| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | tracepoint-defs.h | 51 void *bpf_func; member
|
| H A D | filter.h | 560 unsigned int (*bpf_func)(const void *ctx, member 581 __ret = dfunc(ctx, (prog)->insnsi, (prog)->bpf_func); \ 588 __ret = dfunc(ctx, (prog)->insnsi, (prog)->bpf_func); \ 846 unsigned long real_start = (unsigned long)fp->bpf_func; in bpf_jit_binary_hdr()
|
| H A D | bpf.h | 673 unsigned int (*bpf_func)(const void *, in bpf_dispatcher_nop_func() 676 return bpf_func(ctx, insnsi); in bpf_dispatcher_nop_func() 702 unsigned int (*bpf_func)(const void *, \ 705 return bpf_func(ctx, insnsi); \ 714 unsigned int (*bpf_func)(const void *, \
|
| /OK3568_Linux_fs/kernel/kernel/bpf/ |
| H A D | dispatcher.c | 100 *ipsp++ = (s64)(uintptr_t)d->progs[i].prog->bpf_func; in bpf_dispatcher_prepare()
|
| H A D | core.c | 207 jited_linfo[0] = prog->bpf_func; in bpf_prog_fill_jited_linfo() 215 jited_linfo[i] = prog->bpf_func + in bpf_prog_fill_jited_linfo() 545 prog->aux->ksym.start = (unsigned long) prog->bpf_func; in bpf_prog_ksym_set_addr() 949 addr = (u8 *)prog->aux->func[off]->bpf_func; in bpf_jit_get_func_addr() 1834 fp->bpf_func = interpreters[(round_up(stack_depth, 32) / 32) - 1]; in bpf_prog_select_func() 1836 fp->bpf_func = __bpf_prog_ret0_warn; in bpf_prog_select_func() 1853 if (fp->bpf_func) in bpf_prog_select_runtime() 1909 .bpf_func = __bpf_prog_ret1,
|
| H A D | trampoline.c | 407 prog->bpf_func); in bpf_trampoline_link_prog() 442 tr->extension_prog->bpf_func, NULL); in bpf_trampoline_unlink_prog()
|
| H A D | arraymap.c | 970 old_addr = old ? (u8 *)old->bpf_func + poke->adj_off : NULL; in prog_array_map_poke_run() 971 new_addr = new ? (u8 *)new->bpf_func + poke->adj_off : NULL; in prog_array_map_poke_run()
|
| H A D | offload.c | 258 prog->bpf_func = bpf_prog_warn_on_exec; in bpf_prog_offload_compile()
|
| H A D | syscall.c | 3540 img = (u8 *) prog->aux->func[i]->bpf_func; in bpf_prog_get_info_by_fd() 3549 if (copy_to_user(uinsns, prog->bpf_func, ulen)) in bpf_prog_get_info_by_fd() 3573 prog->aux->func[i]->bpf_func; in bpf_prog_get_info_by_fd() 3579 ksym_addr = (unsigned long) prog->bpf_func; in bpf_prog_get_info_by_fd()
|
| /OK3568_Linux_fs/kernel/arch/riscv/net/ |
| H A D | bpf_jit_core.c | 149 prog->bpf_func = (void *)ctx->insns; in bpf_int_jit_compile()
|
| H A D | bpf_jit_comp64.c | 335 off = offsetof(struct bpf_prog, bpf_func); in emit_bpf_tail_call()
|
| /OK3568_Linux_fs/kernel/include/trace/ |
| H A D | bpf_probe.h | 85 .bpf_func = __bpf_trace_##template, \
|
| /OK3568_Linux_fs/kernel/arch/powerpc/net/ |
| H A D | bpf_jit_comp.c | 669 fp->bpf_func = (void *)image; in bpf_jit_compile() 680 module_memfree(fp->bpf_func); in bpf_jit_free()
|
| H A D | bpf_jit_comp64.c | 275 PPC_BPF_LL(b2p[TMP_REG_1], b2p[TMP_REG_1], offsetof(struct bpf_prog, bpf_func)); in bpf_jit_emit_tail_call() 1298 fp->bpf_func = (void *)image; in bpf_int_jit_compile() 1327 unsigned long addr = (unsigned long)fp->bpf_func & PAGE_MASK; in bpf_jit_free()
|
| /OK3568_Linux_fs/kernel/arch/arm64/net/ |
| H A D | bpf_jit_comp.c | 312 off = offsetof(struct bpf_prog, bpf_func); in emit_bpf_tail_call() 1113 prog->bpf_func = NULL; in bpf_int_jit_compile() 1126 prog->bpf_func = (void *)ctx.image; in bpf_int_jit_compile()
|
| /OK3568_Linux_fs/kernel/arch/x86/net/ |
| H A D | bpf_jit_comp.c | 491 offsetof(struct bpf_prog, bpf_func)); in emit_bpf_tail_call_indirect() 578 (u8 *)target->bpf_func + in bpf_tail_call_direct_fixup() 1564 if (emit_call(&prog, p->bpf_func, prog)) in invoke_bpf_prog() 2135 prog->bpf_func = (void *)image; in bpf_int_jit_compile()
|
| H A D | bpf_jit_comp32.c | 1369 offsetof(struct bpf_prog, bpf_func)); in emit_bpf_tail_call() 2414 prog->bpf_func = (void *)image; in bpf_int_jit_compile()
|
| /OK3568_Linux_fs/kernel/arch/sparc/net/ |
| H A D | bpf_jit_comp_32.c | 750 fp->bpf_func = (void *)image; in bpf_jit_compile() 761 module_memfree(fp->bpf_func); in bpf_jit_free()
|
| H A D | bpf_jit_comp_64.c | 887 off = offsetof(struct bpf_prog, bpf_func); in emit_tail_call() 1601 prog->bpf_func = (void *)ctx.image; in bpf_int_jit_compile()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/progs/ |
| H A D | bpf_flow.c | 24 #define PROG_(NUM, NAME) SEC("flow_dissector/"#NUM) int bpf_func##NAME
|
| /OK3568_Linux_fs/kernel/arch/arm/net/ |
| H A D | bpf_jit_32.c | 1228 BUILD_BUG_ON(offsetof(struct bpf_prog, bpf_func) > in emit_bpf_tail_call() 1230 off = offsetof(struct bpf_prog, bpf_func); in emit_bpf_tail_call() 2028 prog->bpf_func = (void *)ctx.target; in bpf_int_jit_compile()
|
| /OK3568_Linux_fs/kernel/arch/mips/net/ |
| H A D | bpf_jit.c | 1286 fp->bpf_func = (void *)ctx.target; in bpf_jit_compile() 1296 module_memfree(fp->bpf_func); in bpf_jit_free()
|
| H A D | ebpf_jit.c | 644 off = offsetof(struct bpf_prog, bpf_func); in emit_bpf_tail_call() 1916 prog->bpf_func = (void *)ctx.target; in bpf_int_jit_compile()
|
| /OK3568_Linux_fs/kernel/arch/s390/net/ |
| H A D | bpf_jit_comp.c | 1366 offsetof(struct bpf_prog, bpf_func)); in bpf_jit_insn() 1816 fp->bpf_func = (void *) jit.prg_buf; in bpf_int_jit_compile()
|
| /OK3568_Linux_fs/kernel/kernel/trace/ |
| H A D | bpf_trace.c | 2106 return tracepoint_probe_register_may_exist(tp, (void *)btp->bpf_func, in __bpf_probe_register() 2117 return tracepoint_probe_unregister(btp->tp, (void *)btp->bpf_func, prog); in bpf_probe_unregister()
|