Searched refs:SECCOMP_RET_ALLOW (Results 1 – 14 of 14) sorted by relevance
/linux-6.12.1/samples/seccomp/ |
D | bpf-direct.c | 118 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 121 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 124 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 126 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 141 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
|
D | dropper.c | 39 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
|
D | user-trap.c | 97 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in user_trap_syscall()
|
D | bpf-helper.h | 46 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW)
|
/linux-6.12.1/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 96 #ifndef SECCOMP_RET_ALLOW 114 #define SECCOMP_RET_ALLOW 0x7fff0000U /* allow */ macro 394 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 427 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 464 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 502 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 525 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 550 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 673 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST_SIGNAL() 700 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST_SIGNAL() [all …]
|
D | seccomp_benchmark.c | 170 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in main() 178 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in main()
|
/linux-6.12.1/Documentation/translations/zh_CN/userspace-api/ |
D | seccomp_filter.rst | 131 ``SECCOMP_RET_ALLOW``: 253 ``SECCOMP_RET_ALLOW`` 动作。尝试向sysctl写入 ``allow`` 会导致返回一个EINVAL。
|
/linux-6.12.1/samples/bpf/ |
D | tracex5_user.c | 25 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_accept_all_seccomp()
|
/linux-6.12.1/tools/include/uapi/linux/ |
D | seccomp.h | 46 #define SECCOMP_RET_ALLOW 0x7fff0000U /* allow */ macro
|
/linux-6.12.1/include/uapi/linux/ |
D | seccomp.h | 46 #define SECCOMP_RET_ALLOW 0x7fff0000U /* allow */ macro
|
/linux-6.12.1/tools/perf/bench/ |
D | sched-seccomp-notify.c | 56 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in user_notif_syscall()
|
/linux-6.12.1/kernel/ |
D | seccomp.c | 409 u32 ret = SECCOMP_RET_ALLOW; in seccomp_run_filters() 419 return SECCOMP_RET_ALLOW; in seccomp_run_filters() 773 return k == SECCOMP_RET_ALLOW; in seccomp_is_const_allow() 982 case SECCOMP_RET_ALLOW: in seccomp_log() 1308 case SECCOMP_RET_ALLOW: in __seccomp_filter() 2040 case SECCOMP_RET_ALLOW: in seccomp_get_action_avail()
|
/linux-6.12.1/Documentation/userspace-api/ |
D | seccomp_filter.rst | 163 ``SECCOMP_RET_ALLOW``: 317 as it is not possible to log ``SECCOMP_RET_ALLOW`` actions. Attempting
|
/linux-6.12.1/Documentation/networking/ |
D | filter.rst | 359 good: ret #0x7fff0000 /* SECCOMP_RET_ALLOW */
|