| /OK3568_Linux_fs/kernel/net/core/ |
| H A D | ptp_classifier.c | 106 return BPF_PROG_RUN(ptp_insns, skb); in ptp_classify_raw()
|
| H A D | filter.c | 9922 action = BPF_PROG_RUN(prog, &reuse_kern); in bpf_run_sk_reuseport()
|
| /OK3568_Linux_fs/kernel/kernel/bpf/ |
| H A D | cgroup.c | 1098 ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], sk, BPF_PROG_RUN); in __cgroup_bpf_run_filter_sk() 1142 ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], &ctx, BPF_PROG_RUN); in __cgroup_bpf_run_filter_sock_addr() 1172 BPF_PROG_RUN); in __cgroup_bpf_run_filter_sock_ops() 1191 BPF_PROG_RUN); in __cgroup_bpf_check_dev_permission() 1322 ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], &ctx, BPF_PROG_RUN); in __cgroup_bpf_run_filter_sysctl() 1418 &ctx, BPF_PROG_RUN); in __cgroup_bpf_run_filter_setsockopt() 1511 &ctx, BPF_PROG_RUN); in __cgroup_bpf_run_filter_getsockopt()
|
| H A D | bpf_iter.c | 652 ret = BPF_PROG_RUN(prog, ctx); in bpf_iter_run_prog()
|
| /OK3568_Linux_fs/kernel/net/netfilter/ |
| H A D | xt_bpf.c | 93 return BPF_PROG_RUN(info->filter, skb); in bpf_mt()
|
| /OK3568_Linux_fs/kernel/net/sched/ |
| H A D | act_bpf.c | 51 filter_res = BPF_PROG_RUN(filter, skb); in tcf_bpf_act() 55 filter_res = BPF_PROG_RUN(filter, skb); in tcf_bpf_act()
|
| H A D | cls_bpf.c | 101 filter_res = BPF_PROG_RUN(prog->filter, skb); in cls_bpf_classify() 105 filter_res = BPF_PROG_RUN(prog->filter, skb); in cls_bpf_classify()
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | filter.h | 592 #define BPF_PROG_RUN(prog, ctx) \ macro 715 res = BPF_PROG_RUN(prog, skb); in __bpf_prog_run_save_cb() 1407 act = BPF_PROG_SK_LOOKUP_RUN_ARRAY(run_array, ctx, BPF_PROG_RUN); in bpf_sk_lookup_run_v4() 1445 act = BPF_PROG_SK_LOOKUP_RUN_ARRAY(run_array, ctx, BPF_PROG_RUN); in bpf_sk_lookup_run_v6()
|
| /OK3568_Linux_fs/kernel/net/bpf/ |
| H A D | test_run.c | 116 *retval = BPF_PROG_RUN(prog, ctx); in bpf_test_run() 303 info->retval = BPF_PROG_RUN(info->prog, info->ctx); in __bpf_prog_test_run_raw_tp() 882 retval = BPF_PROG_SK_LOOKUP_RUN_ARRAY(progs, ctx, BPF_PROG_RUN); in bpf_prog_test_run_sk_lookup()
|
| /OK3568_Linux_fs/kernel/drivers/media/rc/ |
| H A D | bpf-lirc.c | 220 BPF_PROG_RUN_ARRAY(raw->progs, &raw->bpf_sample, BPF_PROG_RUN); in lirc_bpf_run()
|
| /OK3568_Linux_fs/kernel/drivers/net/ppp/ |
| H A D | ppp_generic.c | 1620 BPF_PROG_RUN(ppp->pass_filter, skb) == 0) { in ppp_send_frame() 1630 BPF_PROG_RUN(ppp->active_filter, skb) == 0)) in ppp_send_frame() 2306 BPF_PROG_RUN(ppp->pass_filter, skb) == 0) { in ppp_receive_nonmp_frame() 2315 BPF_PROG_RUN(ppp->active_filter, skb) == 0)) in ppp_receive_nonmp_frame()
|
| /OK3568_Linux_fs/kernel/drivers/net/team/ |
| H A D | team_mode_loadbalance.c | 200 lhash = BPF_PROG_RUN(fp, skb); in lb_get_skb_hash()
|
| /OK3568_Linux_fs/kernel/kernel/trace/ |
| H A D | bpf_trace.c | 124 ret = BPF_PROG_RUN_ARRAY_CHECK(call->prog_array, ctx, BPF_PROG_RUN); in trace_call_bpf() 2043 (void) BPF_PROG_RUN(prog, args); in __bpf_trace_run()
|
| /OK3568_Linux_fs/kernel/Documentation/networking/ |
| H A D | filter.rst | 633 BPF_PROG_RUN(filter, ctx) transparently invokes eBPF interpreter or JITed
|
| /OK3568_Linux_fs/kernel/lib/ |
| H A D | test_bpf.c | 6647 ret = BPF_PROG_RUN(fp, data); in __run_one()
|
| /OK3568_Linux_fs/kernel/kernel/events/ |
| H A D | core.c | 9720 ret = BPF_PROG_RUN(event->prog, &ctx); in bpf_overflow_handler()
|