/linux-master/samples/bpf/ |
H A D | sock_example.c | 48 struct bpf_insn prog[] = { local 62 size_t insns_cnt = ARRAY_SIZE(prog); 69 prog, insns_cnt, &opts); 71 printf("failed to load prog '%s'\n", strerror(errno));
|
H A D | tracex3_user.c | 110 struct bpf_program *prog; local 147 bpf_object__for_each_program(prog, obj) { 148 links[j] = bpf_program__attach(prog);
|
H A D | offwaketime_user.c | 99 struct bpf_program *prog; local 132 bpf_object__for_each_program(prog, obj) { 133 links[i] = bpf_program__attach(prog);
|
H A D | xdp_adjust_tail_user.c | 43 printf("couldn't find a prog id on a given iface\n"); 70 printf("Start a XDP prog which send ICMP \"packet too big\" \n" 78 printf(" -F force loading prog\n"); 90 struct bpf_program *prog; local 153 prog = bpf_object__next_program(obj, NULL); 154 bpf_program__set_type(prog, BPF_PROG_TYPE_XDP); 160 prog_fd = bpf_program__fd(prog); 189 printf("can't get prog info - %s\n", strerror(errno));
|
H A D | test_map_in_map_user.c | 119 struct bpf_program *prog; local 130 prog = bpf_object__find_program_by_name(obj, "trace_sys_connect"); 131 if (!prog) { 132 printf("finding a prog in obj file failed\n"); 155 link = bpf_program__attach(prog);
|
H A D | test_overhead_kprobe.bpf.c | 14 int prog(struct pt_regs *ctx) function
|
H A D | cpustat_user.c | 192 struct bpf_program *prog; local 204 prog = bpf_object__find_program_by_name(obj, "bpf_prog1"); 205 if (!prog) { 206 printf("finding a prog in obj file failed\n"); 223 link = bpf_program__attach(prog);
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | libbpf_probes.c | 89 #define CASE(prog, helper, supp) { \ 90 .prog_type_name = "BPF_PROG_TYPE_" # prog, \ 92 .prog_type = BPF_PROG_TYPE_ ## prog, \
|
H A D | get_stack_raw_tp.c | 94 struct bpf_program *prog; local 107 prog = bpf_object__find_program_by_name(obj, prog_name); 108 if (CHECK(!prog, "find_probe", "prog '%s' not found\n", prog_name)) 125 link = bpf_program__attach_raw_tracepoint(prog, "sys_enter");
|
H A D | link_pinning.c | 11 void test_link_pinning_subtest(struct bpf_program *prog, argument 19 link = bpf_program__attach(prog);
|
H A D | obj_name.c | 16 struct bpf_insn prog[] = { local 35 attr.insns = ptr_to_u64(prog); 43 "check-bpf-prog-name",
|
/linux-master/drivers/net/ethernet/amazon/ena/ |
H A D | ena_xdp.c | 193 /* Provides a way for both kernel and bpf-prog to know 234 struct bpf_prog *prog, 243 old_bpf_prog = xchg(&rx_ring->xdp_bpf_prog, prog); 245 if (!old_bpf_prog && prog) { 247 } else if (old_bpf_prog && !prog) { 254 struct bpf_prog *prog) 256 struct bpf_prog *old_bpf_prog = xchg(&adapter->xdp_bpf_prog, prog); 259 prog, 291 struct bpf_prog *prog = bpf->prog; local 233 ena_xdp_exchange_program_rx_in_range(struct ena_adapter *adapter, struct bpf_prog *prog, int first, int count) argument 253 ena_xdp_exchange_program(struct ena_adapter *adapter, struct bpf_prog *prog) argument [all...] |
/linux-master/arch/loongarch/net/ |
H A D | bpf_jit.c | 64 * eBPF prog stack layout: 84 * | prog->aux->stack_depth | 93 bpf_stack_adjust = round_up(ctx->prog->aux->stack_depth, 16); 187 * Call the next bpf prog and skip the first instruction 248 * prog = array->ptrs[index]; 249 * if (!prog) 259 /* goto *(prog->bpf_func + 4); */ 419 if (!ctx->image || !ctx->prog->aux->extable) 426 if (WARN_ON_ONCE(ctx->num_exentries >= ctx->prog->aux->num_exentries)) 429 ex = &ctx->prog 1127 const struct bpf_prog *prog = ctx->prog; local 1181 bpf_int_jit_compile(struct bpf_prog *prog) argument [all...] |
/linux-master/drivers/gpu/drm/nouveau/nvkm/subdev/fb/ |
H A D | ramgf108.c | 52 .prog = gf100_ram_prog,
|
H A D | nv25.c | 52 .tile.prog = nv20_fb_tile_prog,
|
H A D | nv46.c | 49 .tile.prog = nv44_fb_tile_prog,
|
/linux-master/tools/testing/selftests/seccomp/ |
H A D | seccomp_bpf.c | 394 struct sock_fprog prog = { local 407 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); 428 struct sock_fprog prog = { }; local 440 prog.filter = filter; 441 prog.len = count; 444 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); 446 TH_LOG("Installing %d insn filter was allowed", prog.len); 450 prog.len -= 1; 451 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); 453 TH_LOG("Installing %d insn filter wasn't allowed", prog 465 struct sock_fprog prog = { }; local 502 struct sock_fprog prog = { local 525 struct sock_fprog prog = { local 550 struct sock_fprog prog = { local 567 struct sock_fprog prog = { local 586 struct sock_fprog prog = { local 608 struct sock_fprog prog = { local 630 struct sock_fprog prog = { local 651 struct sock_fprog prog = { local 673 struct sock_fprog prog = { local 706 struct sock_fprog prog = { local 745 struct sock_fprog prog = { local 930 struct sock_fprog prog = { local 1047 struct sock_fprog prog; local 1658 struct sock_fprog prog; local 2035 struct sock_fprog prog; local 2142 struct sock_fprog prog = { local 2243 struct sock_fprog prog = { local 2266 struct sock_fprog prog = { local 2291 struct sock_fprog prog = { local 2310 struct sock_fprog prog = { local 2362 struct sock_fprog prog = { local 2489 struct sock_fprog prog = { local 2519 struct sock_fprog *prog; member in struct:tsync_sibling 2670 struct sock_fprog prog = { local 3035 struct sock_fprog prog = { local 3294 struct sock_fprog prog = { local 3351 struct sock_fprog prog = { local 3372 struct sock_fprog prog = { local [all...] |
/linux-master/net/core/ |
H A D | sock_map.c | 28 * - protect race between prog/link attach/detach and link prog update, and 34 static int sock_map_prog_update(struct bpf_map *map, struct bpf_prog *prog, 68 int sock_map_get_from_fd(const union bpf_attr *attr, struct bpf_prog *prog) argument 83 ret = sock_map_prog_update(map, prog, NULL, NULL, attr->attach_type); 92 struct bpf_prog *prog; local 105 prog = bpf_prog_get(attr->attach_bpf_fd); 106 if (IS_ERR(prog)) { 107 ret = PTR_ERR(prog); 111 if (prog 764 struct bpf_prog *prog; local 1375 struct bpf_prog *prog; local 1524 sock_map_prog_update(struct bpf_map *map, struct bpf_prog *prog, struct bpf_prog *old, struct bpf_link *link, u32 which) argument 1561 struct bpf_prog *prog; local 1745 sock_map_link_update_prog(struct bpf_link *link, struct bpf_prog *prog, struct bpf_prog *old) argument 1837 sock_map_link_create(const union bpf_attr *attr, struct bpf_prog *prog) argument 1897 sock_map_iter_attach_target(struct bpf_prog *prog, union bpf_iter_link_info *linfo, struct bpf_iter_aux_info *aux) argument [all...] |
/linux-master/kernel/trace/ |
H A D | bpf_trace.c | 953 static bool bpf_d_path_allowed(const struct bpf_prog *prog) argument 955 if (prog->type == BPF_PROG_TYPE_TRACING && 956 prog->expected_attach_type == BPF_TRACE_ITER) 959 if (prog->type == BPF_PROG_TYPE_LSM) 960 return bpf_lsm_is_sleepable_hook(prog->aux->attach_btf_id); 963 prog->aux->attach_btf_id); 1484 static int bpf_get_file_xattr_filter(const struct bpf_prog *prog, u32 kfunc_id) argument 1490 return prog->type != BPF_PROG_TYPE_LSM ? -EACCES : 0; 1507 bpf_tracing_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) argument 1610 if (bpf_prog_check_recur(prog)) 1634 is_kprobe_multi(const struct bpf_prog *prog) argument 1640 is_kprobe_session(const struct bpf_prog *prog) argument 1646 kprobe_prog_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) argument 1677 kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 1772 tp_prog_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) argument 1788 tp_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 1876 pe_prog_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) argument 2011 raw_tp_prog_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) argument 2028 tracing_prog_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) argument 2096 raw_tp_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 2104 tracing_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 2112 bpf_prog_test_run_tracing(struct bpf_prog *prog, const union bpf_attr *kattr, union bpf_attr __user *uattr) argument 2139 raw_tp_writable_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 2160 pe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 2198 pe_prog_convert_ctx_access(enum bpf_access_type type, const struct bpf_insn *si, struct bpf_insn *insn_buf, struct bpf_prog *prog, u32 *target_size) argument 2247 perf_event_attach_bpf_prog(struct perf_event *event, struct bpf_prog *prog, u64 bpf_cookie) argument 2389 struct bpf_prog *prog = link->link.prog; local 2459 struct bpf_prog *prog = link->link.prog; local 2485 struct bpf_prog *prog; local 2993 bpf_kprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog) argument 3138 bpf_kprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog) argument 3293 struct bpf_prog *prog = link->link.prog; local 3365 bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog) argument 3508 bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog) argument 3548 bpf_kprobe_multi_filter(const struct bpf_prog *prog, u32 kfunc_id) argument [all...] |
/linux-master/tools/testing/selftests/futex/functional/ |
H A D | futex_wait_uninitialized_heap.c | 42 void usage(char *prog) argument 44 printf("Usage: %s\n", prog);
|
H A D | futex_wait_private_mapped_file.c | 43 void usage(char *prog) argument 45 printf("Usage: %s\n", prog);
|
H A D | futex_requeue_pi_mismatched_ops.c | 35 void usage(char *prog) argument 37 printf("Usage: %s\n", prog);
|
H A D | futex_requeue.c | 19 void usage(char *prog) argument 21 printf("Usage: %s\n", prog);
|
H A D | futex_wait_wouldblock.c | 31 void usage(char *prog) argument 33 printf("Usage: %s\n", prog);
|
/linux-master/net/netfilter/ |
H A D | nf_bpf_link.c | 14 const struct bpf_prog *prog = bpf_prog; local 20 return bpf_prog_run(prog, &ctx); 202 return -ERANGE; /* cannot use defrag if prog runs before nf_defrag */ 207 int bpf_nf_link_attach(const union bpf_attr *attr, struct bpf_prog *prog) argument 225 bpf_link_init(&link->link, BPF_LINK_TYPE_NETFILTER, &bpf_nf_link_lops, prog); 229 link->hook_ops.priv = prog; 287 const struct bpf_prog *prog, 315 bpf_nf_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) argument 317 return bpf_base_func_proto(func_id, prog); 286 nf_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument
|