• Home
  • Raw
  • Download

Lines Matching refs:code

290 		    dst[i].code == (BPF_LD | BPF_IMM | BPF_DW) &&  in bpf_prog_calc_tag()
296 dst[i].code == 0 && in bpf_prog_calc_tag()
380 u8 code; in bpf_adj_branches() local
390 code = insn->code; in bpf_adj_branches()
391 if ((BPF_CLASS(code) != BPF_JMP && in bpf_adj_branches()
392 BPF_CLASS(code) != BPF_JMP32) || in bpf_adj_branches()
393 BPF_OP(code) == BPF_EXIT) in bpf_adj_branches()
396 if (BPF_OP(code) == BPF_CALL) { in bpf_adj_branches()
933 (from->code == (BPF_ALU | BPF_MOV | BPF_K) || in bpf_jit_blind_insn()
934 from->code == (BPF_ALU64 | BPF_MOV | BPF_K))) { in bpf_jit_blind_insn()
939 switch (from->code) { in bpf_jit_blind_insn()
951 *to++ = BPF_ALU32_REG(from->code, from->dst_reg, BPF_REG_AX); in bpf_jit_blind_insn()
965 *to++ = BPF_ALU64_REG(from->code, from->dst_reg, BPF_REG_AX); in bpf_jit_blind_insn()
985 *to++ = BPF_JMP_REG(from->code, from->dst_reg, BPF_REG_AX, off); in bpf_jit_blind_insn()
1005 *to++ = BPF_JMP32_REG(from->code, from->dst_reg, BPF_REG_AX, in bpf_jit_blind_insn()
1029 *to++ = BPF_STX_MEM(from->code, from->dst_reg, BPF_REG_AX, from->off); in bpf_jit_blind_insn()
1099 if (insn[0].code == (BPF_LD | BPF_IMM | BPF_DW) && in bpf_jit_blind_constants()
1100 insn[1].code == 0) in bpf_jit_blind_constants()
1281 bool bpf_opcode_in_insntable(u8 code) in bpf_opcode_in_insntable() argument
1299 return public_insntable[code]; in bpf_opcode_in_insntable()
1331 goto *jumptable[insn->code]; in ___bpf_prog_run()
1570 pr_warn("BPF interpreter: unknown opcode %02x\n", insn->code); in ___bpf_prog_run()
1643 insn->code = BPF_JMP | BPF_CALL_ARGS; in bpf_patch_call_args()