/openbmc/linux/samples/seccomp/ |
H A D | bpf-direct.c | 118 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 121 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 124 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 126 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 133 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL), in install_filter() 141 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 142 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_TRAP), in install_filter() 143 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL), in install_filter()
|
H A D | dropper.c | 37 BPF_STMT(BPF_RET+BPF_K, in install_filter() 39 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_filter() 46 struct sock_filter kill = BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL); in install_filter()
|
H A D | user-trap.c | 92 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_USER_NOTIF), in user_trap_syscall() 93 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in user_trap_syscall()
|
H A D | bpf-helper.h | 46 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW) 48 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL)
|
/openbmc/linux/tools/testing/selftests/seccomp/ |
H A D | seccomp_bpf.c | 392 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 425 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in TEST() 584 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_LOG), in TEST() 606 BPF_STMT(BPF_RET|BPF_K, 0x10000000U), in TEST_SIGNAL() 628 BPF_STMT(BPF_RET|BPF_K, 0x90000000U), in TEST_SIGNAL() 649 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_KILL), in TEST_SIGNAL() 670 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_KILL), in TEST_SIGNAL() 703 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_KILL), in TEST_SIGNAL() 742 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_KILL), in TEST_SIGNAL() 823 BPF_STMT(BPF_RET|BPF_K, kill), in kill_thread_or_group() [all …]
|
H A D | seccomp_benchmark.c | 126 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in main() 134 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in main()
|
/openbmc/linux/lib/ |
H A D | test_bpf.c | 3077 BPF_STMT(BPF_RET | BPF_A, 0) 3104 BPF_STMT(BPF_RET | BPF_A, 0) 3128 BPF_STMT(BPF_RET | BPF_A, 0) 3144 BPF_STMT(BPF_RET | BPF_A, 0) 3167 BPF_STMT(BPF_RET | BPF_K, 1) 3177 BPF_STMT(BPF_RET | BPF_K, 1) 3190 BPF_STMT(BPF_RET | BPF_A, 0) 3204 BPF_STMT(BPF_RET | BPF_A, 0) 3217 BPF_STMT(BPF_RET | BPF_A, 0) 3231 BPF_STMT(BPF_RET | BPF_A, 0) [all …]
|
/openbmc/linux/tools/perf/bench/ |
H A D | sched-seccomp-notify.c | 55 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_USER_NOTIF), in user_notif_syscall() 56 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), in user_notif_syscall()
|
/openbmc/linux/tools/bpf/ |
H A D | bpf_dbg.c | 170 [BPF_RET] = "ret", 223 case BPF_RET | BPF_K: in bpf_disasm() 224 op = op_table[BPF_RET]; in bpf_disasm() 227 case BPF_RET | BPF_A: in bpf_disasm() 228 op = op_table[BPF_RET]; in bpf_disasm() 231 case BPF_RET | BPF_X: in bpf_disasm() 232 op = op_table[BPF_RET]; in bpf_disasm() 640 case BPF_RET | BPF_K: in bpf_single_step() 644 case BPF_RET | BPF_A: in bpf_single_step() 648 case BPF_RET | BPF_X: in bpf_single_step()
|
H A D | bpf_exp.y | 444 bpf_set_curr_instr(BPF_RET | BPF_A, 0, 0, 0); } 446 bpf_set_curr_instr(BPF_RET | BPF_A, 0, 0, 0); } 448 bpf_set_curr_instr(BPF_RET | BPF_X, 0, 0, 0); } 450 bpf_set_curr_instr(BPF_RET | BPF_X, 0, 0, 0); } 452 bpf_set_curr_instr(BPF_RET | BPF_K, 0, 0, $3); }
|
/openbmc/linux/tools/include/uapi/linux/ |
H A D | bpf_common.h | 13 #define BPF_RET 0x06 macro
|
/openbmc/linux/include/uapi/linux/ |
H A D | bpf_common.h | 13 #define BPF_RET 0x06 macro
|
/openbmc/linux/samples/bpf/ |
H A D | tracex5_user.c | 25 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), in install_accept_all_seccomp()
|
/openbmc/linux/tools/testing/selftests/net/ |
H A D | toeplitz.c | 296 BPF_STMT(BPF_RET + BPF_K, 0), in __set_filter() 297 BPF_STMT(BPF_RET + BPF_K, 0xFFFF), in __set_filter() 326 BPF_STMT(BPF_RET + BPF_K, 0), in set_filter_null()
|
H A D | reuseport_bpf.c | 139 { BPF_RET | BPF_A, 0, 0, 0 }, in attach_cbpf() 346 struct sock_filter ccode[] = {{ BPF_RET | BPF_A, 0, 0, 0 }}; in test_filter_no_reuseport()
|
H A D | reuseport_bpf_cpu.c | 83 { BPF_RET | BPF_A, 0, 0, 0 }, in attach_bpf()
|
H A D | csum.c | 504 BPF_STMT(BPF_RET + BPF_K, 0), in __recv_prepare_packet_filter() 505 BPF_STMT(BPF_RET + BPF_K, 0xFFFF), in __recv_prepare_packet_filter()
|
H A D | psock_fanout.c | 116 BPF_STMT(BPF_RET | BPF_A, 0), /* ret A */ in sock_fanout_set_cbpf()
|
H A D | gro.c | 132 BPF_STMT(BPF_RET + BPF_K, 0xFFFFFFFF), in setup_sock_filter() 133 BPF_STMT(BPF_RET + BPF_K, 0), in setup_sock_filter()
|
/openbmc/linux/Documentation/bpf/ |
H A D | classic_vs_extended.rst | 266 BPF_RET 0x06 BPF_JMP32 0x06 336 Classic BPF wastes the whole BPF_RET class to represent a single ``ret`` 337 operation. Classic BPF_RET | BPF_K means copy imm32 into return register
|
/openbmc/linux/arch/sparc/net/ |
H A D | bpf_jit_comp_32.c | 486 case BPF_RET | BPF_K: in bpf_jit_compile() 495 case BPF_RET | BPF_A: in bpf_jit_compile()
|
/openbmc/linux/Documentation/networking/ |
H A D | cdc_mbim.rst | 263 BPF_STMT(BPF_RET|BPF_K, (u_int)-1), /* accept */ 264 BPF_STMT(BPF_RET|BPF_K, 0), /* ignore */
|
/openbmc/linux/kernel/ |
H A D | seccomp.c | 304 case BPF_RET | BPF_K: in seccomp_check_filter() 305 case BPF_RET | BPF_A: in seccomp_check_filter() 758 case BPF_RET | BPF_K: in seccomp_is_const_allow()
|
/openbmc/linux/include/linux/ |
H A D | filter.h | 1224 case BPF_RET | BPF_K: in bpf_needs_clear_a()
|
/openbmc/linux/net/core/ |
H A D | filter.c | 807 case BPF_RET | BPF_A: in bpf_convert_filter() 808 case BPF_RET | BPF_K: in bpf_convert_filter() 1012 [BPF_RET | BPF_K] = true, in chk_code_allowed() 1013 [BPF_RET | BPF_A] = true, in chk_code_allowed() 1127 case BPF_RET | BPF_K: in bpf_check_classic() 1128 case BPF_RET | BPF_A: in bpf_check_classic()
|