/linux-6.12.1/arch/x86/net/ |
D | bpf_jit_comp.c | 2638 int run_ctx_off, bool save_ret, in invoke_bpf_prog() argument 2657 emit_stx(&prog, BPF_DW, BPF_REG_FP, BPF_REG_1, -run_ctx_off + ctx_cookie_off); in invoke_bpf_prog() 2662 if (!is_imm8(-run_ctx_off)) in invoke_bpf_prog() 2663 EMIT3_off32(0x48, 0x8D, 0xB5, -run_ctx_off); in invoke_bpf_prog() 2665 EMIT4(0x48, 0x8D, 0x75, -run_ctx_off); in invoke_bpf_prog() 2714 if (!is_imm8(-run_ctx_off)) in invoke_bpf_prog() 2715 EMIT3_off32(0x48, 0x8D, 0x95, -run_ctx_off); in invoke_bpf_prog() 2717 EMIT4(0x48, 0x8D, 0x55, -run_ctx_off); in invoke_bpf_prog() 2753 int run_ctx_off, bool save_ret, in invoke_bpf() argument 2761 run_ctx_off, save_ret, image, rw_image)) in invoke_bpf() [all …]
|
/linux-6.12.1/arch/arm64/net/ |
D | bpf_jit_comp.c | 1986 int args_off, int retval_off, int run_ctx_off, in invoke_bpf_prog() argument 2000 emit(A64_STR64I(A64_ZR, A64_SP, run_ctx_off + cookie_off), ctx); in invoke_bpf_prog() 2003 emit(A64_STR64I(A64_R(10), A64_SP, run_ctx_off + cookie_off), in invoke_bpf_prog() 2015 emit(A64_ADD_I(1, A64_R(1), A64_SP, run_ctx_off), ctx); in invoke_bpf_prog() 2047 emit(A64_ADD_I(1, A64_R(2), A64_SP, run_ctx_off), ctx); in invoke_bpf_prog() 2053 int args_off, int retval_off, int run_ctx_off, in invoke_bpf_mod_ret() argument 2064 run_ctx_off, true); in invoke_bpf_mod_ret() 2120 int run_ctx_off; in prepare_trampoline() local 2153 run_ctx_off = stack_size; in prepare_trampoline() 2233 retval_off, run_ctx_off, in prepare_trampoline() [all …]
|
/linux-6.12.1/arch/riscv/net/ |
D | bpf_jit_comp64.c | 739 int run_ctx_off, bool save_ret, struct rv_jit_context *ctx) in invoke_bpf_prog() argument 747 emit_sd(RV_REG_FP, -run_ctx_off + cookie_off, RV_REG_T1, ctx); in invoke_bpf_prog() 749 emit_sd(RV_REG_FP, -run_ctx_off + cookie_off, RV_REG_ZERO, ctx); in invoke_bpf_prog() 755 emit_addi(RV_REG_A1, RV_REG_FP, -run_ctx_off, ctx); in invoke_bpf_prog() 796 emit_addi(RV_REG_A2, RV_REG_FP, -run_ctx_off, ctx); in invoke_bpf_prog() 811 int retval_off, args_off, nregs_off, ip_off, run_ctx_off, sreg_off, stk_arg_off; in __arch_prepare_bpf_trampoline() local 893 run_ctx_off = stack_size; in __arch_prepare_bpf_trampoline() 958 ret = invoke_bpf_prog(fentry->links[i], args_off, retval_off, run_ctx_off, in __arch_prepare_bpf_trampoline() 973 run_ctx_off, true, ctx); in __arch_prepare_bpf_trampoline() 1006 run_ctx_off, false, ctx); in __arch_prepare_bpf_trampoline()
|
/linux-6.12.1/arch/s390/net/ |
D | bpf_jit_comp.c | 2453 int run_ctx_off; /* Offset of struct bpf_tramp_run_ctx */ member 2473 int cookie_off = tjit->run_ctx_off + in invoke_bpf_prog() 2497 EMIT4_DISP(0x41000000, REG_3, REG_15, tjit->run_ctx_off); in invoke_bpf_prog() 2542 EMIT4_DISP(0x41000000, REG_4, REG_15, tjit->run_ctx_off); in invoke_bpf_prog() 2629 tjit->run_ctx_off = alloc_stack(tjit, in __arch_prepare_bpf_trampoline()
|