/external/minijail/ |
D | bpf.c | 14 size_t bpf_validate_arch(struct sock_filter *filter) in bpf_validate_arch() 16 struct sock_filter *curr_block = filter; in bpf_validate_arch() 25 size_t bpf_allow_syscall(struct sock_filter *filter, int nr) in bpf_allow_syscall() 27 struct sock_filter *curr_block = filter; in bpf_allow_syscall() 33 size_t bpf_allow_syscall_args(struct sock_filter *filter, in bpf_allow_syscall_args() 36 struct sock_filter *curr_block = filter; in bpf_allow_syscall_args() 44 size_t bpf_load_arg(struct sock_filter *filter, int argidx) in bpf_load_arg() 50 size_t bpf_load_arg(struct sock_filter *filter, int argidx) in bpf_load_arg() 52 struct sock_filter *curr_block = filter; in bpf_load_arg() 62 size_t bpf_comp_jeq32(struct sock_filter *filter, unsigned long c, in bpf_comp_jeq32() [all …]
|
D | syscall_filter.c | 33 struct sock_filter *new_instr_buf(size_t count) in new_instr_buf() 35 struct sock_filter *buf = calloc(count, sizeof(struct sock_filter)); in new_instr_buf() 55 struct sock_filter *instrs, size_t len) in append_filter_block() 96 struct sock_filter *filter = new_instr_buf(ONE_INSTR); in append_ret_kill() 103 struct sock_filter *filter = new_instr_buf(ONE_INSTR); in append_ret_trap() 110 struct sock_filter *filter = new_instr_buf(ONE_INSTR); in append_ret_errno() 117 struct sock_filter *filter = new_instr_buf(ALLOW_SYSCALL_LEN); in append_allow_syscall() 205 struct sock_filter *comp_block; in compile_atom() 296 struct sock_filter *entry_label = new_instr_buf(ONE_INSTR); in compile_section() 332 struct sock_filter *group_end_block = new_instr_buf(TWO_INSTRS); in compile_section() [all …]
|
D | bpf.h | 123 static inline size_t set_bpf_instr(struct sock_filter *instr, in set_bpf_instr() 166 struct sock_filter *filter, size_t count); 171 size_t bpf_load_arg(struct sock_filter *filter, int argidx); 172 size_t bpf_comp_jeq(struct sock_filter *filter, unsigned long c, 174 size_t bpf_comp_jset(struct sock_filter *filter, unsigned long mask, 181 size_t bpf_arg_comp(struct sock_filter **pfilter, 183 size_t bpf_validate_arch(struct sock_filter *filter); 184 size_t bpf_allow_syscall(struct sock_filter *filter, int nr); 185 size_t bpf_allow_syscall_args(struct sock_filter *filter, 190 void dump_bpf_filter(struct sock_filter *filter, unsigned short len);
|
D | syscall_filter.h | 18 struct sock_filter *instrs; 33 int flatten_block_list(struct filter_block *head, struct sock_filter *filter,
|
D | syscall_filter_unittest.c | 106 struct sock_filter instr; in TEST_F() 118 struct sock_filter load_arg[BPF_LOAD_ARG_LEN]; in TEST_F() 135 struct sock_filter comp_jeq[BPF_COMP_LEN]; in TEST_F() 157 struct sock_filter comp_jset[BPF_COMP_LEN]; in TEST_F() 179 struct sock_filter *arg_comp; in TEST_F() 214 struct sock_filter validate_arch[ARCH_VALIDATION_LEN]; in TEST_F() 223 struct sock_filter allow_syscall[ALLOW_SYSCALL_LEN]; in TEST_F() 233 struct sock_filter allow_syscall[ALLOW_SYSCALL_LEN]; in TEST_F()
|
/external/libchrome/sandbox/linux/bpf_dsl/ |
D | verifier.cc | 22 State(const std::vector<struct sock_filter>& p, in State() 25 const std::vector<struct sock_filter>& program; 35 void Ld(State* state, const struct sock_filter& insn, const char** err) { in Ld() 53 void Jmp(State* state, const struct sock_filter& insn, const char** err) { in Jmp() 103 uint32_t Ret(State*, const struct sock_filter& insn, const char** err) { in Ret() 111 void Alu(State* state, const struct sock_filter& insn, const char** err) { in Alu() 176 uint32_t Verifier::EvaluateBPF(const std::vector<struct sock_filter>& program, in EvaluateBPF() 189 const struct sock_filter& insn = program[state.ip]; in EvaluateBPF()
|
D | verifier.h | 15 struct sock_filter; 34 static uint32_t EvaluateBPF(const std::vector<struct sock_filter>& program,
|
D | codegen.h | 18 struct sock_filter; 56 typedef std::vector<struct sock_filter> Program;
|
D | dump_bpf.cc | 81 void AppendInstruction(std::string* dst, size_t pc, const sock_filter& insn) { in AppendInstruction()
|
D | codegen.cc | 136 program_.push_back(sock_filter{ in Append()
|
/external/autotest/client/site_tests/security_SeccompSyscallFilters/src/ |
D | seccomp_bpf_tests.c | 130 struct sock_filter filter[] = { in TEST() 154 struct sock_filter filter[] = { in TEST() 175 struct sock_filter filter[] = { in TEST() 191 struct sock_filter filter[] = { in TEST() 207 struct sock_filter filter[] = { in TEST_SIGNAL() 227 struct sock_filter filter[] = { in TEST_SIGNAL() 246 struct sock_filter filter[] = { in TEST_SIGNAL() 262 struct sock_filter filter[] = { in TEST_SIGNAL() 286 struct sock_filter filter[] = { in TEST_SIGNAL() 316 struct sock_filter filter[] = { in TEST_SIGNAL() [all …]
|
D | sigsegv.c | 67 struct sock_filter filter[] = { in FIXTURE_SETUP()
|
D | resumption.c | 91 struct sock_filter filter[] = { in FIXTURE_SETUP()
|
/external/wpa_supplicant_8/src/l2_packet/ |
D | l2_packet_linux.c | 46 static struct sock_filter dhcp_sock_filter_insns[] = { 71 static struct sock_filter ndisc_sock_filter_insns[] = { 321 struct sock_filter ethertype_sock_filter_insns[] = { in l2_packet_init_bridge() 459 const struct sock_fprog *sock_filter; in l2_packet_set_packet_filter() local 463 sock_filter = &dhcp_sock_filter; in l2_packet_set_packet_filter() 466 sock_filter = &ndisc_sock_filter; in l2_packet_set_packet_filter() 473 sock_filter, sizeof(struct sock_fprog))) { in l2_packet_set_packet_filter()
|
/external/iproute2/include/linux/ |
D | filter.h | 23 struct sock_filter { /* Filter block */ struct 32 struct sock_filter *filter; argument
|
/external/kernel-headers/original/uapi/linux/ |
D | filter.h | 23 struct sock_filter { /* Filter block */ struct 32 struct sock_filter __user *filter; argument
|
/external/libchrome/sandbox/linux/system_headers/ |
D | linux_filter.h | 12 struct sock_filter { struct 21 struct sock_filter *filter; argument
|
/external/strace/tests/ |
D | seccomp.c | 77 static const struct sock_filter filter[] = { 96 .filter = (struct sock_filter *) filter,
|
/external/tlsdate/src/ |
D | seccomp.c | 75 static const struct sock_filter insns[] = in enable_setter_seccomp() 148 .filter = (struct sock_filter *) insns, in enable_setter_seccomp()
|
/external/iptables/include/linux/netfilter/ |
D | xt_bpf.h | 11 struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR];
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
D | xt_bpf.h | 13 struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR];
|
/external/compiler-rt/test/asan/TestCases/Linux/ |
D | read_binary_name_regtest.c | 32 struct sock_filter filter[] = { in main()
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_nl80211_monitor.c | 175 static struct sock_filter msock_filter_insns[] = { 287 struct sock_filter *insn = &msock_filter_insns[idx]; in add_monitor_filter()
|
/external/libchrome/sandbox/linux/seccomp-bpf/ |
D | sandbox_bpf.cc | 246 struct sock_filter bpf[program.size()]; in InstallFilter()
|
/external/iproute2/tc/ |
D | tc_bpf.c | 144 static int bpf_ops_parse(int argc, char **argv, struct sock_filter *bpf_ops, in bpf_ops_parse() 198 struct sock_filter *ops = (struct sock_filter *) RTA_DATA(bpf_ops); in bpf_print_ops() 478 const char **ptr_uds_name, struct sock_filter *opcodes) in bpf_parse() 583 struct sock_filter opcodes[BPF_MAXINSNS]; in bpf_parse_common() 603 ret * sizeof(struct sock_filter)); in bpf_parse_common()
|