Home
last modified time | relevance | path

Searched refs:seccomp (Results 1 – 25 of 65) sorted by relevance

123

/Linux-v5.4/include/linux/
Dseccomp.h29 struct seccomp { struct
49 static inline int seccomp_mode(struct seccomp *s) in seccomp_mode() argument
58 struct seccomp { }; struct
77 static inline int seccomp_mode(struct seccomp *s) in seccomp_mode()
/Linux-v5.4/Documentation/userspace-api/
Dseccomp_filter.rst24 Additionally, BPF makes it impossible for users of seccomp to fall prey
46 An additional seccomp mode is added and is enabled using the same
47 prctl(2) call as the strict seccomp. If the architecture has
87 A seccomp filter may return any of the following values. If multiple
119 ``SIGSYS`` triggered by seccomp will have a si_code of ``SYS_SECCOMP``.
149 The seccomp check will not be run again after the tracer is
150 notified. (This means that seccomp-based sandboxes MUST NOT
187 The ``samples/seccomp/`` directory contains both an x86-specific example
194 The ``SECCOMP_RET_USER_NOTIF`` return code lets seccomp filters pass a
200 argument to the ``seccomp()`` syscall:
[all …]
Dno_new_privs.rst47 - Filters installed for the seccomp mode 2 sandbox persist across
/Linux-v5.4/kernel/
Dseccomp.c260 READ_ONCE(current->seccomp.filter); in seccomp_run_filters()
288 if (current->seccomp.mode && current->seccomp.mode != seccomp_mode) in seccomp_may_assign_mode()
302 task->seccomp.mode = seccomp_mode; in seccomp_assign_mode()
353 if (thread->seccomp.mode == SECCOMP_MODE_DISABLED || in seccomp_can_sync_threads()
354 (thread->seccomp.mode == SECCOMP_MODE_FILTER && in seccomp_can_sync_threads()
355 is_ancestor(thread->seccomp.filter, in seccomp_can_sync_threads()
356 caller->seccomp.filter))) in seccomp_can_sync_threads()
400 smp_store_release(&thread->seccomp.filter, in seccomp_sync_threads()
401 caller->seccomp.filter); in seccomp_sync_threads()
418 if (thread->seccomp.mode == SECCOMP_MODE_DISABLED) in seccomp_sync_threads()
[all …]
Dptrace.c655 if (seccomp_mode(&current->seccomp) != SECCOMP_MODE_DISABLED || in ptrace_setoptions()
933 info->seccomp.ret_data = child->ptrace_message; in ptrace_get_syscall_info_seccomp()
936 return offsetofend(struct ptrace_syscall_info, seccomp.ret_data); in ptrace_get_syscall_info_seccomp()
DMakefile89 obj-$(CONFIG_SECCOMP) += seccomp.o
Dsys_ni.c328 COND_SYSCALL(seccomp);
/Linux-v5.4/Documentation/features/seccomp/seccomp-filter/
Darch-support.txt2 # Feature name: seccomp-filter
4 # description: arch supports seccomp filters
/Linux-v5.4/tools/testing/selftests/seccomp/
Dseccomp_bpf.c207 #ifndef seccomp
208 int seccomp(unsigned int op, unsigned int flags, void *args) in seccomp() function
716 ASSERT_EQ(0, seccomp(SECCOMP_SET_MODE_FILTER, 0, in kill_thread_or_group()
723 ASSERT_EQ(0, seccomp(SECCOMP_SET_MODE_FILTER, 0, &prog_thread)); in kill_thread_or_group()
2095 ret = seccomp(-1, 0, &prog); in TEST()
2104 ret = seccomp(SECCOMP_SET_MODE_STRICT, -1, NULL); in TEST()
2108 ret = seccomp(SECCOMP_SET_MODE_STRICT, 0, &prog); in TEST()
2114 ret = seccomp(SECCOMP_SET_MODE_FILTER, -1, &prog); in TEST()
2118 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, NULL); in TEST()
2123 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, &prog); in TEST()
[all …]
/Linux-v5.4/samples/seccomp/
Duser-trap.c26 static int seccomp(unsigned int op, unsigned int flags, void *args) in seccomp() function
101 return seccomp(SECCOMP_SET_MODE_FILTER, flags, &prog); in user_trap_syscall()
293 if (seccomp(SECCOMP_GET_NOTIF_SIZES, 0, &sizes) < 0) { in main()
/Linux-v5.4/arch/microblaze/
DKconfig124 bool "Enable seccomp to safely compute untrusted bytecode"
133 their own address space using seccomp. Once seccomp is
134 enabled via /proc/<pid>/seccomp, it cannot be disabled
136 defined by each seccomp mode.
/Linux-v5.4/arch/um/
DKconfig174 prompt "Enable seccomp to safely compute untrusted bytecode"
181 their own address space using seccomp. Once seccomp is
184 defined by each seccomp mode.
/Linux-v5.4/samples/
DMakefile17 subdir-$(CONFIG_SAMPLE_SECCOMP) += seccomp
DKconfig113 bool "Build seccomp sample code"
116 Build samples of seccomp filters using various methods of
/Linux-v5.4/arch/arm/include/asm/
DKbuild18 generic-y += seccomp.h
/Linux-v5.4/include/uapi/linux/
Dptrace.h100 } seccomp; member
/Linux-v5.4/arch/parisc/include/asm/
DKbuild22 generic-y += seccomp.h
/Linux-v5.4/arch/parisc/
DKconfig378 prompt "Enable seccomp to safely compute untrusted bytecode"
385 their own address space using seccomp. Once seccomp is
388 defined by each seccomp mode.
/Linux-v5.4/arch/mips/kernel/
Dscall64-n32.S78 bltz v0, 1f # seccomp failed? Skip syscall
Dscall64-n64.S89 bltz v0, 1f # seccomp failed? Skip syscall
Dscall32-o32.S131 bltz v0, 1f # seccomp failed? Skip syscall
Dscall64-o32.S133 bltz v0, 1f # seccomp failed? Skip syscall
/Linux-v5.4/arch/sparc/
DKconfig236 bool "Enable seccomp to safely compute untrusted bytecode"
245 their own address space using seccomp. Once seccomp is
246 enabled via /proc/<pid>/seccomp, it cannot be disabled
248 defined by each seccomp mode.
/Linux-v5.4/tools/testing/selftests/
DMakefile42 TARGETS += seccomp
/Linux-v5.4/arch/sh/
DKconfig649 bool "Enable seccomp to safely compute untrusted bytecode"
657 their own address space using seccomp. Once seccomp is
659 allowed to execute a few safe syscalls defined by each seccomp

123