Home
last modified time | relevance | path

Searched refs:SECCOMP_RET_ERRNO (Results 1 – 21 of 21) sorted by relevance

/external/strace/xlat/
Dseccomp_ret_action.h27 #if defined(SECCOMP_RET_ERRNO) || (defined(HAVE_DECL_SECCOMP_RET_ERRNO) && HAVE_DECL_SECCOMP_RET_ER…
29 static_assert((SECCOMP_RET_ERRNO) == (0x00050000U), "SECCOMP_RET_ERRNO != 0x00050000U");
32 # define SECCOMP_RET_ERRNO 0x00050000U
64 XLAT(SECCOMP_RET_ERRNO),
Dseccomp_ret_action.in4 SECCOMP_RET_ERRNO 0x00050000U
/external/strace/tests-mx32/
Dseccomp_get_action_avail.c78 # ifdef SECCOMP_RET_ERRNO in main()
79 { ARG_STR(SECCOMP_RET_ERRNO) }, in main()
Dprctl-seccomp-filter-v.c50 && defined SECCOMP_RET_ERRNO \
60 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|(SECCOMP_RET_DATA & (err)))
Dseccomp-filter-v.c50 && defined SECCOMP_RET_ERRNO \
60 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|(SECCOMP_RET_DATA & (err)))
/external/strace/tests-m32/
Dseccomp_get_action_avail.c78 # ifdef SECCOMP_RET_ERRNO in main()
79 { ARG_STR(SECCOMP_RET_ERRNO) }, in main()
Dprctl-seccomp-filter-v.c50 && defined SECCOMP_RET_ERRNO \
60 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|(SECCOMP_RET_DATA & (err)))
Dseccomp-filter-v.c50 && defined SECCOMP_RET_ERRNO \
60 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|(SECCOMP_RET_DATA & (err)))
/external/strace/tests/
Dseccomp_get_action_avail.c78 # ifdef SECCOMP_RET_ERRNO in main()
79 { ARG_STR(SECCOMP_RET_ERRNO) }, in main()
Dprctl-seccomp-filter-v.c50 && defined SECCOMP_RET_ERRNO \
60 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|(SECCOMP_RET_DATA & (err)))
Dseccomp-filter-v.c50 && defined SECCOMP_RET_ERRNO \
60 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|(SECCOMP_RET_DATA & (err)))
/external/minijail/
Dbpf.h50 #define SECCOMP_RET_ERRNO 0x00050000U /* return -1 and set errno */ macro
173 SECCOMP_RET_ERRNO | ((_errno) & SECCOMP_RET_DATA))
Dsyscall_filter_unittest.cc830 SECCOMP_RET_ERRNO | (1 & SECCOMP_RET_DATA)); in TEST_F()
863 SECCOMP_RET_ERRNO | (1 & SECCOMP_RET_DATA)); in TEST_F()
/external/compiler-rt/test/asan/TestCases/Linux/
Dread_binary_name_regtest.c38 BPF_STMT(BPF_RET + BPF_K, SECCOMP_RET_ERRNO | EPERM), in main()
/external/kernel-headers/original/uapi/linux/
Dseccomp.h39 #define SECCOMP_RET_ERRNO 0x00050000U /* returns an errno */ macro
/external/autotest/client/site_tests/security_SeccompSyscallFilters/src/
Dseccomp_bpf_tests.c60 #define SECCOMP_RET_ERRNO 0x00050000U // returns an errno macro
361 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ERRNO | E2BIG), in TEST()
385 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ERRNO | 0), in TEST()
529 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ERRNO), in FIXTURE_SETUP()
1152 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ERRNO | EINVAL),
/external/minijail/tools/
Dbpf.py70 SECCOMP_RET_ERRNO = 0x00050000 variable
131 if (ins.k & SECCOMP_RET_ACTION_FULL) == SECCOMP_RET_ERRNO:
236 SECCOMP_RET_ERRNO | (errno & SECCOMP_RET_DATA))
/external/openssh/
Dsandbox-seccomp-filter.c89 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ERRNO|(_errno))
/external/seccomp-tests/linux/
Dseccomp_bpf.c74 #define SECCOMP_RET_ERRNO 0x00050000U /* returns an errno */ macro
550 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO | E2BIG), in TEST()
577 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO | 0), in TEST()
604 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO | 4096), in TEST()
761 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO), in FIXTURE_SETUP()
1766 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO | EINVAL), in TEST_F()
/external/linux-kselftest/tools/testing/selftests/seccomp/
Dseccomp_bpf.c97 #define SECCOMP_RET_ERRNO 0x00050000U /* returns an errno */ macro
763 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO | errno), \
1004 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO), in FIXTURE_SETUP()
1877 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO | EPERM), in TEST_F()
1939 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO | EPERM), in TEST_F()
2343 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO | EINVAL), in TEST_F()
2869 SECCOMP_RET_ERRNO, SECCOMP_RET_TRACE,
/external/strace/
DChangeLog39955 exceed 4095, but SECCOMP_RET_ERRNO support introduced by kernel commit
40270 flag is set in ptrace_setoptions. Remove all SECCOMP_RET_ERRNO
40353 BPF_STMT(BPF_RET, SECCOMP_RET_ERRNO | SECCOMP_RET_DATA)
40359 x86, x32, x86_64: print SECCOMP_RET_ERRNO filtered syscalls.
40360 This is required to process SECCOMP_RET_ERRNO filtered syscalls on
40385 Syscall number -1 might be a side effect of SECCOMP_RET_ERRNO filtering.
40393 Syscall number -1 might be a side effect of SECCOMP_RET_ERRNO filtering.