/external/seccomp-tests/linux/ |
seccomp_bpf.c | 15 #include <sys/prctl.h> 19 #include <linux/prctl.h> 106 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_STRICT, NULL, NULL, NULL); 117 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_STRICT, NULL, NULL, NULL); 133 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); 144 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, NULL, 0, 0); 148 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, NULL, NULL, NULL); 166 ret = prctl(PR_GET_NO_NEW_PRIVS, 0, NULL, 0, 0); 171 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); 201 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) [all...] |
/external/linux-kselftest/tools/testing/selftests/capabilities/ |
test_execve.c | 18 #include <sys/prctl.h> 99 if (prctl(PR_SET_KEEPCAPS, 1, 0, 0, 0) != 0) 273 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != -1 || errno != EPERM) { 287 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_RAW, 0, 0, 0) != -1 || errno != EPERM) { 296 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { 302 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 1) { 307 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_CLEAR_ALL, 0, 0, 0, 0) != 0) 310 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { 315 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) 322 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) [all...] |
validate_cap.c | 7 #include <sys/prctl.h> 66 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != bool_arg(argv, 4)) {
|
/external/libcap/libcap/ |
cap_proc.c | 7 #include <sys/prctl.h> 114 result = prctl(PR_CAPBSET_READ, cap); 124 result = prctl(PR_CAPBSET_DROP, cap);
|
/external/linux-kselftest/tools/testing/selftests/powerpc/pmu/ |
per_event_excludes.c | 13 #include <sys/prctl.h> 77 prctl(PR_TASK_PERF_EVENTS_ENABLE); 83 prctl(PR_TASK_PERF_EVENTS_DISABLE);
|
/external/ltp/testcases/kernel/security/cap_bound/ |
cap_bset_inh_bounds.c | 35 #include <sys/prctl.h> 53 ret = prctl(PR_CAPBSET_READ, CAP_SYS_ADMIN); 82 ret = prctl(PR_CAPBSET_DROP, CAP_SYS_ADMIN);
|
/external/strace/tests/ |
prctl-seccomp-filter-v.c | 2 * Check verbose decoding of prctl PR_SET_SECCOMP SECCOMP_MODE_FILTER. 38 # include <sys/prctl.h> 103 puts("prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) = 0"); 105 printf("prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=%u, filter=[", 129 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)) 131 if (prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog))
|
prctl-no-args.c | 2 * Check decoding of prctl operations without arguments and return code parsing: 39 # include <linux/prctl.h> 66 printf("prctl(%s) = %s\n", options[i].str, sprintrc(rc));
|
/external/strace/tests-m32/ |
prctl-seccomp-filter-v.c | 2 * Check verbose decoding of prctl PR_SET_SECCOMP SECCOMP_MODE_FILTER. 38 # include <sys/prctl.h> 103 puts("prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) = 0"); 105 printf("prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=%u, filter=[", 129 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)) 131 if (prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog))
|
prctl-no-args.c | 2 * Check decoding of prctl operations without arguments and return code parsing: 39 # include <linux/prctl.h> 66 printf("prctl(%s) = %s\n", options[i].str, sprintrc(rc));
|
/external/strace/tests-mx32/ |
prctl-seccomp-filter-v.c | 2 * Check verbose decoding of prctl PR_SET_SECCOMP SECCOMP_MODE_FILTER. 38 # include <sys/prctl.h> 103 puts("prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) = 0"); 105 printf("prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=%u, filter=[", 129 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)) 131 if (prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog))
|
prctl-no-args.c | 2 * Check decoding of prctl operations without arguments and return code parsing: 39 # include <linux/prctl.h> 66 printf("prctl(%s) = %s\n", options[i].str, sprintrc(rc));
|
/cts/tests/tests/os/src/android/os/cts/ |
SecurityFeaturesTest.java | 49 * Verifies that prctl(PR_GET_DUMPABLE) == ro.debuggable 66 * 3) An app which explicitly calls prctl(PR_SET_DUMPABLE, 1). 69 * to exactly equal prctl(PR_GET_DUMPABLE). 73 int prctl_dumpable = Os.prctl(PR_GET_DUMPABLE, 0, 0, 0, 0);
|
/frameworks/av/services/mediadrm/ |
main_mediadrmserver.cpp | 22 #include <sys/prctl.h>
|
/system/core/libmemunreachable/ |
PtracerThread.cpp | 51 prctl(PR_SET_VMA, PR_SET_VMA_ANON_NAME, base_, size_, "libmemunreachable stack"); 97 prctl(PR_SET_NAME, "libmemunreachable ptrace thread"); 148 prctl(PR_SET_PTRACER, tracer_pid); 152 prctl(PR_SET_PTRACER, 0);
|
/bionic/libc/arch-x86/syscalls/ |
prctl.S | 5 ENTRY(prctl) function 49 END(prctl)
|
/bionic/linker/ |
linker_logger.cpp | 32 #include <sys/prctl.h> 89 if (prctl(PR_GET_DUMPABLE, 0, 0, 0, 0) == 0) {
|
/external/drm_hwcomposer/ |
worker.cpp | 19 #include <sys/prctl.h> 81 prctl(PR_SET_NAME, name_.c_str());
|
/external/libchrome/base/threading/ |
platform_thread_linux.cc | 20 #include <sys/prctl.h> 84 // available everywhere and it's only benefit over using prctl directly is 86 int err = prctl(PR_SET_NAME, name.c_str()); 89 DPLOG(ERROR) << "prctl(PR_SET_NAME)";
|
/external/libchrome/sandbox/linux/services/ |
yama.cc | 10 #include <sys/prctl.h> 42 const int ret = prctl(PR_SET_PTRACER, set_ptracer_arg);
|
/external/ltp/testcases/kernel/syscalls/prctl/ |
prctl02.c | 35 * 1) prctl() fails with errno, EINVAL when an invalid value is given for 37 * 2) prctl() fails with errno, EINVAL when option is PR_SET_PDEATHSIG 49 * call prctl() with proper arguments 80 #include <sys/prctl.h> 132 TEST(prctl(test_cases[i].option, 140 "prctl() returned %ld",
|
/frameworks/base/cmds/webview_zygote/ |
webview_zygote.cpp | 20 #include <sys/prctl.h> 61 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) < 0) {
|
/system/tpm/attestation/server/ |
attestationd-seccomp-amd64.policy | 79 prctl: return 1
|
/system/tpm/tpm_manager/server/ |
tpm_managerd-seccomp-amd64.policy | 81 prctl: return 1
|
/system/tpm/trunks/ |
trunksd-seccomp-amd64.policy | 72 prctl: return 1
|