Home
last modified time | relevance | path

Searched refs:jt (Results 1 – 11 of 11) sorted by relevance

/Linux-v4.19/samples/seccomp/
Dbpf-helper.h55 #define SYSCALL(nr, jt) \ argument
57 jt
76 #define JEQ(x, jt) JEQ32(x, EXPAND(jt)) argument
77 #define JNE(x, jt) JNE32(x, EXPAND(jt)) argument
78 #define JGT(x, jt) JGT32(x, EXPAND(jt)) argument
79 #define JLT(x, jt) JLT32(x, EXPAND(jt)) argument
80 #define JGE(x, jt) JGE32(x, EXPAND(jt)) argument
81 #define JLE(x, jt) JLE32(x, EXPAND(jt)) argument
82 #define JA(x, jt) JA32(x, EXPAND(jt)) argument
103 #define JEQ(x, jt) \ argument
[all …]
Dbpf-helper.c35 switch ((instr->jt<<8)|instr->jf) { in bpf_resolve_jumps()
44 instr->jt = 0; in bpf_resolve_jumps()
55 instr->jt = 0; in bpf_resolve_jumps()
95 filter->code, filter->jt, filter->jf, filter->k); in seccomp_bpf_print()
/Linux-v4.19/include/uapi/linux/
Dfilter.h26 __u8 jt; /* Jump true */ member
52 #define BPF_JUMP(code, k, jt, jf) { (unsigned short)(code), jt, jf, k } argument
/Linux-v4.19/tools/bpf/
Dbpf_dbg.c433 i + 1 + f.jt, i + 1 + f.jf); in bpf_disasm()
444 f->code, f->jt, f->jf, f->k); in bpf_dump_curr()
448 if (f->jt || f->jf) { in bpf_dump_curr()
450 bpf_disasm(*(f + f->jt + 1), r->Pc + f->jt + 1); in bpf_dump_curr()
495 f[i].code, f[i].jt, f[i].jf, f[i].k); in bpf_dump_all()
734 r->Pc += r->A > r->X ? f->jt : f->jf; in bpf_single_step()
737 r->Pc += r->A > K ? f->jt : f->jf; in bpf_single_step()
740 r->Pc += r->A >= r->X ? f->jt : f->jf; in bpf_single_step()
743 r->Pc += r->A >= K ? f->jt : f->jf; in bpf_single_step()
746 r->Pc += r->A == r->X ? f->jt : f->jf; in bpf_single_step()
[all …]
Dbpf_exp.y43 static void bpf_set_curr_instr(uint16_t op, uint8_t jt, uint8_t jf, uint32_t k);
479 static void bpf_set_curr_instr(uint16_t code, uint8_t jt, uint8_t jf, in bpf_set_curr_instr() argument
484 out[curr_instr].jt = jt; in bpf_set_curr_instr()
555 out[i].jt = (uint8_t) (off - i -1); in bpf_reduce_jt_jumps()
585 out[i].jt, out[i].jf, out[i].k); in bpf_pretty_print_c()
595 out[i].jt, out[i].jf, out[i].k); in bpf_pretty_print()
/Linux-v4.19/arch/powerpc/net/
Dbpf_jit_comp.c486 if (filter[i].jt == filter[i].jf) { in bpf_jit_build_body()
487 if (filter[i].jt > 0) in bpf_jit_build_body()
488 PPC_JMP(addrs[i + 1 + filter[i].jt]); in bpf_jit_build_body()
528 if (filter[i].jt == 0) in bpf_jit_build_body()
533 PPC_BCC(true_cond, addrs[i + 1 + filter[i].jt]); in bpf_jit_build_body()
/Linux-v4.19/arch/mips/net/
Dbpf_jit.c678 __func__, inst->code, inst->jt, inst->jf, inst->k); in build_body()
989 b_off = b_imm(i + inst->jt + 1, ctx); in build_body()
994 b_off = b_imm(i + inst->jt + 1, ctx); in build_body()
1004 b_off = b_imm(i + inst->jt + 1, ctx); in build_body()
1017 b_off = b_imm(i + inst->jt + 1, in build_body()
1036 b_off = b_imm(i + inst->jt + 1, ctx); in build_body()
1049 b_off = b_imm(i + inst->jt + 1, ctx); in build_body()
/Linux-v4.19/arch/sparc/net/
Dbpf_jit_comp_32.c654 t_offset = addrs[i + filter[i].jt]; in bpf_jit_compile()
657 if (filter[i].jt == filter[i].jf) { in bpf_jit_compile()
693 if (filter[i].jt != 0) { in bpf_jit_compile()
/Linux-v4.19/Documentation/networking/
Dfilter.txt66 __u8 jt; /* Jump true */
72 a code, jt, jf and k value. jt and jf are jump offsets and k a generic
191 op:16, jt:8, jf:8, k:32
194 encoded. jt and jf are two 8 bit wide jump targets, one for condition
407 /* { op, jt, jf, k }, */
429 code: [40] jt[0] jf[0] k[12] <-- plain BPF code of current instruction
660 - Conditional jt/jf targets replaced with jt/fall-through:
815 op:16, jt:8, jf:8, k:32 ==> op:8, dst_reg:4, src_reg:4, off:16, imm:32
/Linux-v4.19/
D.mailmap84 Jean Tourrilhes <jt@hpl.hp.com>
/Linux-v4.19/net/core/
Dfilter.c714 target = i + fp->jt + 1; in bpf_convert_filter()
720 if (fp->jt == 0) { in bpf_convert_filter()
741 target = i + fp->jt + 1; in bpf_convert_filter()
928 masks[pc + 1 + filter[pc].jt] &= memvalid; in check_load_and_stores()
1082 if (pc + ftest->jt + 1 >= flen || in bpf_check_classic()