View | Details | Raw Unified | Return to bug 2361 | Differences between
and this patch

Collapse All | Expand All

(-)a/sandbox-seccomp-filter.c (-1 / +1 lines)
Lines 81-87 Link Here
81
	BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_ ## _nr, 0, 1), \
81
	BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_ ## _nr, 0, 1), \
82
	BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW)
82
	BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW)
83
#define SC_ALLOW_ARG(_nr, _arg_nr, _arg_val) \
83
#define SC_ALLOW_ARG(_nr, _arg_nr, _arg_val) \
84
	BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_ ## _nr, 0, 3), \
84
	BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_ ## _nr, 0, 4), \
85
	/* load first syscall argument */ \
85
	/* load first syscall argument */ \
86
	BPF_STMT(BPF_LD+BPF_W+BPF_ABS, \
86
	BPF_STMT(BPF_LD+BPF_W+BPF_ABS, \
87
	    offsetof(struct seccomp_data, args[(_arg_nr)])), \
87
	    offsetof(struct seccomp_data, args[(_arg_nr)])), \

Return to bug 2361