/external/chromium_org/sandbox/linux/seccomp-bpf/ |
D | codegen_unittest.cc | 51 return codegen->MakeInstruction(BPF_RET + BPF_K, 0); in SampleProgramOneInstruction() 63 codegen->MakeInstruction(BPF_RET + BPF_K, 1), in SampleProgramSimpleBranch() 64 codegen->MakeInstruction(BPF_RET + BPF_K, 0)); in SampleProgramSimpleBranch() 78 BPF_RET + BPF_K, 0); in SampleProgramAtypicalBranch() 94 Instruction* insn0 = codegen->MakeInstruction(BPF_RET + BPF_K, 42); in SampleProgramComplex() 96 SANDBOX_ASSERT(insn0->code == BPF_RET + BPF_K); in SampleProgramComplex() 116 codegen->MakeInstruction(BPF_RET + BPF_K, 42)); in SampleProgramComplex() 165 Instruction* i7 = codegen->MakeInstruction(BPF_RET + BPF_K, 1); in SampleProgramConfusingTails() 166 Instruction* i6 = codegen->MakeInstruction(BPF_RET + BPF_K, 0); in SampleProgramConfusingTails() 193 Instruction* i5 = codegen->MakeInstruction(BPF_RET + BPF_K, 1); in SampleProgramConfusingTailsBasic() [all …]
|
D | codegen.cc | 31 case BPF_RET: in TraverseRecursively() 110 case BPF_RET: in PrintProgram() 159 if (next && BPF_CLASS(code) == BPF_RET) { in MakeInstruction() 238 if (!insn->next != (BPF_CLASS(insn->code) == BPF_RET)) { in FindBranchTargets() 428 BPF_CLASS(insns1_last->code) != BPF_RET); in PointerCompare() 450 if (BPF_CLASS(insn1.code) == BPF_JMP || BPF_CLASS(insn1.code) == BPF_RET) { in PointerCompare() 458 if (BPF_CLASS(insn1.code) == BPF_RET) { in PointerCompare() 537 } else if (BPF_CLASS(last_insn->code) != BPF_RET) { in ComputeIncomingBranches() 585 } else if (BPF_CLASS(last_insn->code) != BPF_RET) { in TopoSortBasicBlocks() 681 } else if (BPF_CLASS(insn->code) != BPF_RET && in ComputeRelativeJumps()
|
D | sandbox_bpf.cc | 175 if (BPF_CLASS(insn->code) == BPF_RET && insn->k > SECCOMP_RET_TRAP && in CheckForUnsafeErrorCodes() 210 if (BPF_CLASS(insn->code) == BPF_RET && in RedirectToUserspace() 893 return gen->MakeInstruction(BPF_RET + BPF_K, err.err()); in RetExpression()
|
D | verifier.cc | 370 case BPF_RET: { in EvaluateBPF()
|
/external/dhcpcd/ |
D | bpf-filter.h | 46 BPF_STMT(BPF_RET + BPF_K, BPF_WHOLEPACKET), 48 BPF_STMT(BPF_RET + BPF_K, 0), 96 BPF_STMT(BPF_RET + BPF_K, BPF_WHOLEPACKET), 98 BPF_STMT(BPF_RET + BPF_K, 0),
|
/external/chromium_org/third_party/skia/experimental/webtry/ |
D | seccomp_bpf.h | 62 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW) 65 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL)
|
/external/skia/experimental/webtry/ |
D | seccomp_bpf.h | 60 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW) 63 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_KILL)
|
/external/libpcap/ |
D | bpf_filter.c | 250 case BPF_RET|BPF_K: 253 case BPF_RET|BPF_A: 677 case BPF_RET: 685 return BPF_CLASS(f[len - 1].code) == BPF_RET;
|
D | bpf_image.c | 73 case BPF_RET|BPF_K: 78 case BPF_RET|BPF_A:
|
D | optimize.c | 345 case BPF_RET: in atomuse() 1225 BPF_CLASS(b->s.code) == BPF_RET)) { in opt_blk() 1641 if (BPF_CLASS((*b)->s.code) == BPF_RET) in opt_root() 1707 if (BPF_CLASS(p->s.code) != BPF_RET) { in make_marks()
|
D | pcap-linux.c | 401 = BPF_STMT(BPF_RET | BPF_K, 0); 5868 case BPF_RET:
|
D | pcap-bpf.c | 2206 total_insn.code = (u_short)(BPF_RET | BPF_K);
|
D | gencode.c | 386 struct block *b = new_block(BPF_RET|BPF_K); 482 (root->s.code == (BPF_RET|BPF_K) && root->s.k == 0)) in pcap_compile_unsafe()
|
/external/libpcap/bpf/net/ |
D | bpf_filter.c | 250 case BPF_RET|BPF_K: 253 case BPF_RET|BPF_A: 677 case BPF_RET: 685 return BPF_CLASS(f[len - 1].code) == BPF_RET;
|
/external/kernel-headers/original/uapi/linux/ |
D | filter.h | 46 #define BPF_RET 0x06 macro
|
/external/android-clat/ |
D | clatd.c | 137 BPF_STMT(BPF_RET | BPF_K, PACKETLEN), in configure_packet_socket() 138 BPF_STMT(BPF_RET | BPF_K, 0) in configure_packet_socket()
|
/external/libpcap/pcap/ |
D | bpf.h | 1260 #define BPF_RET 0x06 macro
|
/external/iputils/ |
D | rarpd.c | 336 BPF_STMT(BPF_RET|BPF_K, 1024), in load_arp_bpflet() 337 BPF_STMT(BPF_RET|BPF_K, 0), in load_arp_bpflet()
|
D | ping.c | 1379 BPF_STMT(BPF_RET|BPF_K, ~0U), /* Yes, it passes. */ in install_filter() 1382 BPF_STMT(BPF_RET|BPF_K, 0xFFFFFFF), /* No. It passes. */ in install_filter() 1383 BPF_STMT(BPF_RET|BPF_K, 0) /* Echo with wrong ident. Reject. */ in install_filter()
|
D | ping6.c | 1782 BPF_STMT(BPF_RET|BPF_K, ~0U), /* Yes, it passes. */ in install_filter() 1785 BPF_STMT(BPF_RET|BPF_K, ~0U), /* No. It passes. This must not happen. */ in install_filter() 1786 BPF_STMT(BPF_RET|BPF_K, 0), /* Echo with wrong ident. Reject. */ in install_filter()
|
/external/ppp/pppd/plugins/rp-pppoe/ |
D | if.c | 225 BPF_STMT(BPF_RET+BPF_K, (u_int) -1), /* keep packet */ in initFilter() 226 BPF_STMT(BPF_RET+BPF_K, 0), /* drop packet */ in initFilter()
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_nl80211.c | 8319 BPF_STMT(BPF_RET | BPF_K, 0), 8321 BPF_STMT(BPF_RET | BPF_K, ~0),
|