Home
last modified time | relevance | path

Searched refs:seccomp_data (Results 1 – 15 of 15) sorted by relevance

/Linux-v5.4/include/linux/
Dseccomp.h35 extern int __secure_computing(const struct seccomp_data *sd);
36 static inline int secure_computing(const struct seccomp_data *sd) in secure_computing()
62 static inline int secure_computing(struct seccomp_data *sd) { return 0; } in secure_computing()
Dptrace.h17 struct seccomp_data data;
Dfilter.h33 struct seccomp_data;
/Linux-v5.4/include/uapi/linux/
Dseccomp.h59 struct seccomp_data { struct
69 __u16 seccomp_data; argument
76 struct seccomp_data data;
/Linux-v5.4/samples/seccomp/
Ddropper.c32 (offsetof(struct seccomp_data, arch))), in install_filter()
35 (offsetof(struct seccomp_data, nr))), in install_filter()
Dbpf-helper.h66 #define LO_ARG(idx) offsetof(struct seccomp_data, args[(idx)])
68 #define LO_ARG(idx) offsetof(struct seccomp_data, args[(idx)]) + sizeof(__u32)
90 #define HI_ARG(idx) offsetof(struct seccomp_data, args[(idx)]) + sizeof(__u32)
93 #define HI_ARG(idx) offsetof(struct seccomp_data, args[(idx)])
261 offsetof(struct seccomp_data, nr))
Dbpf-direct.c31 #define syscall_arg(_n) (offsetof(struct seccomp_data, args[_n]))
32 #define syscall_nr (offsetof(struct seccomp_data, nr))
Duser-trap.c90 offsetof(struct seccomp_data, nr)), in user_trap_syscall()
/Linux-v5.4/samples/bpf/
Dtracex5_kern.c47 struct seccomp_data sd; in PROG()
60 struct seccomp_data sd; in PROG()
/Linux-v5.4/kernel/
Dseccomp.c63 const struct seccomp_data *data;
144 static void populate_seccomp_data(struct seccomp_data *sd) in populate_seccomp_data()
186 if (k >= sizeof(struct seccomp_data) || k & 3) in seccomp_check_filter()
191 ftest->k = sizeof(struct seccomp_data); in seccomp_check_filter()
195 ftest->k = sizeof(struct seccomp_data); in seccomp_check_filter()
254 static u32 seccomp_run_filters(const struct seccomp_data *sd, in seccomp_run_filters()
737 const struct seccomp_data *sd) in seccomp_do_user_notification()
787 static int __seccomp_filter(int this_syscall, const struct seccomp_data *sd, in __seccomp_filter()
793 struct seccomp_data sd_local; in __seccomp_filter()
913 static int __seccomp_filter(int this_syscall, const struct seccomp_data *sd, in __seccomp_filter()
[all …]
/Linux-v5.4/tools/testing/selftests/seccomp/
Dseccomp_bpf.c83 struct seccomp_data { struct
185 struct seccomp_data data;
198 __u16 seccomp_data; member
216 #define syscall_arg(_n) (offsetof(struct seccomp_data, args[_n]))
218 #define syscall_arg(_n) (offsetof(struct seccomp_data, args[_n]) + sizeof(__u32))
557 offsetof(struct seccomp_data, nr)), in TEST_SIGNAL()
585 offsetof(struct seccomp_data, nr)), in TEST_SIGNAL()
625 offsetof(struct seccomp_data, nr)), in TEST_SIGNAL()
691 offsetof(struct seccomp_data, nr)), in kill_thread_or_group()
702 offsetof(struct seccomp_data, nr)), in kill_thread_or_group()
[all …]
/Linux-v5.4/Documentation/userspace-api/
Dseccomp_filter.rst53 The BPF program will be executed over struct seccomp_data
220 __u16 seccomp_data;
227 struct seccomp_data data;
239 seccomp_data`` may change in the future, so code should use:
262 It is worth noting that ``struct seccomp_data`` contains the values of register
/Linux-v5.4/arch/x86/entry/
Dcommon.c93 struct seccomp_data sd; in syscall_trace_enter()
/Linux-v5.4/arch/mips/kernel/
Dptrace.c1417 struct seccomp_data sd; in syscall_trace_enter()
/Linux-v5.4/Documentation/networking/
Dfilter.txt329 ld [4] /* offsetof(struct seccomp_data, arch) */
331 ld [0] /* offsetof(struct seccomp_data, nr) */
815 to seccomp_data, for converted BPF filters R1 points to a skb.