/linux-master/samples/seccomp/ |
H A D | bpf-direct.c | 117 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_rt_sigreturn, 0, 1), 118 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), 120 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_sigreturn, 0, 1), 121 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), 123 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_exit_group, 0, 1), 124 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), 125 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_exit, 0, 1), 126 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), 127 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_read, 1, 0), 128 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_writ [all...] |
H A D | bpf-helper.h | 46 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW) 48 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL) 56 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, (nr), 0, 1), \ 150 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, (value), 0, 1), \ 154 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, (value), 1, 0), \ 158 BPF_JUMP(BPF_JMP+BPF_JSET+BPF_K, (value), 0, 1), \ 162 BPF_JUMP(BPF_JMP+BPF_JGE+BPF_K, (value), 0, 1), \ 166 BPF_JUMP(BPF_JMP+BPF_JGT+BPF_K, (value), 0, 1), \ 170 BPF_JUMP(BPF_JMP+BPF_JGT+BPF_K, (value), 1, 0), \ 174 BPF_JUMP(BPF_JMP+BPF_JGE+BPF_K, (valu [all...] |
H A D | dropper.c | 33 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, arch, 0, 3), 36 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, nr, 0, 1), 37 BPF_STMT(BPF_RET+BPF_K, 39 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW), 46 struct sock_filter kill = BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL);
|
/linux-master/arch/powerpc/net/ |
H A D | bpf_jit_comp64.c | 426 case BPF_ALU | BPF_ADD | BPF_K: /* (u32) dst += (u32) imm */ 427 case BPF_ALU64 | BPF_ADD | BPF_K: /* dst += imm */ 437 case BPF_ALU | BPF_SUB | BPF_K: /* (u32) dst -= (u32) imm */ 438 case BPF_ALU64 | BPF_SUB | BPF_K: /* dst -= imm */ 455 case BPF_ALU | BPF_MUL | BPF_K: /* (u32) dst *= (u32) imm */ 456 case BPF_ALU64 | BPF_MUL | BPF_K: /* dst *= imm */ 485 case BPF_ALU | BPF_MOD | BPF_K: /* (u32) dst %= (u32) imm */ 486 case BPF_ALU | BPF_DIV | BPF_K: /* (u32) dst /= (u32) imm */ 487 case BPF_ALU64 | BPF_MOD | BPF_K: /* dst %= imm */ 488 case BPF_ALU64 | BPF_DIV | BPF_K [all...] |
H A D | bpf_jit_comp32.c | 367 case BPF_ALU | BPF_SUB | BPF_K: /* (u32) dst -= (u32) imm */ 370 case BPF_ALU | BPF_ADD | BPF_K: /* (u32) dst += (u32) imm */ 380 case BPF_ALU64 | BPF_SUB | BPF_K: /* dst -= imm */ 383 case BPF_ALU64 | BPF_ADD | BPF_K: /* dst += imm */ 412 case BPF_ALU | BPF_MUL | BPF_K: /* (u32) dst *= (u32) imm */ 426 case BPF_ALU64 | BPF_MUL | BPF_K: /* dst *= imm */ 464 case BPF_ALU | BPF_DIV | BPF_K: /* (u32) dst /= (u32) imm */ 476 case BPF_ALU | BPF_MOD | BPF_K: /* (u32) dst %= (u32) imm */ 493 case BPF_ALU64 | BPF_MOD | BPF_K: /* dst %= imm */ 506 case BPF_ALU64 | BPF_DIV | BPF_K [all...] |
/linux-master/arch/mips/net/ |
H A D | bpf_jit_comp64.c | 649 case BPF_ALU | BPF_MOV | BPF_K: 673 case BPF_ALU | BPF_OR | BPF_K: 674 case BPF_ALU | BPF_AND | BPF_K: 675 case BPF_ALU | BPF_XOR | BPF_K: 676 case BPF_ALU | BPF_LSH | BPF_K: 692 case BPF_ALU | BPF_RSH | BPF_K: 693 case BPF_ALU | BPF_ARSH | BPF_K: 694 case BPF_ALU | BPF_ADD | BPF_K: 695 case BPF_ALU | BPF_SUB | BPF_K: 696 case BPF_ALU | BPF_MUL | BPF_K [all...] |
H A D | bpf_jit_comp32.c | 1478 case BPF_ALU | BPF_MOV | BPF_K: 1508 case BPF_ALU | BPF_OR | BPF_K: 1509 case BPF_ALU | BPF_AND | BPF_K: 1510 case BPF_ALU | BPF_XOR | BPF_K: 1511 case BPF_ALU | BPF_LSH | BPF_K: 1512 case BPF_ALU | BPF_RSH | BPF_K: 1513 case BPF_ALU | BPF_ARSH | BPF_K: 1514 case BPF_ALU | BPF_ADD | BPF_K: 1515 case BPF_ALU | BPF_SUB | BPF_K: 1516 case BPF_ALU | BPF_MUL | BPF_K [all...] |
/linux-master/arch/parisc/net/ |
H A D | bpf_jit_comp64.c | 652 case BPF_ALU | BPF_MUL | BPF_K: 653 case BPF_ALU64 | BPF_MUL | BPF_K: 663 case BPF_ALU | BPF_DIV | BPF_K: 664 case BPF_ALU64 | BPF_DIV | BPF_K: 674 case BPF_ALU | BPF_MOD | BPF_K: 675 case BPF_ALU64 | BPF_MOD | BPF_K: 771 case BPF_ALU | BPF_MOV | BPF_K: 772 case BPF_ALU64 | BPF_MOV | BPF_K: 779 case BPF_ALU | BPF_ADD | BPF_K: 780 case BPF_ALU64 | BPF_ADD | BPF_K [all...] |
H A D | bpf_jit_comp32.c | 1141 case BPF_ALU64 | BPF_ADD | BPF_K: 1144 case BPF_ALU64 | BPF_SUB | BPF_K: 1151 case BPF_ALU64 | BPF_MUL | BPF_K: 1154 case BPF_ALU64 | BPF_DIV | BPF_K: 1157 case BPF_ALU64 | BPF_MOD | BPF_K: 1162 if (BPF_SRC(code) == BPF_K) { 1174 case BPF_ALU64 | BPF_MOV | BPF_K: 1175 case BPF_ALU64 | BPF_AND | BPF_K: 1176 case BPF_ALU64 | BPF_OR | BPF_K: 1177 case BPF_ALU64 | BPF_XOR | BPF_K [all...] |
/linux-master/arch/loongarch/net/ |
H A D | bpf_jit.c | 501 case BPF_ALU | BPF_MOV | BPF_K: 502 case BPF_ALU64 | BPF_MOV | BPF_K: 514 case BPF_ALU | BPF_ADD | BPF_K: 515 case BPF_ALU64 | BPF_ADD | BPF_K: 533 case BPF_ALU | BPF_SUB | BPF_K: 534 case BPF_ALU64 | BPF_SUB | BPF_K: 552 case BPF_ALU | BPF_MUL | BPF_K: 553 case BPF_ALU64 | BPF_MUL | BPF_K: 578 case BPF_ALU | BPF_DIV | BPF_K: 579 case BPF_ALU64 | BPF_DIV | BPF_K [all...] |
/linux-master/tools/bpf/ |
H A D | bpf_exp.y | 219 bpf_set_curr_instr(BPF_JMP | BPF_JEQ | BPF_K, 0, 0, $3); } 230 bpf_set_curr_instr(BPF_JMP | BPF_JEQ | BPF_K, 0, 0, $3); } 242 bpf_set_curr_instr(BPF_JMP | BPF_JEQ | BPF_K, 0, 0, $3); } 254 bpf_set_curr_instr(BPF_JMP | BPF_JGE | BPF_K, 0, 0, $3); } 266 bpf_set_curr_instr(BPF_JMP | BPF_JGT | BPF_K, 0, 0, $3); } 279 bpf_set_curr_instr(BPF_JMP | BPF_JGT | BPF_K, 0, 0, $3); } 290 bpf_set_curr_instr(BPF_JMP | BPF_JGT | BPF_K, 0, 0, $3); } 303 bpf_set_curr_instr(BPF_JMP | BPF_JGE | BPF_K, 0, 0, $3); } 314 bpf_set_curr_instr(BPF_JMP | BPF_JGE | BPF_K, 0, 0, $3); } 327 bpf_set_curr_instr(BPF_JMP | BPF_JSET | BPF_K, [all...] |
H A D | bpf_dbg.c | 223 case BPF_RET | BPF_K: 308 case BPF_JMP_JGT | BPF_K: 316 case BPF_JMP_JGE | BPF_K: 324 case BPF_JMP_JEQ | BPF_K: 332 case BPF_JMP_JSET | BPF_K: 344 case BPF_ALU_LSH | BPF_K: 352 case BPF_ALU_RSH | BPF_K: 360 case BPF_ALU_ADD | BPF_K: 368 case BPF_ALU_SUB | BPF_K: 376 case BPF_ALU_MUL | BPF_K [all...] |
/linux-master/arch/riscv/net/ |
H A D | bpf_jit_comp32.c | 973 case BPF_ALU64 | BPF_ADD | BPF_K: 976 case BPF_ALU64 | BPF_SUB | BPF_K: 983 case BPF_ALU64 | BPF_MUL | BPF_K: 988 if (BPF_SRC(code) == BPF_K) { 1000 case BPF_ALU64 | BPF_DIV | BPF_K: 1002 case BPF_ALU64 | BPF_MOD | BPF_K: 1005 case BPF_ALU64 | BPF_MOV | BPF_K: 1006 case BPF_ALU64 | BPF_AND | BPF_K: 1007 case BPF_ALU64 | BPF_OR | BPF_K: 1008 case BPF_ALU64 | BPF_XOR | BPF_K [all...] |
H A D | bpf_jit_comp64.c | 1206 case BPF_ALU | BPF_MOV | BPF_K: 1207 case BPF_ALU64 | BPF_MOV | BPF_K: 1214 case BPF_ALU | BPF_ADD | BPF_K: 1215 case BPF_ALU64 | BPF_ADD | BPF_K: 1225 case BPF_ALU | BPF_SUB | BPF_K: 1226 case BPF_ALU64 | BPF_SUB | BPF_K: 1236 case BPF_ALU | BPF_AND | BPF_K: 1237 case BPF_ALU64 | BPF_AND | BPF_K: 1247 case BPF_ALU | BPF_OR | BPF_K: 1248 case BPF_ALU64 | BPF_OR | BPF_K [all...] |
/linux-master/tools/testing/selftests/seccomp/ |
H A D | seccomp_bpf.c | 392 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), 425 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), 462 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), 500 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), 523 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), 548 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), 584 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_LOG), 606 BPF_STMT(BPF_RET|BPF_K, 0x10000000U), 628 BPF_STMT(BPF_RET|BPF_K, 0x90000000U), 649 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_KIL [all...] |
/linux-master/samples/bpf/ |
H A D | bpf_insn.h | 30 .code = BPF_ALU64 | BPF_OP(OP) | BPF_K, \ 38 .code = BPF_ALU | BPF_OP(OP) | BPF_K, \ 66 .code = BPF_ALU64 | BPF_MOV | BPF_K, \ 74 .code = BPF_ALU | BPF_MOV | BPF_K, \ 197 .code = BPF_JMP | BPF_OP(OP) | BPF_K, \ 207 .code = BPF_JMP32 | BPF_OP(OP) | BPF_K, \
|
/linux-master/arch/x86/net/ |
H A D | bpf_jit_comp32.c | 1689 case BPF_ALU | BPF_MOV | BPF_K: 1691 case BPF_ALU64 | BPF_MOV | BPF_K: 1703 case BPF_K: 1718 case BPF_ALU | BPF_ADD | BPF_K: 1720 case BPF_ALU | BPF_SUB | BPF_K: 1722 case BPF_ALU | BPF_OR | BPF_K: 1724 case BPF_ALU | BPF_AND | BPF_K: 1726 case BPF_ALU | BPF_XOR | BPF_K: 1728 case BPF_ALU64 | BPF_ADD | BPF_K: 1730 case BPF_ALU64 | BPF_SUB | BPF_K [all...] |
/linux-master/arch/arm/net/ |
H A D | bpf_jit_32.c | 539 * For BPF_ALU | BPF_DIV | BPF_K instructions 1618 case BPF_ALU | BPF_MOV | BPF_K: 1620 case BPF_ALU64 | BPF_MOV | BPF_K: 1634 case BPF_K: 1648 case BPF_ALU | BPF_ADD | BPF_K: 1650 case BPF_ALU | BPF_SUB | BPF_K: 1652 case BPF_ALU | BPF_OR | BPF_K: 1654 case BPF_ALU | BPF_AND | BPF_K: 1656 case BPF_ALU | BPF_XOR | BPF_K: 1658 case BPF_ALU | BPF_MUL | BPF_K [all...] |
/linux-master/arch/sparc/net/ |
H A D | bpf_jit_comp_64.c | 1064 case BPF_ALU | BPF_MOV | BPF_K: 1069 case BPF_ALU64 | BPF_MOV | BPF_K: 1073 case BPF_ALU | BPF_ADD | BPF_K: 1074 case BPF_ALU64 | BPF_ADD | BPF_K: 1077 case BPF_ALU | BPF_SUB | BPF_K: 1078 case BPF_ALU64 | BPF_SUB | BPF_K: 1081 case BPF_ALU | BPF_AND | BPF_K: 1082 case BPF_ALU64 | BPF_AND | BPF_K: 1085 case BPF_ALU | BPF_OR | BPF_K: 1086 case BPF_ALU64 | BPF_OR | BPF_K [all...] |
H A D | bpf_jit_comp_32.c | 402 case BPF_ALU | BPF_ADD | BPF_K: /* A += K; */ 408 case BPF_ALU | BPF_SUB | BPF_K: /* A -= K */ 414 case BPF_ALU | BPF_AND | BPF_K: /* A &= K */ 420 case BPF_ALU | BPF_OR | BPF_K: /* A |= K */ 427 case BPF_ALU | BPF_XOR | BPF_K: /* A ^= K */ 433 case BPF_ALU | BPF_LSH | BPF_K: /* A <<= K */ 439 case BPF_ALU | BPF_RSH | BPF_K: /* A >>= K */ 445 case BPF_ALU | BPF_MUL | BPF_K: /* A *= K */ 448 case BPF_ALU | BPF_DIV | BPF_K: /* A /= K with K != 0*/ 486 case BPF_RET | BPF_K [all...] |
/linux-master/tools/perf/bench/ |
H A D | sched-seccomp-notify.c | 54 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, nr, 0, 1), 55 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_USER_NOTIF), 56 BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW),
|
/linux-master/tools/include/linux/ |
H A D | filter.h | 54 .code = BPF_ALU64 | BPF_OP(OP) | BPF_K, \ 62 .code = BPF_ALU | BPF_OP(OP) | BPF_K, \ 100 .code = BPF_ALU64 | BPF_MOV | BPF_K, \ 108 .code = BPF_ALU | BPF_MOV | BPF_K, \ 114 /* Short form of mov based on type, BPF_X: dst_reg = src_reg, BPF_K: dst_reg = imm32 */ 232 .code = BPF_JMP | BPF_OP(OP) | BPF_K, \ 242 .code = BPF_JMP32 | BPF_OP(OP) | BPF_K, \
|
/linux-master/arch/s390/net/ |
H A D | bpf_jit_comp.c | 845 case BPF_ALU | BPF_MOV | BPF_K: /* dst = (u32) imm */ 851 case BPF_ALU64 | BPF_MOV | BPF_K: /* dst = imm */ 881 case BPF_ALU | BPF_ADD | BPF_K: /* dst = (u32) dst + (u32) imm */ 888 case BPF_ALU64 | BPF_ADD | BPF_K: /* dst = dst + imm */ 906 case BPF_ALU | BPF_SUB | BPF_K: /* dst = (u32) dst - (u32) imm */ 913 case BPF_ALU64 | BPF_SUB | BPF_K: /* dst = dst - imm */ 936 case BPF_ALU | BPF_MUL | BPF_K: /* dst = (u32) dst * (u32) imm */ 943 case BPF_ALU64 | BPF_MUL | BPF_K: /* dst = dst * imm */ 1004 case BPF_ALU | BPF_DIV | BPF_K: 1005 case BPF_ALU | BPF_MOD | BPF_K [all...] |
/linux-master/arch/arm64/net/ |
H A D | bpf_jit_comp.c | 970 case BPF_ALU | BPF_MOV | BPF_K: 971 case BPF_ALU64 | BPF_MOV | BPF_K: 975 case BPF_ALU | BPF_ADD | BPF_K: 976 case BPF_ALU64 | BPF_ADD | BPF_K: 986 case BPF_ALU | BPF_SUB | BPF_K: 987 case BPF_ALU64 | BPF_SUB | BPF_K: 997 case BPF_ALU | BPF_AND | BPF_K: 998 case BPF_ALU64 | BPF_AND | BPF_K: 1007 case BPF_ALU | BPF_OR | BPF_K: 1008 case BPF_ALU64 | BPF_OR | BPF_K [all...] |
/linux-master/kernel/bpf/ |
H A D | core.c | 1308 (from->code == (BPF_ALU | BPF_MOV | BPF_K) || 1309 from->code == (BPF_ALU64 | BPF_MOV | BPF_K))) { 1315 case BPF_ALU | BPF_ADD | BPF_K: 1316 case BPF_ALU | BPF_SUB | BPF_K: 1317 case BPF_ALU | BPF_AND | BPF_K: 1318 case BPF_ALU | BPF_OR | BPF_K: 1319 case BPF_ALU | BPF_XOR | BPF_K: 1320 case BPF_ALU | BPF_MUL | BPF_K: 1321 case BPF_ALU | BPF_MOV | BPF_K: 1322 case BPF_ALU | BPF_DIV | BPF_K [all...] |