| /Linux-v5.4/tools/testing/selftests/bpf/verifier/ |
| D | jump.c | 31 BPF_JMP_IMM(BPF_JA, 0, 0, 14), 34 BPF_JMP_IMM(BPF_JA, 0, 0, 11), 37 BPF_JMP_IMM(BPF_JA, 0, 0, 8), 40 BPF_JMP_IMM(BPF_JA, 0, 0, 5), 43 BPF_JMP_IMM(BPF_JA, 0, 0, 2), 60 BPF_JMP_IMM(BPF_JA, 0, 0, 19), 64 BPF_JMP_IMM(BPF_JA, 0, 0, 15), 68 BPF_JMP_IMM(BPF_JA, 0, 0, 11), 72 BPF_JMP_IMM(BPF_JA, 0, 0, 7), 76 BPF_JMP_IMM(BPF_JA, 0, 0, 3), [all …]
|
| D | cfg.c | 13 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 14 BPF_JMP_IMM(BPF_JA, 0, 0, 0), 23 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 32 BPF_JMP_IMM(BPF_JA, 0, 0, -2), 41 BPF_JMP_IMM(BPF_JA, 0, 0, -1), 54 BPF_JMP_IMM(BPF_JA, 0, 0, -4),
|
| D | dead_code.c | 4 BPF_JMP_IMM(BPF_JA, 0, 0, 2), 6 BPF_JMP_IMM(BPF_JA, 0, 0, 2), 31 BPF_JMP_IMM(BPF_JA, 0, 0, 2), 70 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 72 BPF_JMP_IMM(BPF_JA, 0, 0, -5), 151 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
|
| D | map_ptr_mixing.c | 7 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 37 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 68 BPF_JMP_IMM(BPF_JA, 0, 0, 2), 89 BPF_JMP_IMM(BPF_JA, 0, 0, 2),
|
| D | xdp_direct_packet_access.c | 99 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 117 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 154 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 172 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 315 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 333 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 370 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 388 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 531 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 549 BPF_JMP_IMM(BPF_JA, 0, 0, 1), [all …]
|
| D | calls.c | 124 BPF_JMP_IMM(BPF_JA, 0, 0, 4), 125 BPF_JMP_IMM(BPF_JA, 0, 0, 4), 210 BPF_JMP_IMM(BPF_JA, 0, 0, 4), 214 BPF_JMP_IMM(BPF_JA, 0, 0, -6), 216 BPF_JMP_IMM(BPF_JA, 0, 0, -6), 234 BPF_JMP_IMM(BPF_JA, 0, 0, -5), 251 BPF_JMP_IMM(BPF_JA, 0, 0, -6), 470 BPF_JMP_IMM(BPF_JA, 0, 0, 2), 472 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 473 BPF_JMP_IMM(BPF_JA, 0, 0, -3), [all …]
|
| D | jset.c | 15 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 109 BPF_JMP_IMM(BPF_JA, 0, 0, 1),
|
| D | xadd.c | 44 BPF_JMP_IMM(BPF_JA, 0, 0, 6),
|
| D | direct_packet_access.c | 282 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 574 BPF_JMP_IMM(BPF_JA, 0, 0, -4), 592 BPF_JMP_IMM(BPF_JA, 0, 0, -3), 629 BPF_JMP_IMM(BPF_JA, 0, 0, -4),
|
| D | search_pruning.c | 73 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
|
| D | jmp32.c | 8 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 39 BPF_JMP_IMM(BPF_JA, 0, 0, 1),
|
| D | stack_ptr.c | 303 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
|
| /Linux-v5.4/include/uapi/linux/ |
| D | bpf_common.h | 44 #define BPF_JA 0x00 macro
|
| /Linux-v5.4/tools/include/uapi/linux/ |
| D | bpf_common.h | 44 #define BPF_JA 0x00 macro
|
| /Linux-v5.4/tools/perf/util/ |
| D | bpf-prologue.c | 311 ins(BPF_JMP_IMM(BPF_JA, BPF_REG_0, 0, JMP_TO_SUCCESS_CODE), pos); in gen_prologue_slowpath() 465 ins(BPF_JMP_IMM(BPF_JA, BPF_REG_0, 0, JMP_TO_USER_CODE), in bpf__gen_prologue()
|
| /Linux-v5.4/kernel/bpf/ |
| D | disasm.c | 91 [BPF_JA >> 4] = "jmp", 233 } else if (insn->code == (BPF_JMP | BPF_JA)) { in print_bpf_insn()
|
| D | arraymap.c | 209 *insn++ = BPF_JMP_IMM(BPF_JA, 0, 0, 1); in array_map_gen_lookup() 828 *insn++ = BPF_JMP_IMM(BPF_JA, 0, 0, 1); in array_of_map_gen_lookup()
|
| /Linux-v5.4/samples/seccomp/ |
| D | bpf-helper.c | 33 if (instr->code != (BPF_JMP+BPF_JA)) in bpf_resolve_jumps()
|
| D | bpf-helper.h | 50 BPF_JUMP(BPF_JMP+BPF_JA, FIND_LABEL((labels), (label)), \ 53 BPF_JUMP(BPF_JMP+BPF_JA, FIND_LABEL((labels), (label)), \
|
| /Linux-v5.4/tools/bpf/bpftool/ |
| D | cfg.c | 188 if (opcode != BPF_JA) { in func_partition_bb_head() 310 } else if (BPF_OP(insn->code) == BPF_JA) { in func_add_bb_edges()
|
| /Linux-v5.4/samples/bpf/ |
| D | cookie_uid_helper_example.c | 142 BPF_JMP_IMM(BPF_JA, 0, 0, 5), in prog_load()
|
| /Linux-v5.4/lib/ |
| D | test_bpf.c | 182 insn[0] = __BPF_JUMP(BPF_JMP | BPF_JA, len - 2, 0, 0); in bpf_fill_maxinsns5() 276 insn[0] = BPF_JMP_IMM(BPF_JA, 0, 0, len - 2); in bpf_fill_maxinsns9() 284 insn[len - 1] = BPF_JMP_IMM(BPF_JA, 0, 0, -(len - 1)); in bpf_fill_maxinsns9() 303 insn[i] = BPF_JMP_IMM(BPF_JA, 0, 0, hlen - 2 - 2 * i); in bpf_fill_maxinsns10() 305 insn[i] = BPF_JMP_IMM(BPF_JA, 0, 0, hlen - 1 - 2 * i); in bpf_fill_maxinsns10() 307 insn[hlen / 2] = BPF_JMP_IMM(BPF_JA, 0, 0, hlen / 2 - 1); in bpf_fill_maxinsns10() 332 insn[i + j] = __BPF_JUMP(BPF_JMP | BPF_JA, in __bpf_fill_ja() 335 insn[i + j] = __BPF_JUMP(BPF_JMP | BPF_JA, rlen - 1 - j, in __bpf_fill_ja() 362 insn[0] = __BPF_JUMP(BPF_JMP | BPF_JA, len - 2, 0, 0); in bpf_fill_maxinsns12() 968 BPF_JUMP(BPF_JMP | BPF_JA, 0, 0, 0), [all …]
|
| /Linux-v5.4/tools/include/linux/ |
| D | filter.h | 236 .code = BPF_JMP | BPF_JA, \
|
| /Linux-v5.4/drivers/net/ethernet/netronome/nfp/bpf/ |
| D | main.h | 457 return op != BPF_JA && op != BPF_EXIT && op != BPF_CALL; in is_mbpf_cond_jump()
|
| /Linux-v5.4/tools/testing/selftests/net/ |
| D | psock_fanout.c | 139 { BPF_JMP | BPF_JA | BPF_K, 0, 0, 4, 0 }, in sock_fanout_set_ebpf()
|