Home
last modified time | relevance | path

Searched refs:BPF_CALL (Results 1 – 13 of 13) sorted by relevance

/linux-4.4.14/samples/bpf/
Dtest_verifier.c246 BPF_RAW_INSN(BPF_JMP | BPF_CALL | BPF_X, 0, 0, 0, 0),
255 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 1, 0),
264 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, 1234567),
276 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
436 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_delete_elem),
449 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
464 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
480 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
572 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_delete_elem),
716 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
[all …]
Dsock_example.c50 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), in test_sock()
/linux-4.4.14/include/uapi/linux/
Dbpf.h36 #define BPF_CALL 0x80 /* function call */ macro
/linux-4.4.14/tools/include/linux/
Dfilter.h205 .code = BPF_JMP | BPF_CALL, \
/linux-4.4.14/kernel/bpf/
Dverifier.c312 [BPF_CALL >> 4] = "call",
390 if (opcode == BPF_CALL) { in print_bpf_insn()
1522 } else if (opcode == BPF_CALL) { in check_cfg()
1879 if (opcode == BPF_CALL) { in do_check()
2092 BPF_OP(insn->code) == BPF_CALL || in adjust_branches()
Dcore.c255 [BPF_JMP | BPF_CALL] = &&JMP_CALL, in __bpf_prog_run()
256 [BPF_JMP | BPF_CALL | BPF_X] = &&JMP_TAIL_CALL, in __bpf_prog_run()
Dsyscall.c467 if (insn->code == (BPF_JMP | BPF_CALL)) { in fixup_bpf_calls()
/linux-4.4.14/arch/x86/net/
Dbpf_jit_comp.c810 case BPF_JMP | BPF_CALL: in do_jit()
844 case BPF_JMP | BPF_CALL | BPF_X: in do_jit()
/linux-4.4.14/Documentation/networking/
Dfilter.txt670 registers and BPF_CALL instruction will be JITed as single 'call' HW
908 BPF_CALL 0x80 /* eBPF only: function call */
1177 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
1191 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
1207 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
1225 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
1247 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
/linux-4.4.14/arch/s390/net/
Dbpf_jit_comp.c971 case BPF_JMP | BPF_CALL: in bpf_jit_insn()
996 case BPF_JMP | BPF_CALL | BPF_X: in bpf_jit_insn()
/linux-4.4.14/include/linux/
Dfilter.h256 .code = BPF_JMP | BPF_CALL, \
/linux-4.4.14/arch/arm64/net/
Dbpf_jit_comp.c519 case BPF_JMP | BPF_CALL: in build_insn()
/linux-4.4.14/lib/
Dtest_bpf.c407 insn[i++] = BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in bpf_fill_ld_abs_vlan_push_pop()
418 insn[i++] = BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in bpf_fill_ld_abs_vlan_push_pop()