Searched refs:SECCOMP_RET_ALLOW (Results 1 – 16 of 16) sorted by relevance
| /linux/samples/seccomp/ |
| H A D | bpf-direct.c | 118 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 121 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 124 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 126 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 141 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
|
| H A D | dropper.c | 39 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
|
| H A D | user-trap.c | 97 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in user_trap_syscall()
|
| H A D | bpf-helper.h | 46 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW)
|
| /linux/tools/testing/selftests/seccomp/ |
| H A D | seccomp_bpf.c | 110 #ifndef SECCOMP_RET_ALLOW 128 #define SECCOMP_RET_ALLOW 0x7fff0000U /* allow */ macro 414 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 447 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 484 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 522 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 545 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 570 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 693 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST_SIGNAL() 720 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST_SIGNAL() [all …]
|
| H A D | seccomp_benchmark.c | 170 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in main() 178 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in main()
|
| /linux/Documentation/translations/zh_CN/userspace-api/ |
| H A D | seccomp_filter.rst | 131 ``SECCOMP_RET_ALLOW``: 253 ``SECCOMP_RET_ALLOW`` 动作。尝试向sysctl写入 ``allow`` 会导致返回一个EINVAL。
|
| /linux/samples/bpf/ |
| H A D | tracex5_user.c | 25 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_accept_all_seccomp()
|
| /linux/tools/include/uapi/linux/ |
| H A D | seccomp.h | 46 #define SECCOMP_RET_ALLOW 0x7fff0000U /* allow */ macro
|
| /linux/include/uapi/linux/ |
| H A D | seccomp.h | 46 #define SECCOMP_RET_ALLOW 0x7fff0000U /* allow */ macro
|
| /linux/tools/perf/bench/ |
| H A D | sched-seccomp-notify.c | 56 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in user_notif_syscall()
|
| /linux/kernel/ |
| H A D | seccomp.c | 407 u32 ret = SECCOMP_RET_ALLOW; in seccomp_run_filters() 417 return SECCOMP_RET_ALLOW; in seccomp_run_filters() 805 return k == SECCOMP_RET_ALLOW; in seccomp_is_const_allow() 1014 case SECCOMP_RET_ALLOW: in seccomp_log() 1347 case SECCOMP_RET_ALLOW: in __seccomp_filter() 2077 case SECCOMP_RET_ALLOW: in seccomp_get_action_avail()
|
| /linux/arch/um/kernel/skas/ |
| H A D | stub_exe.c | 193 BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_ALLOW), in real_init()
|
| /linux/arch/um/os-Linux/ |
| H A D | start_up.c | 260 BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_ALLOW), in seccomp_helper()
|
| /linux/Documentation/userspace-api/ |
| H A D | seccomp_filter.rst | 163 ``SECCOMP_RET_ALLOW``: 317 as it is not possible to log ``SECCOMP_RET_ALLOW`` actions. Attempting
|
| /linux/Documentation/networking/ |
| H A D | filter.rst | 359 good: ret #0x7fff0000 /* SECCOMP_RET_ALLOW */
|