| /Linux-v5.4/samples/seccomp/ |
| D | bpf-direct.c | 118 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 121 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 124 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 126 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 133 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL), in install_filter() 141 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 142 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_TRAP), in install_filter() 143 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL), in install_filter()
|
| D | dropper.c | 37 BPF_STMT(BPF_RET+BPF_K, in install_filter() 39 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
|
| D | user-trap.c | 92 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_USER_NOTIF), in user_trap_syscall() 93 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in user_trap_syscall()
|
| D | bpf-helper.h | 46 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW) 48 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL)
|
| /Linux-v5.4/lib/ |
| D | test_bpf.c | 99 insn[i] = __BPF_STMT(BPF_RET | BPF_K, k); in bpf_fill_maxinsns1() 118 insn[i] = __BPF_STMT(BPF_RET | BPF_K, 0xfefefefe); in bpf_fill_maxinsns2() 145 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); in bpf_fill_maxinsns3() 164 insn[i] = __BPF_STMT(BPF_RET | BPF_K, 0xfefefefe); in bpf_fill_maxinsns4() 185 insn[i] = __BPF_STMT(BPF_RET | BPF_K, 0xfefefefe); in bpf_fill_maxinsns5() 187 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_K, 0xabababab); in bpf_fill_maxinsns5() 209 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); in bpf_fill_maxinsns6() 235 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); in bpf_fill_maxinsns7() 258 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); in bpf_fill_maxinsns8() 338 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_K, 0xababcbac); in __bpf_fill_ja() [all …]
|
| /Linux-v5.4/tools/testing/selftests/seccomp/ |
| D | seccomp_bpf.c | 283 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 314 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 351 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 389 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 412 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 437 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 473 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_LOG), in TEST() 495 BPF_STMT(BPF_RET|BPF_K, 0x10000000U), in TEST_SIGNAL() 517 BPF_STMT(BPF_RET|BPF_K, 0x90000000U), in TEST_SIGNAL() 538 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_KILL), in TEST_SIGNAL() [all …]
|
| D | seccomp_benchmark.c | 63 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in main()
|
| /Linux-v5.4/tools/bpf/ |
| D | bpf_dbg.c | 170 [BPF_RET] = "ret", 223 case BPF_RET | BPF_K: in bpf_disasm() 224 op = op_table[BPF_RET]; in bpf_disasm() 227 case BPF_RET | BPF_A: in bpf_disasm() 228 op = op_table[BPF_RET]; in bpf_disasm() 231 case BPF_RET | BPF_X: in bpf_disasm() 232 op = op_table[BPF_RET]; in bpf_disasm() 640 case BPF_RET | BPF_K: in bpf_single_step() 644 case BPF_RET | BPF_A: in bpf_single_step() 648 case BPF_RET | BPF_X: in bpf_single_step()
|
| D | bpf_exp.y | 444 bpf_set_curr_instr(BPF_RET | BPF_A, 0, 0, 0); } 446 bpf_set_curr_instr(BPF_RET | BPF_A, 0, 0, 0); } 448 bpf_set_curr_instr(BPF_RET | BPF_X, 0, 0, 0); } 450 bpf_set_curr_instr(BPF_RET | BPF_X, 0, 0, 0); } 452 bpf_set_curr_instr(BPF_RET | BPF_K, 0, 0, $3); }
|
| /Linux-v5.4/samples/bpf/ |
| D | tracex5_user.c | 18 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_accept_all_seccomp()
|
| /Linux-v5.4/include/uapi/linux/ |
| D | bpf_common.h | 13 #define BPF_RET 0x06 macro
|
| /Linux-v5.4/tools/include/uapi/linux/ |
| D | bpf_common.h | 13 #define BPF_RET 0x06 macro
|
| /Linux-v5.4/arch/powerpc/net/ |
| D | bpf_jit_comp.c | 256 case BPF_RET | BPF_K: in bpf_jit_build_body() 283 case BPF_RET | BPF_A: in bpf_jit_build_body()
|
| /Linux-v5.4/tools/testing/selftests/net/ |
| D | reuseport_bpf.c | 141 { BPF_RET | BPF_A, 0, 0, 0 }, in attach_cbpf() 348 struct sock_filter ccode[] = {{ BPF_RET | BPF_A, 0, 0, 0 }}; in test_filter_no_reuseport()
|
| D | reuseport_bpf_cpu.c | 83 { BPF_RET | BPF_A, 0, 0, 0 }, in attach_bpf()
|
| D | psock_fanout.c | 102 BPF_STMT(BPF_RET+BPF_A, 0), /* ret A */ in sock_fanout_set_cbpf()
|
| /Linux-v5.4/arch/sparc/net/ |
| D | bpf_jit_comp_32.c | 486 case BPF_RET | BPF_K: in bpf_jit_compile() 495 case BPF_RET | BPF_A: in bpf_jit_compile()
|
| /Linux-v5.4/Documentation/networking/ |
| D | cdc_mbim.txt | 255 BPF_STMT(BPF_RET|BPF_K, (u_int)-1), /* accept */ 256 BPF_STMT(BPF_RET|BPF_K, 0), /* ignore */
|
| D | filter.txt | 870 BPF_RET 0x06 BPF_JMP32 0x06 937 Classic BPF wastes the whole BPF_RET class to represent a single 'ret' 938 operation. Classic BPF_RET | BPF_K means copy imm32 into return register
|
| /Linux-v5.4/kernel/ |
| D | seccomp.c | 198 case BPF_RET | BPF_K: in seccomp_check_filter() 199 case BPF_RET | BPF_A: in seccomp_check_filter()
|
| /Linux-v5.4/include/linux/ |
| D | filter.h | 1109 case BPF_RET | BPF_K: in bpf_needs_clear_a()
|
| /Linux-v5.4/net/core/ |
| D | filter.c | 782 case BPF_RET | BPF_A: in bpf_convert_filter() 783 case BPF_RET | BPF_K: in bpf_convert_filter() 987 [BPF_RET | BPF_K] = true, in chk_code_allowed() 988 [BPF_RET | BPF_A] = true, in chk_code_allowed() 1102 case BPF_RET | BPF_K: in bpf_check_classic() 1103 case BPF_RET | BPF_A: in bpf_check_classic()
|