/external/dhcpcd/ |
D | bpf-filter.h | 37 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ETHERTYPE_ARP, 0, 3), 41 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ARPOP_REQUEST, 2, 0), 44 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ARPOP_REPLY, 0, 1), 82 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ETHERTYPE_IP, 0, 8), 86 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, IPPROTO_UDP, 0, 6), 94 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, DHCP_CLIENT_PORT, 0, 1),
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_nl80211_monitor.c | 201 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0, PASS, 0), 217 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x0801, PASS, 0), 228 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 8, 0, FAIL), 235 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 3, PASS, 0), 258 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_X, 0, PASS, 0), 264 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0xAAAA0300, 0, FAIL), 266 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x0000888E, PASS, FAIL),
|
/external/strace/xlat/ |
D | bpf_op_jmp.h | 7 #if defined(BPF_JEQ) || (defined(HAVE_DECL_BPF_JEQ) && HAVE_DECL_BPF_JEQ) 8 XLAT(BPF_JEQ),
|
D | bpf_op_jmp.in | 2 BPF_JEQ
|
/external/openssh/ |
D | sandbox-seccomp-filter.c | 77 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_ ## _nr, 0, 1), \ 80 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_ ## _nr, 0, 1), \ 88 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, SECCOMP_AUDIT_ARCH, 1, 0),
|
/external/strace/tests/ |
D | seccomp.c | 30 BPF_JUMP(BPF_JMP | BPF_K | BPF_JEQ, __NR_ ## nr, 0, 1), \ 34 BPF_JUMP(BPF_JMP | BPF_K | BPF_JEQ, __NR_ ## nr, 0, 1), \
|
/external/libpcap/ |
D | gencode.c | 646 return gen_ncmp(offrel, offset, size, 0xffffffff, BPF_JEQ, 0, v); 692 return gen_ncmp(offrel, offset, size, mask, BPF_JEQ, 0, v); 1702 b = new_block(JMP(BPF_JEQ)); 2145 sjeq_avs_cookie = new_stmt(JMP(BPF_JEQ)); in gen_load_prism_llprefixlen() 2671 b = new_block(JMP(BPF_JEQ)); in gen_ppi_dlt_check() 3038 b0 = gen_atmfield_code(A_PROTOTYPE, PT_LLC, BPF_JEQ, 0); 5561 s[i] = new_stmt(BPF_JMP|BPF_JEQ|BPF_K); 5572 s[i] = new_stmt(BPF_JMP|BPF_JEQ|BPF_K); 5585 s[i] = new_stmt(BPF_JMP|BPF_JEQ|BPF_K); 5592 s[i - 1]->s.jf = s[i] = new_stmt(BPF_JMP|BPF_JEQ|BPF_K); [all …]
|
D | bpf_image.c | 169 case BPF_JMP|BPF_JEQ|BPF_K: 189 case BPF_JMP|BPF_JEQ|BPF_X:
|
D | bpf_filter.c | 430 case BPF_JMP|BPF_JEQ|BPF_K: 446 case BPF_JMP|BPF_JEQ|BPF_X: 666 case BPF_JEQ:
|
D | grammar.y | 606 | '=' { $$ = BPF_JEQ; } 610 | NEQ { $$ = BPF_JEQ; } 665 $$.b = gen_atmfield_code($$.atmfieldtype, (bpf_int32) $1, BPF_JEQ, 0); 704 $$.b = gen_mtp3field_code($$.mtp3fieldtype, (u_int) $1, BPF_JEQ, 0);
|
D | grammar.c | 3294 { (yyval.i) = BPF_JEQ; } 3315 { (yyval.i) = BPF_JEQ; } 3585 …blk).b = gen_atmfield_code((yyval.blk).atmfieldtype, (bpf_int32) (yyvsp[(1) - (1)].i), BPF_JEQ, 0); 3729 …l.blk).b = gen_mtp3field_code((yyval.blk).mtp3fieldtype, (u_int) (yyvsp[(1) - (1)].i), BPF_JEQ, 0);
|
D | optimize.c | 790 if (b->s.code == (BPF_JMP|BPF_JEQ|BPF_K) && in opt_peep() 822 b->s.code = BPF_JMP|BPF_JEQ|BPF_X; in opt_peep() 883 case BPF_JEQ: in opt_peep() 1298 if (sense && code == (BPF_JMP|BPF_JEQ|BPF_K)) in fold_edge()
|
/external/android-clat/ |
D | clatd.c | 94 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, htonl(ipv6[0]), 0, 7), in configure_packet_socket() 96 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, htonl(ipv6[1]), 0, 5), in configure_packet_socket() 98 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, htonl(ipv6[2]), 0, 3), in configure_packet_socket() 100 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, htonl(ipv6[3]), 0, 1), in configure_packet_socket()
|
/external/kernel-headers/original/uapi/linux/ |
D | bpf_common.h | 43 #define BPF_JEQ 0x10 macro
|
/external/libpcap/bpf/net/ |
D | bpf_filter.c | 430 case BPF_JMP|BPF_JEQ|BPF_K: 446 case BPF_JMP|BPF_JEQ|BPF_X: 666 case BPF_JEQ:
|
/external/libpcap/pcap/ |
D | bpf.h | 1288 #define BPF_JEQ 0x10 macro
|
/external/iputils/ |
D | ping.c | 1378 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 0xAAAA, 0, 1), /* Ours? */ in install_filter() 1381 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, ICMP_ECHOREPLY, 1, 0), /* Echo? */ in install_filter() 1395 insns[2] = (struct sock_filter)BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, htons(ident), 0, 1); in install_filter()
|
D | ping6.c | 1781 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 0xAAAA, 0, 1), /* Ours? */ in install_filter() 1784 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, ICMP6_ECHO_REPLY, 1, 0), /* Echo? */ in install_filter() 1798 insns[1] = (struct sock_filter)BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, htons(ident), 0, 1); in install_filter()
|
D | rarpd.c | 335 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, ARPOP_RREQUEST, 0, 1), in load_arp_bpflet()
|
/external/wpa_supplicant_8/src/l2_packet/ |
D | l2_packet_linux.c | 296 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, protocol, 0, 1), in l2_packet_init_bridge()
|
/external/toybox/toys/pending/ |
D | dhcp.c | 244 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, IPPROTO_UDP, 0, 6), 248 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 68, 0, 1),
|