Home
last modified time | relevance | path

Searched refs:jf (Results 1 – 13 of 13) sorted by relevance

/openbmc/linux/samples/seccomp/
H A Dbpf-helper.c35 switch ((instr->jt<<8)|instr->jf) { in bpf_resolve_jumps()
45 instr->jf = 0; in bpf_resolve_jumps()
56 instr->jf = 0; in bpf_resolve_jumps()
95 filter->code, filter->jt, filter->jf, filter->k); in seccomp_bpf_print()
/openbmc/linux/tools/include/uapi/linux/
H A Dfilter.h27 __u8 jf; /* Jump false */ member
52 #define BPF_JUMP(code, k, jt, jf) { (unsigned short)(code), jt, jf, k } argument
/openbmc/linux/include/uapi/linux/
H A Dfilter.h27 __u8 jf; /* Jump false */ member
52 #define BPF_JUMP(code, k, jt, jf) { (unsigned short)(code), jt, jf, k } argument
/openbmc/linux/tools/bpf/
H A Dbpf_dbg.c433 i + 1 + f.jt, i + 1 + f.jf); in bpf_disasm()
444 f->code, f->jt, f->jf, f->k); in bpf_dump_curr()
448 if (f->jt || f->jf) { in bpf_dump_curr()
452 bpf_disasm(*(f + f->jf + 1), r->Pc + f->jf + 1); in bpf_dump_curr()
495 f[i].code, f[i].jt, f[i].jf, f[i].k); in bpf_dump_all()
734 r->Pc += r->A > r->X ? f->jt : f->jf; in bpf_single_step()
737 r->Pc += r->A > K ? f->jt : f->jf; in bpf_single_step()
740 r->Pc += r->A >= r->X ? f->jt : f->jf; in bpf_single_step()
743 r->Pc += r->A >= K ? f->jt : f->jf; in bpf_single_step()
746 r->Pc += r->A == r->X ? f->jt : f->jf; in bpf_single_step()
[all …]
H A Dbpf_exp.y43 static void bpf_set_curr_instr(uint16_t op, uint8_t jt, uint8_t jf, uint32_t k);
479 static void bpf_set_curr_instr(uint16_t code, uint8_t jt, uint8_t jf, in bpf_set_curr_instr() argument
485 out[curr_instr].jf = jf; in bpf_set_curr_instr()
579 out[i].jf = bpf_encode_jt_jf_offset(off, i); in bpf_reduce_jf_jumps()
597 out[i].jt, out[i].jf, out[i].k); in bpf_pretty_print_c()
607 out[i].jt, out[i].jf, out[i].k); in bpf_pretty_print()
/openbmc/linux/arch/sparc/net/
H A Dbpf_jit_comp_32.c652 cond_branch: f_offset = addrs[i + filter[i].jf]; in bpf_jit_compile()
656 if (filter[i].jt == filter[i].jf) { in bpf_jit_compile()
693 if (filter[i].jf) in bpf_jit_compile()
697 if (filter[i].jf) { in bpf_jit_compile()
/openbmc/linux/Documentation/networking/
H A Dfilter.rst79 __u8 jf; /* Jump false */
84 a code, jt, jf and k value. jt and jf are jump offsets and k a generic
207 op:16, jt:8, jf:8, k:32
210 encoded. jt and jf are two 8 bit wide jump targets, one for condition
446 /* { op, jt, jf, k }, */
475 code: [40] jt[0] jf[0] k[12] <-- plain BPF code of current instruction
/openbmc/linux/Documentation/bpf/
H A Dclassic_vs_extended.rst55 - Conditional jt/jf targets replaced with jt/fall-through:
212 op:16, jt:8, jf:8, k:32 ==> op:8, dst_reg:4, src_reg:4, off:16, imm:32
/openbmc/linux/kernel/
H A Dseccomp.c786 pc += op_res ? insn->jt : insn->jf; in seccomp_is_const_allow()
/openbmc/qemu/linux-user/
H A Dstrace.c2989 filter[i].jt, filter[i].jf, in do_print_sockopt()
2994 filter[i].jt, filter[i].jf, in do_print_sockopt()
H A Dsyscall_defs.h196 uint8_t jf; member
H A Dsyscall.c2383 filter[i].jf = tfilter[i].jf; in do_setsockopt()
/openbmc/linux/net/core/
H A Dfilter.c739 if (fp->jf == 0) { in bpf_convert_filter()
762 target = i + fp->jf + 1; in bpf_convert_filter()
774 target = i + fp->jf + 1; in bpf_convert_filter()
956 masks[pc + 1 + filter[pc].jf] &= memvalid; in check_load_and_stores()
1110 pc + ftest->jf + 1 >= flen) in bpf_check_classic()