Searched refs:SECCOMP_RET_TRACE (Results 1 - 4 of 4) sorted by relevance

/linux-master/include/uapi/linux/
H A Dseccomp.h44 #define SECCOMP_RET_TRACE 0x7ff00000U /* pass to a tracer or disallow */ macro
101 * or SECCOMP_RET_TRACE. For SECCOMP_RET_USER_NOTIF filters acting on the
106 * SECCOMP_USER_NOTIF_FLAG_CONTINUE. Note that SECCOMP_RET_TRACE can equally
/linux-master/tools/include/uapi/linux/
H A Dseccomp.h44 #define SECCOMP_RET_TRACE 0x7ff00000U /* pass to a tracer or disallow */ macro
101 * or SECCOMP_RET_TRACE. For SECCOMP_RET_USER_NOTIF filters acting on the
106 * SECCOMP_USER_NOTIF_FLAG_CONTINUE. Note that SECCOMP_RET_TRACE can equally
/linux-master/tools/testing/selftests/seccomp/
H A Dseccomp_bpf.c111 #define SECCOMP_RET_TRACE 0x7ff00000U /* pass to a tracer or disallow */ macro
1183 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRACE),
1670 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRACE | 0x1001),
2111 * All of the SECCOMP_RET_TRACE behaviors can be tested with either
2112 * SECCOMP_RET_TRACE+PTRACE_CONT or plain ptrace()+PTRACE_SYSCALL.
2113 * This indicates if we should use SECCOMP_RET_TRACE (false), or
2133 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRACE | 0x1002),
2135 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRACE | 0x1003),
2137 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRACE | 0x1004),
2139 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRACE |
[all...]
/linux-master/kernel/
H A Dseccomp.c977 case SECCOMP_RET_TRACE:
1242 case SECCOMP_RET_TRACE:
2020 case SECCOMP_RET_TRACE:

Completed in 124 milliseconds