| /linux/tools/testing/selftests/bpf/ |
| H A D | test_loader.c | 75 struct expected_msgs jited; 137 free_msgs(&spec->priv.jited); in free_test_spec() 138 free_msgs(&spec->unpriv.jited); in free_test_spec() 504 &spec->priv.jited); in parse_test_spec() 516 &spec->unpriv.jited); in parse_test_spec() 609 if (strcmp(val, "jited") == 0) { in parse_test_spec() 704 if (spec->unpriv.jited.cnt == 0) in emit_jited() 705 clone_msgs(&spec->priv.jited, &spec->unpriv.jited); in emit_jited() 764 static void emit_jited(const char *jited, boo in validate_msgs() 81 struct expected_msgs jited; global() member 703 emit_jited(const char * jited,bool force) emit_jited() argument [all...] |
| /linux/tools/bpf/bpftool/Documentation/ |
| H A D | bpftool-prog.rst | 24 { **show** | **list** | **dump xlated** | **dump jited** | **pin** | **load** | 32 | **bpftool** **prog dump jited** *PROG* [{ **file** *FILE* | [**opcodes**] [**linum**] }] 112 bpftool prog dump jited *PROG* [{ file *FILE* | [opcodes] [linum] }] 113 Dump jited image (host machine code) of the program. 271 xlated 528B jited 370B memlock 4096B map_ids 10 288 "jited": true, 309 **# bpftool prog dump jited tag 005a3d2123620c8b** 330 **# bpftool prog dump jited pinned /sys/fs/bpf/prog opcodes** 353 xlated 488B jited 336B memlock 4096B map_ids 7
|
| H A D | bpftool-map.rst | 238 xlated 240B jited 257B memlock 4096B map_ids 294 242 xlated 200B jited 164B memlock 4096B 246 xlated 200B jited 164B memlock 4096B 255 owner_prog_type xdp owner jited
|
| H A D | common_options.rst | 11 dump jited**) and usage of BPF skeletons (some features like **bpftool prog
|
| H A D | bpftool.rst | 32 *PROG-COMMANDS* := { **show** | **list** | **dump jited** | **dump xlated** | **pin** |
|
| /linux/arch/parisc/net/ |
| H A D | bpf_jit_core.c | 164 prog->jited = 1; in bpf_int_jit_compile() 173 prog->jited = 0; in bpf_int_jit_compile()
|
| /linux/arch/riscv/net/ |
| H A D | bpf_jit_core.c | 176 prog->jited = 1; in bpf_int_jit_compile() 249 if (prog->jited) { in bpf_jit_free()
|
| H A D | bpf_jit_comp64.c | 969 if (!p->jited) in invoke_bpf_prog()
|
| /linux/arch/arc/net/ |
| H A D | bpf_jit_core.c | 147 if (bpf_jit_enable <= 1 || !ctx->prog->jited) in jit_dump() 175 ctx->is_extra_pass = ctx->prog->jited; in jit_ctx_init() 1249 prog->jited = 1; in jit_finalize() 1419 if (!prog->jited) in bpf_int_jit_compile()
|
| /linux/kernel/bpf/ |
| H A D | core.c | 195 (!prog->jited || !prog->aux->jited_linfo[0])) { in bpf_prog_jit_attempt_done() 666 return fp->jited && !bpf_prog_was_classic(fp); in bpf_prog_kallsyms_candidate() 1237 if (fp->jited) { in bpf_jit_free() 2402 map->owner->jited = fp->jited; in __bpf_prog_map_compatible() 2415 map->owner->jited == fp->jited && in __bpf_prog_map_compatible() 2549 if (!fp->jited && jit_needed) { in bpf_prog_select_runtime()
|
| H A D | syscall.c | 1011 u32 type = 0, jited = 0; in bpf_map_show_fdinfo() local 1016 jited = map->owner->jited; in bpf_map_show_fdinfo() 1041 seq_printf(m, "owner_jited:\t%u\n", jited); in bpf_map_show_fdinfo() 2506 prog->jited, in bpf_prog_show_fdinfo() 3040 prog->jited = 0; in bpf_prog_load()
|
| H A D | trampoline.c | 941 p->jited = false; in cgroup_shim_alloc()
|
| /linux/drivers/hid/bpf/progs/ |
| H A D | README | 100 xlated 120B jited 77B memlock 4096B
|
| /linux/arch/powerpc/net/ |
| H A D | bpf_jit_comp.c | 299 fp->jited = 1; in bpf_int_jit_compile() 419 if (fp->jited) { in bpf_jit_free() 561 if (!p->jited) in invoke_bpf_prog()
|
| /linux/arch/sparc/net/ |
| H A D | bpf_jit_comp_32.c | 751 fp->jited = 1; in bpf_jit_compile() 760 if (fp->jited) in bpf_jit_free()
|
| H A D | bpf_jit_comp_64.c | 1617 prog->jited = 1; in bpf_int_jit_compile()
|
| /linux/arch/arm64/net/ |
| H A D | bpf_jit_comp.c | 2197 prog->jited = 0; in bpf_int_jit_compile() 2221 prog->jited = 1; in bpf_int_jit_compile() 2335 if (!p->jited) in invoke_bpf_prog() 3173 if (prog->jited) { in bpf_jit_free()
|
| /linux/arch/loongarch/net/ |
| H A D | bpf_jit.c | 1519 if (!p->jited) in invoke_bpf_prog() 2058 prog->jited = 1; in bpf_int_jit_compile() 2092 if (prog->jited) { in bpf_jit_free()
|
| /linux/arch/x86/net/ |
| H A D | bpf_jit_comp.c | 3030 if (!p->jited) in invoke_bpf_prog() 3836 prog->jited = 0; in bpf_int_jit_compile() 3918 prog->jited = 1; in bpf_int_jit_compile() 3969 if (prog->jited) { in bpf_jit_free()
|
| H A D | bpf_jit_comp32.c | 2605 prog->jited = 1; in bpf_int_jit_compile()
|
| /linux/arch/mips/net/ |
| H A D | bpf_jit_comp.c | 1024 prog->jited = 1; in bpf_int_jit_compile()
|
| /linux/arch/s390/net/ |
| H A D | bpf_jit_comp.c | 2388 fp->jited = 1; in bpf_int_jit_compile() 2552 if (!p->jited) in invoke_bpf_prog()
|
| /linux/tools/perf/Documentation/ |
| H A D | perf.data-file-format.txt | 350 a BPF program, including type, id, tag, jited/xlated instructions, etc.
|
| /linux/include/linux/ |
| H A D | bpf.h | 288 bool jited; member 1777 u16 jited:1, /* Is our filter JIT'ed? */ member
|
| /linux/arch/arm/net/ |
| H A D | bpf_jit_32.c | 2271 prog->jited = 1; in bpf_int_jit_compile()
|