/linux-master/kernel/bpf/ |
H A D | core.c | 1077 bpf_jit_binary_alloc(unsigned int proglen, u8 **image_ptr, argument 1091 size = round_up(proglen + sizeof(*hdr) + 128, PAGE_SIZE); 1105 hole = min_t(unsigned int, size - (proglen + sizeof(*hdr)), 1132 bpf_jit_binary_pack_alloc(unsigned int proglen, u8 **image_ptr, argument 1145 size = round_up(proglen + sizeof(*ro_header) + 16, BPF_PROG_CHUNK_SIZE); 1166 hole = min_t(unsigned int, size - (proglen + sizeof(*ro_header)),
|
/linux-master/arch/sparc/net/ |
H A D | bpf_jit_comp_32.c | 328 unsigned int cleanup_addr, proglen, oldproglen = 0; local 345 for (proglen = 0, i = 0; i < flen; i++) { 346 proglen += 64; 347 addrs[i] = proglen; 349 cleanup_addr = proglen; /* epilogue address */ 355 proglen = 0; 713 if (unlikely(proglen + ilen > oldproglen)) { 719 memcpy(image + proglen, temp, ilen); 721 proglen += ilen; 722 addrs[i] = proglen; [all...] |
/linux-master/arch/powerpc/net/ |
H A D | bpf_jit_comp.c | 53 u32 proglen; member in struct:powerpc_jit_data 64 u32 proglen; local 117 proglen = jit_data->proglen; 173 proglen = cgctx.idx * 4; 174 alloclen = proglen + FUNCTION_DESCR_SIZE + fixup_len + extable_len; 184 fp->aux->extable = (void *)fimage + FUNCTION_DESCR_SIZE + proglen + fixup_len; 207 proglen - (cgctx.idx * 4), cgctx.seen); 215 bpf_jit_dump(flen, proglen, pass, code_base); 225 fp->jited_len = proglen [all...] |
/linux-master/include/linux/ |
H A D | filter.h | 872 static inline unsigned int bpf_prog_size(unsigned int proglen) argument 875 offsetof(struct bpf_prog, insns[proglen])); 1106 bpf_jit_binary_alloc(unsigned int proglen, u8 **image_ptr, 1127 bpf_jit_binary_pack_alloc(unsigned int proglen, u8 **ro_image, 1148 static inline void bpf_jit_dump(unsigned int flen, unsigned int proglen, argument 1151 pr_err("flen=%u proglen=%u pass=%u image=%pK from=%s pid=%d\n", flen, 1152 proglen, pass, image, current->comm, task_pid_nr(current)); 1156 16, 1, image, proglen, false);
|
/linux-master/arch/x86/net/ |
H A D | bpf_jit_comp32.c | 1667 int proglen = 0; local 2471 ctx->cleanup_addr = proglen; 2502 if (unlikely(proglen + ilen > oldproglen || 2503 proglen + ilen != addrs[i])) { 2507 memcpy(image + proglen, temp, ilen); 2509 proglen += ilen; 2510 addrs[i] = proglen; 2513 return proglen; 2525 int proglen, oldproglen = 0; local 2558 for (proglen [all...] |
H A D | bpf_jit_comp.c | 1332 int ilen, proglen = 0; local 1369 memcpy(rw_image + proglen, temp, ilen); 1370 proglen += ilen; 1371 addrs[0] = proglen; 1824 u8 *_insn = image + proglen + (start_of_ldx - temp); 1924 u8 *_insn = image + proglen + (start_of_ldx - temp); 2314 ctx->cleanup_addr = proglen; 2353 if (unlikely(proglen + ilen > oldproglen || 2354 proglen + ilen != addrs[i])) { 2358 memcpy(rw_image + proglen, tem 3217 int proglen; member in struct:x64_jit_data 3230 int proglen, oldproglen = 0; local [all...] |
/linux-master/tools/bpf/ |
H A D | bpf_jit_disasm.c | 178 unsigned int proglen; local 188 ret = regcomp(®ex, "flen=[[:alnum:]]+ proglen=[[:digit:]]+ " 206 ret = sscanf(ptr, "flen=%d proglen=%u pass=%d image=%lx", 207 &flen, &proglen, &pass, &base); 212 if (proglen > 1000000) { 213 printf("proglen of %d too big, stopping\n", proglen); 217 image = malloc(proglen); 222 memset(image, 0, proglen); 225 while ((ptr = strtok(tmp, "\n")) != NULL && ulen < proglen) { [all...] |