Searched refs:emit_jump (Results 1 - 6 of 6) sorted by relevance
/kernel/linux/linux-5.10/arch/sparc/net/ |
H A D | bpf_jit_comp_32.c | 256 #define emit_jump(DEST) emit_branch(BA, DEST) macro 323 * emit_jump() calls with adjusted offsets. 470 emit_jump(cleanup_addr + 20); in bpf_jit_compile() 498 emit_jump(cleanup_addr); in bpf_jit_compile() 633 emit_jump(addrs[i + K]); in bpf_jit_compile() 657 emit_jump(t_offset); in bpf_jit_compile() 698 emit_jump(f_offset); in bpf_jit_compile()
|
/kernel/linux/linux-6.6/arch/sparc/net/ |
H A D | bpf_jit_comp_32.c | 256 #define emit_jump(DEST) emit_branch(BA, DEST) macro 323 * emit_jump() calls with adjusted offsets. 470 emit_jump(cleanup_addr + 20); in bpf_jit_compile() 498 emit_jump(cleanup_addr); in bpf_jit_compile() 633 emit_jump(addrs[i + K]); in bpf_jit_compile() 657 emit_jump(t_offset); in bpf_jit_compile() 698 emit_jump(f_offset); in bpf_jit_compile()
|
/kernel/linux/linux-6.6/arch/parisc/net/ |
H A D | bpf_jit_comp64.c | 181 static int emit_jump(signed long paoff, bool force_far, in emit_jump() function 277 * branch itself, and the two instructions from emit_jump. in emit_branch() 323 ret = emit_jump(paoff, true, ctx); in emit_branch() 859 ret = emit_jump(paoff, false, ctx); in bpf_jit_emit_insn() 993 ret = emit_jump(paoff, false, ctx); in bpf_jit_emit_insn()
|
H A D | bpf_jit_comp32.c | 401 static void emit_jump(s32 paoff, bool force_far, in emit_jump() function 711 * emit_jump, meaning the BPF branch is not taken. in emit_branch_r64() 712 * JUMP skips directly to the emit_jump, meaning in emit_branch_r64() 785 emit_jump(paoff, true, ctx); in emit_branch_r64() 816 * branch itself, and the three instructions from emit_jump. in emit_bcc() 861 emit_jump(paoff, true, ctx); in emit_bcc() 1301 emit_jump(paoff, false, ctx); in bpf_jit_emit_insn()
|
/kernel/linux/linux-5.10/arch/x86/net/ |
H A D | bpf_jit_comp.c | 319 static int emit_jump(u8 **pprog, void *func, void *ip) in emit_jump() function 339 emit_jump(&prog, old_addr, ip); in __bpf_arch_text_poke() 349 emit_jump(&prog, new_addr, ip); in __bpf_arch_text_poke() 394 emit_jump(&prog, &__x86_indirect_thunk_array[reg], ip); in emit_indirect_jump() 408 emit_jump(&prog, &__x86_return_thunk, ip); in emit_return() 532 emit_jump(&prog, (u8 *)poke->tailcall_target + X86_PATCH_SIZE, in emit_bpf_tail_call_direct()
|
/kernel/linux/linux-6.6/arch/x86/net/ |
H A D | bpf_jit_comp.c | 351 static int emit_jump(u8 **pprog, void *func, void *ip) in emit_jump() function 370 emit_jump(&prog, old_addr, ip); in __bpf_arch_text_poke() 380 emit_jump(&prog, new_addr, ip); in __bpf_arch_text_poke() 429 emit_jump(&prog, &__x86_indirect_jump_thunk_array[reg], ip); in emit_indirect_jump() 431 emit_jump(&prog, &__x86_indirect_thunk_array[reg], ip); in emit_indirect_jump() 446 emit_jump(&prog, x86_return_thunk, ip); in emit_return() 570 emit_jump(&prog, (u8 *)poke->tailcall_target + X86_PATCH_SIZE, in emit_bpf_tail_call_direct()
|
Completed in 12 milliseconds