• Home
  • Raw
  • Download

Lines Matching refs:code

301 		    dst[i].code == (BPF_LD | BPF_IMM | BPF_DW) &&  in bpf_prog_calc_tag()
307 dst[i].code == 0 && in bpf_prog_calc_tag()
391 u8 code; in bpf_adj_branches() local
401 code = insn->code; in bpf_adj_branches()
402 if ((BPF_CLASS(code) != BPF_JMP && in bpf_adj_branches()
403 BPF_CLASS(code) != BPF_JMP32) || in bpf_adj_branches()
404 BPF_OP(code) == BPF_EXIT) in bpf_adj_branches()
407 if (BPF_OP(code) == BPF_CALL) { in bpf_adj_branches()
1003 (from->code == (BPF_ALU | BPF_MOV | BPF_K) || in bpf_jit_blind_insn()
1004 from->code == (BPF_ALU64 | BPF_MOV | BPF_K))) { in bpf_jit_blind_insn()
1009 switch (from->code) { in bpf_jit_blind_insn()
1021 *to++ = BPF_ALU32_REG(from->code, from->dst_reg, BPF_REG_AX); in bpf_jit_blind_insn()
1035 *to++ = BPF_ALU64_REG(from->code, from->dst_reg, BPF_REG_AX); in bpf_jit_blind_insn()
1055 *to++ = BPF_JMP_REG(from->code, from->dst_reg, BPF_REG_AX, off); in bpf_jit_blind_insn()
1075 *to++ = BPF_JMP32_REG(from->code, from->dst_reg, BPF_REG_AX, in bpf_jit_blind_insn()
1099 *to++ = BPF_STX_MEM(from->code, from->dst_reg, BPF_REG_AX, from->off); in bpf_jit_blind_insn()
1169 if (insn[0].code == (BPF_LD | BPF_IMM | BPF_DW) && in bpf_jit_blind_constants()
1170 insn[1].code == 0) in bpf_jit_blind_constants()
1351 bool bpf_opcode_in_insntable(u8 code) in bpf_opcode_in_insntable() argument
1369 return public_insntable[code]; in bpf_opcode_in_insntable()
1412 goto *jumptable[insn->code]; in ___bpf_prog_run()
1694 pr_warn("BPF interpreter: unknown opcode %02x\n", insn->code); in ___bpf_prog_run()
1767 insn->code = BPF_JMP | BPF_CALL_ARGS; in bpf_patch_call_args()