Home
last modified time | relevance | path

Searched refs:BPF_RET (Results 1 – 22 of 22) sorted by relevance

/Linux-v5.4/samples/seccomp/
Dbpf-direct.c118 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
121 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
124 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
126 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
133 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL), in install_filter()
141 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
142 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_TRAP), in install_filter()
143 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL), in install_filter()
Ddropper.c37 BPF_STMT(BPF_RET+BPF_K, in install_filter()
39 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
Duser-trap.c92 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_USER_NOTIF), in user_trap_syscall()
93 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in user_trap_syscall()
Dbpf-helper.h46 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW)
48 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL)
/Linux-v5.4/lib/
Dtest_bpf.c99 insn[i] = __BPF_STMT(BPF_RET | BPF_K, k); in bpf_fill_maxinsns1()
118 insn[i] = __BPF_STMT(BPF_RET | BPF_K, 0xfefefefe); in bpf_fill_maxinsns2()
145 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); in bpf_fill_maxinsns3()
164 insn[i] = __BPF_STMT(BPF_RET | BPF_K, 0xfefefefe); in bpf_fill_maxinsns4()
185 insn[i] = __BPF_STMT(BPF_RET | BPF_K, 0xfefefefe); in bpf_fill_maxinsns5()
187 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_K, 0xabababab); in bpf_fill_maxinsns5()
209 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); in bpf_fill_maxinsns6()
235 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); in bpf_fill_maxinsns7()
258 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); in bpf_fill_maxinsns8()
338 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_K, 0xababcbac); in __bpf_fill_ja()
[all …]
/Linux-v5.4/tools/testing/selftests/seccomp/
Dseccomp_bpf.c283 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
314 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
351 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
389 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
412 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
437 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
473 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_LOG), in TEST()
495 BPF_STMT(BPF_RET|BPF_K, 0x10000000U), in TEST_SIGNAL()
517 BPF_STMT(BPF_RET|BPF_K, 0x90000000U), in TEST_SIGNAL()
538 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_KILL), in TEST_SIGNAL()
[all …]
Dseccomp_benchmark.c63 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in main()
/Linux-v5.4/tools/bpf/
Dbpf_dbg.c170 [BPF_RET] = "ret",
223 case BPF_RET | BPF_K: in bpf_disasm()
224 op = op_table[BPF_RET]; in bpf_disasm()
227 case BPF_RET | BPF_A: in bpf_disasm()
228 op = op_table[BPF_RET]; in bpf_disasm()
231 case BPF_RET | BPF_X: in bpf_disasm()
232 op = op_table[BPF_RET]; in bpf_disasm()
640 case BPF_RET | BPF_K: in bpf_single_step()
644 case BPF_RET | BPF_A: in bpf_single_step()
648 case BPF_RET | BPF_X: in bpf_single_step()
Dbpf_exp.y444 bpf_set_curr_instr(BPF_RET | BPF_A, 0, 0, 0); }
446 bpf_set_curr_instr(BPF_RET | BPF_A, 0, 0, 0); }
448 bpf_set_curr_instr(BPF_RET | BPF_X, 0, 0, 0); }
450 bpf_set_curr_instr(BPF_RET | BPF_X, 0, 0, 0); }
452 bpf_set_curr_instr(BPF_RET | BPF_K, 0, 0, $3); }
/Linux-v5.4/samples/bpf/
Dtracex5_user.c18 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_accept_all_seccomp()
/Linux-v5.4/include/uapi/linux/
Dbpf_common.h13 #define BPF_RET 0x06 macro
/Linux-v5.4/tools/include/uapi/linux/
Dbpf_common.h13 #define BPF_RET 0x06 macro
/Linux-v5.4/arch/powerpc/net/
Dbpf_jit_comp.c256 case BPF_RET | BPF_K: in bpf_jit_build_body()
283 case BPF_RET | BPF_A: in bpf_jit_build_body()
/Linux-v5.4/tools/testing/selftests/net/
Dreuseport_bpf.c141 { BPF_RET | BPF_A, 0, 0, 0 }, in attach_cbpf()
348 struct sock_filter ccode[] = {{ BPF_RET | BPF_A, 0, 0, 0 }}; in test_filter_no_reuseport()
Dreuseport_bpf_cpu.c83 { BPF_RET | BPF_A, 0, 0, 0 }, in attach_bpf()
Dpsock_fanout.c102 BPF_STMT(BPF_RET+BPF_A, 0), /* ret A */ in sock_fanout_set_cbpf()
/Linux-v5.4/arch/sparc/net/
Dbpf_jit_comp_32.c486 case BPF_RET | BPF_K: in bpf_jit_compile()
495 case BPF_RET | BPF_A: in bpf_jit_compile()
/Linux-v5.4/Documentation/networking/
Dcdc_mbim.txt255 BPF_STMT(BPF_RET|BPF_K, (u_int)-1), /* accept */
256 BPF_STMT(BPF_RET|BPF_K, 0), /* ignore */
Dfilter.txt870 BPF_RET 0x06 BPF_JMP32 0x06
937 Classic BPF wastes the whole BPF_RET class to represent a single 'ret'
938 operation. Classic BPF_RET | BPF_K means copy imm32 into return register
/Linux-v5.4/kernel/
Dseccomp.c198 case BPF_RET | BPF_K: in seccomp_check_filter()
199 case BPF_RET | BPF_A: in seccomp_check_filter()
/Linux-v5.4/include/linux/
Dfilter.h1109 case BPF_RET | BPF_K: in bpf_needs_clear_a()
/Linux-v5.4/net/core/
Dfilter.c782 case BPF_RET | BPF_A: in bpf_convert_filter()
783 case BPF_RET | BPF_K: in bpf_convert_filter()
987 [BPF_RET | BPF_K] = true, in chk_code_allowed()
988 [BPF_RET | BPF_A] = true, in chk_code_allowed()
1102 case BPF_RET | BPF_K: in bpf_check_classic()
1103 case BPF_RET | BPF_A: in bpf_check_classic()