Searched refs:__bpf_call_base (Results 1 – 9 of 9) sorted by relevance
/linux-6.12.1/include/linux/ |
D | filter.h | 462 #define BPF_CALL_IMM(x) ((void *)(x) - (void *)__bpf_call_base) 1105 u64 __bpf_call_base(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5); 1108 (void *)__bpf_call_base)
|
/linux-6.12.1/kernel/bpf/ |
D | core.c | 1281 addr = (u8 *)__bpf_call_base + imm; in bpf_jit_get_func_addr() 1538 noinline u64 __bpf_call_base(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5) in __bpf_call_base() function 1542 EXPORT_SYMBOL_GPL(__bpf_call_base); 2010 BPF_R0 = (__bpf_call_base + insn->imm)(BPF_R1, BPF_R2, BPF_R3, in ___bpf_prog_run()
|
D | verifier.c | 21237 insn->imm = fn->func - __bpf_call_base; in do_misc_fixups()
|
/linux-6.12.1/arch/x86/net/ |
D | bpf_jit_comp32.c | 1631 jmp_offset = (u8 *)__bpf_call_base + insn->imm - end_addr; in emit_kfunc_call() 2106 func = (u8 *) __bpf_call_base + imm32; in do_jit()
|
D | bpf_jit_comp.c | 2129 func = (u8 *) __bpf_call_base + imm32; in do_jit()
|
/linux-6.12.1/arch/sparc/net/ |
D | bpf_jit_comp_64.c | 1216 u8 *func = ((u8 *)__bpf_call_base) + imm; in build_insn()
|
/linux-6.12.1/arch/arm/net/ |
D | bpf_jit_32.c | 2056 const u32 func = (u32)__bpf_call_base + (u32)imm; in build_insn()
|
/linux-6.12.1/net/core/ |
D | filter.c | 471 BUG_ON(__bpf_call_base(0, 0, 0, 0, 0) != 0); in convert_bpf_extensions()
|
/linux-6.12.1/lib/ |
D | test_bpf.c | 15496 if ((long)__bpf_call_base + insn->imm != addr) in prepare_tail_call_tests()
|