Home
last modified time | relevance | path

Searched refs:BPF_PROG_RUN (Results 1 – 19 of 19) sorted by relevance

/Linux-v5.4/net/core/
Dptp_classifier.c106 return BPF_PROG_RUN(ptp_insns, skb); in ptp_classify_raw()
Dskmsg.c641 ret = BPF_PROG_RUN(prog, msg); in sk_psock_msg_verdict()
669 ret = BPF_PROG_RUN(prog, skb); in sk_psock_bpf_run()
Dflow_dissector.c816 result = BPF_PROG_RUN(prog, ctx); in bpf_flow_dissect()
Dfilter.c8706 action = BPF_PROG_RUN(prog, &reuse_kern); in bpf_run_sk_reuseport()
/Linux-v5.4/kernel/bpf/
Dcgroup.c675 ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], sk, BPF_PROG_RUN); in __cgroup_bpf_run_filter_sk()
719 ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], &ctx, BPF_PROG_RUN); in __cgroup_bpf_run_filter_sock_addr()
749 BPF_PROG_RUN); in __cgroup_bpf_run_filter_sock_ops()
768 BPF_PROG_RUN); in __cgroup_bpf_check_dev_permission()
926 ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], &ctx, BPF_PROG_RUN); in __cgroup_bpf_run_filter_sysctl()
1015 &ctx, BPF_PROG_RUN); in __cgroup_bpf_run_filter_setsockopt()
1099 &ctx, BPF_PROG_RUN); in __cgroup_bpf_run_filter_getsockopt()
/Linux-v5.4/net/netfilter/
Dxt_bpf.c93 return BPF_PROG_RUN(info->filter, skb); in bpf_mt()
/Linux-v5.4/net/sched/
Dact_bpf.c50 filter_res = BPF_PROG_RUN(filter, skb); in tcf_bpf_act()
54 filter_res = BPF_PROG_RUN(filter, skb); in tcf_bpf_act()
Dcls_bpf.c101 filter_res = BPF_PROG_RUN(prog->filter, skb); in cls_bpf_classify()
105 filter_res = BPF_PROG_RUN(prog->filter, skb); in cls_bpf_classify()
/Linux-v5.4/include/linux/
Dfilter.h556 #define BPF_PROG_RUN(prog, ctx) ({ \ macro
662 res = BPF_PROG_RUN(prog, skb); in __bpf_prog_run_save_cb()
691 res = BPF_PROG_RUN(prog, skb); in bpf_prog_run_clear_cb()
705 return BPF_PROG_RUN(prog, xdp); in bpf_prog_run_xdp()
/Linux-v5.4/drivers/media/rc/
Dbpf-lirc.c223 BPF_PROG_RUN_ARRAY(raw->progs, &raw->bpf_sample, BPF_PROG_RUN); in lirc_bpf_run()
/Linux-v5.4/net/bpf/
Dtest_run.c44 *retval = BPF_PROG_RUN(prog, ctx); in bpf_test_run()
/Linux-v5.4/kernel/trace/
Dbpf_trace.c114 ret = BPF_PROG_RUN_ARRAY_CHECK(call->prog_array, ctx, BPF_PROG_RUN); in trace_call_bpf()
1336 (void) BPF_PROG_RUN(prog, args); in __bpf_trace_run()
/Linux-v5.4/drivers/net/ppp/
Dppp_generic.c1516 BPF_PROG_RUN(ppp->pass_filter, skb) == 0) { in ppp_send_frame()
1526 BPF_PROG_RUN(ppp->active_filter, skb) == 0)) in ppp_send_frame()
2202 BPF_PROG_RUN(ppp->pass_filter, skb) == 0) { in ppp_receive_nonmp_frame()
2211 BPF_PROG_RUN(ppp->active_filter, skb) == 0)) in ppp_receive_nonmp_frame()
/Linux-v5.4/drivers/net/team/
Dteam_mode_loadbalance.c200 lhash = BPF_PROG_RUN(fp, skb); in lb_get_skb_hash()
/Linux-v5.4/kernel/
Dseccomp.c272 u32 cur_ret = BPF_PROG_RUN(f->prog, sd); in seccomp_run_filters()
/Linux-v5.4/net/kcm/
Dkcmsock.c384 res = BPF_PROG_RUN(prog, skb); in kcm_parse_func_strparser()
/Linux-v5.4/Documentation/networking/
Dfilter.txt601 BPF_PROG_RUN(filter, ctx) transparently invokes eBPF interpreter or JITed
/Linux-v5.4/lib/
Dtest_bpf.c6667 ret = BPF_PROG_RUN(fp, data); in __run_one()
/Linux-v5.4/kernel/events/
Dcore.c8967 ret = BPF_PROG_RUN(event->prog, &ctx); in bpf_overflow_handler()