github.com/google/syzkaller@v0.0.0-20240517125934-c0f1611a36d6/sys/linux/bpf_prog.txt.const (about) 1 # Code generated by syz-sysgen. DO NOT EDIT. 2 arches = 386, amd64, arm, arm64, mips64le, ppc64le, riscv64, s390x 3 BPF_ABS0 = 1 4 BPF_ADD0 = 0 5 BPF_ALU = 4 6 BPF_ALU64 = 7 7 BPF_AND0 = 5 8 BPF_ARSH0 = 12 9 BPF_B0 = 2 10 BPF_CALL0 = 8 11 BPF_CORE_RELO_SIZE = 16 12 BPF_DIV0 = 3 13 BPF_DW0 = 3 14 BPF_END0 = 13 15 BPF_EXIT0 = 9 16 BPF_FUNC_INFO_SIZE = 8 17 BPF_FUNC_ringbuf_discard = 133 18 BPF_FUNC_ringbuf_output = 130 19 BPF_FUNC_ringbuf_query = 134 20 BPF_FUNC_ringbuf_reserve = 131 21 BPF_FUNC_ringbuf_submit = 132 22 BPF_FUNC_snprintf = 165 23 BPF_FUNC_tail_call = 12 24 BPF_FUNC_trace_printk = 6 25 BPF_H0 = 1 26 BPF_IMM0 = 0 27 BPF_IND0 = 2 28 BPF_JA0 = 0 29 BPF_JEQ0 = 1 30 BPF_JGE0 = 3 31 BPF_JGT0 = 2 32 BPF_JLE0 = 11 33 BPF_JLT0 = 10 34 BPF_JMP = 5 35 BPF_JNE0 = 5 36 BPF_JSET0 = 4 37 BPF_JSGE0 = 7 38 BPF_JSGT0 = 6 39 BPF_JSLE0 = 13 40 BPF_JSLT0 = 12 41 BPF_K0 = 0 42 BPF_LD = 0 43 BPF_LDX = 1 44 BPF_LINE_INFO_SIZE = 16 45 BPF_LSH0 = 6 46 BPF_MEM0 = 3 47 BPF_MEMSX0 = 4 48 BPF_MOD0 = 9 49 BPF_MOV0 = 11 50 BPF_MUL0 = 2 51 BPF_NEG0 = 8 52 BPF_OBJ_NAME_LEN = 16 53 BPF_OR0 = 4 54 BPF_PSEUDO_BTF_ID = 3 55 BPF_PSEUDO_CALL = 1 56 BPF_PSEUDO_FUNC = 4 57 BPF_PSEUDO_KFUNC_CALL = 2 58 BPF_PSEUDO_MAP_FD = 1 59 BPF_PSEUDO_MAP_IDX = 5 60 BPF_PSEUDO_MAP_IDX_VALUE = 6 61 BPF_PSEUDO_MAP_VALUE = 2 62 BPF_RB_FORCE_WAKEUP = 2 63 BPF_RB_NO_WAKEUP = 1 64 BPF_REG_0 = 0 65 BPF_REG_1 = 1 66 BPF_REG_10 = 10 67 BPF_REG_2 = 2 68 BPF_REG_3 = 3 69 BPF_REG_4 = 4 70 BPF_REG_5 = 5 71 BPF_REG_6 = 6 72 BPF_REG_7 = 7 73 BPF_REG_8 = 8 74 BPF_REG_9 = 9 75 BPF_RSH0 = 7 76 BPF_ST = 2 77 BPF_STX = 3 78 BPF_SUB0 = 1 79 BPF_W0 = 0 80 BPF_X0 = 1 81 BPF_XADD0 = 6 82 BPF_XOR0 = 10 83 MAX_BPF_REG = 11 84 __BPF_FUNC_MAX_ID = 212 85 __MAX_BPF_REG = 11 86 bpf_call_code = 133 87 bpf_exit_code = 149 88 bpf_insn_load_imm_dw = 24