Searched refs:BPF_JEQ (Results 1 – 3 of 3) sorted by relevance
/bionic/libc/seccomp/ |
D | seccomp_policy.cpp | 110 f[offset] = BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, SECONDARY_ARCH, u8_jump_length, 0); in SetValidateArchitectureJumpTarget() 116 f.push_back(BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, PRIMARY_ARCH, 2, 0)); in ValidateArchitectureAndJumpIfNeeded() 117 f.push_back(BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, SECONDARY_ARCH, 1, 0)); in ValidateArchitectureAndJumpIfNeeded() 124 f.push_back(BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, PRIMARY_ARCH, 1, 0)); in ValidateArchitecture() 155 f.push_back(BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, setresuid_nr, 0, 12)); in ValidateSetUidGid() 163 f.push_back(BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, setresgid_nr, 0, 12)); in ValidateSetUidGid()
|
/bionic/libc/kernel/uapi/linux/ |
D | bpf_common.h | 54 #define BPF_JEQ 0x10 macro
|
/bionic/libc/tools/ |
D | genseccomp.py | 15 BPF_JEQ = "BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, {0}, {1}, {2})" variable 166 result.append(BPF_JEQ.format(syscall[1], "{allow}", 0) +
|