/external/linux-kselftest/android/patches/ |
D | 0009-seccomp-disable-tests-broken-on-kernels-4.8.patch | 4 Subject: [PATCH] seccomp: disable tests broken on kernels < 4.8 14 tools/testing/selftests/seccomp/seccomp_bpf.c | 6 ++++++ 17 diff --git a/tools/testing/selftests/seccomp/seccomp_bpf.c b/tools/testing/selftests/seccomp/seccom… 19 --- a/tools/testing/selftests/seccomp/seccomp_bpf.c 20 +++ b/tools/testing/selftests/seccomp/seccomp_bpf.c
|
D | 0010-seccomp-detect-compat-mode-in-ARM64.patch | 4 Subject: [PATCH] seccomp: detect compat mode in ARM64 13 tools/testing/selftests/seccomp/seccomp_bpf.c | 5 +++-- 16 diff --git a/tools/testing/selftests/seccomp/seccomp_bpf.c b/tools/testing/selftests/seccomp/seccom… 18 --- a/tools/testing/selftests/seccomp/seccomp_bpf.c 19 +++ b/tools/testing/selftests/seccomp/seccomp_bpf.c
|
D | 0017-seccomp_bpf_disable_tests.patch | 1 diff --git a/tools/testing/selftests/seccomp/seccomp_bpf.c b/tools/testing/selftests/seccomp/seccom… 3 --- a/tools/testing/selftests/seccomp/seccomp_bpf.c 4 +++ b/tools/testing/selftests/seccomp/seccomp_bpf.c
|
/external/autotest/client/site_tests/security_SeccompSyscallFilters/ |
D | control | 9 Runs tests to verify that seccomp calls make correct changes with 12 PURPOSE = "To verify that seccomp is correctly changing permissions" 13 CRITERIA = "Permissions are changed to expected values after seccomp calls"
|
/external/minijail/ |
D | minijail0_cli.c | 580 int seccomp = -1; in parse_args() local 631 if (seccomp != -1 && seccomp != 1) { in parse_args() 637 seccomp = 1; in parse_args() 641 if (seccomp != -1 && seccomp != 2) { in parse_args() 647 seccomp = 2; in parse_args() 841 if (seccomp != -1 && seccomp != 3) { in parse_args() 847 seccomp = 3; in parse_args()
|
/external/linux-kselftest/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 159 #ifndef seccomp 160 int seccomp(unsigned int op, unsigned int flags, void *args) in seccomp() function 670 ASSERT_EQ(0, seccomp(SECCOMP_SET_MODE_FILTER, 0, in kill_thread_or_group() 677 ASSERT_EQ(0, seccomp(SECCOMP_SET_MODE_FILTER, 0, &prog_thread)); in kill_thread_or_group() 2014 ret = seccomp(-1, 0, &prog); in TEST() 2023 ret = seccomp(SECCOMP_SET_MODE_STRICT, -1, NULL); in TEST() 2027 ret = seccomp(SECCOMP_SET_MODE_STRICT, 0, &prog); in TEST() 2033 ret = seccomp(SECCOMP_SET_MODE_FILTER, -1, &prog); in TEST() 2037 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, NULL); in TEST() 2042 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, &prog); in TEST() [all …]
|
/external/autotest/client/site_tests/security_SeccompSyscallFilters/src/ |
D | seccomp_bpf_tests.c | 928 #ifndef seccomp 929 int seccomp(unsigned int op, unsigned int flags, struct sock_fprog *filter) in seccomp() function 955 ret = seccomp(-1, 0, &prog); 961 ret = seccomp(SECCOMP_SET_MODE_STRICT, -1, NULL); 965 ret = seccomp(SECCOMP_SET_MODE_STRICT, 0, &prog); 971 ret = seccomp(SECCOMP_SET_MODE_FILTER, -1, &prog); 975 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, NULL); 980 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, &prog); 1000 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, &prog); 1011 ret = seccomp(SECCOMP_SET_MODE_STRICT, 0, NULL); [all …]
|
/external/strace/tests-m32/ |
D | Makefile.am | 148 prctl-seccomp-filter-v \ 149 prctl-seccomp-strict \ 167 seccomp-filter-v \ 168 seccomp-strict \ 279 prctl-seccomp-filter-v.test \ 280 prctl-seccomp-strict.test \ 293 seccomp-strict.test \
|
D | seccomp-filter-v.gen.test | 4 run_strace_match_diff -v -e trace=seccomp
|
D | seccomp_get_action_avail.gen.test | 4 run_strace_match_diff -e trace=seccomp
|
D | seccomp-filter.gen.test | 4 run_strace_match_diff -e trace=seccomp
|
/external/strace/tests-mx32/ |
D | Makefile.am | 148 prctl-seccomp-filter-v \ 149 prctl-seccomp-strict \ 167 seccomp-filter-v \ 168 seccomp-strict \ 279 prctl-seccomp-filter-v.test \ 280 prctl-seccomp-strict.test \ 293 seccomp-strict.test \
|
D | seccomp_get_action_avail.gen.test | 4 run_strace_match_diff -e trace=seccomp
|
D | seccomp-filter.gen.test | 4 run_strace_match_diff -e trace=seccomp
|
D | seccomp-filter-v.gen.test | 4 run_strace_match_diff -v -e trace=seccomp
|
/external/strace/tests/ |
D | Makefile.am | 148 prctl-seccomp-filter-v \ 149 prctl-seccomp-strict \ 167 seccomp-filter-v \ 168 seccomp-strict \ 279 prctl-seccomp-filter-v.test \ 280 prctl-seccomp-strict.test \ 293 seccomp-strict.test \
|
D | seccomp-filter-v.gen.test | 4 run_strace_match_diff -v -e trace=seccomp
|
D | seccomp-filter.gen.test | 4 run_strace_match_diff -e trace=seccomp
|
D | seccomp_get_action_avail.gen.test | 4 run_strace_match_diff -e trace=seccomp
|
/external/seccomp-tests/ |
D | README.google | 2 …ttps://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/tools/testing/selftests/seccomp 4 Description: Mirror of Linux kernel seccomp test suite, run in CTS.
|
D | README.md | 42 git filter-branch --subdirectory-filter tools/testing/selftests/seccomp 78 branch into the seccomp-tests repository and subtree merge it (as FETCH\_HEAD). This will avoid
|
/external/autotest/client/site_tests/security_SandboxedServices/ |
D | security_SandboxedServices.py | 86 properties['filter'] = yes_or_no(service.seccomp == SECCOMP_MODE_FILTER) 356 if process.seccomp != SECCOMP_MODE_FILTER: 362 SECCOMP_MAP[SECCOMP_MODE_FILTER], process.seccomp, 363 SECCOMP_MAP.get(process.seccomp, '???')))
|
/external/seccomp-tests/linux/ |
D | seccomp_bpf.c | 1504 #ifndef seccomp 1505 int seccomp(unsigned int op, unsigned int flags, struct sock_fprog *filter) in seccomp() function 1529 ret = seccomp(-1, 0, &prog); in TEST() 1538 ret = seccomp(SECCOMP_SET_MODE_STRICT, -1, NULL); in TEST() 1542 ret = seccomp(SECCOMP_SET_MODE_STRICT, 0, &prog); in TEST() 1548 ret = seccomp(SECCOMP_SET_MODE_FILTER, -1, &prog); in TEST() 1552 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, NULL); in TEST() 1557 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, &prog); in TEST() 1580 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, &prog); in TEST() 1594 ret = seccomp(SECCOMP_SET_MODE_STRICT, 0, NULL); in TEST() [all …]
|
/external/strace/ |
D | seccomp.c | 36 SYS_FUNC(seccomp) in SYS_FUNC() argument
|
/external/adhd/init/ |
D | cras.sh | 50 -S /usr/share/policy/cras-seccomp.policy \
|