 class SANDBOX_EXPORT SandboxBPF {36 explicit SandboxBPF(bpf_dsl::Policy* policy);40 ~SandboxBPF();110 DISALLOW_COPY_AND_ASSIGN(SandboxBPF);
54 DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); in EvaluateSyscall()96 CHECK(SandboxBPF::IsValidSyscallNumber(system_call_number)); in EvaluateSyscall()
117 DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); in EvaluateSyscall()
272 DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); in EvaluateSyscall()