Searched refs:BPF_CALL (Results 1 – 10 of 10) sorted by relevance
/third_party/elfutils/lib/ |
D | bpf.h | 24 #define BPF_CALL 0x80 macro
|
/third_party/libbpf/include/linux/ |
D | filter.h | 50 .code = BPF_JMP | BPF_CALL, \
|
/third_party/ltp/include/lapi/ |
D | bpf.h | 55 #define BPF_CALL 0x80 /* function call */ macro 599 .code = BPF_JMP | BPF_CALL, \
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Target/BPF/ |
D | BPFInstrFormats.td | 65 def BPF_CALL : BPFJumpOp<0x8>;
|
D | BPFInstrInfo.td | 481 : TYPE_ALU_JMP<BPF_CALL.Value, BPF_K.Value, 493 : TYPE_ALU_JMP<BPF_CALL.Value, BPF_X.Value,
|
/third_party/elfutils/libcpu/ |
D | bpf_disasm.c | 161 case BPF_JMP | BPF_CALL: in bpf_disasm()
|
/third_party/libbpf/src/ |
D | libbpf.c | 772 BPF_OP(insn->code) == BPF_CALL && in insn_is_subprog_call() 781 return insn->code == (BPF_JMP | BPF_CALL); in is_call_insn() 4468 if (insn->code == (BPF_JMP | BPF_CALL)) 5146 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_probe_read_kernel), 5278 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_get_attach_cookie), 6321 insn->code = BPF_JMP | BPF_CALL; 6348 insn->code = BPF_JMP | BPF_CALL; 7218 BPF_OP(insn->code) == BPF_CALL &&
|
D | relo_core.c | 974 insn->code = BPF_JMP | BPF_CALL; in bpf_core_poison_insn()
|
D | linker.c | 2086 if (insn->code == (BPF_JMP | BPF_CALL)) in linker_append_elf_relos()
|
/third_party/libbpf/include/uapi/linux/ |
D | bpf.h | 45 #define BPF_CALL 0x80 /* function call */ macro
|