Home
last modified time | relevance | path

Searched refs:BPF_RET (Results 1 – 25 of 25) sorted by relevance

/Linux-v6.6/samples/seccomp/
Dbpf-direct.c118 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
121 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
124 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
126 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
133 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL), in install_filter()
141 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
142 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_TRAP), in install_filter()
143 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL), in install_filter()
Ddropper.c37 BPF_STMT(BPF_RET+BPF_K, in install_filter()
39 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter()
46 struct sock_filter kill = BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL); in install_filter()
Duser-trap.c92 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_USER_NOTIF), in user_trap_syscall()
93 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in user_trap_syscall()
Dbpf-helper.h46 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW)
48 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL)
/Linux-v6.6/tools/testing/selftests/seccomp/
Dseccomp_bpf.c392 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
425 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
462 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
500 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
523 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
548 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST()
584 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_LOG), in TEST()
606 BPF_STMT(BPF_RET|BPF_K, 0x10000000U), in TEST_SIGNAL()
628 BPF_STMT(BPF_RET|BPF_K, 0x90000000U), in TEST_SIGNAL()
649 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_KILL), in TEST_SIGNAL()
[all …]
Dseccomp_benchmark.c126 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in main()
134 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in main()
/Linux-v6.6/lib/
Dtest_bpf.c102 insn[i] = __BPF_STMT(BPF_RET | BPF_K, k); in bpf_fill_maxinsns1()
121 insn[i] = __BPF_STMT(BPF_RET | BPF_K, 0xfefefefe); in bpf_fill_maxinsns2()
148 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); in bpf_fill_maxinsns3()
167 insn[i] = __BPF_STMT(BPF_RET | BPF_K, 0xfefefefe); in bpf_fill_maxinsns4()
188 insn[i] = __BPF_STMT(BPF_RET | BPF_K, 0xfefefefe); in bpf_fill_maxinsns5()
190 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_K, 0xabababab); in bpf_fill_maxinsns5()
212 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); in bpf_fill_maxinsns6()
238 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); in bpf_fill_maxinsns7()
261 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); in bpf_fill_maxinsns8()
341 insn[len - 1] = __BPF_STMT(BPF_RET | BPF_K, 0xababcbac); in __bpf_fill_ja()
[all …]
/Linux-v6.6/tools/perf/bench/
Dsched-seccomp-notify.c55 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_USER_NOTIF), in user_notif_syscall()
56 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in user_notif_syscall()
/Linux-v6.6/tools/bpf/
Dbpf_dbg.c170 [BPF_RET] = "ret",
223 case BPF_RET | BPF_K: in bpf_disasm()
224 op = op_table[BPF_RET]; in bpf_disasm()
227 case BPF_RET | BPF_A: in bpf_disasm()
228 op = op_table[BPF_RET]; in bpf_disasm()
231 case BPF_RET | BPF_X: in bpf_disasm()
232 op = op_table[BPF_RET]; in bpf_disasm()
640 case BPF_RET | BPF_K: in bpf_single_step()
644 case BPF_RET | BPF_A: in bpf_single_step()
648 case BPF_RET | BPF_X: in bpf_single_step()
Dbpf_exp.y444 bpf_set_curr_instr(BPF_RET | BPF_A, 0, 0, 0); }
446 bpf_set_curr_instr(BPF_RET | BPF_A, 0, 0, 0); }
448 bpf_set_curr_instr(BPF_RET | BPF_X, 0, 0, 0); }
450 bpf_set_curr_instr(BPF_RET | BPF_X, 0, 0, 0); }
452 bpf_set_curr_instr(BPF_RET | BPF_K, 0, 0, $3); }
/Linux-v6.6/tools/include/uapi/linux/
Dbpf_common.h13 #define BPF_RET 0x06 macro
/Linux-v6.6/include/uapi/linux/
Dbpf_common.h13 #define BPF_RET 0x06 macro
/Linux-v6.6/samples/bpf/
Dtracex5_user.c25 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_accept_all_seccomp()
/Linux-v6.6/tools/testing/selftests/net/
Dtoeplitz.c296 BPF_STMT(BPF_RET + BPF_K, 0), in __set_filter()
297 BPF_STMT(BPF_RET + BPF_K, 0xFFFF), in __set_filter()
326 BPF_STMT(BPF_RET + BPF_K, 0), in set_filter_null()
Dreuseport_bpf.c139 { BPF_RET | BPF_A, 0, 0, 0 }, in attach_cbpf()
346 struct sock_filter ccode[] = {{ BPF_RET | BPF_A, 0, 0, 0 }}; in test_filter_no_reuseport()
Dreuseport_bpf_cpu.c83 { BPF_RET | BPF_A, 0, 0, 0 }, in attach_bpf()
Dcsum.c504 BPF_STMT(BPF_RET + BPF_K, 0), in __recv_prepare_packet_filter()
505 BPF_STMT(BPF_RET + BPF_K, 0xFFFF), in __recv_prepare_packet_filter()
Dpsock_fanout.c116 BPF_STMT(BPF_RET | BPF_A, 0), /* ret A */ in sock_fanout_set_cbpf()
Dgro.c132 BPF_STMT(BPF_RET + BPF_K, 0xFFFFFFFF), in setup_sock_filter()
133 BPF_STMT(BPF_RET + BPF_K, 0), in setup_sock_filter()
/Linux-v6.6/Documentation/bpf/
Dclassic_vs_extended.rst266 BPF_RET 0x06 BPF_JMP32 0x06
336 Classic BPF wastes the whole BPF_RET class to represent a single ``ret``
337 operation. Classic BPF_RET | BPF_K means copy imm32 into return register
/Linux-v6.6/arch/sparc/net/
Dbpf_jit_comp_32.c486 case BPF_RET | BPF_K: in bpf_jit_compile()
495 case BPF_RET | BPF_A: in bpf_jit_compile()
/Linux-v6.6/Documentation/networking/
Dcdc_mbim.rst263 BPF_STMT(BPF_RET|BPF_K, (u_int)-1), /* accept */
264 BPF_STMT(BPF_RET|BPF_K, 0), /* ignore */
/Linux-v6.6/kernel/
Dseccomp.c304 case BPF_RET | BPF_K: in seccomp_check_filter()
305 case BPF_RET | BPF_A: in seccomp_check_filter()
758 case BPF_RET | BPF_K: in seccomp_is_const_allow()
/Linux-v6.6/include/linux/
Dfilter.h1221 case BPF_RET | BPF_K: in bpf_needs_clear_a()
/Linux-v6.6/net/core/
Dfilter.c805 case BPF_RET | BPF_A: in bpf_convert_filter()
806 case BPF_RET | BPF_K: in bpf_convert_filter()
1010 [BPF_RET | BPF_K] = true, in chk_code_allowed()
1011 [BPF_RET | BPF_A] = true, in chk_code_allowed()
1125 case BPF_RET | BPF_K: in bpf_check_classic()
1126 case BPF_RET | BPF_A: in bpf_check_classic()