Searched refs:BPF_JEQ (Results 1 – 3 of 3) sorted by relevance
/bionic/libc/seccomp/ |
D | seccomp_policy.cpp | 124 f[offset] = BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, SECONDARY_ARCH, u8_jump_length, 0); in SetValidateArchitectureJumpTarget() 130 f.push_back(BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, PRIMARY_ARCH, 2, 0)); in ValidateArchitectureAndJumpIfNeeded() 131 f.push_back(BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, SECONDARY_ARCH, 1, 0)); in ValidateArchitectureAndJumpIfNeeded() 138 f.push_back(BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, PRIMARY_ARCH, 1, 0)); in ValidateArchitecture() 177 f.push_back(BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, setresuid_nr, 0, 12)); in ValidateSetUidGid() 184 f.push_back(BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, setresgid_nr, 0, 12)); in ValidateSetUidGid()
|
/bionic/libc/kernel/uapi/linux/ |
D | bpf_common.h | 42 #define BPF_JEQ 0x10 macro
|
/bionic/libc/tools/ |
D | genseccomp.py | 15 BPF_JEQ = "BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, {0}, {1}, {2})" variable 179 result.append(BPF_JEQ.format(syscall[1], "{allow}", 0) +
|