Searched refs:syscall_filter_sets (Results 1 – 6 of 6) sorted by relevance
/systemd-251/src/test/ |
D | test-seccomp.c | 158 … assert_se(syscall_filter_set_find("@clock") == syscall_filter_sets + SYSCALL_FILTER_SET_CLOCK); in TEST() 159 …assert_se(syscall_filter_set_find("@default") == syscall_filter_sets + SYSCALL_FILTER_SET_DEFAULT); in TEST() 160 … assert_se(syscall_filter_set_find("@raw-io") == syscall_filter_sets + SYSCALL_FILTER_SET_RAW_IO); in TEST() 179 log_info("Running on valgrind, skipping %s", syscall_filter_sets[i].name); in TEST() 186 … log_info("Running on address sanitizer, skipping %s", syscall_filter_sets[i].name); in TEST() 191 log_info("Testing %s", syscall_filter_sets[i].name); in TEST() 203 …r = seccomp_load_syscall_filter_set(SCMP_ACT_ERRNO(EUCLEAN), syscall_filter_sets + i, SCMP_ACT_ALL… in TEST() 205 …r = seccomp_load_syscall_filter_set(SCMP_ACT_ALLOW, syscall_filter_sets + i, SCMP_ACT_ERRNO(EUCLEA… in TEST() 221 …assert_se(wait_for_terminate_and_check(syscall_filter_sets[i].name, pid, WAIT_LOG) == EXIT_SUCCESS… in TEST() 228 assert_se(streq(syscall_filter_sets[0].name, "@default")); in TEST() [all …]
|
/systemd-251/src/analyze/ |
D | analyze-syscall-filter.c | 99 NULSTR_FOREACH(sys, syscall_filter_sets[SYSCALL_FILTER_SET_KNOWN].value) in verb_syscall_filters() 107 const SyscallFilterSet *set = syscall_filter_sets + i; in verb_syscall_filters()
|
D | analyze-security.c | 616 const SyscallFilterSet *f = syscall_filter_sets + a->parameter; in assess_system_call_filter()
|
/systemd-251/src/shared/ |
D | seccomp-util.h | 62 extern const SyscallFilterSet syscall_filter_sets[];
|
D | seccomp-util.c | 284 const SyscallFilterSet syscall_filter_sets[_SYSCALL_FILTER_SET_MAX] = { variable 940 if (streq(syscall_filter_sets[i].name, name)) in syscall_filter_set_find() 941 return syscall_filter_sets + i; in syscall_filter_set_find() 2285 NULSTR_FOREACH(c, syscall_filter_sets[SYSCALL_FILTER_SET_SYNC].value) { in seccomp_suppress_sync()
|
/systemd-251/src/core/ |
D | execute.c | 1507 …= seccomp_filter_set_add(c->syscall_filter, c->syscall_allow_list, syscall_filter_sets + SYSCALL_F… in apply_syscall_filter() 1641 …return seccomp_load_syscall_filter_set(SCMP_ACT_ALLOW, syscall_filter_sets + SYSCALL_FILTER_SET_MO… in apply_protect_kernel_modules() 1667 …return seccomp_load_syscall_filter_set(SCMP_ACT_ALLOW, syscall_filter_sets + SYSCALL_FILTER_SET_CL… in apply_protect_clock() 1682 …return seccomp_load_syscall_filter_set(SCMP_ACT_ALLOW, syscall_filter_sets + SYSCALL_FILTER_SET_RA… in apply_private_devices()
|