Searched refs:BPF_CALL (Results 1 – 13 of 13) sorted by relevance
| /linux-4.4.14/samples/bpf/ |
| D | test_verifier.c | 246 BPF_RAW_INSN(BPF_JMP | BPF_CALL | BPF_X, 0, 0, 0, 0), 255 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 1, 0), 264 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, 1234567), 276 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), 436 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_delete_elem), 449 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), 464 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), 480 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), 572 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_delete_elem), 716 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), [all …]
|
| D | sock_example.c | 50 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), in test_sock()
|
| /linux-4.4.14/include/uapi/linux/ |
| D | bpf.h | 36 #define BPF_CALL 0x80 /* function call */ macro
|
| /linux-4.4.14/tools/include/linux/ |
| D | filter.h | 205 .code = BPF_JMP | BPF_CALL, \
|
| /linux-4.4.14/kernel/bpf/ |
| D | verifier.c | 312 [BPF_CALL >> 4] = "call", 390 if (opcode == BPF_CALL) { in print_bpf_insn() 1522 } else if (opcode == BPF_CALL) { in check_cfg() 1879 if (opcode == BPF_CALL) { in do_check() 2092 BPF_OP(insn->code) == BPF_CALL || in adjust_branches()
|
| D | core.c | 255 [BPF_JMP | BPF_CALL] = &&JMP_CALL, in __bpf_prog_run() 256 [BPF_JMP | BPF_CALL | BPF_X] = &&JMP_TAIL_CALL, in __bpf_prog_run()
|
| D | syscall.c | 467 if (insn->code == (BPF_JMP | BPF_CALL)) { in fixup_bpf_calls()
|
| /linux-4.4.14/arch/x86/net/ |
| D | bpf_jit_comp.c | 810 case BPF_JMP | BPF_CALL: in do_jit() 844 case BPF_JMP | BPF_CALL | BPF_X: in do_jit()
|
| /linux-4.4.14/Documentation/networking/ |
| D | filter.txt | 670 registers and BPF_CALL instruction will be JITed as single 'call' HW 908 BPF_CALL 0x80 /* eBPF only: function call */ 1177 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), 1191 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), 1207 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), 1225 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), 1247 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
|
| /linux-4.4.14/arch/s390/net/ |
| D | bpf_jit_comp.c | 971 case BPF_JMP | BPF_CALL: in bpf_jit_insn() 996 case BPF_JMP | BPF_CALL | BPF_X: in bpf_jit_insn()
|
| /linux-4.4.14/include/linux/ |
| D | filter.h | 256 .code = BPF_JMP | BPF_CALL, \
|
| /linux-4.4.14/arch/arm64/net/ |
| D | bpf_jit_comp.c | 519 case BPF_JMP | BPF_CALL: in build_insn()
|
| /linux-4.4.14/lib/ |
| D | test_bpf.c | 407 insn[i++] = BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in bpf_fill_ld_abs_vlan_push_pop() 418 insn[i++] = BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, in bpf_fill_ld_abs_vlan_push_pop()
|