Home
last modified time | relevance | path

Searched refs:seccomp (Results 1 – 25 of 85) sorted by relevance

1234

/external/linux-kselftest/android/patches/
D0009-seccomp-disable-tests-broken-on-kernels-4.8.patch4 Subject: [PATCH] seccomp: disable tests broken on kernels < 4.8
14 tools/testing/selftests/seccomp/seccomp_bpf.c | 6 ++++++
17 diff --git a/tools/testing/selftests/seccomp/seccomp_bpf.c b/tools/testing/selftests/seccomp/seccom…
19 --- a/tools/testing/selftests/seccomp/seccomp_bpf.c
20 +++ b/tools/testing/selftests/seccomp/seccomp_bpf.c
D0010-seccomp-detect-compat-mode-in-ARM64.patch4 Subject: [PATCH] seccomp: detect compat mode in ARM64
13 tools/testing/selftests/seccomp/seccomp_bpf.c | 5 +++--
16 diff --git a/tools/testing/selftests/seccomp/seccomp_bpf.c b/tools/testing/selftests/seccomp/seccom…
18 --- a/tools/testing/selftests/seccomp/seccomp_bpf.c
19 +++ b/tools/testing/selftests/seccomp/seccomp_bpf.c
D0017-seccomp_bpf_disable_tests.patch1 diff --git a/tools/testing/selftests/seccomp/seccomp_bpf.c b/tools/testing/selftests/seccomp/seccom…
3 --- a/tools/testing/selftests/seccomp/seccomp_bpf.c
4 +++ b/tools/testing/selftests/seccomp/seccomp_bpf.c
/external/autotest/client/site_tests/security_SeccompSyscallFilters/
Dcontrol9 Runs tests to verify that seccomp calls make correct changes with
12 PURPOSE = "To verify that seccomp is correctly changing permissions"
13 CRITERIA = "Permissions are changed to expected values after seccomp calls"
/external/minijail/
Dminijail0_cli.c580 int seccomp = -1; in parse_args() local
631 if (seccomp != -1 && seccomp != 1) { in parse_args()
637 seccomp = 1; in parse_args()
641 if (seccomp != -1 && seccomp != 2) { in parse_args()
647 seccomp = 2; in parse_args()
841 if (seccomp != -1 && seccomp != 3) { in parse_args()
847 seccomp = 3; in parse_args()
/external/linux-kselftest/tools/testing/selftests/seccomp/
Dseccomp_bpf.c159 #ifndef seccomp
160 int seccomp(unsigned int op, unsigned int flags, void *args) in seccomp() function
670 ASSERT_EQ(0, seccomp(SECCOMP_SET_MODE_FILTER, 0, in kill_thread_or_group()
677 ASSERT_EQ(0, seccomp(SECCOMP_SET_MODE_FILTER, 0, &prog_thread)); in kill_thread_or_group()
2014 ret = seccomp(-1, 0, &prog); in TEST()
2023 ret = seccomp(SECCOMP_SET_MODE_STRICT, -1, NULL); in TEST()
2027 ret = seccomp(SECCOMP_SET_MODE_STRICT, 0, &prog); in TEST()
2033 ret = seccomp(SECCOMP_SET_MODE_FILTER, -1, &prog); in TEST()
2037 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, NULL); in TEST()
2042 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, &prog); in TEST()
[all …]
/external/autotest/client/site_tests/security_SeccompSyscallFilters/src/
Dseccomp_bpf_tests.c928 #ifndef seccomp
929 int seccomp(unsigned int op, unsigned int flags, struct sock_fprog *filter) in seccomp() function
955 ret = seccomp(-1, 0, &prog);
961 ret = seccomp(SECCOMP_SET_MODE_STRICT, -1, NULL);
965 ret = seccomp(SECCOMP_SET_MODE_STRICT, 0, &prog);
971 ret = seccomp(SECCOMP_SET_MODE_FILTER, -1, &prog);
975 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, NULL);
980 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, &prog);
1000 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, &prog);
1011 ret = seccomp(SECCOMP_SET_MODE_STRICT, 0, NULL);
[all …]
/external/strace/tests-m32/
DMakefile.am148 prctl-seccomp-filter-v \
149 prctl-seccomp-strict \
167 seccomp-filter-v \
168 seccomp-strict \
279 prctl-seccomp-filter-v.test \
280 prctl-seccomp-strict.test \
293 seccomp-strict.test \
Dseccomp-filter-v.gen.test4 run_strace_match_diff -v -e trace=seccomp
Dseccomp_get_action_avail.gen.test4 run_strace_match_diff -e trace=seccomp
Dseccomp-filter.gen.test4 run_strace_match_diff -e trace=seccomp
/external/strace/tests-mx32/
DMakefile.am148 prctl-seccomp-filter-v \
149 prctl-seccomp-strict \
167 seccomp-filter-v \
168 seccomp-strict \
279 prctl-seccomp-filter-v.test \
280 prctl-seccomp-strict.test \
293 seccomp-strict.test \
Dseccomp_get_action_avail.gen.test4 run_strace_match_diff -e trace=seccomp
Dseccomp-filter.gen.test4 run_strace_match_diff -e trace=seccomp
Dseccomp-filter-v.gen.test4 run_strace_match_diff -v -e trace=seccomp
/external/strace/tests/
DMakefile.am148 prctl-seccomp-filter-v \
149 prctl-seccomp-strict \
167 seccomp-filter-v \
168 seccomp-strict \
279 prctl-seccomp-filter-v.test \
280 prctl-seccomp-strict.test \
293 seccomp-strict.test \
Dseccomp-filter-v.gen.test4 run_strace_match_diff -v -e trace=seccomp
Dseccomp-filter.gen.test4 run_strace_match_diff -e trace=seccomp
Dseccomp_get_action_avail.gen.test4 run_strace_match_diff -e trace=seccomp
/external/seccomp-tests/
DREADME.google2 …ttps://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/tools/testing/selftests/seccomp
4 Description: Mirror of Linux kernel seccomp test suite, run in CTS.
DREADME.md42 git filter-branch --subdirectory-filter tools/testing/selftests/seccomp
78 branch into the seccomp-tests repository and subtree merge it (as FETCH\_HEAD). This will avoid
/external/autotest/client/site_tests/security_SandboxedServices/
Dsecurity_SandboxedServices.py86 properties['filter'] = yes_or_no(service.seccomp == SECCOMP_MODE_FILTER)
356 if process.seccomp != SECCOMP_MODE_FILTER:
362 SECCOMP_MAP[SECCOMP_MODE_FILTER], process.seccomp,
363 SECCOMP_MAP.get(process.seccomp, '???')))
/external/seccomp-tests/linux/
Dseccomp_bpf.c1504 #ifndef seccomp
1505 int seccomp(unsigned int op, unsigned int flags, struct sock_fprog *filter) in seccomp() function
1529 ret = seccomp(-1, 0, &prog); in TEST()
1538 ret = seccomp(SECCOMP_SET_MODE_STRICT, -1, NULL); in TEST()
1542 ret = seccomp(SECCOMP_SET_MODE_STRICT, 0, &prog); in TEST()
1548 ret = seccomp(SECCOMP_SET_MODE_FILTER, -1, &prog); in TEST()
1552 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, NULL); in TEST()
1557 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, &prog); in TEST()
1580 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, &prog); in TEST()
1594 ret = seccomp(SECCOMP_SET_MODE_STRICT, 0, NULL); in TEST()
[all …]
/external/strace/
Dseccomp.c36 SYS_FUNC(seccomp) in SYS_FUNC() argument
/external/adhd/init/
Dcras.sh50 -S /usr/share/policy/cras-seccomp.policy \

1234