Searched refs:BPF_PROG_RUN (Results 1 – 17 of 17) sorted by relevance
/Linux-v4.19/net/core/ |
D | ptp_classifier.c | 114 return BPF_PROG_RUN(ptp_insns, skb); in ptp_classify_raw()
|
D | filter.c | 7093 action = BPF_PROG_RUN(prog, &reuse_kern); in bpf_run_sk_reuseport()
|
/Linux-v4.19/kernel/bpf/ |
D | cgroup.c | 566 ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], sk, BPF_PROG_RUN); in __cgroup_bpf_run_filter_sk() 610 ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], &ctx, BPF_PROG_RUN); in __cgroup_bpf_run_filter_sock_addr() 640 BPF_PROG_RUN); in __cgroup_bpf_run_filter_sock_ops() 659 BPF_PROG_RUN); in __cgroup_bpf_check_dev_permission()
|
/Linux-v4.19/net/netfilter/ |
D | xt_bpf.c | 96 return BPF_PROG_RUN(info->filter, skb); in bpf_mt()
|
/Linux-v4.19/net/sched/ |
D | act_bpf.c | 53 filter_res = BPF_PROG_RUN(filter, skb); in tcf_bpf_act() 57 filter_res = BPF_PROG_RUN(filter, skb); in tcf_bpf_act()
|
D | cls_bpf.c | 104 filter_res = BPF_PROG_RUN(prog->filter, skb); in cls_bpf_classify() 108 filter_res = BPF_PROG_RUN(prog->filter, skb); in cls_bpf_classify()
|
/Linux-v4.19/include/linux/ |
D | filter.h | 513 #define BPF_PROG_RUN(filter, ctx) (*(filter)->bpf_func)(ctx, (filter)->insnsi) macro 600 res = BPF_PROG_RUN(prog, skb); in bpf_prog_run_save_cb() 616 return BPF_PROG_RUN(prog, skb); in bpf_prog_run_clear_cb() 628 return BPF_PROG_RUN(prog, xdp); in bpf_prog_run_xdp()
|
/Linux-v4.19/net/bpf/ |
D | test_run.c | 22 ret = BPF_PROG_RUN(prog, ctx); in bpf_test_run_one()
|
/Linux-v4.19/drivers/media/rc/ |
D | bpf-lirc.c | 190 BPF_PROG_RUN_ARRAY(raw->progs, &raw->bpf_sample, BPF_PROG_RUN); in lirc_bpf_run()
|
/Linux-v4.19/drivers/isdn/i4l/ |
D | isdn_ppp.c | 1189 && BPF_PROG_RUN(is->pass_filter, skb) == 0) { in isdn_ppp_push_higher() 1196 && BPF_PROG_RUN(is->active_filter, skb) == 0)) { in isdn_ppp_push_higher() 1335 && BPF_PROG_RUN(ipt->pass_filter, skb) == 0) { in isdn_ppp_xmit() 1342 && BPF_PROG_RUN(ipt->active_filter, skb) == 0)) { in isdn_ppp_xmit() 1532 && BPF_PROG_RUN(is->pass_filter, skb) == 0; in isdn_ppp_autodial_filter() 1534 && BPF_PROG_RUN(is->active_filter, skb) == 0; in isdn_ppp_autodial_filter()
|
/Linux-v4.19/kernel/trace/ |
D | bpf_trace.c | 72 ret = BPF_PROG_RUN_ARRAY_CHECK(call->prog_array, ctx, BPF_PROG_RUN); in trace_call_bpf() 1093 (void) BPF_PROG_RUN(prog, args); in __bpf_trace_run()
|
/Linux-v4.19/drivers/net/ppp/ |
D | ppp_generic.c | 1520 BPF_PROG_RUN(ppp->pass_filter, skb) == 0) { in ppp_send_frame() 1530 BPF_PROG_RUN(ppp->active_filter, skb) == 0)) in ppp_send_frame() 2163 BPF_PROG_RUN(ppp->pass_filter, skb) == 0) { in ppp_receive_nonmp_frame() 2172 BPF_PROG_RUN(ppp->active_filter, skb) == 0)) in ppp_receive_nonmp_frame()
|
/Linux-v4.19/drivers/net/team/ |
D | team_mode_loadbalance.c | 204 lhash = BPF_PROG_RUN(fp, skb); in lb_get_skb_hash()
|
/Linux-v4.19/kernel/ |
D | seccomp.c | 211 u32 cur_ret = BPF_PROG_RUN(f->prog, sd); in seccomp_run_filters()
|
/Linux-v4.19/Documentation/networking/ |
D | filter.txt | 598 BPF_PROG_RUN(filter, ctx) transparently invokes eBPF interpreter or JITed
|
/Linux-v4.19/lib/ |
D | test_bpf.c | 6671 ret = BPF_PROG_RUN(fp, data); in __run_one()
|
/Linux-v4.19/kernel/events/ |
D | core.c | 8516 ret = BPF_PROG_RUN(event->prog, &ctx); in bpf_overflow_handler()
|