Searched refs:SECCOMP_RET_ALLOW (Results 1 – 18 of 18) sorted by relevance
/external/autotest/client/site_tests/security_SeccompSyscallFilters/src/ |
D | seccomp_bpf_tests.c | 70 #define SECCOMP_RET_ALLOW 0x7fff0000U // allow macro 131 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in TEST() 155 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in TEST() 176 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in TEST() 267 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in TEST_SIGNAL() 290 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in TEST_SIGNAL() 295 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in TEST_SIGNAL() 320 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in TEST_SIGNAL() 325 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in TEST_SIGNAL() 350 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in TEST() [all …]
|
D | resumption.c | 102 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in FIXTURE_SETUP() 111 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in FIXTURE_SETUP()
|
D | sigsegv.c | 80 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in FIXTURE_SETUP()
|
/external/strace/xlat/ |
D | seccomp_ret_action.h | 23 #if defined(SECCOMP_RET_ALLOW) || (defined(HAVE_DECL_SECCOMP_RET_ALLOW) && HAVE_DECL_SECCOMP_RET_AL… 24 XLAT(SECCOMP_RET_ALLOW),
|
D | seccomp_ret_action.in | 5 SECCOMP_RET_ALLOW
|
/external/minijail/ |
D | bpf.h | 46 #define SECCOMP_RET_ALLOW 0x7fff0000U /* allow */ macro 159 set_bpf_stmt((_block), BPF_RET+BPF_K, SECCOMP_RET_ALLOW)
|
D | syscall_filter_unittest.c | 71 BPF_RET+BPF_K, SECCOMP_RET_ALLOW); \ 87 BPF_RET+BPF_K, SECCOMP_RET_ALLOW); \
|
D | bpf.c | 29 set_bpf_stmt(curr_block++, BPF_RET+BPF_K, SECCOMP_RET_ALLOW); in bpf_allow_syscall()
|
/external/tlsdate/src/ |
D | seccomp-compat.h | 20 #define SECCOMP_RET_ALLOW 0x7fff0000U /* allow */ macro
|
D | seccomp.c | 40 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW)
|
/external/kernel-headers/original/uapi/linux/ |
D | seccomp.h | 32 #define SECCOMP_RET_ALLOW 0x7fff0000U /* allow */ macro
|
/external/compiler-rt/test/asan/TestCases/Linux/ |
D | read_binary_name_regtest.c | 40 BPF_STMT(BPF_RET + BPF_K, SECCOMP_RET_ALLOW) in main()
|
/external/libchrome/sandbox/linux/system_headers/ |
D | linux_seccomp.h | 96 #define SECCOMP_RET_ALLOW 0x7fff0000U // Allow macro
|
/external/strace/tests/ |
D | seccomp.c | 58 BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_ALLOW)
|
/external/libchrome/sandbox/linux/bpf_dsl/ |
D | bpf_dsl.cc | 32 bool IsAllow() const override { return IsAction(SECCOMP_RET_ALLOW); } in IsAllow() 246 return ResultExpr(new const ReturnResultExprImpl(SECCOMP_RET_ALLOW)); in Allow()
|
D | dump_bpf.cc | 122 } else if (insn.k == SECCOMP_RET_ALLOW) { in AppendInstruction()
|
D | verifier.cc | 200 case SECCOMP_RET_ALLOW: in EvaluateBPF()
|
D | bpf_dsl_unittest.cc | 89 EXPECT_EQ(SECCOMP_RET_ALLOW, Emulate(data)); in ExpectAllow()
|