Searched refs:BPF_CALL (Results 1 - 8 of 8) sorted by relevance
/third_party/elfutils/lib/ |
H A D | bpf.h | 24 #define BPF_CALL 0x80 macro
|
/third_party/libbpf/include/linux/ |
H A D | filter.h | 50 .code = BPF_JMP | BPF_CALL, \
|
/third_party/ltp/include/lapi/ |
H A D | bpf.h | 55 #define BPF_CALL 0x80 /* function call */ macro 466 /* integer value in 'imm' field of BPF_CALL instruction selects which helper 599 .code = BPF_JMP | BPF_CALL, \
|
/third_party/elfutils/libcpu/ |
H A D | bpf_disasm.c | 161 case BPF_JMP | BPF_CALL: in bpf_disasm()
|
/third_party/libbpf/src/ |
H A D | relo_core.c | 974 insn->code = BPF_JMP | BPF_CALL; in bpf_core_poison_insn()
|
H A D | libbpf.c | 772 BPF_OP(insn->code) == BPF_CALL && in insn_is_subprog_call() 781 return insn->code == (BPF_JMP | BPF_CALL); in is_call_insn() 4468 if (insn->code == (BPF_JMP | BPF_CALL)) 5146 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_probe_read_kernel), 5278 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_get_attach_cookie), 6321 insn->code = BPF_JMP | BPF_CALL; 6348 insn->code = BPF_JMP | BPF_CALL; 7218 BPF_OP(insn->code) == BPF_CALL &&
|
H A D | linker.c | 2086 if (insn->code == (BPF_JMP | BPF_CALL)) in linker_append_elf_relos()
|
/third_party/libbpf/include/uapi/linux/ |
H A D | bpf.h | 45 #define BPF_CALL 0x80 /* function call */ macro 5902 /* integer value in 'imm' field of BPF_CALL instruction selects which helper
|
Completed in 37 milliseconds