Displaying 4 results from an estimated 4 matches for "bpf_w".
Did you mean:
  bpf_k
  
2017 Feb 13
2
[PATCH] Enable specific ioctl calls for ICA crypto card (s390)
..._NR_ ## _nr, 0, 1), \
 	BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ERRNO|(_errno))
@@ -82,9 +94,8 @@
 	BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW)
 #define SC_ALLOW_ARG(_nr, _arg_nr, _arg_val) \
 	BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_ ## _nr, 0, 4), \
-	/* load first syscall argument */ \
-	BPF_STMT(BPF_LD+BPF_W+BPF_ABS, \
-	    offsetof(struct seccomp_data, args[(_arg_nr)])), \
+	/* load the syscall argument to check into accumulator */ \
+	BPF_STMT(BPF_LD+BPF_W+BPF_ABS, LO_ARG(_arg_nr)), \
 	BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, (_arg_val), 0, 1), \
 	BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), \
 	/* reload s...
2023 Sep 03
0
[Bug 1062] Kernel IPv6 event filtering not working
...illa.netfilter.org/show_bug.cgi?id=1062
--- Comment #2 from Jeremy Sowden <jeremy at azazel.net> ---
In the ipv4 case:
    for (i = 0; i < f->l3proto_elems[dir]; i++) {
        int ip = f->l3proto[dir][i].addr & f->l3proto[dir][i].mask;
        j += nfct_bsf_load_attr(this, BPF_W, j);
        j += nfct_bsf_alu_and(this, f->l3proto[dir][i].mask, j);
        j += nfct_bsf_cmp_k_stack(this, ip, jt - j, j, s);
    }
there is one comparison per address and if it matches we jump to the end of the
filter.
In the ipv6 case:
    for (i = 0; i < f->l3proto_elems_ipv6[dir]...
2023 Dec 02
34
[Bug 3639] New: server thread aborts during client login after receiving SSH2_MSG_KEXINIT
https://bugzilla.mindrot.org/show_bug.cgi?id=3639
            Bug ID: 3639
           Summary: server thread aborts during client login after
                    receiving SSH2_MSG_KEXINIT
           Product: Portable OpenSSH
           Version: 9.2p1
          Hardware: ARM
                OS: Linux
            Status: NEW
          Severity: critical
          Priority: P5
         Component:
2015 Mar 05
31
[Bug 2361] New: seccomp filter (not only) for aarch64
https://bugzilla.mindrot.org/show_bug.cgi?id=2361
            Bug ID: 2361
           Summary: seccomp filter (not only) for aarch64
           Product: Portable OpenSSH
           Version: 6.7p1
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: sshd
          Assignee: unassigned-bugs at