/systemd-251/src/libsystemd-network/ |
D | arp-util.c | 20 …BPF_JUMP(BPF_JMP + BPF_JGE + BPF_K, sizeof(struct ether_arp), 1, 0), /* packet >= arp pa… in arp_update_filter() 23 …BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ARPHRD_ETHER, 1, 0), /* header == ethern… in arp_update_filter() 26 …BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ETHERTYPE_IP, 1, 0), /* protocol == IP ?… in arp_update_filter() 29 …BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, sizeof(struct ether_addr), 1, 0), /* length == sizeof… in arp_update_filter() 32 …BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, sizeof(struct in_addr), 1, 0), /* length == sizeof… in arp_update_filter() 35 …BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ARPOP_REQUEST, 2, 0), /* protocol == requ… in arp_update_filter() 36 …BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ARPOP_REPLY, 1, 0), /* protocol == repl… in arp_update_filter() 41 … BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_X, 0, 0, 4), /* A == X ? */ in arp_update_filter() 44 … BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_X, 0, 0, 1), /* A == X ? */ in arp_update_filter() 49 … BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_X, 0, 0, 1), /* A == X ? */ in arp_update_filter() [all …]
|
D | dhcp-network.c | 30 …BPF_JUMP(BPF_JMP + BPF_JGE + BPF_K, sizeof(DHCPPacket), 1, 0), /* packet >= DHCPPacket ? */ in _bind_raw_socket() 33 … BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, IPPROTO_UDP, 1, 0), /* IP protocol == UDP ? */ in _bind_raw_socket() 37 … BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, 0, 1, 0), /* A == 0 ? */ in _bind_raw_socket() 41 … BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, 0, 1, 0), /* A == 0 ? */ in _bind_raw_socket() 44 …BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, port, 1, 0), /* UDP destination port == … in _bind_raw_socket() 47 … BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, BOOTREPLY, 1, 0), /* op == BOOTREPLY ? */ in _bind_raw_socket() 50 …BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, arp_type, 1, 0), /* header type == arp_type … in _bind_raw_socket() 53 …BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, xid, 1, 0), /* client identifier == xid… in _bind_raw_socket() 56 …BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, dhcp_hlen, 1, 0), /* address length == dhcp_h… in _bind_raw_socket() 61 …BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ETH_ALEN, 0, 8), /* A (the M… in _bind_raw_socket() [all …]
|
D | lldp-network.c | 14 … BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, 0x0180c200, 1, 0), /* A != 01:80:c2:00 */ in lldp_network_bind_raw_socket() 17 … BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, 0x0000, 3, 0), /* A != 00:00 */ in lldp_network_bind_raw_socket() 18 … BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, 0x0003, 2, 0), /* A != 00:03 */ in lldp_network_bind_raw_socket() 19 … BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, 0x000e, 1, 0), /* A != 00:0e */ in lldp_network_bind_raw_socket() 22 …BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ETHERTYPE_LLDP, 1, 0), /* A != ETHERTYPE_LLDP */ in lldp_network_bind_raw_socket()
|
/systemd-251/src/shared/linux/ |
D | bpf_insn.h | 177 .code = BPF_JMP | BPF_OP(OP) | BPF_X, \ 197 .code = BPF_JMP | BPF_OP(OP) | BPF_K, \ 215 .code = BPF_JMP | BPF_JA, \ 235 .code = BPF_JMP | BPF_EXIT, \
|
D | bpf_common.h | 12 #define BPF_JMP 0x05 macro
|
/systemd-251/src/libsystemd/sd-device/ |
D | device-monitor.c | 669 bpf_jmp(ins, &i, BPF_JMP|BPF_JEQ|BPF_K, UDEV_MONITOR_MAGIC, 1, 0); in sd_device_monitor_filter_update() 687 bpf_jmp(ins, &i, BPF_JMP|BPF_JEQ|BPF_K, tag_bloom_hi, 0, 3); in sd_device_monitor_filter_update() 695 … bpf_jmp(ins, &i, BPF_JMP|BPF_JEQ|BPF_K, tag_bloom_lo, 1 + (tag_matches * 6), 0); in sd_device_monitor_filter_update() 711 bpf_jmp(ins, &i, BPF_JMP|BPF_JEQ|BPF_K, hash, 0, 1); in sd_device_monitor_filter_update() 714 bpf_jmp(ins, &i, BPF_JMP|BPF_JEQ|BPF_K, hash, 0, 3); in sd_device_monitor_filter_update() 719 bpf_jmp(ins, &i, BPF_JMP|BPF_JEQ|BPF_K, hash, 0, 1); in sd_device_monitor_filter_update()
|
/systemd-251/src/network/ |
D | networkd-manager.c | 254 …BPF_JUMP(BPF_JMP + BPF_JGE + BPF_K, sizeof(struct nlmsghdr), 1, 0), /* A (packet length) >… in manager_setup_rtnl_filter() 258 …BPF_JUMP(BPF_JMP + BPF_JSET + BPF_K, htobe16(NLM_F_MULTI), 0, 1), /* message flags has N… in manager_setup_rtnl_filter() 262 …BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, htobe16(RTM_NEWNEIGH), 2, 0), /* message type == RTM… in manager_setup_rtnl_filter() 263 …BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, htobe16(RTM_DELNEIGH), 1, 0), /* message type == RTM… in manager_setup_rtnl_filter() 267 … BPF_JUMP(BPF_JMP + BPF_JGE + BPF_K, sizeof(struct nlmsghdr) + sizeof(struct ndmsg), 1, 0), in manager_setup_rtnl_filter() 273 …BPF_JUMP(BPF_JMP + BPF_JSET + BPF_K, htobe16(NUD_PERMANENT), 1, 0), /* neighbor state has … in manager_setup_rtnl_filter()
|
/systemd-251/src/core/ |
D | bpf-firewall.c | 94 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_skb_load_bytes), in add_lookup_instructions() 111 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), in add_lookup_instructions() 292 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), in bpf_firewall_compile_bpf() 303 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), in bpf_firewall_compile_bpf()
|
D | bpf-devices.c | 249 if (ins->code == (BPF_JMP | BPF_JA) && ins->off == PASS_JUMP_OFF) in bpf_devices_apply_policy()
|