Home
last modified time | relevance | path

Searched refs:jf (Results 1 – 13 of 13) sorted by relevance

/linux-4.4.14/samples/seccomp/
Dbpf-helper.c34 switch ((filter->jt<<8)|filter->jf) { in bpf_resolve_jumps()
44 filter->jf = 0; in bpf_resolve_jumps()
55 filter->jf = 0; in bpf_resolve_jumps()
94 filter->code, filter->jt, filter->jf, filter->k); in seccomp_bpf_print()
/linux-4.4.14/include/uapi/linux/
Dfilter.h26 __u8 jf; /* Jump false */ member
51 #define BPF_JUMP(code, k, jt, jf) { (unsigned short)(code), jt, jf, k } argument
/linux-4.4.14/tools/net/
Dbpf_dbg.c433 i + 1 + f.jt, i + 1 + f.jf); in bpf_disasm()
444 f->code, f->jt, f->jf, f->k); in bpf_dump_curr()
448 if (f->jt || f->jf) { in bpf_dump_curr()
452 bpf_disasm(*(f + f->jf + 1), r->Pc + f->jf + 1); in bpf_dump_curr()
495 f[i].code, f[i].jt, f[i].jf, f[i].k); in bpf_dump_all()
734 r->Pc += r->A > r->X ? f->jt : f->jf; in bpf_single_step()
737 r->Pc += r->A > K ? f->jt : f->jf; in bpf_single_step()
740 r->Pc += r->A >= r->X ? f->jt : f->jf; in bpf_single_step()
743 r->Pc += r->A >= K ? f->jt : f->jf; in bpf_single_step()
746 r->Pc += r->A == r->X ? f->jt : f->jf; in bpf_single_step()
[all …]
Dbpf_exp.y42 static void bpf_set_curr_instr(uint16_t op, uint8_t jt, uint8_t jf, uint32_t k);
604 static void bpf_set_curr_instr(uint16_t code, uint8_t jt, uint8_t jf, in bpf_set_curr_instr() argument
610 out[curr_instr].jf = jf; in bpf_set_curr_instr()
692 out[i].jf = (uint8_t) (off - i - 1); in bpf_reduce_jf_jumps()
710 out[i].jt, out[i].jf, out[i].k); in bpf_pretty_print_c()
720 out[i].jt, out[i].jf, out[i].k); in bpf_pretty_print()
/linux-4.4.14/arch/powerpc/net/
Dbpf_jit_comp.c484 if (filter[i].jt == filter[i].jf) { in bpf_jit_build_body()
529 addrs[i + 1 + filter[i].jf]); in bpf_jit_build_body()
532 if (filter[i].jf != 0) in bpf_jit_build_body()
533 PPC_JMP(addrs[i + 1 + filter[i].jf]); in bpf_jit_build_body()
/linux-4.4.14/arch/mips/net/
Dbpf_jit.c665 __func__, inst->code, inst->jt, inst->jf, inst->k); in build_body()
958 b_off = b_imm(i + inst->jf + 1, ctx); in build_body()
971 b_off = b_imm(i + inst->jf + 1, ctx); in build_body()
996 b_off = b_imm(i + inst->jf + 1, in build_body()
1010 b_off = b_imm(i + inst->jf + 1, ctx); in build_body()
1027 b_off = b_imm(i + inst->jf + 1, ctx); in build_body()
1040 b_off = b_imm(i + inst->jf + 1, ctx); in build_body()
/linux-4.4.14/arch/sparc/net/
Dbpf_jit_comp.c702 cond_branch: f_offset = addrs[i + filter[i].jf]; in bpf_jit_compile()
706 if (filter[i].jt == filter[i].jf) { in bpf_jit_compile()
743 if (filter[i].jf) in bpf_jit_compile()
747 if (filter[i].jf) { in bpf_jit_compile()
/linux-4.4.14/net/core/
Dfilter.c483 if (fp->jf == 0) { in bpf_convert_filter()
493 target = i + fp->jf + 1; in bpf_convert_filter()
505 target = i + fp->jf + 1; in bpf_convert_filter()
665 masks[pc + 1 + filter[pc].jf] &= memvalid; in check_load_and_stores()
811 pc + ftest->jf + 1 >= flen) in bpf_check_classic()
/linux-4.4.14/Documentation/networking/
Dfilter.txt67 __u8 jf; /* Jump false */
72 a code, jt, jf and k value. jt and jf are jump offsets and k a generic
191 op:16, jt:8, jf:8, k:32
194 encoded. jt and jf are two 8 bit wide jump targets, one for condition
407 /* { op, jt, jf, k }, */
429 code: [40] jt[0] jf[0] k[12] <-- plain BPF code of current instruction
655 - Conditional jt/jf targets replaced with jt/fall-through:
810 op:16, jt:8, jf:8, k:32 ==> op:8, dst_reg:4, src_reg:4, off:16, imm:32
/linux-4.4.14/Documentation/DocBook/media/
Dfieldseq_bt.gif.b64204 4jf+4+d9KwDlTGD+5nf+54f+6Jf+6af+6rf+62d+VDZzFmCD7vf+7wf/8Bf/8Sf/8jf/80f/7mcB
Dfieldseq_tb.gif.b64394 XH/2aR9jRCn0f9ohLoEeeL/3ff/3gT/4hX/4ib/4jf/4eb8PYN9XCOMZquD5oT/6pX/6qb/6rf/6
/linux-4.4.14/arch/arm/net/
Dbpf_jit_32.c797 if (inst->jf) in build_body()
798 _emit(condt ^ 1, ARM_B(b_imm(i + inst->jf + 1, in build_body()
/linux-4.4.14/Documentation/
D00-INDEX10 - Japanese, maintained by the JF Project (jf@listserv.linux.or.jp), at