Searched refs:__bpf_call_base (Results 1 – 9 of 9) sorted by relevance
/openbmc/linux/include/linux/ |
H A D | filter.h | 375 #define BPF_CALL_IMM(x) ((void *)(x) - (void *)__bpf_call_base) 907 u64 __bpf_call_base(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5); 910 (void *)__bpf_call_base)
|
/openbmc/linux/kernel/bpf/ |
H A D | core.c | 1239 addr = (u8 *)__bpf_call_base + imm; in bpf_jit_get_func_addr() 1496 noinline u64 __bpf_call_base(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5) in __bpf_call_base() function 1500 EXPORT_SYMBOL_GPL(__bpf_call_base); 1967 BPF_R0 = (__bpf_call_base + insn->imm)(BPF_R1, BPF_R2, BPF_R3, in ___bpf_prog_run()
|
H A D | verifier.c | 19383 insn->imm = fn->func - __bpf_call_base; in do_misc_fixups()
|
/openbmc/linux/arch/x86/net/ |
H A D | bpf_jit_comp32.c | 1631 jmp_offset = (u8 *)__bpf_call_base + insn->imm - end_addr; in emit_kfunc_call() 2106 func = (u8 *) __bpf_call_base + imm32; in do_jit()
|
H A D | bpf_jit_comp.c | 1671 func = (u8 *) __bpf_call_base + imm32; in do_jit()
|
/openbmc/linux/arch/sparc/net/ |
H A D | bpf_jit_comp_64.c | 1216 u8 *func = ((u8 *)__bpf_call_base) + imm; in build_insn()
|
/openbmc/linux/arch/arm/net/ |
H A D | bpf_jit_32.c | 1786 const u32 func = (u32)__bpf_call_base + (u32)imm; in build_insn()
|
/openbmc/linux/net/core/ |
H A D | filter.c | 464 BUG_ON(__bpf_call_base(0, 0, 0, 0, 0) != 0); in convert_bpf_extensions()
|
/openbmc/linux/lib/ |
H A D | test_bpf.c | 15134 if ((long)__bpf_call_base + insn->imm != addr) in prepare_tail_call_tests()
|