/linux-6.12.1/tools/testing/selftests/bpf/ |
D | test_loader.c | 74 struct expected_msgs jited; member 131 free_msgs(&spec->priv.jited); in free_test_spec() 132 free_msgs(&spec->unpriv.jited); in free_test_spec() 449 &spec->priv.jited); in parse_test_spec() 461 &spec->unpriv.jited); in parse_test_spec() 594 if (spec->unpriv.jited.cnt == 0) in parse_test_spec() 595 clone_msgs(&spec->priv.jited, &spec->unpriv.jited); in parse_test_spec() 650 static void emit_jited(const char *jited, bool force) in emit_jited() argument 654 fprintf(stdout, "JITED:\n=============\n%s=============\n", jited); in emit_jited() 982 if (subspec->jited.cnt) { in run_subtest() [all …]
|
/linux-6.12.1/tools/bpf/bpftool/Documentation/ |
D | bpftool-prog.rst | 24 { **show** | **list** | **dump xlated** | **dump jited** | **pin** | **load** | 32 | **bpftool** **prog dump jited** *PROG* [{ **file** *FILE* | [**opcodes**] [**linum**] }] 111 bpftool prog dump jited *PROG* [{ file *FILE* | [opcodes] [linum] }] 112 Dump jited image (host machine code) of the program. 246 xlated 528B jited 370B memlock 4096B map_ids 10 263 "jited": true, 284 **# bpftool prog dump jited tag 005a3d2123620c8b** 305 **# bpftool prog dump jited pinned /sys/fs/bpf/prog opcodes** 328 xlated 488B jited 336B memlock 4096B map_ids 7
|
D | bpftool-map.rst | 237 xlated 240B jited 257B memlock 4096B map_ids 294 241 xlated 200B jited 164B memlock 4096B 245 xlated 200B jited 164B memlock 4096B 254 owner_prog_type xdp owner jited
|
D | common_options.rst | 11 dump jited**) and usage of BPF skeletons (some features like **bpftool prog
|
D | bpftool.rst | 32 *PROG-COMMANDS* := { **show** | **list** | **dump jited** | **dump xlated** | **pin** |
|
/linux-6.12.1/arch/parisc/net/ |
D | bpf_jit_core.c | 164 prog->jited = 1; in bpf_int_jit_compile() 173 prog->jited = 0; in bpf_int_jit_compile()
|
/linux-6.12.1/arch/riscv/net/ |
D | bpf_jit_core.c | 177 prog->jited = 1; in bpf_int_jit_compile() 250 if (prog->jited) { in bpf_jit_free()
|
/linux-6.12.1/arch/powerpc/net/ |
D | bpf_jit_comp.c | 224 fp->jited = 1; in bpf_int_jit_compile() 341 if (fp->jited) { in bpf_jit_free()
|
/linux-6.12.1/arch/arc/net/ |
D | bpf_jit_core.c | 147 if (bpf_jit_enable <= 1 || !ctx->prog->jited) in jit_dump() 175 ctx->is_extra_pass = ctx->prog->jited; in jit_ctx_init() 1249 prog->jited = 1; in jit_finalize() 1419 if (!prog->jited) in bpf_int_jit_compile()
|
/linux-6.12.1/kernel/bpf/ |
D | core.c | 184 (!prog->jited || !prog->aux->jited_linfo[0])) { in bpf_prog_jit_attempt_done() 685 return fp->jited && !bpf_prog_was_classic(fp); in bpf_prog_kallsyms_candidate() 1238 if (fp->jited) { in bpf_jit_free() 2324 map->owner.jited = fp->jited; in bpf_prog_map_compatible() 2330 map->owner.jited == fp->jited && in bpf_prog_map_compatible() 2425 if (!fp->jited && jit_needed) { in bpf_prog_select_runtime()
|
D | syscall.c | 860 u32 type = 0, jited = 0; in bpf_map_show_fdinfo() local 865 jited = map->owner.jited; in bpf_map_show_fdinfo() 890 seq_printf(m, "owner_jited:\t%u\n", jited); in bpf_map_show_fdinfo() 2329 prog->jited, in bpf_prog_show_fdinfo() 2797 prog->jited = 0; in bpf_prog_load()
|
D | trampoline.c | 656 p->jited = false; in cgroup_shim_alloc()
|
/linux-6.12.1/drivers/hid/bpf/progs/ |
D | README | 100 xlated 120B jited 77B memlock 4096B
|
/linux-6.12.1/arch/sparc/net/ |
D | bpf_jit_comp_32.c | 751 fp->jited = 1; in bpf_jit_compile() 760 if (fp->jited) in bpf_jit_free()
|
D | bpf_jit_comp_64.c | 1617 prog->jited = 1; in bpf_int_jit_compile()
|
/linux-6.12.1/arch/arm64/net/ |
D | bpf_jit_comp.c | 1908 prog->jited = 0; in bpf_int_jit_compile() 1932 prog->jited = 1; in bpf_int_jit_compile() 2029 if (!p->jited) in invoke_bpf_prog() 2682 if (prog->jited) { in bpf_jit_free()
|
/linux-6.12.1/tools/bpf/bpftool/bash-completion/ |
D | bpftool | 365 COMPREPLY+=( $( compgen -W "xlated jited" -- \ 369 xlated|jited)
|
/linux-6.12.1/arch/x86/net/ |
D | bpf_jit_comp.c | 2686 if (!p->jited) in invoke_bpf_prog() 3410 prog->jited = 0; in bpf_int_jit_compile() 3483 prog->jited = 1; in bpf_int_jit_compile() 3529 if (prog->jited) { in bpf_jit_free()
|
/linux-6.12.1/arch/loongarch/net/ |
D | bpf_jit.c | 1315 prog->jited = 1; in bpf_int_jit_compile() 1344 prog->jited = 0; in bpf_int_jit_compile()
|
/linux-6.12.1/include/linux/ |
D | filter.h | 1044 if (!fp->jited) { in bpf_prog_lock_ro() 1289 return fp->jited && bpf_jit_is_ebpf(); in bpf_prog_ebpf_jited()
|
D | bpf.h | 300 bool jited; member 1562 u16 jited:1, /* Is our filter JIT'ed? */ member
|
/linux-6.12.1/arch/mips/net/ |
D | bpf_jit_comp.c | 1024 prog->jited = 1; in bpf_int_jit_compile()
|
/linux-6.12.1/Documentation/bpf/ |
D | btf.rst | 15 info helps generate source annotated translated byte code, jited code and 950 $ bpftool prog dump jited pinned /sys/fs/bpf/test_btf_haskv
|
/linux-6.12.1/arch/s390/net/ |
D | bpf_jit_comp.c | 2348 fp->jited = 1; in bpf_int_jit_compile() 2515 if (!p->jited) in invoke_bpf_prog()
|
/linux-6.12.1/tools/perf/Documentation/ |
D | perf.data-file-format.txt | 350 a BPF program, including type, id, tag, jited/xlated instructions, etc.
|