/Linux-v6.6/tools/testing/selftests/bpf/verifier/ |
D | jump.c | 31 BPF_JMP_IMM(BPF_JA, 0, 0, 14), 34 BPF_JMP_IMM(BPF_JA, 0, 0, 11), 37 BPF_JMP_IMM(BPF_JA, 0, 0, 8), 40 BPF_JMP_IMM(BPF_JA, 0, 0, 5), 43 BPF_JMP_IMM(BPF_JA, 0, 0, 2), 60 BPF_JMP_IMM(BPF_JA, 0, 0, 19), 64 BPF_JMP_IMM(BPF_JA, 0, 0, 15), 68 BPF_JMP_IMM(BPF_JA, 0, 0, 11), 72 BPF_JMP_IMM(BPF_JA, 0, 0, 7), 76 BPF_JMP_IMM(BPF_JA, 0, 0, 3), [all …]
|
D | dead_code.c | 4 BPF_JMP_IMM(BPF_JA, 0, 0, 2), 6 BPF_JMP_IMM(BPF_JA, 0, 0, 2), 33 BPF_JMP_IMM(BPF_JA, 0, 0, 2), 72 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 74 BPF_JMP_IMM(BPF_JA, 0, 0, -5), 153 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
|
D | calls.c | 401 BPF_JMP_IMM(BPF_JA, 0, 0, 4), 402 BPF_JMP_IMM(BPF_JA, 0, 0, 4), 487 BPF_JMP_IMM(BPF_JA, 0, 0, 4), 491 BPF_JMP_IMM(BPF_JA, 0, 0, -6), 493 BPF_JMP_IMM(BPF_JA, 0, 0, -6), 511 BPF_JMP_IMM(BPF_JA, 0, 0, -5), 528 BPF_JMP_IMM(BPF_JA, 0, 0, -6), 747 BPF_JMP_IMM(BPF_JA, 0, 0, 2), 749 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 750 BPF_JMP_IMM(BPF_JA, 0, 0, -3), [all …]
|
D | jset.c | 15 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 109 BPF_JMP_IMM(BPF_JA, 0, 0, 1),
|
D | bpf_loop_inline.c | 43 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 85 BPF_JMP_IMM(BPF_JA, 0, 0, -10), 109 BPF_JMP_IMM(BPF_JA, 0, 0, 3),
|
D | precise.c | 231 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
|
D | jmp32.c | 8 BPF_JMP_IMM(BPF_JA, 0, 0, 1), 39 BPF_JMP_IMM(BPF_JA, 0, 0, 1),
|
D | ctx_skb.c | 77 BPF_JMP_IMM(BPF_JA, 0, 0, -12), 100 BPF_JMP_IMM(BPF_JA, 0, 0, -13),
|
/Linux-v6.6/tools/include/uapi/linux/ |
D | bpf_common.h | 44 #define BPF_JA 0x00 macro
|
/Linux-v6.6/include/uapi/linux/ |
D | bpf_common.h | 44 #define BPF_JA 0x00 macro
|
/Linux-v6.6/tools/testing/selftests/bpf/ |
D | disasm.c | 122 [BPF_JA >> 4] = "jmp", 322 } else if (insn->code == (BPF_JMP | BPF_JA)) { in print_bpf_insn() 325 } else if (insn->code == (BPF_JMP32 | BPF_JA)) { in print_bpf_insn()
|
/Linux-v6.6/kernel/bpf/ |
D | disasm.c | 122 [BPF_JA >> 4] = "jmp", 322 } else if (insn->code == (BPF_JMP | BPF_JA)) { in print_bpf_insn() 325 } else if (insn->code == (BPF_JMP32 | BPF_JA)) { in print_bpf_insn()
|
/Linux-v6.6/tools/lib/bpf/ |
D | gen_loader.c | 133 emit(gen, BPF_JMP_IMM(BPF_JA, 0, 0, in bpf_gen__init() 293 emit(gen, BPF_JMP_IMM(BPF_JA, 0, 0, -1)); in emit_check_err() 700 emit(gen, BPF_JMP_IMM(BPF_JA, 0, 0, 10)); in emit_relo_kfunc_btf() 716 emit(gen, BPF_JMP_IMM(BPF_JA, 0, 0, 1)); in emit_relo_kfunc_btf() 832 emit(gen, BPF_JMP_IMM(BPF_JA, 0, 0, 4)); in emit_relo_ksym_btf() 840 emit(gen, BPF_JMP_IMM(BPF_JA, 0, 0, 3)); in emit_relo_ksym_btf() 1067 emit(gen, BPF_JMP_IMM(BPF_JA, 0, 0, 1)); in bpf_gen__map_update_elem()
|
/Linux-v6.6/samples/seccomp/ |
D | bpf-helper.c | 33 if (instr->code != (BPF_JMP+BPF_JA)) in bpf_resolve_jumps()
|
D | bpf-helper.h | 50 BPF_JUMP(BPF_JMP+BPF_JA, FIND_LABEL((labels), (label)), \ 53 BPF_JUMP(BPF_JMP+BPF_JA, FIND_LABEL((labels), (label)), \
|
/Linux-v6.6/arch/mips/net/ |
D | bpf_jit_comp.c | 536 case BPF_JA: return JIT_JNOP; in invert_jmp() 569 if (bpf_op == BPF_JA) in setup_jmp() 645 bpf_op = BPF_JA; in setup_jmp_i() 662 bpf_op = BPF_JA; in setup_jmp_r()
|
/Linux-v6.6/tools/bpf/bpftool/ |
D | cfg.c | 188 if (opcode != BPF_JA) { in func_partition_bb_head() 310 } else if (BPF_OP(insn->code) == BPF_JA) { in func_add_bb_edges()
|
/Linux-v6.6/Documentation/bpf/standardization/ |
D | instruction-set.rst | 350 BPF_JA 0x0 0x0 PC += offset BPF_JMP class 351 BPF_JA 0x0 0x0 PC += imm BPF_JMP32 class 380 ``BPF_JA | BPF_K | BPF_JMP32`` (0x06) means:: 386 Note that there are two flavors of ``BPF_JA`` instructions. The 411 ``BPF_JA``. The offset is encoded in the imm field of the call instruction.
|
/Linux-v6.6/samples/bpf/ |
D | cookie_uid_helper_example.c | 142 BPF_JMP_IMM(BPF_JA, 0, 0, 5), in prog_load()
|
/Linux-v6.6/net/xdp/ |
D | xskmap.c | 132 *insn++ = BPF_JMP_IMM(BPF_JA, 0, 0, 1); in xsk_map_gen_lookup()
|
/Linux-v6.6/tools/include/linux/ |
D | filter.h | 252 .code = BPF_JMP | BPF_JA, \
|
/Linux-v6.6/drivers/net/ethernet/netronome/nfp/bpf/ |
D | main.h | 457 return op != BPF_JA && op != BPF_EXIT && op != BPF_CALL; in is_mbpf_cond_jump()
|
/Linux-v6.6/tools/testing/selftests/net/ |
D | psock_fanout.c | 153 { BPF_JMP | BPF_JA | BPF_K, 0, 0, 4, 0 }, in sock_fanout_set_ebpf()
|
/Linux-v6.6/lib/ |
D | test_bpf.c | 185 insn[0] = __BPF_JUMP(BPF_JMP | BPF_JA, len - 2, 0, 0); in bpf_fill_maxinsns5() 279 insn[0] = BPF_JMP_IMM(BPF_JA, 0, 0, len - 2); in bpf_fill_maxinsns9() 287 insn[len - 1] = BPF_JMP_IMM(BPF_JA, 0, 0, -(len - 1)); in bpf_fill_maxinsns9() 306 insn[i] = BPF_JMP_IMM(BPF_JA, 0, 0, hlen - 2 - 2 * i); in bpf_fill_maxinsns10() 308 insn[i] = BPF_JMP_IMM(BPF_JA, 0, 0, hlen - 1 - 2 * i); in bpf_fill_maxinsns10() 310 insn[hlen / 2] = BPF_JMP_IMM(BPF_JA, 0, 0, hlen / 2 - 1); in bpf_fill_maxinsns10() 335 insn[i + j] = __BPF_JUMP(BPF_JMP | BPF_JA, in __bpf_fill_ja() 338 insn[i + j] = __BPF_JUMP(BPF_JMP | BPF_JA, rlen - 1 - j, in __bpf_fill_ja() 365 insn[0] = __BPF_JUMP(BPF_JMP | BPF_JA, len - 2, 0, 0); in bpf_fill_maxinsns12() 2316 insns[i++] = BPF_JMP_IMM(BPF_JA, 0, 0, 1); in __bpf_emit_jmp_imm() [all …]
|
/Linux-v6.6/tools/bpf/ |
D | bpf_dbg.c | 59 #define BPF_JMP_JA (BPF_JMP | BPF_JA) 431 if ((BPF_CLASS(f.code) == BPF_JMP && BPF_OP(f.code) != BPF_JA)) in bpf_disasm()
|