Searched refs:prog (Results 151 - 175 of 465) sorted by relevance

1234567891011>>

/linux-master/samples/bpf/
H A Dsock_example.c48 struct bpf_insn prog[] = { local
62 size_t insns_cnt = ARRAY_SIZE(prog);
69 prog, insns_cnt, &opts);
71 printf("failed to load prog '%s'\n", strerror(errno));
H A Dtracex3_user.c110 struct bpf_program *prog; local
147 bpf_object__for_each_program(prog, obj) {
148 links[j] = bpf_program__attach(prog);
H A Doffwaketime_user.c99 struct bpf_program *prog; local
132 bpf_object__for_each_program(prog, obj) {
133 links[i] = bpf_program__attach(prog);
H A Dxdp_adjust_tail_user.c43 printf("couldn't find a prog id on a given iface\n");
70 printf("Start a XDP prog which send ICMP \"packet too big\" \n"
78 printf(" -F force loading prog\n");
90 struct bpf_program *prog; local
153 prog = bpf_object__next_program(obj, NULL);
154 bpf_program__set_type(prog, BPF_PROG_TYPE_XDP);
160 prog_fd = bpf_program__fd(prog);
189 printf("can't get prog info - %s\n", strerror(errno));
H A Dtest_map_in_map_user.c119 struct bpf_program *prog; local
130 prog = bpf_object__find_program_by_name(obj, "trace_sys_connect");
131 if (!prog) {
132 printf("finding a prog in obj file failed\n");
155 link = bpf_program__attach(prog);
H A Dtest_overhead_kprobe.bpf.c14 int prog(struct pt_regs *ctx) function
H A Dcpustat_user.c192 struct bpf_program *prog; local
204 prog = bpf_object__find_program_by_name(obj, "bpf_prog1");
205 if (!prog) {
206 printf("finding a prog in obj file failed\n");
223 link = bpf_program__attach(prog);
/linux-master/tools/testing/selftests/bpf/prog_tests/
H A Dlibbpf_probes.c89 #define CASE(prog, helper, supp) { \
90 .prog_type_name = "BPF_PROG_TYPE_" # prog, \
92 .prog_type = BPF_PROG_TYPE_ ## prog, \
H A Dget_stack_raw_tp.c94 struct bpf_program *prog; local
107 prog = bpf_object__find_program_by_name(obj, prog_name);
108 if (CHECK(!prog, "find_probe", "prog '%s' not found\n", prog_name))
125 link = bpf_program__attach_raw_tracepoint(prog, "sys_enter");
H A Dlink_pinning.c11 void test_link_pinning_subtest(struct bpf_program *prog, argument
19 link = bpf_program__attach(prog);
H A Dobj_name.c16 struct bpf_insn prog[] = { local
35 attr.insns = ptr_to_u64(prog);
43 "check-bpf-prog-name",
/linux-master/drivers/net/ethernet/amazon/ena/
H A Dena_xdp.c193 /* Provides a way for both kernel and bpf-prog to know
234 struct bpf_prog *prog,
243 old_bpf_prog = xchg(&rx_ring->xdp_bpf_prog, prog);
245 if (!old_bpf_prog && prog) {
247 } else if (old_bpf_prog && !prog) {
254 struct bpf_prog *prog)
256 struct bpf_prog *old_bpf_prog = xchg(&adapter->xdp_bpf_prog, prog);
259 prog,
291 struct bpf_prog *prog = bpf->prog; local
233 ena_xdp_exchange_program_rx_in_range(struct ena_adapter *adapter, struct bpf_prog *prog, int first, int count) argument
253 ena_xdp_exchange_program(struct ena_adapter *adapter, struct bpf_prog *prog) argument
[all...]
/linux-master/arch/loongarch/net/
H A Dbpf_jit.c64 * eBPF prog stack layout:
84 * | prog->aux->stack_depth |
93 bpf_stack_adjust = round_up(ctx->prog->aux->stack_depth, 16);
187 * Call the next bpf prog and skip the first instruction
248 * prog = array->ptrs[index];
249 * if (!prog)
259 /* goto *(prog->bpf_func + 4); */
419 if (!ctx->image || !ctx->prog->aux->extable)
426 if (WARN_ON_ONCE(ctx->num_exentries >= ctx->prog->aux->num_exentries))
429 ex = &ctx->prog
1127 const struct bpf_prog *prog = ctx->prog; local
1181 bpf_int_jit_compile(struct bpf_prog *prog) argument
[all...]
/linux-master/drivers/gpu/drm/nouveau/nvkm/subdev/fb/
H A Dramgf108.c52 .prog = gf100_ram_prog,
H A Dnv25.c52 .tile.prog = nv20_fb_tile_prog,
H A Dnv46.c49 .tile.prog = nv44_fb_tile_prog,
/linux-master/tools/testing/selftests/seccomp/
H A Dseccomp_bpf.c394 struct sock_fprog prog = { local
407 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0);
428 struct sock_fprog prog = { }; local
440 prog.filter = filter;
441 prog.len = count;
444 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0);
446 TH_LOG("Installing %d insn filter was allowed", prog.len);
450 prog.len -= 1;
451 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0);
453 TH_LOG("Installing %d insn filter wasn't allowed", prog
465 struct sock_fprog prog = { }; local
502 struct sock_fprog prog = { local
525 struct sock_fprog prog = { local
550 struct sock_fprog prog = { local
567 struct sock_fprog prog = { local
586 struct sock_fprog prog = { local
608 struct sock_fprog prog = { local
630 struct sock_fprog prog = { local
651 struct sock_fprog prog = { local
673 struct sock_fprog prog = { local
706 struct sock_fprog prog = { local
745 struct sock_fprog prog = { local
930 struct sock_fprog prog = { local
1047 struct sock_fprog prog; local
1658 struct sock_fprog prog; local
2035 struct sock_fprog prog; local
2142 struct sock_fprog prog = { local
2243 struct sock_fprog prog = { local
2266 struct sock_fprog prog = { local
2291 struct sock_fprog prog = { local
2310 struct sock_fprog prog = { local
2362 struct sock_fprog prog = { local
2489 struct sock_fprog prog = { local
2519 struct sock_fprog *prog; member in struct:tsync_sibling
2670 struct sock_fprog prog = { local
3035 struct sock_fprog prog = { local
3294 struct sock_fprog prog = { local
3351 struct sock_fprog prog = { local
3372 struct sock_fprog prog = { local
[all...]
/linux-master/net/core/
H A Dsock_map.c28 * - protect race between prog/link attach/detach and link prog update, and
34 static int sock_map_prog_update(struct bpf_map *map, struct bpf_prog *prog,
68 int sock_map_get_from_fd(const union bpf_attr *attr, struct bpf_prog *prog) argument
83 ret = sock_map_prog_update(map, prog, NULL, NULL, attr->attach_type);
92 struct bpf_prog *prog; local
105 prog = bpf_prog_get(attr->attach_bpf_fd);
106 if (IS_ERR(prog)) {
107 ret = PTR_ERR(prog);
111 if (prog
764 struct bpf_prog *prog; local
1375 struct bpf_prog *prog; local
1524 sock_map_prog_update(struct bpf_map *map, struct bpf_prog *prog, struct bpf_prog *old, struct bpf_link *link, u32 which) argument
1561 struct bpf_prog *prog; local
1745 sock_map_link_update_prog(struct bpf_link *link, struct bpf_prog *prog, struct bpf_prog *old) argument
1837 sock_map_link_create(const union bpf_attr *attr, struct bpf_prog *prog) argument
1897 sock_map_iter_attach_target(struct bpf_prog *prog, union bpf_iter_link_info *linfo, struct bpf_iter_aux_info *aux) argument
[all...]
/linux-master/kernel/trace/
H A Dbpf_trace.c953 static bool bpf_d_path_allowed(const struct bpf_prog *prog) argument
955 if (prog->type == BPF_PROG_TYPE_TRACING &&
956 prog->expected_attach_type == BPF_TRACE_ITER)
959 if (prog->type == BPF_PROG_TYPE_LSM)
960 return bpf_lsm_is_sleepable_hook(prog->aux->attach_btf_id);
963 prog->aux->attach_btf_id);
1484 static int bpf_get_file_xattr_filter(const struct bpf_prog *prog, u32 kfunc_id) argument
1490 return prog->type != BPF_PROG_TYPE_LSM ? -EACCES : 0;
1507 bpf_tracing_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) argument
1610 if (bpf_prog_check_recur(prog))
1634 is_kprobe_multi(const struct bpf_prog *prog) argument
1640 is_kprobe_session(const struct bpf_prog *prog) argument
1646 kprobe_prog_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) argument
1677 kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument
1772 tp_prog_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) argument
1788 tp_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument
1876 pe_prog_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) argument
2011 raw_tp_prog_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) argument
2028 tracing_prog_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) argument
2096 raw_tp_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument
2104 tracing_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument
2112 bpf_prog_test_run_tracing(struct bpf_prog *prog, const union bpf_attr *kattr, union bpf_attr __user *uattr) argument
2139 raw_tp_writable_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument
2160 pe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument
2198 pe_prog_convert_ctx_access(enum bpf_access_type type, const struct bpf_insn *si, struct bpf_insn *insn_buf, struct bpf_prog *prog, u32 *target_size) argument
2247 perf_event_attach_bpf_prog(struct perf_event *event, struct bpf_prog *prog, u64 bpf_cookie) argument
2389 struct bpf_prog *prog = link->link.prog; local
2459 struct bpf_prog *prog = link->link.prog; local
2485 struct bpf_prog *prog; local
2993 bpf_kprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog) argument
3138 bpf_kprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog) argument
3293 struct bpf_prog *prog = link->link.prog; local
3365 bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog) argument
3508 bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog) argument
3548 bpf_kprobe_multi_filter(const struct bpf_prog *prog, u32 kfunc_id) argument
[all...]
/linux-master/tools/testing/selftests/futex/functional/
H A Dfutex_wait_uninitialized_heap.c42 void usage(char *prog) argument
44 printf("Usage: %s\n", prog);
H A Dfutex_wait_private_mapped_file.c43 void usage(char *prog) argument
45 printf("Usage: %s\n", prog);
H A Dfutex_requeue_pi_mismatched_ops.c35 void usage(char *prog) argument
37 printf("Usage: %s\n", prog);
H A Dfutex_requeue.c19 void usage(char *prog) argument
21 printf("Usage: %s\n", prog);
H A Dfutex_wait_wouldblock.c31 void usage(char *prog) argument
33 printf("Usage: %s\n", prog);
/linux-master/net/netfilter/
H A Dnf_bpf_link.c14 const struct bpf_prog *prog = bpf_prog; local
20 return bpf_prog_run(prog, &ctx);
202 return -ERANGE; /* cannot use defrag if prog runs before nf_defrag */
207 int bpf_nf_link_attach(const union bpf_attr *attr, struct bpf_prog *prog) argument
225 bpf_link_init(&link->link, BPF_LINK_TYPE_NETFILTER, &bpf_nf_link_lops, prog);
229 link->hook_ops.priv = prog;
287 const struct bpf_prog *prog,
315 bpf_nf_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) argument
317 return bpf_base_func_proto(func_id, prog);
286 nf_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument

Completed in 234 milliseconds

1234567891011>>