Home
last modified time | relevance | path

Searched refs:BPF_RET (Results 1 – 23 of 23) sorted by relevance

/Linux-v6.1/samples/seccomp/
Dbpf-direct.c118 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
121 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
124 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
126 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
133 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL), in install_filter()
141 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
142 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_TRAP), in install_filter()
143 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL), in install_filter()
Ddropper.c37 BPF_STMT(BPF_RET+BPF_K, in install_filter()
39 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
46 struct sock_filter kill = BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL); in install_filter()
Duser-trap.c92 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_USER_NOTIF), in user_trap_syscall()
93 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in user_trap_syscall()
Dbpf-helper.h46 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW)
48 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL)
/Linux-v6.1/tools/testing/selftests/seccomp/
Dseccomp_bpf.c388 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
419 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
456 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
494 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
517 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
542 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
578 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_LOG), in TEST()
600 BPF_STMT(BPF_RET|BPF_K, 0x10000000U), in TEST_SIGNAL()
622 BPF_STMT(BPF_RET|BPF_K, 0x90000000U), in TEST_SIGNAL()
643 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_KILL), in TEST_SIGNAL()
[all …]
Dseccomp_benchmark.c126 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in main()
134 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in main()
/Linux-v6.1/lib/
Dtest_bpf.c102 insn[i] = __BPF_STMT(BPF_RET | BPF_K, k); in bpf_fill_maxinsns1()
121 insn[i] = __BPF_STMT(BPF_RET | BPF_K, 0xfefefefe); in bpf_fill_maxinsns2()
148 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); in bpf_fill_maxinsns3()
167 insn[i] = __BPF_STMT(BPF_RET | BPF_K, 0xfefefefe); in bpf_fill_maxinsns4()
188 insn[i] = __BPF_STMT(BPF_RET | BPF_K, 0xfefefefe); in bpf_fill_maxinsns5()
190 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_K, 0xabababab); in bpf_fill_maxinsns5()
212 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); in bpf_fill_maxinsns6()
238 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); in bpf_fill_maxinsns7()
261 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); in bpf_fill_maxinsns8()
341 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_K, 0xababcbac); in __bpf_fill_ja()
[all …]
/Linux-v6.1/tools/bpf/
Dbpf_dbg.c170 [BPF_RET] = "ret",
223 case BPF_RET | BPF_K: in bpf_disasm()
224 op = op_table[BPF_RET]; in bpf_disasm()
227 case BPF_RET | BPF_A: in bpf_disasm()
228 op = op_table[BPF_RET]; in bpf_disasm()
231 case BPF_RET | BPF_X: in bpf_disasm()
232 op = op_table[BPF_RET]; in bpf_disasm()
640 case BPF_RET | BPF_K: in bpf_single_step()
644 case BPF_RET | BPF_A: in bpf_single_step()
648 case BPF_RET | BPF_X: in bpf_single_step()
Dbpf_exp.y444 bpf_set_curr_instr(BPF_RET | BPF_A, 0, 0, 0); }
446 bpf_set_curr_instr(BPF_RET | BPF_A, 0, 0, 0); }
448 bpf_set_curr_instr(BPF_RET | BPF_X, 0, 0, 0); }
450 bpf_set_curr_instr(BPF_RET | BPF_X, 0, 0, 0); }
452 bpf_set_curr_instr(BPF_RET | BPF_K, 0, 0, $3); }
/Linux-v6.1/tools/include/uapi/linux/
Dbpf_common.h13 #define BPF_RET 0x06 macro
/Linux-v6.1/include/uapi/linux/
Dbpf_common.h13 #define BPF_RET 0x06 macro
/Linux-v6.1/samples/bpf/
Dtracex5_user.c25 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_accept_all_seccomp()
/Linux-v6.1/tools/testing/selftests/net/
Dtoeplitz.c294 BPF_STMT(BPF_RET + BPF_K, 0), in __set_filter()
295 BPF_STMT(BPF_RET + BPF_K, 0xFFFF), in __set_filter()
324 BPF_STMT(BPF_RET + BPF_K, 0), in set_filter_null()
Dreuseport_bpf.c139 { BPF_RET | BPF_A, 0, 0, 0 }, in attach_cbpf()
346 struct sock_filter ccode[] = {{ BPF_RET | BPF_A, 0, 0, 0 }}; in test_filter_no_reuseport()
Dreuseport_bpf_cpu.c83 { BPF_RET | BPF_A, 0, 0, 0 }, in attach_bpf()
Dpsock_fanout.c116 BPF_STMT(BPF_RET | BPF_A, 0), /* ret A */ in sock_fanout_set_cbpf()
Dgro.c132 BPF_STMT(BPF_RET + BPF_K, 0xFFFFFFFF), in setup_sock_filter()
133 BPF_STMT(BPF_RET + BPF_K, 0), in setup_sock_filter()
/Linux-v6.1/Documentation/bpf/
Dclassic_vs_extended.rst266 BPF_RET 0x06 BPF_JMP32 0x06
336 Classic BPF wastes the whole BPF_RET class to represent a single ``ret``
337 operation. Classic BPF_RET | BPF_K means copy imm32 into return register
/Linux-v6.1/arch/sparc/net/
Dbpf_jit_comp_32.c486 case BPF_RET | BPF_K: in bpf_jit_compile()
495 case BPF_RET | BPF_A: in bpf_jit_compile()
/Linux-v6.1/Documentation/networking/
Dcdc_mbim.rst263 BPF_STMT(BPF_RET|BPF_K, (u_int)-1), /* accept */
264 BPF_STMT(BPF_RET|BPF_K, 0), /* ignore */
/Linux-v6.1/kernel/
Dseccomp.c299 case BPF_RET | BPF_K: in seccomp_check_filter()
300 case BPF_RET | BPF_A: in seccomp_check_filter()
749 case BPF_RET | BPF_K: in seccomp_is_const_allow()
/Linux-v6.1/include/linux/
Dfilter.h1230 case BPF_RET | BPF_K: in bpf_needs_clear_a()
/Linux-v6.1/net/core/
Dfilter.c804 case BPF_RET | BPF_A: in bpf_convert_filter()
805 case BPF_RET | BPF_K: in bpf_convert_filter()
1009 [BPF_RET | BPF_K] = true, in chk_code_allowed()
1010 [BPF_RET | BPF_A] = true, in chk_code_allowed()
1124 case BPF_RET | BPF_K: in bpf_check_classic()
1125 case BPF_RET | BPF_A: in bpf_check_classic()