Searched refs:SECCOMP_RET_ALLOW (Results 1 – 14 of 14) sorted by relevance
/openbmc/linux/samples/seccomp/ |
H A D | bpf-direct.c | 118 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 121 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 124 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 126 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 141 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
|
H A D | dropper.c | 39 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
|
H A D | user-trap.c | 93 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in user_trap_syscall()
|
H A D | bpf-helper.h | 46 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW)
|
/openbmc/linux/tools/testing/selftests/seccomp/ |
H A D | seccomp_bpf.c | 94 #ifndef SECCOMP_RET_ALLOW 112 #define SECCOMP_RET_ALLOW 0x7fff0000U /* allow */ macro 392 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 425 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 462 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 500 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 523 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 548 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 671 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST_SIGNAL() 698 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST_SIGNAL() [all …]
|
H A D | seccomp_benchmark.c | 126 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in main() 134 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in main()
|
/openbmc/linux/Documentation/translations/zh_CN/userspace-api/ |
H A D | seccomp_filter.rst | 131 ``SECCOMP_RET_ALLOW``: 253 ``SECCOMP_RET_ALLOW`` 动作。尝试向sysctl写入 ``allow`` 会导致返回一个EINVAL。
|
/openbmc/linux/samples/bpf/ |
H A D | tracex5_user.c | 25 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_accept_all_seccomp()
|
/openbmc/linux/tools/include/uapi/linux/ |
H A D | seccomp.h | 46 #define SECCOMP_RET_ALLOW 0x7fff0000U /* allow */ macro
|
/openbmc/linux/include/uapi/linux/ |
H A D | seccomp.h | 46 #define SECCOMP_RET_ALLOW 0x7fff0000U /* allow */ macro
|
/openbmc/linux/tools/perf/bench/ |
H A D | sched-seccomp-notify.c | 56 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in user_notif_syscall()
|
/openbmc/linux/kernel/ |
H A D | seccomp.c | 409 u32 ret = SECCOMP_RET_ALLOW; in seccomp_run_filters() 419 return SECCOMP_RET_ALLOW; in seccomp_run_filters() 760 return k == SECCOMP_RET_ALLOW; in seccomp_is_const_allow() 969 case SECCOMP_RET_ALLOW: in seccomp_log() 1295 case SECCOMP_RET_ALLOW: in __seccomp_filter() 2022 case SECCOMP_RET_ALLOW: in seccomp_get_action_avail()
|
/openbmc/linux/Documentation/userspace-api/ |
H A D | seccomp_filter.rst | 163 ``SECCOMP_RET_ALLOW``: 317 as it is not possible to log ``SECCOMP_RET_ALLOW`` actions. Attempting
|
/openbmc/linux/Documentation/networking/ |
H A D | filter.rst | 359 good: ret #0x7fff0000 /* SECCOMP_RET_ALLOW */
|