Home
last modified time | relevance | path

Searched refs:sock_filter (Results 1 – 25 of 37) sorted by relevance

12

/external/minijail/
Dbpf.c14 size_t bpf_validate_arch(struct sock_filter *filter) in bpf_validate_arch()
16 struct sock_filter *curr_block = filter; in bpf_validate_arch()
25 size_t bpf_allow_syscall(struct sock_filter *filter, int nr) in bpf_allow_syscall()
27 struct sock_filter *curr_block = filter; in bpf_allow_syscall()
33 size_t bpf_allow_syscall_args(struct sock_filter *filter, in bpf_allow_syscall_args()
36 struct sock_filter *curr_block = filter; in bpf_allow_syscall_args()
44 size_t bpf_load_arg(struct sock_filter *filter, int argidx) in bpf_load_arg()
50 size_t bpf_load_arg(struct sock_filter *filter, int argidx) in bpf_load_arg()
52 struct sock_filter *curr_block = filter; in bpf_load_arg()
62 size_t bpf_comp_jeq32(struct sock_filter *filter, unsigned long c, in bpf_comp_jeq32()
[all …]
Dsyscall_filter.c33 struct sock_filter *new_instr_buf(size_t count) in new_instr_buf()
35 struct sock_filter *buf = calloc(count, sizeof(struct sock_filter)); in new_instr_buf()
55 struct sock_filter *instrs, size_t len) in append_filter_block()
96 struct sock_filter *filter = new_instr_buf(ONE_INSTR); in append_ret_kill()
103 struct sock_filter *filter = new_instr_buf(ONE_INSTR); in append_ret_trap()
110 struct sock_filter *filter = new_instr_buf(ONE_INSTR); in append_ret_errno()
117 struct sock_filter *filter = new_instr_buf(ALLOW_SYSCALL_LEN); in append_allow_syscall()
205 struct sock_filter *comp_block; in compile_atom()
296 struct sock_filter *entry_label = new_instr_buf(ONE_INSTR); in compile_section()
332 struct sock_filter *group_end_block = new_instr_buf(TWO_INSTRS); in compile_section()
[all …]
Dbpf.h123 static inline size_t set_bpf_instr(struct sock_filter *instr, in set_bpf_instr()
166 struct sock_filter *filter, size_t count);
171 size_t bpf_load_arg(struct sock_filter *filter, int argidx);
172 size_t bpf_comp_jeq(struct sock_filter *filter, unsigned long c,
174 size_t bpf_comp_jset(struct sock_filter *filter, unsigned long mask,
181 size_t bpf_arg_comp(struct sock_filter **pfilter,
183 size_t bpf_validate_arch(struct sock_filter *filter);
184 size_t bpf_allow_syscall(struct sock_filter *filter, int nr);
185 size_t bpf_allow_syscall_args(struct sock_filter *filter,
190 void dump_bpf_filter(struct sock_filter *filter, unsigned short len);
Dsyscall_filter.h18 struct sock_filter *instrs;
33 int flatten_block_list(struct filter_block *head, struct sock_filter *filter,
Dsyscall_filter_unittest.c106 struct sock_filter instr; in TEST_F()
118 struct sock_filter load_arg[BPF_LOAD_ARG_LEN]; in TEST_F()
135 struct sock_filter comp_jeq[BPF_COMP_LEN]; in TEST_F()
157 struct sock_filter comp_jset[BPF_COMP_LEN]; in TEST_F()
179 struct sock_filter *arg_comp; in TEST_F()
214 struct sock_filter validate_arch[ARCH_VALIDATION_LEN]; in TEST_F()
223 struct sock_filter allow_syscall[ALLOW_SYSCALL_LEN]; in TEST_F()
233 struct sock_filter allow_syscall[ALLOW_SYSCALL_LEN]; in TEST_F()
/external/libchrome/sandbox/linux/bpf_dsl/
Dverifier.cc22 State(const std::vector<struct sock_filter>& p, in State()
25 const std::vector<struct sock_filter>& program;
35 void Ld(State* state, const struct sock_filter& insn, const char** err) { in Ld()
53 void Jmp(State* state, const struct sock_filter& insn, const char** err) { in Jmp()
103 uint32_t Ret(State*, const struct sock_filter& insn, const char** err) { in Ret()
111 void Alu(State* state, const struct sock_filter& insn, const char** err) { in Alu()
176 uint32_t Verifier::EvaluateBPF(const std::vector<struct sock_filter>& program, in EvaluateBPF()
189 const struct sock_filter& insn = program[state.ip]; in EvaluateBPF()
Dverifier.h15 struct sock_filter;
34 static uint32_t EvaluateBPF(const std::vector<struct sock_filter>& program,
Dcodegen.h18 struct sock_filter;
56 typedef std::vector<struct sock_filter> Program;
Ddump_bpf.cc81 void AppendInstruction(std::string* dst, size_t pc, const sock_filter& insn) { in AppendInstruction()
Dcodegen.cc136 program_.push_back(sock_filter{ in Append()
/external/autotest/client/site_tests/security_SeccompSyscallFilters/src/
Dseccomp_bpf_tests.c130 struct sock_filter filter[] = { in TEST()
154 struct sock_filter filter[] = { in TEST()
175 struct sock_filter filter[] = { in TEST()
191 struct sock_filter filter[] = { in TEST()
207 struct sock_filter filter[] = { in TEST_SIGNAL()
227 struct sock_filter filter[] = { in TEST_SIGNAL()
246 struct sock_filter filter[] = { in TEST_SIGNAL()
262 struct sock_filter filter[] = { in TEST_SIGNAL()
286 struct sock_filter filter[] = { in TEST_SIGNAL()
316 struct sock_filter filter[] = { in TEST_SIGNAL()
[all …]
Dsigsegv.c67 struct sock_filter filter[] = { in FIXTURE_SETUP()
Dresumption.c91 struct sock_filter filter[] = { in FIXTURE_SETUP()
/external/wpa_supplicant_8/src/l2_packet/
Dl2_packet_linux.c46 static struct sock_filter dhcp_sock_filter_insns[] = {
71 static struct sock_filter ndisc_sock_filter_insns[] = {
321 struct sock_filter ethertype_sock_filter_insns[] = { in l2_packet_init_bridge()
459 const struct sock_fprog *sock_filter; in l2_packet_set_packet_filter() local
463 sock_filter = &dhcp_sock_filter; in l2_packet_set_packet_filter()
466 sock_filter = &ndisc_sock_filter; in l2_packet_set_packet_filter()
473 sock_filter, sizeof(struct sock_fprog))) { in l2_packet_set_packet_filter()
/external/iproute2/include/linux/
Dfilter.h23 struct sock_filter { /* Filter block */ struct
32 struct sock_filter *filter; argument
/external/kernel-headers/original/uapi/linux/
Dfilter.h23 struct sock_filter { /* Filter block */ struct
32 struct sock_filter __user *filter; argument
/external/libchrome/sandbox/linux/system_headers/
Dlinux_filter.h12 struct sock_filter { struct
21 struct sock_filter *filter; argument
/external/strace/tests/
Dseccomp.c77 static const struct sock_filter filter[] = {
96 .filter = (struct sock_filter *) filter,
/external/tlsdate/src/
Dseccomp.c75 static const struct sock_filter insns[] = in enable_setter_seccomp()
148 .filter = (struct sock_filter *) insns, in enable_setter_seccomp()
/external/iptables/include/linux/netfilter/
Dxt_bpf.h11 struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR];
/external/kernel-headers/original/uapi/linux/netfilter/
Dxt_bpf.h13 struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR];
/external/compiler-rt/test/asan/TestCases/Linux/
Dread_binary_name_regtest.c32 struct sock_filter filter[] = { in main()
/external/wpa_supplicant_8/src/drivers/
Ddriver_nl80211_monitor.c175 static struct sock_filter msock_filter_insns[] = {
287 struct sock_filter *insn = &msock_filter_insns[idx]; in add_monitor_filter()
/external/libchrome/sandbox/linux/seccomp-bpf/
Dsandbox_bpf.cc246 struct sock_filter bpf[program.size()]; in InstallFilter()
/external/iproute2/tc/
Dtc_bpf.c144 static int bpf_ops_parse(int argc, char **argv, struct sock_filter *bpf_ops, in bpf_ops_parse()
198 struct sock_filter *ops = (struct sock_filter *) RTA_DATA(bpf_ops); in bpf_print_ops()
478 const char **ptr_uds_name, struct sock_filter *opcodes) in bpf_parse()
583 struct sock_filter opcodes[BPF_MAXINSNS]; in bpf_parse_common()
603 ret * sizeof(struct sock_filter)); in bpf_parse_common()

12