linux/tools/testing/selftests/seccomp
Eyal Birger c2debdb854 selftests/seccomp: validate uretprobe syscall passes through seccomp
The uretprobe syscall is implemented as a performance enhancement on
x86_64 by having the kernel inject a call to it on function exit; User
programs cannot call this system call explicitly.

As such, this syscall is considered a kernel implementation detail and
should not be filtered by seccomp.

Enhance the seccomp bpf test suite to check that uretprobes can be
attached to processes without the killing the process regardless of
seccomp policy.

Signed-off-by: Eyal Birger <eyal.birger@gmail.com>
Link: https://lore.kernel.org/r/20250202162921.335813-3-eyal.birger@gmail.com
[kees: Skip archs without __NR_uretprobe]
Signed-off-by: Kees Cook <kees@kernel.org>
2025-02-06 13:19:14 -08:00
..
.gitignore .gitignore: add SPDX License Identifier 2020-03-25 11:50:48 +01:00
Makefile selftests: seccomp: Fix incorrect kernel headers search path 2023-02-13 09:09:45 -07:00
config selftests/seccomp: Update kernel config 2020-12-02 11:20:54 -08:00
seccomp_benchmark.c selftests: seccomp: fix format-zero-length warnings 2024-06-11 09:25:43 -06:00
seccomp_bpf.c selftests/seccomp: validate uretprobe syscall passes through seccomp 2025-02-06 13:19:14 -08:00
settings selftests/seccomp: Try to fit runtime of benchmark into timeout 2024-03-29 13:57:14 -06:00