Lines Matching refs:code

74  * Such calls are "invisible" in the eBPF code, so it is up to the calling
76 * JIT emits code to push and pop those registers onto the stack, immediately
194 * JITed code.
195 * target : final JITed code.
403 /* total stack size used in JITed code */
1591 const u8 code = insn->code;
1599 const bool is64 = BPF_CLASS(code) == BPF_ALU64;
1614 switch (code) {
1622 switch (BPF_SRC(code)) {
1673 switch (BPF_SRC(code)) {
1675 emit_a32_alu_r64(is64, dst, src, ctx, BPF_OP(code));
1685 emit_a32_alu_r64(is64, dst, tmp2, ctx, BPF_OP(code));
1696 switch (BPF_SRC(code)) {
1708 emit_udivmod(rd_lo, rd_lo, rt, ctx, BPF_OP(code), off);
1718 switch (BPF_SRC(code)) {
1727 emit_udivmod64(rd, rd, rs, ctx, BPF_OP(code), off);
1739 emit_a32_alu_i(dst_lo, imm, ctx, BPF_OP(code));
1775 emit_a32_alu_i(dst_lo, 0, ctx, BPF_OP(code));
1786 switch (BPF_SRC(code)) {
1809 if (BPF_SRC(code) == BPF_FROM_LE && BPF_CLASS(code) != BPF_ALU64)
1869 if (BPF_MODE(insn->code) == BPF_MEMSX)
1870 emit_ldsx_r(dst, rn, off, ctx, BPF_SIZE(code));
1872 emit_ldx_r(dst, rn, off, ctx, BPF_SIZE(code));
1882 switch (BPF_SIZE(code)) {
1893 emit_str_r(dst_lo, tmp2, off, ctx, BPF_SIZE(code));
1905 emit_str_r(dst_lo, rs, off, ctx, BPF_SIZE(code));
1988 emit_ar_r(rd[0], rd[1], rm, rn, ctx, BPF_OP(code),
1989 BPF_CLASS(code) == BPF_JMP);
1993 switch (BPF_OP(code)) {
2031 if (BPF_CLASS(code) == BPF_JMP32 && imm != 0)
2033 else if (BPF_CLASS(code) == BPF_JMP && off != 0)
2082 pr_info_once("*** NOT YET: opcode %02x ***\n", code);
2085 pr_err_once("unknown opcode %02x\n", code);
2121 /* If unsuccesful, return with error code */
2163 * the new JITed code.
2187 /* 1) fake pass to find in the length of the JITed code,
2189 * needed to compute final JITed code.
2190 * Also, calculate random starting pointer/start of JITed code
2225 /* Now we can get the actual image size of the JITed arm code.
2231 * JITed code.
2246 /* 2.) Actual pass to generate final JIT code */
2252 /* If building the body of the JITed code fails somehow,