Lines Matching defs:code
72 * Such calls are "invisible" in the eBPF code, so it is up to the calling
74 * JIT emits code to push and pop those registers onto the stack, immediately
192 * JITed code.
193 * target : final JITed code.
360 /* total stack size used in JITed code */
1365 const u8 code = insn->code;
1373 const bool is64 = BPF_CLASS(code) == BPF_ALU64;
1388 switch (code) {
1396 switch (BPF_SRC(code)) {
1444 switch (BPF_SRC(code)) {
1446 emit_a32_alu_r64(is64, dst, src, ctx, BPF_OP(code));
1456 emit_a32_alu_r64(is64, dst, tmp2, ctx, BPF_OP(code));
1467 switch (BPF_SRC(code)) {
1479 emit_udivmod(rd_lo, rd_lo, rt, ctx, BPF_OP(code));
1498 emit_a32_alu_i(dst_lo, imm, ctx, BPF_OP(code));
1534 emit_a32_alu_i(dst_lo, 0, ctx, BPF_OP(code));
1545 switch (BPF_SRC(code)) {
1566 if (BPF_SRC(code) == BPF_FROM_LE)
1622 emit_ldx_r(dst, rn, off, ctx, BPF_SIZE(code));
1632 switch (BPF_SIZE(code)) {
1643 emit_str_r(dst_lo, tmp2, off, ctx, BPF_SIZE(code));
1656 emit_str_r(dst_lo, rs, off, ctx, BPF_SIZE(code));
1739 emit_ar_r(rd[0], rd[1], rm, rn, ctx, BPF_OP(code),
1740 BPF_CLASS(code) == BPF_JMP);
1744 switch (BPF_OP(code)) {
1828 pr_info_once("*** NOT YET: opcode %02x ***\n", code);
1831 pr_err_once("unknown opcode %02x\n", code);
1867 /* If unsuccesfull, return with error code */
1914 * the new JITed code.
1938 /* 1) fake pass to find in the length of the JITed code,
1940 * needed to compute final JITed code.
1941 * Also, calculate random starting pointer/start of JITed code
1976 /* Now we can get the actual image size of the JITed arm code.
1982 * JITed code.
1997 /* 2.) Actual pass to generate final JIT code */
2003 /* If building the body of the JITed code fails somehow,