Home
last modified time | relevance | path

Searched refs:sock_filter (Results 1 – 25 of 38) sorted by relevance

12

/Linux-v5.15/include/uapi/linux/netfilter/
Dxt_bpf.h10 #define XT_BPF_PATH_MAX (XT_BPF_MAX_NUM_INSTR * sizeof(struct sock_filter))
16 struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR];
34 struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR];
/Linux-v5.15/samples/seccomp/
Dbpf-helper.c20 struct sock_filter *filter, size_t count) in bpf_resolve_jumps()
32 struct sock_filter *instr = &filter[offset]; in bpf_resolve_jumps()
90 void seccomp_bpf_print(struct sock_filter *filter, size_t count) in seccomp_bpf_print()
92 struct sock_filter *end = filter + count; in seccomp_bpf_print()
Ddropper.c30 struct sock_filter filter[] = { in install_filter()
Dbpf-fancy.c35 struct sock_filter filter[] = { in main()
Dbpf-helper.h36 struct sock_filter *filter, size_t count);
38 void seccomp_bpf_print(struct sock_filter *filter, size_t count);
Dbpf-direct.c113 struct sock_filter filter[] = { in install_filter()
Duser-trap.c88 struct sock_filter filter[] = { in user_trap_syscall()
/Linux-v5.15/tools/include/uapi/linux/
Dfilter.h24 struct sock_filter { /* Filter block */ struct
33 struct sock_filter *filter; argument
/Linux-v5.15/include/uapi/linux/
Dfilter.h24 struct sock_filter { /* Filter block */ struct
33 struct sock_filter __user *filter; argument
/Linux-v5.15/arch/um/drivers/
Dvector_user.c776 struct sock_filter *bpf; in uml_vector_default_bpf()
789 sizeof(struct sock_filter) * DEFAULT_BPF_LEN, UM_GFP_KERNEL); in uml_vector_default_bpf()
793 bpf[0] = (struct sock_filter){ 0x20, 0, 0, 0x00000008 }; in uml_vector_default_bpf()
795 bpf[1] = (struct sock_filter){ 0x15, 0, 3, ntohl(*mac1)}; in uml_vector_default_bpf()
797 bpf[2] = (struct sock_filter){ 0x28, 0, 0, 0x00000006 }; in uml_vector_default_bpf()
799 bpf[3] = (struct sock_filter){ 0x15, 0, 1, ntohs(*mac2)}; in uml_vector_default_bpf()
801 bpf[4] = (struct sock_filter){ 0x6, 0, 0, 0x00000000 }; in uml_vector_default_bpf()
803 bpf[5] = (struct sock_filter){ 0x6, 0, 0, 0x00040000 }; in uml_vector_default_bpf()
815 struct sock_filter *bpf; in uml_vector_user_bpf()
832 bpf_prog->len = statbuf.st_size / sizeof(struct sock_filter); in uml_vector_user_bpf()
/Linux-v5.15/tools/testing/selftests/seccomp/
Dseccomp_bpf.c380 struct sock_filter filter[] = { in TEST()
411 struct sock_filter allow[] = { in TEST()
414 struct sock_filter *filter; in TEST()
448 struct sock_filter allow[] = { in TEST()
451 struct sock_filter *filter; in TEST()
486 struct sock_filter filter[] = { in TEST()
509 struct sock_filter filter[] = { in TEST()
534 struct sock_filter filter[] = { in TEST()
552 struct sock_filter filter[] = { in TEST()
570 struct sock_filter filter[] = { in TEST()
[all …]
Dseccomp_benchmark.c124 struct sock_filter bitmap_filter[] = { in main()
132 struct sock_filter filter[] = { in main()
/Linux-v5.15/tools/testing/selftests/net/
Dpsock_lib.h50 struct sock_filter bpf_filter[] = { in pair_udp_setfilter()
66 bpf_prog.len = sizeof(bpf_filter) / sizeof(struct sock_filter); in pair_udp_setfilter()
Dtoeplitz.c285 struct sock_filter filter[] = { in __set_filter()
298 prog.len = sizeof(filter) / sizeof(struct sock_filter); in __set_filter()
321 struct sock_filter filter[] = { in set_filter_null()
327 prog.len = sizeof(filter) / sizeof(struct sock_filter); in set_filter_null()
Dpsock_fanout.c113 struct sock_filter bpf_filter[] = { in sock_fanout_set_cbpf()
120 bpf_prog.len = sizeof(bpf_filter) / sizeof(struct sock_filter); in sock_fanout_set_cbpf()
/Linux-v5.15/tools/bpf/
Dbpf_dbg.c131 static struct sock_filter bpf_image[BPF_MAXINSNS + 1];
216 static void bpf_disasm(const struct sock_filter f, unsigned int i) in bpf_disasm()
438 static void bpf_dump_curr(struct bpf_regs *r, struct sock_filter *f) in bpf_dump_curr()
480 static void bpf_disasm_all(const struct sock_filter *f, unsigned int len) in bpf_disasm_all()
488 static void bpf_dump_all(const struct sock_filter *f, unsigned int len) in bpf_dump_all()
498 static bool bpf_runnable(struct sock_filter *f, unsigned int len) in bpf_runnable()
632 static void bpf_single_step(struct bpf_regs *r, struct sock_filter *f, in bpf_single_step()
854 static bool bpf_handle_breakpoint(struct bpf_regs *r, struct sock_filter *f, in bpf_handle_breakpoint()
866 static int bpf_run_all(struct sock_filter *f, uint16_t bpf_len, uint8_t *pkt, in bpf_run_all()
886 static int bpf_run_stepping(struct sock_filter *f, uint16_t bpf_len, in bpf_run_stepping()
[all …]
/Linux-v5.15/net/sched/
Dact_bpf.c26 struct sock_filter *bpf_ops;
105 sizeof(struct sock_filter)); in tcf_bpf_dump_bpf_info()
181 .len = sizeof(struct sock_filter) * BPF_MAXINSNS },
186 struct sock_filter *bpf_ops; in tcf_bpf_init_from_ops()
Dcls_bpf.c47 struct sock_filter *bpf_ops;
62 .len = sizeof(struct sock_filter) * BPF_MAXINSNS },
337 struct sock_filter *bpf_ops; in cls_bpf_prog_from_ops()
548 sizeof(struct sock_filter)); in cls_bpf_dump_bpf_info()
/Linux-v5.15/include/net/tc_act/
Dtc_bpf.h19 struct sock_filter *bpf_ops;
/Linux-v5.15/drivers/net/team/
Dteam_mode_loadbalance.c255 sizeof(struct sock_filter); in lb_bpf_func_get()
264 struct sock_filter *filter = (struct sock_filter *) data; in __fprog_create()
266 if (data_len % sizeof(struct sock_filter)) in __fprog_create()
276 fprog->len = data_len / sizeof(struct sock_filter); in __fprog_create()
/Linux-v5.15/net/core/
Dptp_classifier.c142 static struct sock_filter ptp_filter[] __initdata = { in ptp_classifier_init()
/Linux-v5.15/include/linux/
Dfilter.h409 ((struct sock_filter) BPF_STMT(CODE, K))
412 ((struct sock_filter) BPF_JUMP(CODE, K, JT, JF))
545 struct sock_filter *filter;
589 struct sock_filter insns[0];
931 typedef int (*bpf_aux_classic_check_t)(struct sock_filter *filter,
945 int sk_get_filter(struct sock *sk, struct sock_filter __user *filter,
1234 static inline bool bpf_needs_clear_a(const struct sock_filter *first) in bpf_needs_clear_a()
1253 static inline u16 bpf_anc_helper(const struct sock_filter *ftest) in bpf_anc_helper()
/Linux-v5.15/samples/bpf/
Dtracex5_user.c24 struct sock_filter filter[] = { in install_accept_all_seccomp()
/Linux-v5.15/net/netfilter/
Dxt_bpf.c24 static int __bpf_mt_check_bytecode(struct sock_filter *insns, __u16 len, in __bpf_mt_check_bytecode()
/Linux-v5.15/kernel/
Dseccomp.c230 #define MAX_INSNS_PER_PATH ((1 << 18) / sizeof(struct sock_filter))
270 static int seccomp_check_filter(struct sock_filter *filter, unsigned int flen) in seccomp_check_filter()
274 struct sock_filter *ftest = &filter[pc]; in seccomp_check_filter()
648 BUG_ON(INT_MAX / fprog->len < sizeof(struct sock_filter)); in seccomp_prepare_filter()
726 struct sock_filter *insn = &fprog->filter[pc]; in seccomp_is_const_allow()

12