/linux-master/tools/bpf/ |
H A D | bpf_jit_disasm.c | 178 unsigned int proglen; local 188 ret = regcomp(®ex, "flen=[[:alnum:]]+ proglen=[[:digit:]]+ " 206 ret = sscanf(ptr, "flen=%d proglen=%u pass=%d image=%lx", 207 &flen, &proglen, &pass, &base); 212 if (proglen > 1000000) { 213 printf("proglen of %d too big, stopping\n", proglen); 217 image = malloc(proglen); 222 memset(image, 0, proglen); 225 while ((ptr = strtok(tmp, "\n")) != NULL && ulen < proglen) { [all...] |
/linux-master/arch/powerpc/net/ |
H A D | bpf_jit_comp.c | 53 u32 proglen; member in struct:powerpc_jit_data 64 u32 proglen; local 117 proglen = jit_data->proglen; 173 proglen = cgctx.idx * 4; 174 alloclen = proglen + FUNCTION_DESCR_SIZE + fixup_len + extable_len; 184 fp->aux->extable = (void *)fimage + FUNCTION_DESCR_SIZE + proglen + fixup_len; 207 proglen - (cgctx.idx * 4), cgctx.seen); 215 bpf_jit_dump(flen, proglen, pass, code_base); 225 fp->jited_len = proglen [all...] |
/linux-master/arch/sparc/net/ |
H A D | bpf_jit_comp_32.c | 328 unsigned int cleanup_addr, proglen, oldproglen = 0; local 345 for (proglen = 0, i = 0; i < flen; i++) { 346 proglen += 64; 347 addrs[i] = proglen; 349 cleanup_addr = proglen; /* epilogue address */ 355 proglen = 0; 713 if (unlikely(proglen + ilen > oldproglen)) { 719 memcpy(image + proglen, temp, ilen); 721 proglen += ilen; 722 addrs[i] = proglen; [all...] |
/linux-master/arch/x86/net/ |
H A D | bpf_jit_comp32.c | 1667 int proglen = 0; local 2471 ctx->cleanup_addr = proglen; 2502 if (unlikely(proglen + ilen > oldproglen || 2503 proglen + ilen != addrs[i])) { 2507 memcpy(image + proglen, temp, ilen); 2509 proglen += ilen; 2510 addrs[i] = proglen; 2513 return proglen; 2525 int proglen, oldproglen = 0; local 2558 for (proglen [all...] |
H A D | bpf_jit_comp.c | 1281 int ilen, proglen = 0; local 1318 memcpy(rw_image + proglen, temp, ilen); 1319 proglen += ilen; 1320 addrs[0] = proglen; 1764 u8 *_insn = image + proglen + (start_of_ldx - temp); 1864 u8 *_insn = image + proglen + (start_of_ldx - temp); 2245 ctx->cleanup_addr = proglen; 2284 if (unlikely(proglen + ilen > oldproglen || 2285 proglen + ilen != addrs[i])) { 2289 memcpy(rw_image + proglen, tem 3151 int proglen; member in struct:x64_jit_data 3164 int proglen, oldproglen = 0; local [all...] |
/linux-master/include/linux/ |
H A D | filter.h | 838 static inline unsigned int bpf_prog_size(unsigned int proglen) argument 841 offsetof(struct bpf_prog, insns[proglen])); 1067 bpf_jit_binary_alloc(unsigned int proglen, u8 **image_ptr, 1088 bpf_jit_binary_pack_alloc(unsigned int proglen, u8 **ro_image, 1109 static inline void bpf_jit_dump(unsigned int flen, unsigned int proglen, argument 1112 pr_err("flen=%u proglen=%u pass=%u image=%pK from=%s pid=%d\n", flen, 1113 proglen, pass, image, current->comm, task_pid_nr(current)); 1117 16, 1, image, proglen, false);
|
/linux-master/kernel/bpf/ |
H A D | core.c | 1062 bpf_jit_binary_alloc(unsigned int proglen, u8 **image_ptr, argument 1076 size = round_up(proglen + sizeof(*hdr) + 128, PAGE_SIZE); 1090 hole = min_t(unsigned int, size - (proglen + sizeof(*hdr)), 1117 bpf_jit_binary_pack_alloc(unsigned int proglen, u8 **image_ptr, argument 1130 size = round_up(proglen + sizeof(*ro_header) + 16, BPF_PROG_CHUNK_SIZE); 1151 hole = min_t(unsigned int, size - (proglen + sizeof(*ro_header)),
|