Home
last modified time | relevance | path

Searched refs:jit (Results 1 - 5 of 5) sorted by relevance

/kernel/linux/linux-6.6/arch/s390/net/
H A Dbpf_jit_comp.c117 static inline void reg_set_seen(struct bpf_jit *jit, u32 b1) in reg_set_seen() argument
121 if (r1 >= 6 && r1 <= 15 && !jit->seen_reg[r1]) in reg_set_seen()
122 jit->seen_reg[r1] = 1; in reg_set_seen()
127 reg_set_seen(jit, b1); \
130 #define REG_SEEN(b1) jit->seen_reg[reg2hex[(b1)]]
138 if (jit->prg_buf) \
139 *(u16 *) (jit->prg_buf + jit->prg) = (op); \
140 jit->prg += 2; \
152 if (jit
338 is_first_pass(struct bpf_jit *jit) is_first_pass() argument
347 is_codegen_pass(struct bpf_jit *jit) is_codegen_pass() argument
363 can_use_rel(struct bpf_jit *jit, int off) can_use_rel() argument
381 can_use_ldisp_for_lit32(struct bpf_jit *jit) can_use_ldisp_for_lit32() argument
390 can_use_ldisp_for_lit64(struct bpf_jit *jit) can_use_ldisp_for_lit64() argument
406 save_regs(struct bpf_jit *jit, u32 rs, u32 re) save_regs() argument
421 restore_regs(struct bpf_jit *jit, u32 rs, u32 re, u32 stack_depth) restore_regs() argument
439 get_start(struct bpf_jit *jit, int start) get_start() argument
453 get_end(struct bpf_jit *jit, int start) get_end() argument
470 save_restore_regs(struct bpf_jit *jit, int op, u32 stack_depth) save_restore_regs() argument
497 bpf_skip(struct bpf_jit *jit, int size) bpf_skip() argument
551 bpf_jit_prologue(struct bpf_jit *jit, struct bpf_prog *fp, u32 stack_depth) bpf_jit_prologue() argument
607 emit_expoline(struct bpf_jit *jit) emit_expoline() argument
618 emit_r1_thunk(struct bpf_jit *jit) emit_r1_thunk() argument
631 call_r1(struct bpf_jit *jit) call_r1() argument
644 bpf_jit_epilogue(struct bpf_jit *jit, u32 stack_depth) bpf_jit_epilogue() argument
693 bpf_jit_probe_mem(struct bpf_jit *jit, struct bpf_prog *fp, int probe_prg, int nop_prg) bpf_jit_probe_mem() argument
744 sign_extend(struct bpf_jit *jit, int r, u8 size, u8 flags) sign_extend() argument
775 bpf_jit_insn(struct bpf_jit *jit, struct bpf_prog *fp, int i, bool extra_pass, u32 stack_depth) bpf_jit_insn() argument
1779 bpf_is_new_addr_sane(struct bpf_jit *jit, int i) bpf_is_new_addr_sane() argument
1796 bpf_set_addr(struct bpf_jit *jit, int i) bpf_set_addr() argument
1814 bpf_jit_prog(struct bpf_jit *jit, struct bpf_prog *fp, bool extra_pass, u32 stack_depth) bpf_jit_prog() argument
1867 bpf_jit_alloc(struct bpf_jit *jit, struct bpf_prog *fp) bpf_jit_alloc() argument
1901 struct bpf_jit jit; bpf_int_jit_compile() local
2097 load_imm64(struct bpf_jit *jit, int dst_reg, u64 val) load_imm64() argument
2109 struct bpf_jit *jit = &tjit->common; invoke_bpf_prog() local
2215 struct bpf_jit *jit = &tjit->common; __arch_prepare_bpf_trampoline() local
[all...]
/kernel/linux/linux-5.10/arch/s390/net/
H A Dbpf_jit_comp.c111 static inline void reg_set_seen(struct bpf_jit *jit, u32 b1) in reg_set_seen() argument
115 if (r1 >= 6 && r1 <= 15 && !jit->seen_reg[r1]) in reg_set_seen()
116 jit->seen_reg[r1] = 1; in reg_set_seen()
121 reg_set_seen(jit, b1); \
124 #define REG_SEEN(b1) jit->seen_reg[reg2hex[(b1)]]
132 if (jit->prg_buf) \
133 *(u16 *) (jit->prg_buf + jit->prg) = (op); \
134 jit->prg += 2; \
146 if (jit
332 is_first_pass(struct bpf_jit *jit) is_first_pass() argument
341 is_codegen_pass(struct bpf_jit *jit) is_codegen_pass() argument
357 can_use_rel(struct bpf_jit *jit, int off) can_use_rel() argument
375 can_use_ldisp_for_lit32(struct bpf_jit *jit) can_use_ldisp_for_lit32() argument
384 can_use_ldisp_for_lit64(struct bpf_jit *jit) can_use_ldisp_for_lit64() argument
400 save_regs(struct bpf_jit *jit, u32 rs, u32 re) save_regs() argument
415 restore_regs(struct bpf_jit *jit, u32 rs, u32 re, u32 stack_depth) restore_regs() argument
433 get_start(struct bpf_jit *jit, int start) get_start() argument
447 get_end(struct bpf_jit *jit, int start) get_end() argument
464 save_restore_regs(struct bpf_jit *jit, int op, u32 stack_depth) save_restore_regs() argument
491 bpf_skip(struct bpf_jit *jit, int size) bpf_skip() argument
515 bpf_jit_prologue(struct bpf_jit *jit, u32 stack_depth) bpf_jit_prologue() argument
563 bpf_jit_epilogue(struct bpf_jit *jit, u32 stack_depth) bpf_jit_epilogue() argument
641 bpf_jit_probe_mem(struct bpf_jit *jit, struct bpf_prog *fp, int probe_prg, int nop_prg) bpf_jit_probe_mem() argument
693 bpf_jit_insn(struct bpf_jit *jit, struct bpf_prog *fp, int i, bool extra_pass, u32 stack_depth) bpf_jit_insn() argument
1617 bpf_is_new_addr_sane(struct bpf_jit *jit, int i) bpf_is_new_addr_sane() argument
1634 bpf_set_addr(struct bpf_jit *jit, int i) bpf_set_addr() argument
1652 bpf_jit_prog(struct bpf_jit *jit, struct bpf_prog *fp, bool extra_pass, u32 stack_depth) bpf_jit_prog() argument
1705 bpf_jit_alloc(struct bpf_jit *jit, struct bpf_prog *fp) bpf_jit_alloc() argument
1739 struct bpf_jit jit; bpf_int_jit_compile() local
[all...]
/kernel/linux/linux-5.10/drivers/net/ethernet/netronome/nfp/
H A DMakefile63 bpf/jit.o
/kernel/linux/linux-6.6/drivers/net/ethernet/netronome/nfp/
H A DMakefile72 bpf/jit.o
/kernel/linux/linux-6.6/tools/perf/tests/shell/
H A Dtest_intel_pt.sh335 snprintf(filename, sizeof(filename), "jit-%d.dump", getpid());
413 perf inject -i "${tmpfile}" -o "${perfdatafile}" --jit

Completed in 4 milliseconds