| /Linux-v5.4/include/uapi/linux/netfilter/ |
| D | xt_bpf.h | 10 #define XT_BPF_PATH_MAX (XT_BPF_MAX_NUM_INSTR * sizeof(struct sock_filter)) 16 struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR]; 34 struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR];
|
| /Linux-v5.4/samples/seccomp/ |
| D | bpf-helper.c | 20 struct sock_filter *filter, size_t count) in bpf_resolve_jumps() 32 struct sock_filter *instr = &filter[offset]; in bpf_resolve_jumps() 90 void seccomp_bpf_print(struct sock_filter *filter, size_t count) in seccomp_bpf_print() 92 struct sock_filter *end = filter + count; in seccomp_bpf_print()
|
| D | dropper.c | 30 struct sock_filter filter[] = { in install_filter()
|
| D | bpf-fancy.c | 35 struct sock_filter filter[] = { in main()
|
| D | bpf-helper.h | 36 struct sock_filter *filter, size_t count); 38 void seccomp_bpf_print(struct sock_filter *filter, size_t count);
|
| D | bpf-direct.c | 113 struct sock_filter filter[] = { in install_filter()
|
| D | user-trap.c | 88 struct sock_filter filter[] = { in user_trap_syscall()
|
| /Linux-v5.4/tools/testing/selftests/seccomp/ |
| D | seccomp_bpf.c | 282 struct sock_filter filter[] = { in TEST() 313 struct sock_filter allow[] = { in TEST() 316 struct sock_filter *filter; in TEST() 350 struct sock_filter allow[] = { in TEST() 353 struct sock_filter *filter; in TEST() 388 struct sock_filter filter[] = { in TEST() 411 struct sock_filter filter[] = { in TEST() 436 struct sock_filter filter[] = { in TEST() 454 struct sock_filter filter[] = { in TEST() 472 struct sock_filter filter[] = { in TEST() [all …]
|
| D | seccomp_benchmark.c | 62 struct sock_filter filter[] = { in main()
|
| /Linux-v5.4/include/uapi/linux/ |
| D | filter.h | 24 struct sock_filter { /* Filter block */ struct 33 struct sock_filter __user *filter; argument
|
| /Linux-v5.4/arch/um/drivers/ |
| D | vector_user.c | 676 struct sock_filter *bpf; in uml_vector_default_bpf() 685 sizeof(struct sock_filter) * DEFAULT_BPF_LEN, UM_GFP_KERNEL); in uml_vector_default_bpf() 689 bpf[0] = (struct sock_filter){ 0x20, 0, 0, 0x00000008 }; in uml_vector_default_bpf() 691 bpf[1] = (struct sock_filter){ 0x15, 0, 3, ntohl(*mac1)}; in uml_vector_default_bpf() 693 bpf[2] = (struct sock_filter){ 0x28, 0, 0, 0x00000006 }; in uml_vector_default_bpf() 695 bpf[3] = (struct sock_filter){ 0x15, 0, 1, ntohs(*mac2)}; in uml_vector_default_bpf() 697 bpf[4] = (struct sock_filter){ 0x6, 0, 0, 0x00000000 }; in uml_vector_default_bpf() 699 bpf[5] = (struct sock_filter){ 0x6, 0, 0, 0x00040000 }; in uml_vector_default_bpf()
|
| /Linux-v5.4/tools/testing/selftests/net/ |
| D | psock_lib.h | 50 struct sock_filter bpf_filter[] = { in pair_udp_setfilter() 66 bpf_prog.len = sizeof(bpf_filter) / sizeof(struct sock_filter); in pair_udp_setfilter()
|
| D | psock_fanout.c | 100 struct sock_filter bpf_filter[] = { in sock_fanout_set_cbpf() 107 bpf_prog.len = sizeof(bpf_filter) / sizeof(struct sock_filter); in sock_fanout_set_cbpf()
|
| D | reuseport_bpf.c | 135 struct sock_filter code[] = { in attach_cbpf() 348 struct sock_filter ccode[] = {{ BPF_RET | BPF_A, 0, 0, 0 }}; in test_filter_no_reuseport()
|
| /Linux-v5.4/tools/bpf/ |
| D | bpf_dbg.c | 131 static struct sock_filter bpf_image[BPF_MAXINSNS + 1]; 216 static void bpf_disasm(const struct sock_filter f, unsigned int i) in bpf_disasm() 438 static void bpf_dump_curr(struct bpf_regs *r, struct sock_filter *f) in bpf_dump_curr() 480 static void bpf_disasm_all(const struct sock_filter *f, unsigned int len) in bpf_disasm_all() 488 static void bpf_dump_all(const struct sock_filter *f, unsigned int len) in bpf_dump_all() 498 static bool bpf_runnable(struct sock_filter *f, unsigned int len) in bpf_runnable() 632 static void bpf_single_step(struct bpf_regs *r, struct sock_filter *f, in bpf_single_step() 854 static bool bpf_handle_breakpoint(struct bpf_regs *r, struct sock_filter *f, in bpf_handle_breakpoint() 866 static int bpf_run_all(struct sock_filter *f, uint16_t bpf_len, uint8_t *pkt, in bpf_run_all() 886 static int bpf_run_stepping(struct sock_filter *f, uint16_t bpf_len, in bpf_run_stepping() [all …]
|
| /Linux-v5.4/net/sched/ |
| D | act_bpf.c | 25 struct sock_filter *bpf_ops; 104 sizeof(struct sock_filter)); in tcf_bpf_dump_bpf_info() 180 .len = sizeof(struct sock_filter) * BPF_MAXINSNS }, 185 struct sock_filter *bpf_ops; in tcf_bpf_init_from_ops()
|
| D | cls_bpf.c | 47 struct sock_filter *bpf_ops; 62 .len = sizeof(struct sock_filter) * BPF_MAXINSNS }, 340 struct sock_filter *bpf_ops; in cls_bpf_prog_from_ops() 551 sizeof(struct sock_filter)); in cls_bpf_dump_bpf_info()
|
| /Linux-v5.4/include/net/tc_act/ |
| D | tc_bpf.h | 19 struct sock_filter *bpf_ops;
|
| /Linux-v5.4/net/core/ |
| D | ptp_classifier.c | 112 static struct sock_filter ptp_filter[] __initdata = { in ptp_classifier_init()
|
| /Linux-v5.4/include/linux/ |
| D | filter.h | 374 ((struct sock_filter) BPF_STMT(CODE, K)) 377 ((struct sock_filter) BPF_JUMP(CODE, K, JT, JF)) 511 struct sock_filter *filter; 543 struct sock_filter insns[0]; 822 typedef int (*bpf_aux_classic_check_t)(struct sock_filter *filter, 836 int sk_get_filter(struct sock *sk, struct sock_filter __user *filter, 1106 static inline bool bpf_needs_clear_a(const struct sock_filter *first) in bpf_needs_clear_a() 1125 static inline u16 bpf_anc_helper(const struct sock_filter *ftest) in bpf_anc_helper()
|
| /Linux-v5.4/samples/bpf/ |
| D | tracex5_user.c | 17 struct sock_filter filter[] = { in install_accept_all_seccomp()
|
| /Linux-v5.4/drivers/net/team/ |
| D | team_mode_loadbalance.c | 255 sizeof(struct sock_filter); in lb_bpf_func_get() 264 struct sock_filter *filter = (struct sock_filter *) data; in __fprog_create() 266 if (data_len % sizeof(struct sock_filter)) in __fprog_create() 276 fprog->len = data_len / sizeof(struct sock_filter); in __fprog_create()
|
| /Linux-v5.4/net/netfilter/ |
| D | xt_bpf.c | 24 static int __bpf_mt_check_bytecode(struct sock_filter *insns, __u16 len, in __bpf_mt_check_bytecode()
|
| /Linux-v5.4/kernel/ |
| D | seccomp.c | 138 #define MAX_INSNS_PER_PATH ((1 << 18) / sizeof(struct sock_filter)) 174 static int seccomp_check_filter(struct sock_filter *filter, unsigned int flen) in seccomp_check_filter() 178 struct sock_filter *ftest = &filter[pc]; in seccomp_check_filter() 439 BUG_ON(INT_MAX / fprog->len < sizeof(struct sock_filter)); in seccomp_prepare_filter()
|
| /Linux-v5.4/arch/powerpc/net/ |
| D | bpf_jit_comp.c | 28 const struct sock_filter *filter = fp->insns; in bpf_jit_build_prologue() 114 const struct sock_filter *filter = fp->insns; in bpf_jit_build_body()
|