Lines Matching defs:code
72 * Such calls are "invisible" in the eBPF code, so it is up to the calling
74 * JIT emits code to push and pop those registers onto the stack, immediately
192 * JITed code.
193 * target : final JITed code.
360 /* total stack size used in JITed code */
1350 const u8 code = insn->code;
1358 const bool is64 = BPF_CLASS(code) == BPF_ALU64;
1373 switch (code) {
1381 switch (BPF_SRC(code)) {
1429 switch (BPF_SRC(code)) {
1431 emit_a32_alu_r64(is64, dst, src, ctx, BPF_OP(code));
1441 emit_a32_alu_r64(is64, dst, tmp2, ctx, BPF_OP(code));
1452 switch (BPF_SRC(code)) {
1464 emit_udivmod(rd_lo, rd_lo, rt, ctx, BPF_OP(code));
1483 emit_a32_alu_i(dst_lo, imm, ctx, BPF_OP(code));
1519 emit_a32_alu_i(dst_lo, 0, ctx, BPF_OP(code));
1530 switch (BPF_SRC(code)) {
1551 if (BPF_SRC(code) == BPF_FROM_LE)
1607 emit_ldx_r(dst, rn, off, ctx, BPF_SIZE(code));
1617 switch (BPF_SIZE(code)) {
1628 emit_str_r(dst_lo, tmp2, off, ctx, BPF_SIZE(code));
1640 emit_str_r(dst_lo, rs, off, ctx, BPF_SIZE(code));
1723 emit_ar_r(rd[0], rd[1], rm, rn, ctx, BPF_OP(code),
1724 BPF_CLASS(code) == BPF_JMP);
1728 switch (BPF_OP(code)) {
1812 pr_info_once("*** NOT YET: opcode %02x ***\n", code);
1815 pr_err_once("unknown opcode %02x\n", code);
1851 /* If unsuccesful, return with error code */
1893 * the new JITed code.
1917 /* 1) fake pass to find in the length of the JITed code,
1919 * needed to compute final JITed code.
1920 * Also, calculate random starting pointer/start of JITed code
1955 /* Now we can get the actual image size of the JITed arm code.
1961 * JITed code.
1976 /* 2.) Actual pass to generate final JIT code */
1982 /* If building the body of the JITed code fails somehow,