Lines Matching refs:code
57 /* As per nm, we expose JITed images as text (code) section for
72 .code = BPF_ALU64 | BPF_OP(OP) | BPF_X, \
80 .code = BPF_ALU | BPF_OP(OP) | BPF_X, \
90 .code = BPF_ALU64 | BPF_OP(OP) | BPF_K, \
98 .code = BPF_ALU | BPF_OP(OP) | BPF_K, \
108 .code = BPF_ALU | BPF_END | BPF_SRC(TYPE), \
118 .code = BPF_ALU64 | BPF_MOV | BPF_X, \
126 .code = BPF_ALU | BPF_MOV | BPF_X, \
136 .code = BPF_ALU64 | BPF_MOV | BPF_K, \
144 .code = BPF_ALU | BPF_MOV | BPF_K, \
156 .code = BPF_LD | BPF_DW | BPF_IMM, \
162 .code = 0, /* zero is reserved opcode */ \
176 .code = BPF_ALU64 | BPF_MOV | BPF_SRC(TYPE), \
184 .code = BPF_ALU | BPF_MOV | BPF_SRC(TYPE), \
194 .code = BPF_LD | BPF_SIZE(SIZE) | BPF_ABS, \
204 .code = BPF_LD | BPF_SIZE(SIZE) | BPF_IND, \
214 .code = BPF_LDX | BPF_SIZE(SIZE) | BPF_MEM, \
224 .code = BPF_STX | BPF_SIZE(SIZE) | BPF_MEM, \
234 .code = BPF_STX | BPF_SIZE(SIZE) | BPF_XADD, \
244 .code = BPF_ST | BPF_SIZE(SIZE) | BPF_MEM, \
254 .code = BPF_JMP | BPF_OP(OP) | BPF_X, \
264 .code = BPF_JMP | BPF_OP(OP) | BPF_K, \
274 .code = BPF_JMP | BPF_JA, \
284 .code = BPF_JMP | BPF_CALL, \
290 /* Raw code statement block */
294 .code = CODE, \
304 .code = BPF_JMP | BPF_EXIT, \
366 const int __size = bpf_size_to_bytes(BPF_SIZE(insn->code)); \
756 print_hex_dump(KERN_ERR, "JIT code: ", DUMP_PREFIX_OFFSET,
892 switch (first->code) {
911 BUG_ON(ftest->code & BPF_ANC);
913 switch (ftest->code) {
939 return ftest->code;