/linux-6.3-rc2/net/core/ |
A D | ptp_classifier.c | 106 return bpf_prog_run(ptp_insns, skb); in ptp_classify_raw()
|
A D | filter.c | 10957 action = bpf_prog_run(prog, &reuse_kern); in bpf_run_sk_reuseport()
|
/linux-6.3-rc2/Documentation/bpf/ |
A D | index.rst | 26 bpf_prog_run
|
/linux-6.3-rc2/kernel/bpf/ |
A D | cgroup.c | 84 ctx, bpf_prog_run, 0, NULL); in __cgroup_bpf_run_lsm_sock() 106 ctx, bpf_prog_run, 0, NULL); in __cgroup_bpf_run_lsm_socket() 125 ctx, bpf_prog_run, 0, NULL); in __cgroup_bpf_run_lsm_current() 1442 return bpf_prog_run_array_cg(&cgrp->bpf, atype, sk, bpf_prog_run, 0, in __cgroup_bpf_run_filter_sk() 1488 return bpf_prog_run_array_cg(&cgrp->bpf, atype, &ctx, bpf_prog_run, in __cgroup_bpf_run_filter_sock_addr() 1515 return bpf_prog_run_array_cg(&cgrp->bpf, atype, sock_ops, bpf_prog_run, in __cgroup_bpf_run_filter_sock_ops() 1533 ret = bpf_prog_run_array_cg(&cgrp->bpf, atype, &ctx, bpf_prog_run, 0, in __cgroup_bpf_check_dev_permission() 1724 ret = bpf_prog_run_array_cg(&cgrp->bpf, atype, &ctx, bpf_prog_run, 0, in __cgroup_bpf_run_filter_sysctl() 1818 &ctx, bpf_prog_run, 0, NULL); in __cgroup_bpf_run_filter_setsockopt() 1918 &ctx, bpf_prog_run, retval, NULL); in __cgroup_bpf_run_filter_getsockopt() [all …]
|
A D | bpf_iter.c | 705 ret = bpf_prog_run(prog, ctx); in bpf_iter_run_prog() 713 ret = bpf_prog_run(prog, ctx); in bpf_iter_run_prog()
|
A D | syscall.c | 5168 attr->test.retval = bpf_prog_run(prog, (void *) (long) attr->test.ctx_in); in kern_sys_bpf()
|
/linux-6.3-rc2/net/netfilter/ |
A D | xt_bpf.c | 93 return bpf_prog_run(info->filter, skb); in bpf_mt()
|
/linux-6.3-rc2/net/sched/ |
A D | act_bpf.c | 51 filter_res = bpf_prog_run(filter, skb); in tcf_bpf_act() 55 filter_res = bpf_prog_run(filter, skb); in tcf_bpf_act()
|
A D | cls_bpf.c | 101 filter_res = bpf_prog_run(prog->filter, skb); in cls_bpf_classify() 105 filter_res = bpf_prog_run(prog->filter, skb); in cls_bpf_classify()
|
/linux-6.3-rc2/include/linux/ |
A D | filter.h | 606 static __always_inline u32 bpf_prog_run(const struct bpf_prog *prog, const void *ctx) in bpf_prog_run() function 625 ret = bpf_prog_run(prog, ctx); in bpf_prog_run_pin_on_cpu() 731 res = bpf_prog_run(prog, skb); in __bpf_prog_run_save_cb() 1454 act = BPF_PROG_SK_LOOKUP_RUN_ARRAY(run_array, ctx, bpf_prog_run); in bpf_sk_lookup_run_v4() 1493 act = BPF_PROG_SK_LOOKUP_RUN_ARRAY(run_array, ctx, bpf_prog_run); in bpf_sk_lookup_run_v6()
|
/linux-6.3-rc2/drivers/media/rc/ |
A D | bpf-lirc.c | 222 &raw->bpf_sample, bpf_prog_run); in lirc_bpf_run()
|
/linux-6.3-rc2/net/bpf/ |
A D | test_run.c | 410 *retval = bpf_prog_run(prog, ctx); in bpf_test_run() 880 info->retval = bpf_prog_run(info->prog, info->ctx); in __bpf_prog_test_run_raw_tp() 1611 retval = BPF_PROG_SK_LOOKUP_RUN_ARRAY(progs, ctx, bpf_prog_run); in bpf_prog_test_run_sk_lookup()
|
/linux-6.3-rc2/drivers/net/ppp/ |
A D | ppp_generic.c | 1755 bpf_prog_run(ppp->pass_filter, skb) == 0) { in ppp_send_frame() 1765 bpf_prog_run(ppp->active_filter, skb) == 0)) in ppp_send_frame() 2479 bpf_prog_run(ppp->pass_filter, skb) == 0) { in ppp_receive_nonmp_frame() 2488 bpf_prog_run(ppp->active_filter, skb) == 0)) in ppp_receive_nonmp_frame()
|
/linux-6.3-rc2/drivers/net/team/ |
A D | team_mode_loadbalance.c | 200 lhash = bpf_prog_run(fp, skb); in lb_get_skb_hash()
|
/linux-6.3-rc2/kernel/trace/ |
A D | bpf_trace.c | 137 ctx, bpf_prog_run); in trace_call_bpf() 2263 (void) bpf_prog_run(prog, args); in __bpf_trace_run() 2637 err = bpf_prog_run(link->link.prog, regs); in kprobe_multi_link_prog_run()
|
A D | trace_uprobe.c | 1352 ret = bpf_prog_run_array_sleepable(call->prog_array, regs, bpf_prog_run); in __uprobe_perf_func()
|
/linux-6.3-rc2/Documentation/networking/ |
A D | filter.rst | 645 bpf_prog_run(filter, ctx) transparently invokes eBPF interpreter or JITed
|
/linux-6.3-rc2/kernel/events/ |
A D | core.c | 10356 ret = bpf_prog_run(prog, &ctx); in bpf_overflow_handler()
|
/linux-6.3-rc2/lib/ |
A D | test_bpf.c | 14534 ret = bpf_prog_run(fp, data); in __run_one()
|