Home
last modified time | relevance | path

Searched refs:emit_jump (Results 1 - 6 of 6) sorted by relevance

/kernel/linux/linux-5.10/arch/sparc/net/
H A Dbpf_jit_comp_32.c256 #define emit_jump(DEST) emit_branch(BA, DEST) macro
323 * emit_jump() calls with adjusted offsets.
470 emit_jump(cleanup_addr + 20); in bpf_jit_compile()
498 emit_jump(cleanup_addr); in bpf_jit_compile()
633 emit_jump(addrs[i + K]); in bpf_jit_compile()
657 emit_jump(t_offset); in bpf_jit_compile()
698 emit_jump(f_offset); in bpf_jit_compile()
/kernel/linux/linux-6.6/arch/sparc/net/
H A Dbpf_jit_comp_32.c256 #define emit_jump(DEST) emit_branch(BA, DEST) macro
323 * emit_jump() calls with adjusted offsets.
470 emit_jump(cleanup_addr + 20); in bpf_jit_compile()
498 emit_jump(cleanup_addr); in bpf_jit_compile()
633 emit_jump(addrs[i + K]); in bpf_jit_compile()
657 emit_jump(t_offset); in bpf_jit_compile()
698 emit_jump(f_offset); in bpf_jit_compile()
/kernel/linux/linux-6.6/arch/parisc/net/
H A Dbpf_jit_comp64.c181 static int emit_jump(signed long paoff, bool force_far, in emit_jump() function
277 * branch itself, and the two instructions from emit_jump. in emit_branch()
323 ret = emit_jump(paoff, true, ctx); in emit_branch()
859 ret = emit_jump(paoff, false, ctx); in bpf_jit_emit_insn()
993 ret = emit_jump(paoff, false, ctx); in bpf_jit_emit_insn()
H A Dbpf_jit_comp32.c401 static void emit_jump(s32 paoff, bool force_far, in emit_jump() function
711 * emit_jump, meaning the BPF branch is not taken. in emit_branch_r64()
712 * JUMP skips directly to the emit_jump, meaning in emit_branch_r64()
785 emit_jump(paoff, true, ctx); in emit_branch_r64()
816 * branch itself, and the three instructions from emit_jump. in emit_bcc()
861 emit_jump(paoff, true, ctx); in emit_bcc()
1301 emit_jump(paoff, false, ctx); in bpf_jit_emit_insn()
/kernel/linux/linux-5.10/arch/x86/net/
H A Dbpf_jit_comp.c319 static int emit_jump(u8 **pprog, void *func, void *ip) in emit_jump() function
339 emit_jump(&prog, old_addr, ip); in __bpf_arch_text_poke()
349 emit_jump(&prog, new_addr, ip); in __bpf_arch_text_poke()
394 emit_jump(&prog, &__x86_indirect_thunk_array[reg], ip); in emit_indirect_jump()
408 emit_jump(&prog, &__x86_return_thunk, ip); in emit_return()
532 emit_jump(&prog, (u8 *)poke->tailcall_target + X86_PATCH_SIZE, in emit_bpf_tail_call_direct()
/kernel/linux/linux-6.6/arch/x86/net/
H A Dbpf_jit_comp.c351 static int emit_jump(u8 **pprog, void *func, void *ip) in emit_jump() function
370 emit_jump(&prog, old_addr, ip); in __bpf_arch_text_poke()
380 emit_jump(&prog, new_addr, ip); in __bpf_arch_text_poke()
429 emit_jump(&prog, &__x86_indirect_jump_thunk_array[reg], ip); in emit_indirect_jump()
431 emit_jump(&prog, &__x86_indirect_thunk_array[reg], ip); in emit_indirect_jump()
446 emit_jump(&prog, x86_return_thunk, ip); in emit_return()
570 emit_jump(&prog, (u8 *)poke->tailcall_target + X86_PATCH_SIZE, in emit_bpf_tail_call_direct()

Completed in 12 milliseconds