/external/minijail/ |
D | bpf.c | 15 size_t bpf_validate_arch(struct sock_filter *filter) in bpf_validate_arch() 17 struct sock_filter *curr_block = filter; in bpf_validate_arch() 26 size_t bpf_allow_syscall(struct sock_filter *filter, int nr) in bpf_allow_syscall() 28 struct sock_filter *curr_block = filter; in bpf_allow_syscall() 34 size_t bpf_allow_syscall_args(struct sock_filter *filter, int nr, in bpf_allow_syscall_args() 37 struct sock_filter *curr_block = filter; in bpf_allow_syscall_args() 45 size_t bpf_load_arg(struct sock_filter *filter, int argidx) in bpf_load_arg() 51 size_t bpf_load_arg(struct sock_filter *filter, int argidx) in bpf_load_arg() 53 struct sock_filter *curr_block = filter; in bpf_load_arg() 63 size_t bpf_comp_jeq32(struct sock_filter *filter, unsigned long c, in bpf_comp_jeq32() [all …]
|
D | bpf.h | 128 static inline size_t set_bpf_instr(struct sock_filter *instr, in set_bpf_instr() 171 struct sock_filter *filter, size_t count); 176 size_t bpf_load_arg(struct sock_filter *filter, int argidx); 177 size_t bpf_comp_jeq(struct sock_filter *filter, unsigned long c, 179 size_t bpf_comp_jset(struct sock_filter *filter, unsigned long mask, 181 size_t bpf_comp_jin(struct sock_filter *filter, unsigned long mask, 188 size_t bpf_arg_comp(struct sock_filter **pfilter, 190 size_t bpf_validate_arch(struct sock_filter *filter); 191 size_t bpf_allow_syscall(struct sock_filter *filter, int nr); 192 size_t bpf_allow_syscall_args(struct sock_filter *filter, [all …]
|
D | syscall_filter.c | 44 struct sock_filter *new_instr_buf(size_t count) in new_instr_buf() 46 struct sock_filter *buf = calloc(count, sizeof(struct sock_filter)); in new_instr_buf() 65 void append_filter_block(struct filter_block *head, struct sock_filter *instrs, in append_filter_block() 107 struct sock_filter *filter = new_instr_buf(ONE_INSTR); in append_ret_kill() 114 struct sock_filter *filter = new_instr_buf(ONE_INSTR); in append_ret_trap() 121 struct sock_filter *filter = new_instr_buf(ONE_INSTR); in append_ret_errno() 128 struct sock_filter *filter = new_instr_buf(ALLOW_SYSCALL_LEN); in append_allow_syscall() 246 struct sock_filter *comp_block; in compile_atom() 350 struct sock_filter *entry_label = new_instr_buf(ONE_INSTR); in compile_policy_line() 392 struct sock_filter *group_end_block = new_instr_buf(TWO_INSTRS); in compile_policy_line() [all …]
|
D | syscall_filter.h | 19 struct sock_filter *instrs; 41 int flatten_block_list(struct filter_block *head, struct sock_filter *filter,
|
D | syscall_filter_unittest.cc | 95 struct sock_filter instr; in TEST() 107 struct sock_filter load_arg[BPF_LOAD_ARG_LEN]; in TEST() 124 struct sock_filter comp_jeq[BPF_COMP_LEN]; in TEST() 143 struct sock_filter comp_jset[BPF_COMP_LEN]; in TEST() 163 struct sock_filter comp_jin[BPF_COMP_LEN]; in TEST() 183 struct sock_filter *arg_comp; in TEST() 212 struct sock_filter validate_arch[ARCH_VALIDATION_LEN]; in TEST() 221 struct sock_filter allow_syscall[ALLOW_SYSCALL_LEN]; in TEST() 231 struct sock_filter allow_syscall[ALLOW_SYSCALL_LEN]; in TEST() 256 struct sock_filter test_label[1]; in TEST_F() [all …]
|
/external/libnetfilter_conntrack/src/conntrack/ |
D | bsf.c | 74 static void show_filter(struct sock_filter *this, int from, int to, char *str) 102 show_filter(struct sock_filter *this, int from, int to, char *str) {} in show_filter() 105 #define NEW_POS(x) (sizeof(x)/sizeof(struct sock_filter)) 108 nfct_bsf_load_payload_offset(struct sock_filter *this, int pos) in nfct_bsf_load_payload_offset() 110 struct sock_filter __code = { in nfct_bsf_load_payload_offset() 119 nfct_bsf_find_attr(struct sock_filter *this, int attr, int pos) in nfct_bsf_find_attr() 121 struct sock_filter __code[] = { in nfct_bsf_find_attr() 139 nfct_bsf_find_attr_nest(struct sock_filter *this, int attr, int pos) in nfct_bsf_find_attr_nest() 141 struct sock_filter __code[] = { in nfct_bsf_find_attr_nest() 164 nfct_bsf_cmp_k_stack(struct sock_filter *this, int k, in nfct_bsf_cmp_k_stack() [all …]
|
/external/libchrome/sandbox/linux/bpf_dsl/ |
D | verifier.cc | 22 State(const std::vector<struct sock_filter>& p, in State() 25 const std::vector<struct sock_filter>& program; 35 void Ld(State* state, const struct sock_filter& insn, const char** err) { in Ld() 53 void Jmp(State* state, const struct sock_filter& insn, const char** err) { in Jmp() 103 uint32_t Ret(State*, const struct sock_filter& insn, const char** err) { in Ret() 111 void Alu(State* state, const struct sock_filter& insn, const char** err) { in Alu() 176 uint32_t Verifier::EvaluateBPF(const std::vector<struct sock_filter>& program, in EvaluateBPF() 189 const struct sock_filter& insn = program[state.ip]; in EvaluateBPF()
|
D | verifier.h | 15 struct sock_filter; 34 static uint32_t EvaluateBPF(const std::vector<struct sock_filter>& program,
|
D | codegen.h | 18 struct sock_filter; 56 typedef std::vector<struct sock_filter> Program;
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
D | xt_bpf.h | 9 #define XT_BPF_PATH_MAX (XT_BPF_MAX_NUM_INSTR * sizeof(struct sock_filter)) 15 struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR]; 32 struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR];
|
/external/iptables/include/linux/netfilter/ |
D | xt_bpf.h | 9 #define XT_BPF_PATH_MAX (XT_BPF_MAX_NUM_INSTR * sizeof(struct sock_filter)) 15 struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR]; 32 struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR];
|
/external/autotest/client/site_tests/security_SeccompSyscallFilters/src/ |
D | seccomp_bpf_tests.c | 130 struct sock_filter filter[] = { in TEST() 154 struct sock_filter filter[] = { in TEST() 175 struct sock_filter filter[] = { in TEST() 191 struct sock_filter filter[] = { in TEST() 207 struct sock_filter filter[] = { in TEST_SIGNAL() 227 struct sock_filter filter[] = { in TEST_SIGNAL() 246 struct sock_filter filter[] = { in TEST_SIGNAL() 262 struct sock_filter filter[] = { in TEST_SIGNAL() 286 struct sock_filter filter[] = { in TEST_SIGNAL() 316 struct sock_filter filter[] = { in TEST_SIGNAL() [all …]
|
/external/linux-kselftest/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 157 struct sock_filter filter[] = { in TEST() 188 struct sock_filter allow[] = { in TEST() 191 struct sock_filter *filter; in TEST() 225 struct sock_filter allow[] = { in TEST() 228 struct sock_filter *filter; in TEST() 263 struct sock_filter filter[] = { in TEST() 286 struct sock_filter filter[] = { in TEST() 311 struct sock_filter filter[] = { in TEST() 329 struct sock_filter filter[] = { in TEST() 347 struct sock_filter filter[] = { in TEST_SIGNAL() [all …]
|
/external/seccomp-tests/linux/ |
D | seccomp_bpf.c | 157 struct sock_filter filter[] = { in TEST() 188 struct sock_filter allow[] = { in TEST() 191 struct sock_filter *filter; in TEST() 225 struct sock_filter allow[] = { in TEST() 228 struct sock_filter *filter; in TEST() 263 struct sock_filter filter[] = { in TEST() 286 struct sock_filter filter[] = { in TEST() 311 struct sock_filter filter[] = { in TEST() 329 struct sock_filter filter[] = { in TEST() 347 struct sock_filter filter[] = { in TEST_SIGNAL() [all …]
|
/external/strace/tests-mx32/ |
D | seccomp-filter-v.c | 76 static const struct sock_filter filter_c[] = { 104 struct sock_filter *const filter = in main() 106 struct sock_filter *const big_filter = in main() 136 const struct sock_filter stmt = in main()
|
D | prctl-seccomp-filter-v.c | 76 static const struct sock_filter filter[] = { 95 .filter = (struct sock_filter *) filter,
|
/external/strace/tests-m32/ |
D | seccomp-filter-v.c | 76 static const struct sock_filter filter_c[] = { 104 struct sock_filter *const filter = in main() 106 struct sock_filter *const big_filter = in main() 136 const struct sock_filter stmt = in main()
|
D | prctl-seccomp-filter-v.c | 76 static const struct sock_filter filter[] = { 95 .filter = (struct sock_filter *) filter,
|
/external/strace/tests/ |
D | seccomp-filter-v.c | 76 static const struct sock_filter filter_c[] = { 104 struct sock_filter *const filter = in main() 106 struct sock_filter *const big_filter = in main() 136 const struct sock_filter stmt = in main()
|
D | prctl-seccomp-filter-v.c | 76 static const struct sock_filter filter[] = { 95 .filter = (struct sock_filter *) filter,
|
/external/wpa_supplicant_8/src/l2_packet/ |
D | l2_packet_linux.c | 46 static struct sock_filter dhcp_sock_filter_insns[] = { 71 static struct sock_filter ndisc_sock_filter_insns[] = { 321 struct sock_filter ethertype_sock_filter_insns[] = { in l2_packet_init_bridge() 459 const struct sock_fprog *sock_filter; in l2_packet_set_packet_filter() local 463 sock_filter = &dhcp_sock_filter; in l2_packet_set_packet_filter() 466 sock_filter = &ndisc_sock_filter; in l2_packet_set_packet_filter() 473 sock_filter, sizeof(struct sock_fprog))) { in l2_packet_set_packet_filter()
|
/external/iproute2/include/linux/ |
D | filter.h | 23 struct sock_filter { /* Filter block */ struct 32 struct sock_filter *filter; argument
|
/external/kernel-headers/original/uapi/linux/ |
D | filter.h | 23 struct sock_filter { /* Filter block */ struct 32 struct sock_filter __user *filter; argument
|
/external/libchrome/sandbox/linux/system_headers/ |
D | linux_filter.h | 12 struct sock_filter { struct 21 struct sock_filter *filter; argument
|
/external/iptables/include/linux/ |
D | filter.h | 23 struct sock_filter { /* Filter block */ struct 32 struct sock_filter *filter; argument
|