Home
last modified time | relevance | path

Searched refs:BPF_CALL (Results 1 – 25 of 32) sorted by relevance

12

/Linux-v4.19/tools/testing/selftests/bpf/
Dtest_verifier.c117 insn[i++] = BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in bpf_fill_ld_abs_vlan_push_pop()
128 insn[i++] = BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in bpf_fill_ld_abs_vlan_push_pop()
825 BPF_RAW_INSN(BPF_JMP | BPF_CALL | BPF_X, 0, 0, 0, 0),
834 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 1, 0),
843 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, 1234567),
855 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
898 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
900 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
912 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
915 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
[all …]
Dtest_cgroup_storage.c20 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in main()
Dtest_verifier_log.c38 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
/Linux-v4.19/samples/bpf/
Dcookie_uid_helper_example.c90 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in prog_load()
102 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in prog_load()
111 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in prog_load()
140 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in prog_load()
Dtest_cgrp2_attach.c53 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), in prog_load()
64 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), in prog_load()
Dsock_example.c54 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), in test_sock()
Dtest_cgrp2_attach2.c234 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), in prog_load_cnt()
240 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_get_local_storage), in prog_load_cnt()
Dtest_cgrp2_sock.c51 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in prog_load()
/Linux-v4.19/tools/include/linux/
Dfilter.h226 .code = BPF_JMP | BPF_CALL, \
270 .code = BPF_JMP | BPF_CALL, \
/Linux-v4.19/kernel/bpf/
Ddisasm.c111 [BPF_CALL >> 4] = "call",
226 if (opcode == BPF_CALL) { in print_bpf_insn()
Dverifier.c818 if (insn[i].code != (BPF_JMP | BPF_CALL)) in check_subprogs()
852 if (BPF_OP(code) == BPF_EXIT || BPF_OP(code) == BPF_CALL) in check_subprogs()
1570 if (insn[i].code != (BPF_JMP | BPF_CALL)) in check_max_stack_depth()
4241 } else if (opcode == BPF_CALL) { in check_cfg()
4945 if (opcode == BPF_CALL) { in do_check()
5483 if (insn->code != (BPF_JMP | BPF_CALL) || in jit_subprogs()
5547 if (insn->code != (BPF_JMP | BPF_CALL) || in jit_subprogs()
5594 if (insn->code != (BPF_JMP | BPF_CALL) || in jit_subprogs()
5616 if (insn->code != (BPF_JMP | BPF_CALL) || in jit_subprogs()
5644 if (insn->code != (BPF_JMP | BPF_CALL) || in fixup_call_args()
[all …]
Dsyscall.c1882 insns[i].code = BPF_JMP | BPF_CALL; in bpf_insn_prepare_dump()
1886 if (insns[i].code == (BPF_JMP | BPF_CALL) || in bpf_insn_prepare_dump()
1889 insns[i].code = BPF_JMP | BPF_CALL; in bpf_insn_prepare_dump()
/Linux-v4.19/tools/bpf/bpftool/
Dcfg.c175 if (cur->code != (BPF_JMP | BPF_CALL)) in cfg_partition_funcs()
210 if (opcode == BPF_EXIT || opcode == BPF_CALL) in func_partition_bb_head()
/Linux-v4.19/tools/testing/selftests/net/
Dreuseport_bpf_numa.c81 { BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_get_numa_node_id }, in attach_bpf()
/Linux-v4.19/tools/perf/util/
Dbpf-prologue.c335 if (opcode == BPF_CALL) in prologue_relocate()
/Linux-v4.19/include/linux/
Dfilter.h298 .code = BPF_JMP | BPF_CALL, \
311 .code = BPF_JMP | BPF_CALL, \
/Linux-v4.19/tools/include/uapi/linux/
Dbpf.h42 #define BPF_CALL 0x80 /* function call */ macro
/Linux-v4.19/include/uapi/linux/
Dbpf.h42 #define BPF_CALL 0x80 /* function call */ macro
/Linux-v4.19/drivers/net/ethernet/netronome/nfp/bpf/
Dverifier.c623 if (meta->insn.code == (BPF_JMP | BPF_CALL)) in nfp_verify_insn()
Djit.c3199 [BPF_JMP | BPF_CALL] = call,
3212 if (meta->insn.code == (BPF_JMP | BPF_CALL)) in nfp_fixup_branches()
3820 insn->code == (BPF_JMP | BPF_CALL) || in nfp_bpf_opt_pkt_cache()
4024 BPF_OP(code) != BPF_CALL) { in nfp_bpf_jit_prepare()
/Linux-v4.19/Documentation/networking/
Dfilter.txt675 registers and BPF_CALL instruction will be JITed as single 'call' HW
913 BPF_CALL 0x80 /* eBPF only: function call */
1356 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
1370 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
1386 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
1404 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
1426 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
/Linux-v4.19/arch/x86/net/
Dbpf_jit_comp.c858 case BPF_JMP | BPF_CALL: in do_jit()
/Linux-v4.19/arch/powerpc/net/
Dbpf_jit_comp64.c711 case BPF_JMP | BPF_CALL: in bpf_jit_build_body()
/Linux-v4.19/arch/mips/net/
Debpf_jit.c1230 case BPF_JMP | BPF_CALL: in build_one_insn()
1618 case BPF_CALL: in reg_val_propagate_range()
/Linux-v4.19/arch/s390/net/
Dbpf_jit_comp.c978 case BPF_JMP | BPF_CALL: in bpf_jit_insn()

12