Searched refs:SECCOMP_RET_TRACE (Results 1 - 4 of 4) sorted by relevance
/linux-master/include/uapi/linux/ |
H A D | seccomp.h | 44 #define SECCOMP_RET_TRACE 0x7ff00000U /* pass to a tracer or disallow */ macro 101 * or SECCOMP_RET_TRACE. For SECCOMP_RET_USER_NOTIF filters acting on the 106 * SECCOMP_USER_NOTIF_FLAG_CONTINUE. Note that SECCOMP_RET_TRACE can equally
|
/linux-master/tools/include/uapi/linux/ |
H A D | seccomp.h | 44 #define SECCOMP_RET_TRACE 0x7ff00000U /* pass to a tracer or disallow */ macro 101 * or SECCOMP_RET_TRACE. For SECCOMP_RET_USER_NOTIF filters acting on the 106 * SECCOMP_USER_NOTIF_FLAG_CONTINUE. Note that SECCOMP_RET_TRACE can equally
|
/linux-master/tools/testing/selftests/seccomp/ |
H A D | seccomp_bpf.c | 111 #define SECCOMP_RET_TRACE 0x7ff00000U /* pass to a tracer or disallow */ macro 1183 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRACE), 1670 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRACE | 0x1001), 2111 * All of the SECCOMP_RET_TRACE behaviors can be tested with either 2112 * SECCOMP_RET_TRACE+PTRACE_CONT or plain ptrace()+PTRACE_SYSCALL. 2113 * This indicates if we should use SECCOMP_RET_TRACE (false), or 2133 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRACE | 0x1002), 2135 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRACE | 0x1003), 2137 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRACE | 0x1004), 2139 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRACE | [all...] |
/linux-master/kernel/ |
H A D | seccomp.c | 977 case SECCOMP_RET_TRACE: 1242 case SECCOMP_RET_TRACE: 2020 case SECCOMP_RET_TRACE:
|
Completed in 124 milliseconds