/linux/include/linux/ |
H A D | bpf_lsm.h | 47 void bpf_lsm_find_cgroup_shim(const struct bpf_prog *prog, bpf_func_t *bpf_func); 80 bpf_func_t *bpf_func) in bpf_lsm_find_cgroup_shim() argument
|
H A D | tracepoint-defs.h | 58 void *bpf_func; member
|
H A D | bpf.h | 1288 bpf_func_t bpf_func) in bpf_dispatcher_nop_func() argument 1290 return bpf_func(ctx, insnsi); in bpf_dispatcher_nop_func() 1354 static_call(bpf_dispatcher_##name##_call)(ctx, insnsi, bpf_func) 1362 #define __BPF_DISPATCHER_CALL(name) bpf_func(ctx, insnsi) 1385 bpf_func_t bpf_func) \ 1397 bpf_func_t bpf_func); \ 1624 unsigned int (*bpf_func)(const void *ctx, member
|
H A D | filter.h | 677 unsigned int (*bpf_func)(const void *, 692 ret = dfunc(ctx, prog->insnsi, prog->bpf_func); in __bpf_prog_run() 701 ret = dfunc(ctx, prog->insnsi, prog->bpf_func); in __bpf_prog_run()
|
/linux/kernel/bpf/ |
H A D | bpf_lsm.c | 90 bpf_func_t *bpf_func) in BTF_SET_END() 97 *bpf_func = __cgroup_bpf_run_lsm_current; in BTF_SET_END() 105 *bpf_func = __cgroup_bpf_run_lsm_socket; in BTF_SET_END() 107 *bpf_func = __cgroup_bpf_run_lsm_sock; in BTF_SET_END() 110 *bpf_func = __cgroup_bpf_run_lsm_current; in BTF_SET_END()
|
H A D | core.c | 235 jited_linfo[0] = prog->bpf_func; in bpf_prog_fill_jited_linfo() 243 jited_linfo[i] = prog->bpf_func + in bpf_prog_fill_jited_linfo() 583 prog->aux->ksym.start = (unsigned long) prog->bpf_func; in bpf_prog_ksym_set_addr() 716 fp->aux->ksym_prefix.start = (unsigned long) fp->bpf_func - 16; in bpf_prog_kallsyms_add() 717 fp->aux->ksym_prefix.end = (unsigned long) fp->bpf_func; in bpf_prog_kallsyms_add() 1220 unsigned long real_start = (unsigned long)fp->bpf_func; in bpf_jit_binary_pack_hdr() 1230 unsigned long real_start = (unsigned long)fp->bpf_func; in bpf_jit_binary_hdr() 1272 addr = (u8 *)prog->aux->func[off]->bpf_func; in bpf_jit_get_func_addr() 2384 fp->bpf_func = interpreters[(round_up(stack_depth, 32) / 32) - 1]; in bpf_prog_select_func() 2386 fp->bpf_func = __bpf_prog_ret0_warn; in bpf_prog_select_func() [all …]
|
H A D | offload.c | 425 prog->bpf_func = bpf_prog_warn_on_exec; in bpf_prog_offload_compile()
|
H A D | syscall.c | 4802 img = (u8 *) prog->aux->func[i]->bpf_func; in bpf_prog_get_info_by_fd() 4811 if (copy_to_user(uinsns, prog->bpf_func, ulen)) in bpf_prog_get_info_by_fd() 4835 prog->aux->func[i]->bpf_func; in bpf_prog_get_info_by_fd() 4841 ksym_addr = (unsigned long) prog->bpf_func; in bpf_prog_get_info_by_fd()
|
H A D | verifier.c | 20320 insn[0].imm = (u32)(long)func[subprog]->bpf_func; in jit_subprogs() 20321 insn[1].imm = ((u64)(long)func[subprog]->bpf_func) >> 32; in jit_subprogs() 20327 insn->imm = BPF_CALL_IMM(func[subprog]->bpf_func); in jit_subprogs() 20346 old_bpf_func = func[i]->bpf_func; in jit_subprogs() 20348 if (tmp != func[i] || func[i]->bpf_func != old_bpf_func) { in jit_subprogs() 20388 prog->bpf_func = func[0]->bpf_func; in jit_subprogs() 20395 prog->aux->bpf_exception_cb = (void *)func[env->exception_callback_subprog]->bpf_func; in jit_subprogs() 22255 fname = kallsyms_lookup((unsigned long)btp->bpf_func, NULL, NULL, NULL, in bpf_check_attach_target() 22330 addr = (long) tgt_prog->bpf_func; in bpf_check_attach_target() 22332 addr = (long) tgt_prog->aux->func[subprog]->bpf_func; in bpf_check_attach_target()
|
/linux/arch/parisc/net/ |
H A D | bpf_jit_core.c | 163 prog->bpf_func = (void *)ctx->insns; in bpf_int_jit_compile() 172 prog->bpf_func = NULL; in bpf_int_jit_compile()
|
H A D | bpf_jit_comp64.c | 399 off = offsetof(struct bpf_prog, bpf_func); in emit_bpf_tail_call() 401 BUILD_BUG_ON(sizeof(bpfp.bpf_func) != 8); in emit_bpf_tail_call()
|
H A D | bpf_jit_comp32.c | 997 off = offsetof(struct bpf_prog, bpf_func); in emit_bpf_tail_call() 999 BUILD_BUG_ON(sizeof(bpfp.bpf_func) != 4); in emit_bpf_tail_call()
|
/linux/arch/x86/net/ |
H A D | bpf_jit_comp.c | 778 offsetof(struct bpf_prog, bpf_func)); in emit_bpf_tail_call_indirect() 873 (u8 *)target->bpf_func + in bpf_tail_call_direct_fixup() 2756 if (emit_rsb_call(&prog, p->bpf_func, image + (prog - (u8 *)rw_image))) in invoke_bpf_prog() 3529 prog->bpf_func = NULL; in bpf_int_jit_compile() 3602 prog->bpf_func = (void *)image + cfi_get_offset(); in bpf_int_jit_compile() 3671 prog->bpf_func = (void *)prog->bpf_func - cfi_get_offset(); in bpf_jit_free() 3725 old_addr = old ? (u8 *)old->bpf_func + poke->adj_off : NULL; in bpf_arch_poke_desc_update() 3726 new_addr = new ? (u8 *)new->bpf_func + poke->adj_off : NULL; in bpf_arch_poke_desc_update()
|
H A D | bpf_jit_comp32.c | 1369 offsetof(struct bpf_prog, bpf_func)); in emit_bpf_tail_call() 2604 prog->bpf_func = (void *)image; in bpf_int_jit_compile()
|
/linux/include/trace/ |
H A D | bpf_probe.h | 88 .bpf_func = __bpf_trace_##template, \
|
/linux/arch/sparc/net/ |
H A D | bpf_jit_comp_32.c | 750 fp->bpf_func = (void *)image; in bpf_jit_compile() 761 execmem_free(fp->bpf_func); in bpf_jit_free()
|
H A D | bpf_jit_comp_64.c | 887 off = offsetof(struct bpf_prog, bpf_func); in emit_tail_call() 1616 prog->bpf_func = (void *)ctx.image; in bpf_int_jit_compile()
|
/linux/arch/loongarch/net/ |
H A D | bpf_jit.c | 260 off = offsetof(struct bpf_prog, bpf_func); in emit_bpf_tail_call() 1317 prog->bpf_func = (void *)ctx.image; in bpf_int_jit_compile() 1343 prog->bpf_func = NULL; in bpf_int_jit_compile()
|
/linux/arch/arm/net/ |
H A D | bpf_jit_32.c | 1454 BUILD_BUG_ON(offsetof(struct bpf_prog, bpf_func) > in emit_bpf_tail_call() 1456 off = offsetof(struct bpf_prog, bpf_func); in emit_bpf_tail_call() 2270 prog->bpf_func = (void *)ctx.target; in bpf_int_jit_compile()
|
/linux/arch/s390/net/ |
H A D | bpf_jit_comp.c | 1874 offsetof(struct bpf_prog, bpf_func)); in bpf_jit_insn() 2347 fp->bpf_func = (void *) jit.prg_buf; in bpf_int_jit_compile() 2511 load_imm64(jit, REG_1, (u64)p->bpf_func); in invoke_bpf_prog()
|
/linux/arch/mips/net/ |
H A D | bpf_jit_comp.c | 1023 prog->bpf_func = (void *)ctx.target; in bpf_int_jit_compile()
|
H A D | bpf_jit_comp64.c | 517 off = offsetof(struct bpf_prog, bpf_func); in emit_tail_call()
|
/linux/arch/riscv/net/ |
H A D | bpf_jit_comp64.c | 398 off = offsetof(struct bpf_prog, bpf_func); in emit_bpf_tail_call() 775 ret = emit_call((const u64)p->bpf_func, true, ctx); in invoke_bpf_prog()
|
H A D | bpf_jit_comp32.c | 826 off = offsetof(struct bpf_prog, bpf_func); in emit_bpf_tail_call()
|
/linux/kernel/trace/ |
H A D | bpf_trace.c | 2430 return tracepoint_probe_register_may_exist(tp, (void *)btp->bpf_func, link); in bpf_probe_register() 2435 return tracepoint_probe_unregister(btp->tp, (void *)btp->bpf_func, link); in bpf_probe_unregister()
|