/external/strace/xlat/ |
D | seccomp_ret_action.h | 27 #if defined(SECCOMP_RET_ERRNO) || (defined(HAVE_DECL_SECCOMP_RET_ERRNO) && HAVE_DECL_SECCOMP_RET_ER… 29 static_assert((SECCOMP_RET_ERRNO) == (0x00050000U), "SECCOMP_RET_ERRNO != 0x00050000U"); 32 # define SECCOMP_RET_ERRNO 0x00050000U 64 XLAT(SECCOMP_RET_ERRNO),
|
D | seccomp_ret_action.in | 4 SECCOMP_RET_ERRNO 0x00050000U
|
/external/strace/tests-mx32/ |
D | seccomp_get_action_avail.c | 78 # ifdef SECCOMP_RET_ERRNO in main() 79 { ARG_STR(SECCOMP_RET_ERRNO) }, in main()
|
D | prctl-seccomp-filter-v.c | 50 && defined SECCOMP_RET_ERRNO \ 60 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|(SECCOMP_RET_DATA & (err)))
|
D | seccomp-filter-v.c | 50 && defined SECCOMP_RET_ERRNO \ 60 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|(SECCOMP_RET_DATA & (err)))
|
/external/strace/tests-m32/ |
D | seccomp_get_action_avail.c | 78 # ifdef SECCOMP_RET_ERRNO in main() 79 { ARG_STR(SECCOMP_RET_ERRNO) }, in main()
|
D | prctl-seccomp-filter-v.c | 50 && defined SECCOMP_RET_ERRNO \ 60 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|(SECCOMP_RET_DATA & (err)))
|
D | seccomp-filter-v.c | 50 && defined SECCOMP_RET_ERRNO \ 60 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|(SECCOMP_RET_DATA & (err)))
|
/external/strace/tests/ |
D | seccomp_get_action_avail.c | 78 # ifdef SECCOMP_RET_ERRNO in main() 79 { ARG_STR(SECCOMP_RET_ERRNO) }, in main()
|
D | prctl-seccomp-filter-v.c | 50 && defined SECCOMP_RET_ERRNO \ 60 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|(SECCOMP_RET_DATA & (err)))
|
D | seccomp-filter-v.c | 50 && defined SECCOMP_RET_ERRNO \ 60 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|(SECCOMP_RET_DATA & (err)))
|
/external/minijail/ |
D | bpf.h | 50 #define SECCOMP_RET_ERRNO 0x00050000U /* return -1 and set errno */ macro 173 SECCOMP_RET_ERRNO | ((_errno) & SECCOMP_RET_DATA))
|
D | syscall_filter_unittest.cc | 830 SECCOMP_RET_ERRNO | (1 & SECCOMP_RET_DATA)); in TEST_F() 863 SECCOMP_RET_ERRNO | (1 & SECCOMP_RET_DATA)); in TEST_F()
|
/external/compiler-rt/test/asan/TestCases/Linux/ |
D | read_binary_name_regtest.c | 38 BPF_STMT(BPF_RET + BPF_K, SECCOMP_RET_ERRNO | EPERM), in main()
|
/external/kernel-headers/original/uapi/linux/ |
D | seccomp.h | 39 #define SECCOMP_RET_ERRNO 0x00050000U /* returns an errno */ macro
|
/external/autotest/client/site_tests/security_SeccompSyscallFilters/src/ |
D | seccomp_bpf_tests.c | 60 #define SECCOMP_RET_ERRNO 0x00050000U // returns an errno macro 361 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ERRNO | E2BIG), in TEST() 385 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ERRNO | 0), in TEST() 529 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ERRNO), in FIXTURE_SETUP() 1152 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ERRNO | EINVAL),
|
/external/minijail/tools/ |
D | bpf.py | 70 SECCOMP_RET_ERRNO = 0x00050000 variable 131 if (ins.k & SECCOMP_RET_ACTION_FULL) == SECCOMP_RET_ERRNO: 236 SECCOMP_RET_ERRNO | (errno & SECCOMP_RET_DATA))
|
/external/openssh/ |
D | sandbox-seccomp-filter.c | 89 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ERRNO|(_errno))
|
/external/seccomp-tests/linux/ |
D | seccomp_bpf.c | 74 #define SECCOMP_RET_ERRNO 0x00050000U /* returns an errno */ macro 550 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO | E2BIG), in TEST() 577 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO | 0), in TEST() 604 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO | 4096), in TEST() 761 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO), in FIXTURE_SETUP() 1766 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO | EINVAL), in TEST_F()
|
/external/linux-kselftest/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 97 #define SECCOMP_RET_ERRNO 0x00050000U /* returns an errno */ macro 763 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO | errno), \ 1004 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO), in FIXTURE_SETUP() 1877 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO | EPERM), in TEST_F() 1939 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO | EPERM), in TEST_F() 2343 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO | EINVAL), in TEST_F() 2869 SECCOMP_RET_ERRNO, SECCOMP_RET_TRACE,
|
/external/strace/ |
D | ChangeLog | 39955 exceed 4095, but SECCOMP_RET_ERRNO support introduced by kernel commit 40270 flag is set in ptrace_setoptions. Remove all SECCOMP_RET_ERRNO 40353 BPF_STMT(BPF_RET, SECCOMP_RET_ERRNO | SECCOMP_RET_DATA) 40359 x86, x32, x86_64: print SECCOMP_RET_ERRNO filtered syscalls. 40360 This is required to process SECCOMP_RET_ERRNO filtered syscalls on 40385 Syscall number -1 might be a side effect of SECCOMP_RET_ERRNO filtering. 40393 Syscall number -1 might be a side effect of SECCOMP_RET_ERRNO filtering.
|