/linux/kernel/bpf/ |
H A D | disasm.c | 135 [BPF_EXIT >> 4] = "exit", 356 } else if (insn->code == (BPF_JMP | BPF_EXIT)) { in print_bpf_insn()
|
H A D | verifier.c | 3296 if (BPF_OP(code) == BPF_EXIT || BPF_OP(code) == BPF_CALL) in check_subprogs() 3312 if (code != (BPF_JMP | BPF_EXIT) && in check_subprogs() 3448 if (op == BPF_EXIT) in is_reg64() 4238 } else if (opcode == BPF_EXIT) { in backtrack_insn() 17039 case BPF_EXIT: in visit_insn() 19192 } else if (opcode == BPF_EXIT) { in do_check() 19943 BPF_OP(code) == BPF_CALL || BPF_OP(code) == BPF_EXIT) in adjust_jmp_off() 20148 return op != BPF_JA && op != BPF_EXIT && op != BPF_CALL; in insn_is_cond_jump() 20424 } else if (insn->code == (BPF_JMP | BPF_EXIT) && in convert_ctx_accesses()
|
/linux/tools/testing/selftests/bpf/ |
H A D | disasm.c | 135 [BPF_EXIT >> 4] = "exit", 356 } else if (insn->code == (BPF_JMP | BPF_EXIT)) { in print_bpf_insn()
|
H A D | veristat.c | 1187 { .code = BPF_JMP | BPF_EXIT, }, in max_verifier_log_size()
|
/linux/tools/bpf/bpftool/ |
H A D | cfg.c | 181 if (opcode == BPF_EXIT || opcode == BPF_CALL) in func_partition_bb_head() 306 BPF_OP(insn->code) == BPF_EXIT) { in func_add_bb_edges()
|
/linux/samples/bpf/ |
H A D | bpf_insn.h | 227 .code = BPF_JMP | BPF_EXIT, \
|
/linux/tools/testing/selftests/net/ |
H A D | reuseport_bpf.c | 106 { BPF_JMP | BPF_EXIT, 0, 0, 0, 0 } in attach_ebpf() 344 { BPF_JMP | BPF_EXIT, 0, 0, 0, 0 } in test_filter_no_reuseport()
|
H A D | reuseport_bpf_numa.c | 83 { BPF_JMP | BPF_EXIT, 0, 0, 0, 0 } in attach_bpf()
|
H A D | psock_fanout.c | 186 { BPF_JMP | BPF_EXIT, 0, 0, 0, 0 } in sock_fanout_set_ebpf()
|
/linux/Documentation/bpf/ |
H A D | classic_vs_extended.rst | 317 BPF_EXIT 0x90 /* eBPF BPF_JMP only: function return */ 338 and perform function exit. eBPF is modeled to match CPU, so BPF_JMP | BPF_EXIT 340 value into register R0 before doing a BPF_EXIT. Class 6 in eBPF is used as
|
/linux/tools/include/linux/ |
H A D | filter.h | 363 .code = BPF_JMP | BPF_EXIT, \
|
/linux/drivers/net/ethernet/netronome/nfp/bpf/ |
H A D | main.h | 457 return op != BPF_JA && op != BPF_EXIT && op != BPF_CALL; in is_mbpf_cond_jump()
|
H A D | verifier.c | 654 if (meta->insn.code == (BPF_JMP | BPF_EXIT)) in nfp_verify_insn()
|
H A D | jit.c | 3536 [BPF_JMP | BPF_EXIT] = jmp_exit, 3565 if (meta->insn.code == (BPF_JMP | BPF_EXIT) && in nfp_fixup_branches() 3590 if (meta->insn.code == (BPF_JMP | BPF_EXIT)) in nfp_fixup_branches() 4504 if (BPF_OP(code) == BPF_EXIT) in nfp_bpf_jit_prepare()
|
/linux/arch/parisc/net/ |
H A D | bpf_jit_comp64.c | 415 case BPF_JMP | BPF_EXIT: in init_regs() 988 case BPF_JMP | BPF_EXIT: in bpf_jit_emit_insn()
|
H A D | bpf_jit_comp32.c | 1392 case BPF_JMP | BPF_EXIT: in bpf_jit_emit_insn()
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | sockopt.c | 977 insns[insns_cnt].code != (BPF_JMP | BPF_EXIT); in load_prog()
|
/linux/arch/riscv/net/ |
H A D | bpf_jit_comp64.c | 414 case BPF_JMP | BPF_EXIT: in init_regs() 1602 case BPF_JMP | BPF_EXIT: in bpf_jit_emit_insn()
|
H A D | bpf_jit_comp32.c | 1223 case BPF_JMP | BPF_EXIT: in bpf_jit_emit_insn()
|
/linux/arch/mips/net/ |
H A D | bpf_jit_comp64.c | 1047 case BPF_JMP | BPF_EXIT: in build_insn()
|
/linux/include/uapi/linux/ |
H A D | bpf.h | 47 #define BPF_EXIT 0x90 /* function return */ macro
|
/linux/tools/include/uapi/linux/ |
H A D | bpf.h | 47 #define BPF_EXIT 0x90 /* function return */ macro
|
/linux/arch/loongarch/net/ |
H A D | bpf_jit.c | 919 case BPF_JMP | BPF_EXIT: in build_insn()
|
/linux/include/linux/ |
H A D | filter.h | 486 .code = BPF_JMP | BPF_EXIT, \
|
/linux/arch/sparc/net/ |
H A D | bpf_jit_comp_64.c | 1233 case BPF_JMP | BPF_EXIT: in build_insn()
|