/Linux-v4.19/tools/testing/selftests/bpf/ |
D | test_verifier.c | 117 insn[i++] = BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in bpf_fill_ld_abs_vlan_push_pop() 128 insn[i++] = BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in bpf_fill_ld_abs_vlan_push_pop() 825 BPF_RAW_INSN(BPF_JMP | BPF_CALL | BPF_X, 0, 0, 0, 0), 834 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 1, 0), 843 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, 1234567), 855 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, 898 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, 900 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, 912 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, 915 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, [all …]
|
D | test_cgroup_storage.c | 20 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in main()
|
D | test_verifier_log.c | 38 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
|
/Linux-v4.19/samples/bpf/ |
D | cookie_uid_helper_example.c | 90 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in prog_load() 102 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in prog_load() 111 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in prog_load() 140 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in prog_load()
|
D | test_cgrp2_attach.c | 53 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), in prog_load() 64 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), in prog_load()
|
D | sock_example.c | 54 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), in test_sock()
|
D | test_cgrp2_attach2.c | 234 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), in prog_load_cnt() 240 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_get_local_storage), in prog_load_cnt()
|
D | test_cgrp2_sock.c | 51 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in prog_load()
|
/Linux-v4.19/tools/include/linux/ |
D | filter.h | 226 .code = BPF_JMP | BPF_CALL, \ 270 .code = BPF_JMP | BPF_CALL, \
|
/Linux-v4.19/kernel/bpf/ |
D | disasm.c | 111 [BPF_CALL >> 4] = "call", 226 if (opcode == BPF_CALL) { in print_bpf_insn()
|
D | verifier.c | 818 if (insn[i].code != (BPF_JMP | BPF_CALL)) in check_subprogs() 852 if (BPF_OP(code) == BPF_EXIT || BPF_OP(code) == BPF_CALL) in check_subprogs() 1570 if (insn[i].code != (BPF_JMP | BPF_CALL)) in check_max_stack_depth() 4241 } else if (opcode == BPF_CALL) { in check_cfg() 4945 if (opcode == BPF_CALL) { in do_check() 5483 if (insn->code != (BPF_JMP | BPF_CALL) || in jit_subprogs() 5547 if (insn->code != (BPF_JMP | BPF_CALL) || in jit_subprogs() 5594 if (insn->code != (BPF_JMP | BPF_CALL) || in jit_subprogs() 5616 if (insn->code != (BPF_JMP | BPF_CALL) || in jit_subprogs() 5644 if (insn->code != (BPF_JMP | BPF_CALL) || in fixup_call_args() [all …]
|
D | syscall.c | 1882 insns[i].code = BPF_JMP | BPF_CALL; in bpf_insn_prepare_dump() 1886 if (insns[i].code == (BPF_JMP | BPF_CALL) || in bpf_insn_prepare_dump() 1889 insns[i].code = BPF_JMP | BPF_CALL; in bpf_insn_prepare_dump()
|
/Linux-v4.19/tools/bpf/bpftool/ |
D | cfg.c | 175 if (cur->code != (BPF_JMP | BPF_CALL)) in cfg_partition_funcs() 210 if (opcode == BPF_EXIT || opcode == BPF_CALL) in func_partition_bb_head()
|
/Linux-v4.19/tools/testing/selftests/net/ |
D | reuseport_bpf_numa.c | 81 { BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_get_numa_node_id }, in attach_bpf()
|
/Linux-v4.19/tools/perf/util/ |
D | bpf-prologue.c | 335 if (opcode == BPF_CALL) in prologue_relocate()
|
/Linux-v4.19/include/linux/ |
D | filter.h | 298 .code = BPF_JMP | BPF_CALL, \ 311 .code = BPF_JMP | BPF_CALL, \
|
/Linux-v4.19/tools/include/uapi/linux/ |
D | bpf.h | 42 #define BPF_CALL 0x80 /* function call */ macro
|
/Linux-v4.19/include/uapi/linux/ |
D | bpf.h | 42 #define BPF_CALL 0x80 /* function call */ macro
|
/Linux-v4.19/drivers/net/ethernet/netronome/nfp/bpf/ |
D | verifier.c | 623 if (meta->insn.code == (BPF_JMP | BPF_CALL)) in nfp_verify_insn()
|
D | jit.c | 3199 [BPF_JMP | BPF_CALL] = call, 3212 if (meta->insn.code == (BPF_JMP | BPF_CALL)) in nfp_fixup_branches() 3820 insn->code == (BPF_JMP | BPF_CALL) || in nfp_bpf_opt_pkt_cache() 4024 BPF_OP(code) != BPF_CALL) { in nfp_bpf_jit_prepare()
|
/Linux-v4.19/Documentation/networking/ |
D | filter.txt | 675 registers and BPF_CALL instruction will be JITed as single 'call' HW 913 BPF_CALL 0x80 /* eBPF only: function call */ 1356 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), 1370 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), 1386 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), 1404 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), 1426 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
|
/Linux-v4.19/arch/x86/net/ |
D | bpf_jit_comp.c | 858 case BPF_JMP | BPF_CALL: in do_jit()
|
/Linux-v4.19/arch/powerpc/net/ |
D | bpf_jit_comp64.c | 711 case BPF_JMP | BPF_CALL: in bpf_jit_build_body()
|
/Linux-v4.19/arch/mips/net/ |
D | ebpf_jit.c | 1230 case BPF_JMP | BPF_CALL: in build_one_insn() 1618 case BPF_CALL: in reg_val_propagate_range()
|
/Linux-v4.19/arch/s390/net/ |
D | bpf_jit_comp.c | 978 case BPF_JMP | BPF_CALL: in bpf_jit_insn()
|