/linux-master/drivers/net/ethernet/engleder/ |
H A D | tsnep_main.c | 1279 static bool tsnep_xdp_run_prog(struct tsnep_rx *rx, struct bpf_prog *prog, argument 1289 act = bpf_prog_run_xdp(prog, xdp); 1299 if (xdp_do_redirect(rx->adapter->netdev, xdp, prog) < 0) 1304 bpf_warn_invalid_xdp_action(rx->adapter->netdev, prog, act); 1308 trace_xdp_exception(rx->adapter->netdev, prog, act); 1323 static bool tsnep_xdp_run_prog_zc(struct tsnep_rx *rx, struct bpf_prog *prog, argument 1330 act = bpf_prog_run_xdp(prog, xdp); 1334 if (xdp_do_redirect(rx->adapter->netdev, xdp, prog) < 0) 1349 bpf_warn_invalid_xdp_action(rx->adapter->netdev, prog, act); 1353 trace_xdp_exception(rx->adapter->netdev, prog, ac 1434 struct bpf_prog *prog; local 1538 struct bpf_prog *prog; local [all...] |
/linux-master/drivers/net/ethernet/netronome/nfp/bpf/ |
H A D | jit.c | 18 /* --- NFP prog --- */ 56 nfp_prog->prog[nfp_prog->prog_len] = insn; 175 nfp_prog->prog[nfp_prog->prog_len - 1] |= 229 nfp_prog->prog[nfp_prog->prog_len - 1] |= 643 nfp_prog->prog[nfp_prog->prog_len - 1] |= 3544 if (immed_get_value(nfp_prog->prog[br_idx + 1])) { 3549 immed_set_value(&nfp_prog->prog[br_idx + 1], jmp_dst->off); 3584 if (!nfp_is_br(nfp_prog->prog[br_idx])) { 3586 br_idx, meta->insn.code, nfp_prog->prog[br_idx]); 3594 if (FIELD_GET(OP_RELO_TYPE, nfp_prog->prog[br_id 4435 nfp_bpf_ustore_calc(u64 *prog, unsigned int len) argument 4455 void *prog; local 4537 u64 *prog; local [all...] |
/linux-master/tools/testing/selftests/futex/functional/ |
H A D | futex_waitv.c | 28 void usage(char *prog) argument 30 printf("Usage: %s\n", prog);
|
/linux-master/tools/testing/selftests/bpf/benchs/ |
H A D | bench_local_storage.c | 115 static void __setup(struct bpf_program *prog, bool hashmap) argument 167 if (!bpf_program__attach(prog)) { 249 * maps, with 'our' prog needing to access its map more often than others
|
/linux-master/usr/ |
H A D | gen_initramfs.sh | 185 echo " ${prog}: Cannot open '$1'" >&2 190 prog=$0
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | cgroup_iter.c | 51 static void read_from_cgroup_iter(struct bpf_program *prog, int cgroup_fd, argument 68 link = bpf_program__attach_iter(prog, &opts);
|
H A D | sock_destroy.c | 11 static void start_iter_sockets(struct bpf_program *prog) argument 17 link = bpf_program__attach_iter(prog, NULL);
|
H A D | flow_dissector_reattach.c | 44 struct bpf_insn prog[] = { local 50 fd = bpf_test_load_program(type, prog, ARRAY_SIZE(prog), "GPL", 0, NULL, 0); 57 static __u32 query_prog_id(int prog) argument 63 err = bpf_prog_get_info_by_fd(prog, &info, &info_len); 159 /* Expect failure creating link when prog attached */ 186 /* Expect failure attaching prog when link exists */ 209 /* Expect failure detaching prog when link exists */ 237 /* Expect no prog attached after successful detach */ 254 /* Expect no prog attache [all...] |
H A D | ctx_rewrite.c | 690 struct bpf_insn *prog; member in struct:prog_info 720 pinfo->prog, pinfo->prog_len, &opts); 799 pinfo.prog = ldx_prog; 832 pinfo.prog = stx_prog; 841 pinfo.prog = st_prog;
|
H A D | bpf_iter.c | 48 static void do_dummy_read_opts(struct bpf_program *prog, struct bpf_iter_attach_opts *opts) argument 54 link = bpf_program__attach_iter(prog, opts); 73 static void do_dummy_read(struct bpf_program *prog) argument 75 do_dummy_read_opts(prog, NULL); 78 static void do_read_map_iter_fd(struct bpf_object_skeleton **skel, struct bpf_program *prog, argument 91 link = bpf_program__attach_iter(prog, &opts); 177 static void check_bpf_link_info(const struct bpf_program *prog) argument 191 link = bpf_program__attach_iter(prog, &opts); 393 struct bpf_program *prog = skel->progs.dump_task_struct; local 400 link = bpf_program__attach_iter(prog, NUL [all...] |
/linux-master/drivers/net/ethernet/aquantia/atlantic/ |
H A D | aq_ring.c | 413 struct bpf_prog *prog; local 422 prog = READ_ONCE(rx_ring->xdp_prog); 423 if (!prog) 429 if (xdp_buff_has_frags(xdp) && !prog->aux->xdp_has_frags) 432 act = bpf_prog_run_xdp(prog, xdp); 456 if (xdp_do_redirect(aq_nic->ndev, xdp, prog) < 0) 471 trace_xdp_exception(aq_nic->ndev, prog, act); 472 bpf_warn_invalid_xdp_action(aq_nic->ndev, prog, act);
|
/linux-master/samples/seccomp/ |
H A D | user-trap.c | 100 struct sock_fprog prog = { local 105 return seccomp(SECCOMP_SET_MODE_FILTER, flags, &prog);
|
/linux-master/tools/testing/selftests/seccomp/ |
H A D | seccomp_benchmark.c | 180 struct sock_fprog prog = { local 238 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog);
|
/linux-master/tools/testing/selftests/hid/ |
H A D | hid_bpf.c | 547 struct bpf_program *prog; local 549 prog = bpf_object__find_program_by_name(*self->skel->skeleton->obj, 551 ASSERT_OK_PTR(prog) TH_LOG("can not find program by name '%s'", programs[i].name); 553 bpf_program__set_autoload(prog, true); 563 struct bpf_program *prog; local 565 prog = bpf_object__find_program_by_name(*self->skel->skeleton->obj, 567 ASSERT_OK_PTR(prog) TH_LOG("can not find program by name '%s'", programs[i].name); 569 args.prog_fd = bpf_program__fd(prog);
|
/linux-master/tools/perf/util/ |
H A D | hist.h | 193 void evsel__output_resort_cb(struct evsel *evsel, struct ui_progress *prog, 195 void evsel__output_resort(struct evsel *evsel, struct ui_progress *prog); 196 void hists__output_resort(struct hists *hists, struct ui_progress *prog); 197 void hists__output_resort_cb(struct hists *hists, struct ui_progress *prog, 199 int hists__collapse_resort(struct hists *hists, struct ui_progress *prog);
|
H A D | hist.c | 1674 int hists__collapse_resort(struct hists *hists, struct ui_progress *prog) argument 1709 if (prog) 1710 ui_progress__update(prog, 1); 1819 struct ui_progress *prog, 1837 if (prog) 1838 ui_progress__update(prog, 1); 1847 hists__hierarchy_output_resort(hists, prog, 1918 static void output_resort(struct hists *hists, struct ui_progress *prog, argument 1938 hists__hierarchy_output_resort(hists, prog, 1968 if (prog) 1818 hists__hierarchy_output_resort(struct hists *hists, struct ui_progress *prog, struct rb_root_cached *root_in, struct rb_root_cached *root_out, u64 min_callchain_hits, bool use_callchain) argument 1973 evsel__output_resort_cb(struct evsel *evsel, struct ui_progress *prog, hists__resort_cb_t cb, void *cb_arg) argument 1985 output_resort(evsel__hists(evsel), prog, use_callchain, cb, cb_arg); local 1988 evsel__output_resort(struct evsel *evsel, struct ui_progress *prog) argument 1993 hists__output_resort(struct hists *hists, struct ui_progress *prog) argument 1998 hists__output_resort_cb(struct hists *hists, struct ui_progress *prog, hists__resort_cb_t cb) argument [all...] |
/linux-master/kernel/bpf/ |
H A D | arraymap.c | 633 struct bpf_prog *prog; local 639 prog = bpf_iter_get_info(&meta, v == NULL); 640 if (!prog) 663 return bpf_iter_run_prog(prog, &ctx); 946 struct bpf_prog *prog = bpf_prog_get(fd); local 948 if (IS_ERR(prog)) 949 return prog; 951 if (!bpf_prog_map_compatible(map, prog)) { 952 bpf_prog_put(prog); 956 return prog; [all...] |
H A D | log.c | 336 const struct bpf_prog *prog; local 340 prog = env->prog; 341 nr_linfo = prog->aux->nr_linfo; 343 if (!nr_linfo || insn_off >= prog->len) 346 linfo = prog->aux->linfo; 417 btf = env->prog->aux->btf;
|
/linux-master/drivers/net/ |
H A D | tun.c | 173 struct bpf_prog *prog; member in struct:tun_prog 546 struct tun_prog *prog; local 554 prog = rcu_dereference(tun->steering_prog); 555 if (prog) 556 ret = bpf_prog_run_clear_cb(prog->prog, skb); 1056 struct tun_prog *prog = rcu_dereference(tun->filter_prog); local 1058 if (prog) 1059 len = bpf_prog_run_clear_cb(prog->prog, sk 1190 tun_xdp_set(struct net_device *dev, struct bpf_prog *prog, struct netlink_ext_ack *extack) argument 2279 struct tun_prog *prog = container_of(rcu, struct tun_prog, rcu); local 2285 __tun_set_ebpf(struct tun_struct *tun, struct tun_prog __rcu **prog_p, struct bpf_prog *prog) argument 3014 struct bpf_prog *prog; local [all...] |
/linux-master/include/linux/ |
H A D | trace_events.h | 765 int perf_event_attach_bpf_prog(struct perf_event *event, struct bpf_prog *prog, u64 bpf_cookie); 779 int bpf_kprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog); 780 int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog); 788 perf_event_attach_bpf_prog(struct perf_event *event, struct bpf_prog *prog, u64 bpf_cookie) argument 824 bpf_kprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog) argument 829 bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog) argument 913 int perf_event_set_bpf_prog(struct perf_event *event, struct bpf_prog *prog, u64 bpf_cookie);
|
/linux-master/lib/ |
H A D | test_firmware.c | 123 const char *prog; member in struct:upload_inject_err 1139 const u8 *p, const char *prog) 1146 tst->inject.prog = prog; 1205 strncmp(tst->inject.prog, progress, strlen(progress)) != 0) 1219 tst->inject.prog = NULL; 1241 strncmp(tst->inject.prog, progress, strlen(progress)) != 0) 1259 strncmp(tst->inject.prog, progress, strlen(progress)) != 0) 1280 tst->inject.prog = NULL; 1138 upload_err_inject_error(struct test_firmware_upload *tst, const u8 *p, const char *prog) argument
|
/linux-master/tools/testing/selftests/net/ |
H A D | psock_fanout.c | 149 struct bpf_insn prog[] = { local 165 attr.insns = (unsigned long) prog; 166 attr.insn_cnt = ARRAY_SIZE(prog);
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_sock.c | 27 /* BPF prog properties */ 387 static int load_sock_prog(const struct bpf_insn *prog, argument 393 insn_cnt = probe_prog_length(prog); 400 ret = bpf_prog_load(BPF_PROG_TYPE_CGROUP_SOCK, NULL, "GPL", prog, insn_cnt, &opts);
|
/linux-master/drivers/net/ethernet/netronome/nfp/ |
H A D | nfp_app.h | 137 struct bpf_prog *prog, 338 struct bpf_prog *prog, 343 return app->type->xdp_offload(app, nn, prog, extack); 337 nfp_app_xdp_offload(struct nfp_app *app, struct nfp_net *nn, struct bpf_prog *prog, struct netlink_ext_ack *extack) argument
|
/linux-master/net/netfilter/ |
H A D | nfnetlink_hook.c | 80 const struct bpf_prog *prog) 88 if (WARN_ON_ONCE(!prog)) 99 ret = nla_put_be32(nlskb, NFNLA_HOOK_BPF_ID, htonl(prog->aux->id)); 77 nfnl_hook_put_bpf_prog_info(struct sk_buff *nlskb, const struct nfnl_dump_hook_data *ctx, unsigned int seq, const struct bpf_prog *prog) argument
|