/linux/include/linux/ |
A D | tracepoint-defs.h | 51 void *bpf_func; member
|
A D | filter.h | 583 unsigned int (*bpf_func)(const void *ctx, member 604 unsigned int (*bpf_func)(const void *, 619 ret = dfunc(ctx, prog->insnsi, prog->bpf_func); in __bpf_prog_run() 626 ret = dfunc(ctx, prog->insnsi, prog->bpf_func); in __bpf_prog_run() 896 unsigned long real_start = (unsigned long)fp->bpf_func; in bpf_jit_binary_hdr()
|
A D | bpf.h | 724 unsigned int (*bpf_func)(const void *, in bpf_dispatcher_nop_func() 727 return bpf_func(ctx, insnsi); in bpf_dispatcher_nop_func() 753 unsigned int (*bpf_func)(const void *, \ 756 return bpf_func(ctx, insnsi); \ 765 unsigned int (*bpf_func)(const void *, \
|
/linux/kernel/bpf/ |
A D | dispatcher.c | 100 *ipsp++ = (s64)(uintptr_t)d->progs[i].prog->bpf_func; in bpf_dispatcher_prepare()
|
A D | core.c | 211 jited_linfo[0] = prog->bpf_func; in bpf_prog_fill_jited_linfo() 219 jited_linfo[i] = prog->bpf_func + in bpf_prog_fill_jited_linfo() 545 prog->aux->ksym.start = (unsigned long) prog->bpf_func; in bpf_prog_ksym_set_addr() 947 addr = (u8 *)prog->aux->func[off]->bpf_func; in bpf_jit_get_func_addr() 1886 fp->bpf_func = interpreters[(round_up(stack_depth, 32) / 32) - 1]; in bpf_prog_select_func() 1888 fp->bpf_func = __bpf_prog_ret0_warn; in bpf_prog_select_func() 1910 if (fp->bpf_func) in bpf_prog_select_runtime() 1966 .bpf_func = __bpf_prog_ret1,
|
A D | trampoline.c | 438 prog->bpf_func); in bpf_trampoline_link_prog() 473 tr->extension_prog->bpf_func, NULL); in bpf_trampoline_unlink_prog()
|
A D | arraymap.c | 1010 old_addr = old ? (u8 *)old->bpf_func + poke->adj_off : NULL; in prog_array_map_poke_run() 1011 new_addr = new ? (u8 *)new->bpf_func + poke->adj_off : NULL; in prog_array_map_poke_run()
|
A D | offload.c | 258 prog->bpf_func = bpf_prog_warn_on_exec; in bpf_prog_offload_compile()
|
A D | syscall.c | 3742 img = (u8 *) prog->aux->func[i]->bpf_func; in bpf_prog_get_info_by_fd() 3751 if (copy_to_user(uinsns, prog->bpf_func, ulen)) in bpf_prog_get_info_by_fd() 3775 prog->aux->func[i]->bpf_func; in bpf_prog_get_info_by_fd() 3781 ksym_addr = (unsigned long) prog->bpf_func; in bpf_prog_get_info_by_fd()
|
A D | verifier.c | 12705 insn[0].imm = (u32)(long)func[subprog]->bpf_func; in jit_subprogs() 12706 insn[1].imm = ((u64)(long)func[subprog]->bpf_func) >> 32; in jit_subprogs() 12712 insn->imm = BPF_CALL_IMM(func[subprog]->bpf_func); in jit_subprogs() 12730 old_bpf_func = func[i]->bpf_func; in jit_subprogs() 12732 if (tmp != func[i] || func[i]->bpf_func != old_bpf_func) { in jit_subprogs() 12767 prog->bpf_func = func[0]->bpf_func; in jit_subprogs() 13755 addr = (long) tgt_prog->bpf_func; in bpf_check_attach_target() 13757 addr = (long) tgt_prog->aux->func[subprog]->bpf_func; in bpf_check_attach_target()
|
/linux/arch/riscv/net/ |
A D | bpf_jit_core.c | 156 prog->bpf_func = (void *)ctx->insns; in bpf_int_jit_compile()
|
/linux/arch/powerpc/net/ |
A D | bpf_jit_comp.c | 239 fp->bpf_func = (void *)image; in bpf_int_jit_compile()
|
A D | bpf_jit_comp64.c | 257 PPC_BPF_LL(b2p[TMP_REG_1], b2p[TMP_REG_1], offsetof(struct bpf_prog, bpf_func)); in bpf_jit_emit_tail_call()
|
A D | bpf_jit_comp32.c | 246 EMIT(PPC_RAW_LWZ(_R3, _R3, offsetof(struct bpf_prog, bpf_func))); in bpf_jit_emit_tail_call()
|
/linux/include/trace/ |
A D | bpf_probe.h | 88 .bpf_func = __bpf_trace_##template, \
|
/linux/arch/arm64/net/ |
A D | bpf_jit_comp.c | 311 off = offsetof(struct bpf_prog, bpf_func); in emit_bpf_tail_call() 1114 prog->bpf_func = NULL; in bpf_int_jit_compile() 1124 prog->bpf_func = (void *)ctx.image; in bpf_int_jit_compile()
|
/linux/arch/sparc/net/ |
A D | bpf_jit_comp_32.c | 750 fp->bpf_func = (void *)image; in bpf_jit_compile() 761 module_memfree(fp->bpf_func); in bpf_jit_free()
|
A D | bpf_jit_comp_64.c | 887 off = offsetof(struct bpf_prog, bpf_func); in emit_tail_call() 1612 prog->bpf_func = (void *)ctx.image; in bpf_int_jit_compile()
|
/linux/arch/x86/net/ |
A D | bpf_jit_comp.c | 482 offsetof(struct bpf_prog, bpf_func)); in emit_bpf_tail_call_indirect() 572 (u8 *)target->bpf_func + in bpf_tail_call_direct_fixup() 1787 if (emit_call(&prog, p->bpf_func, prog)) in invoke_bpf_prog() 2363 prog->bpf_func = (void *)image; in bpf_int_jit_compile()
|
A D | bpf_jit_comp32.c | 1369 offsetof(struct bpf_prog, bpf_func)); in emit_bpf_tail_call() 2605 prog->bpf_func = (void *)image; in bpf_int_jit_compile()
|
/linux/arch/arm/net/ |
A D | bpf_jit_32.c | 1228 BUILD_BUG_ON(offsetof(struct bpf_prog, bpf_func) > in emit_bpf_tail_call() 1230 off = offsetof(struct bpf_prog, bpf_func); in emit_bpf_tail_call() 2022 prog->bpf_func = (void *)ctx.target; in bpf_int_jit_compile()
|
/linux/arch/s390/net/ |
A D | bpf_jit_comp.c | 1417 offsetof(struct bpf_prog, bpf_func)); in bpf_jit_insn() 1867 fp->bpf_func = (void *) jit.prg_buf; in bpf_int_jit_compile()
|
/linux/kernel/trace/ |
A D | bpf_trace.c | 2000 return tracepoint_probe_register_may_exist(tp, (void *)btp->bpf_func, in __bpf_probe_register() 2011 return tracepoint_probe_unregister(btp->tp, (void *)btp->bpf_func, prog); in bpf_probe_unregister()
|
/linux/arch/mips/net/ |
A D | bpf_jit_comp.c | 1018 prog->bpf_func = (void *)ctx.target; in bpf_int_jit_compile()
|
A D | bpf_jit_comp64.c | 514 off = offsetof(struct bpf_prog, bpf_func); in emit_tail_call()
|