/external/dhcpcd/ |
D | bpf-filter.h | 37 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ETHERTYPE_ARP, 0, 3), 41 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ARPOP_REQUEST, 2, 0), 44 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ARPOP_REPLY, 0, 1), 46 BPF_STMT(BPF_RET + BPF_K, BPF_WHOLEPACKET), 48 BPF_STMT(BPF_RET + BPF_K, 0), 82 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ETHERTYPE_IP, 0, 8), 86 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, IPPROTO_UDP, 0, 6), 89 BPF_JUMP(BPF_JMP + BPF_JSET + BPF_K, 0x1fff, 4, 0), 94 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, DHCP_CLIENT_PORT, 0, 1), 96 BPF_STMT(BPF_RET + BPF_K, BPF_WHOLEPACKET), [all …]
|
/external/libpcap/ |
D | bpf_image.c | 73 case BPF_RET|BPF_K: 159 case BPF_JMP|BPF_JGT|BPF_K: 164 case BPF_JMP|BPF_JGE|BPF_K: 169 case BPF_JMP|BPF_JEQ|BPF_K: 174 case BPF_JMP|BPF_JSET|BPF_K: 239 case BPF_ALU|BPF_ADD|BPF_K: 244 case BPF_ALU|BPF_SUB|BPF_K: 249 case BPF_ALU|BPF_MUL|BPF_K: 254 case BPF_ALU|BPF_DIV|BPF_K: 259 case BPF_ALU|BPF_AND|BPF_K: [all …]
|
D | bpf_filter.c | 250 case BPF_RET|BPF_K: 422 case BPF_JMP|BPF_JGT|BPF_K: 426 case BPF_JMP|BPF_JGE|BPF_K: 430 case BPF_JMP|BPF_JEQ|BPF_K: 434 case BPF_JMP|BPF_JSET|BPF_K: 488 case BPF_ALU|BPF_ADD|BPF_K: 492 case BPF_ALU|BPF_SUB|BPF_K: 496 case BPF_ALU|BPF_MUL|BPF_K: 500 case BPF_ALU|BPF_DIV|BPF_K: 504 case BPF_ALU|BPF_AND|BPF_K: [all …]
|
D | optimize.c | 790 if (b->s.code == (BPF_JMP|BPF_JEQ|BPF_K) && in opt_peep() 832 else if (last->s.code == (BPF_ALU|BPF_SUB|BPF_K)) { in opt_peep() 844 else if (last->s.code == (BPF_ALU|BPF_AND|BPF_K) && in opt_peep() 847 b->s.code = BPF_JMP|BPF_K|BPF_JSET; in opt_peep() 857 if (b->s.code == (BPF_JMP|BPF_K|BPF_JSET)) { in opt_peep() 879 if (vmap[val].is_const && BPF_SRC(b->s.code) == BPF_K) { in opt_peep() 977 case BPF_ALU|BPF_ADD|BPF_K: in opt_stmt() 978 case BPF_ALU|BPF_SUB|BPF_K: in opt_stmt() 979 case BPF_ALU|BPF_MUL|BPF_K: in opt_stmt() 980 case BPF_ALU|BPF_DIV|BPF_K: in opt_stmt() [all …]
|
D | gencode.c | 130 #define JMP(c) ((c)|BPF_JMP|BPF_K) 386 struct block *b = new_block(BPF_RET|BPF_K); 482 (root->s.code == (BPF_RET|BPF_K) && root->s.k == 0)) in pcap_compile_unsafe() 753 s2 = new_stmt(BPF_ALU|BPF_AND|BPF_K); 1662 s2 = new_stmt(BPF_ALU|BPF_AND|BPF_K); in gen_loadx_iphdrlen() 1665 s2 = new_stmt(BPF_ALU|BPF_LSH|BPF_K); in gen_loadx_iphdrlen() 2138 s2 = new_stmt(BPF_ALU|BPF_AND|BPF_K); in gen_load_prism_llprefixlen() 2271 s2 = new_stmt(BPF_ALU|BPF_LSH|BPF_K); in gen_load_radiotap_llprefixlen() 2339 s2 = new_stmt(BPF_ALU|BPF_LSH|BPF_K); in gen_load_ppi_llprefixlen() 2441 s2 = new_stmt(BPF_ALU|BPF_ADD|BPF_K); in gen_load_802_11_header_len() [all …]
|
D | pcap-linux.c | 401 = BPF_STMT(BPF_RET | BPF_K, 0); 5879 if (BPF_MODE(p->code) == BPF_K) {
|
D | pcap-bpf.c | 2206 total_insn.code = (u_short)(BPF_RET | BPF_K);
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_nl80211_monitor.c | 186 BPF_STMT(BPF_ALU | BPF_LSH | BPF_K, 8), 199 BPF_STMT(BPF_ALU | BPF_AND | BPF_K, 0xF), 201 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0, PASS, 0), 214 BPF_STMT(BPF_ALU | BPF_AND | BPF_K, 0x0F03), 217 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x0801, PASS, 0), 226 BPF_STMT(BPF_ALU | BPF_AND | BPF_K, 0x0c), 228 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 8, 0, FAIL), 233 BPF_STMT(BPF_ALU | BPF_AND | BPF_K, 0x03), 235 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 3, PASS, 0), 243 BPF_STMT(BPF_ALU | BPF_AND | BPF_K, 0x80), [all …]
|
/external/libpcap/bpf/net/ |
D | bpf_filter.c | 250 case BPF_RET|BPF_K: 422 case BPF_JMP|BPF_JGT|BPF_K: 426 case BPF_JMP|BPF_JGE|BPF_K: 430 case BPF_JMP|BPF_JEQ|BPF_K: 434 case BPF_JMP|BPF_JSET|BPF_K: 488 case BPF_ALU|BPF_ADD|BPF_K: 492 case BPF_ALU|BPF_SUB|BPF_K: 496 case BPF_ALU|BPF_MUL|BPF_K: 500 case BPF_ALU|BPF_DIV|BPF_K: 504 case BPF_ALU|BPF_AND|BPF_K: [all …]
|
/external/strace/tests/ |
D | seccomp.c | 30 BPF_JUMP(BPF_JMP | BPF_K | BPF_JEQ, __NR_ ## nr, 0, 1), \ 31 BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_ALLOW) 34 BPF_JUMP(BPF_JMP | BPF_K | BPF_JEQ, __NR_ ## nr, 0, 1), \ 35 BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_ERRNO | (SECCOMP_RET_DATA & (err))) 38 BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_KILL)
|
/external/openssh/ |
D | sandbox-seccomp-filter.c | 77 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_ ## _nr, 0, 1), \ 78 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ERRNO|(_errno)) 80 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_ ## _nr, 0, 1), \ 81 BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW) 88 BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, SECCOMP_AUDIT_ARCH, 1, 0), 89 BPF_STMT(BPF_RET+BPF_K, SECCOMP_FILTER_FAIL), 132 BPF_STMT(BPF_RET+BPF_K, SECCOMP_FILTER_FAIL),
|
/external/strace/xlat/ |
D | bpf_src.h | 4 #if defined(BPF_K) || (defined(HAVE_DECL_BPF_K) && HAVE_DECL_BPF_K) 5 XLAT(BPF_K),
|
D | bpf_rval.h | 4 #if defined(BPF_K) || (defined(HAVE_DECL_BPF_K) && HAVE_DECL_BPF_K) 5 XLAT(BPF_K),
|
D | bpf_src.in | 1 BPF_K
|
D | bpf_rval.in | 1 BPF_K
|
/external/android-clat/ |
D | clatd.c | 94 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, htonl(ipv6[0]), 0, 7), in configure_packet_socket() 96 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, htonl(ipv6[1]), 0, 5), in configure_packet_socket() 98 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, htonl(ipv6[2]), 0, 3), in configure_packet_socket() 100 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, htonl(ipv6[3]), 0, 1), in configure_packet_socket() 101 BPF_STMT(BPF_RET | BPF_K, PACKETLEN), in configure_packet_socket() 102 BPF_STMT(BPF_RET | BPF_K, 0) in configure_packet_socket()
|
/external/kernel-headers/original/uapi/linux/ |
D | bpf_common.h | 48 #define BPF_K 0x00 macro
|
/external/wpa_supplicant_8/src/l2_packet/ |
D | l2_packet_linux.c | 296 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, protocol, 0, 1), in l2_packet_init_bridge() 298 BPF_STMT(BPF_RET | BPF_K, ~0), in l2_packet_init_bridge() 300 BPF_STMT(BPF_RET | BPF_K, 0) in l2_packet_init_bridge()
|
/external/iputils/ |
D | ping.c | 1378 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 0xAAAA, 0, 1), /* Ours? */ in install_filter() 1379 BPF_STMT(BPF_RET|BPF_K, ~0U), /* Yes, it passes. */ in install_filter() 1381 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, ICMP_ECHOREPLY, 1, 0), /* Echo? */ in install_filter() 1382 BPF_STMT(BPF_RET|BPF_K, 0xFFFFFFF), /* No. It passes. */ in install_filter() 1383 BPF_STMT(BPF_RET|BPF_K, 0) /* Echo with wrong ident. Reject. */ in install_filter() 1395 insns[2] = (struct sock_filter)BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, htons(ident), 0, 1); in install_filter()
|
D | ping6.c | 1781 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 0xAAAA, 0, 1), /* Ours? */ in install_filter() 1782 BPF_STMT(BPF_RET|BPF_K, ~0U), /* Yes, it passes. */ in install_filter() 1784 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, ICMP6_ECHO_REPLY, 1, 0), /* Echo? */ in install_filter() 1785 BPF_STMT(BPF_RET|BPF_K, ~0U), /* No. It passes. This must not happen. */ in install_filter() 1786 BPF_STMT(BPF_RET|BPF_K, 0), /* Echo with wrong ident. Reject. */ in install_filter() 1798 insns[1] = (struct sock_filter)BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, htons(ident), 0, 1); in install_filter()
|
D | rarpd.c | 335 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, ARPOP_RREQUEST, 0, 1), in load_arp_bpflet() 336 BPF_STMT(BPF_RET|BPF_K, 1024), in load_arp_bpflet() 337 BPF_STMT(BPF_RET|BPF_K, 0), in load_arp_bpflet()
|
/external/libpcap/pcap/ |
D | bpf.h | 1293 #define BPF_K 0x00 macro
|
/external/toybox/toys/pending/ |
D | dhcp.c | 244 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, IPPROTO_UDP, 0, 6), 246 BPF_JUMP(BPF_JMP|BPF_JSET|BPF_K, 0x1fff, 4, 0), 248 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 68, 0, 1), 249 BPF_STMT(BPF_RET|BPF_K, 0xffffffff), BPF_STMT(BPF_RET|BPF_K, 0),
|
/external/llvm/lib/Target/BPF/ |
D | BPFInstrInfo.td | 231 let BPFSrc = 0; // BPF_K
|