/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | tc_opts.c | 20 __u32 prog_ids[2]; local 48 optq.prog_ids = prog_ids; 50 memset(prog_ids, 0, sizeof(prog_ids)); 51 optq.count = ARRAY_SIZE(prog_ids); 59 ASSERT_EQ(optq.prog_ids[0], id1, "prog_ids[0]"); 60 ASSERT_EQ(optq.prog_ids[1], 0, "prog_ids[ 118 __u32 prog_ids[5]; local 270 __u32 prog_ids[5]; local 461 __u32 prog_ids[3]; local 672 __u32 prog_ids[4], prog_flags[4]; local 1033 __u32 prog_ids[5]; local 1173 __u32 prog_ids[5]; local 1404 __u32 prog_ids[4], link_ids[4]; local 1658 __u32 prog_ids[5]; local 1829 __u32 prog_ids[5]; local 2036 __u32 prog_ids[5]; local 2470 __u32 prog_ids[10]; local 2763 __u32 prog_ids[2]; local [all...] |
H A D | tc_netkit.c | 147 __u32 prog_ids[2], link_ids[2]; local 193 optq.prog_ids = prog_ids; 196 memset(prog_ids, 0, sizeof(prog_ids)); 198 optq.count = ARRAY_SIZE(prog_ids); 206 ASSERT_EQ(optq.prog_ids[0], pid1, "prog_ids[0]"); 208 ASSERT_EQ(optq.prog_ids[1], 0, "prog_ids[ 261 __u32 prog_ids[3], link_ids[3]; local 391 __u32 prog_ids[3]; local 503 __u32 prog_ids[2], link_ids[2]; local 614 __u32 prog_ids[2], link_ids[2]; local [all...] |
H A D | cgroup_attach_autodetach.c | 28 __u32 prog_ids[2] = {0}; local 60 prog_ids, &prog_cnt), 86 for (i = 0; i < ARRAY_SIZE(prog_ids); i++) { 88 int fd = bpf_prog_get_fd_by_id(prog_ids[i]);
|
H A D | tc_links.c | 18 __u32 prog_ids[2], link_ids[2]; local 50 optq.prog_ids = prog_ids; 53 memset(prog_ids, 0, sizeof(prog_ids)); 55 optq.count = ARRAY_SIZE(prog_ids); 63 ASSERT_EQ(optq.prog_ids[0], pid1, "prog_ids[0]"); 65 ASSERT_EQ(optq.prog_ids[1], 0, "prog_ids[ 117 __u32 prog_ids[5], link_ids[5]; local 271 __u32 prog_ids[5], link_ids[5]; local 425 __u32 prog_ids[3], link_ids[3]; local 632 __u32 prog_ids[4], link_ids[4]; local 1169 __u32 prog_ids[5], link_ids[5]; local 1325 __u32 prog_ids[5], link_ids[5]; local [all...] |
H A D | cgroup_attach_multi.c | 79 __u32 prog_ids[4], prog_cnt = 0, attach_flags, saved_prog_id; local 158 /* retrieve prog_ids of effective progs in cg5 */ 161 prog_ids, &prog_cnt)); 164 saved_prog_id = prog_ids[0]; 166 prog_ids[0] = 0; 170 prog_ids, &prog_cnt) >= 0); 173 /* check that prog_ids are returned even when buffer is too small */ 174 CHECK_FAIL(prog_ids[0] != saved_prog_id); 176 prog_ids[0] = 0; 178 prog_ids, [all...] |
H A D | cgroup_link.c | 41 __u32 prog_ids[ARRAY_SIZE(cgs)], prog_cnt = 0, attach_flags, prog_id; local 93 BPF_F_QUERY_EFFECTIVE, NULL, prog_ids, 100 CHECK(prog_ids[i - 1] != prog_ids[i], "prog_id_check", 102 i, prog_ids[i - 1], prog_ids[i]);
|
H A D | lsm_cgroup.c | 39 p.prog_ids = malloc(sizeof(u32) * p.prog_cnt); 48 fd = bpf_prog_get_fd_by_id(p.prog_ids[i]); 59 free(p.prog_ids);
|
H A D | sk_lookup.c | 520 __u32 prog_ids[3] = {}; local 543 &attach_flags, prog_ids, &prog_cnt); 557 CHECK(prog_ids[0] != prog_id, "bpf_prog_query", 559 prog_ids[0], prog_id); 563 CHECK(prog_ids[1] != prog_id, "bpf_prog_query", 565 prog_ids[1], prog_id); 569 CHECK(prog_ids[2] != prog_id, "bpf_prog_query", 571 prog_ids[2], prog_id); 581 CHECK(prog_ids[0] != prog_id, "bpf_prog_query", 583 prog_ids[ [all...] |
H A D | flow_dissector_reattach.c | 23 __u32 prog_ids[1] = {}; local 24 __u32 prog_cnt = ARRAY_SIZE(prog_ids); 28 prog_ids, &prog_cnt); 34 return prog_cnt == 1 ? prog_ids[0] : 0;
|
H A D | unpriv_bpf_disabled.c | 157 __u32 prog_ids[3] = {}; local 203 ASSERT_EQ(bpf_prog_query(prog_fd, BPF_TRACE_FENTRY, 0, &attach_flags, prog_ids,
|
H A D | sockmap_basic.c | 320 __u32 prog_ids[3] = {}; local 335 &attach_flags, prog_ids, &prog_cnt); 346 &attach_flags, prog_ids, &prog_cnt); 350 ASSERT_EQ(prog_ids[0], query_prog_id(verdict_fd), 351 "wrong prog_ids on query");
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_lirc_mode2_user.c | 55 u32 prog_ids[10], prog_flags[10], prog_cnt; local 89 ret = bpf_prog_query(lircfd, BPF_LIRC_MODE2, 0, prog_flags, prog_ids, 157 ret = bpf_prog_query(lircfd, BPF_LIRC_MODE2, 0, prog_flags, prog_ids,
|
/linux-master/tools/bpf/bpftool/ |
H A D | cgroup.c | 208 __u32 prog_ids[1024] = {0}; local 213 p.prog_cnt = ARRAY_SIZE(prog_ids); 214 p.prog_ids = prog_ids; 224 show_bpf_prog(prog_ids[iter], type, NULL, level); 235 __u32 prog_ids[1024] = {0}; local 241 p.prog_cnt = ARRAY_SIZE(prog_ids); 242 p.prog_ids = prog_ids; 272 show_bpf_prog(prog_ids[ite [all...] |
H A D | net.c | 458 __u32 prog_ids[64] = {}, link_ids[64] = {}; local 463 optq.prog_ids = prog_ids; 467 optq.count = ARRAY_SIZE(prog_ids); 477 ret = __show_dev_tc_bpf_name(prog_ids[i], prog_name, 481 NET_DUMP_UINT("prog_id", " prog_id %u ", prog_ids[i]); 580 __u32 prog_ids[1]; local 591 prog_cnt = ARRAY_SIZE(prog_ids); 593 &attach_flags, prog_ids, &prog_cnt); 608 attach_info->flow_dissector_id = prog_ids[ [all...] |
/linux-master/drivers/media/rc/ |
H A D | bpf-lirc.c | 297 __u32 __user *prog_ids = u64_to_user_ptr(attr->query.prog_ids); local 332 if (attr->query.prog_cnt != 0 && prog_ids && cnt) 333 ret = bpf_prog_array_copy_to_user(progs, prog_ids,
|
/linux-master/kernel/bpf/ |
H A D | net_namespace.c | 251 __u32 __user *prog_ids = u64_to_user_ptr(attr->query.prog_ids); local 264 if (!attr->query.prog_cnt || !prog_ids || !prog_cnt) 267 return bpf_prog_array_copy_to_user(run_array, prog_ids,
|
H A D | cgroup.c | 1025 __u32 __user *prog_ids = u64_to_user_ptr(attr->query.prog_ids); local 1039 prog_ids && !prog_attach_flags) 1069 if (attr->query.prog_cnt == 0 || !prog_ids || !total_cnt) 1083 ret = bpf_prog_array_copy_to_user(effective, prog_ids, cnt); 1096 if (copy_to_user(prog_ids + i, &id, sizeof(id))) 1113 prog_ids += cnt;
|
H A D | core.c | 2499 u32 *prog_ids, 2508 prog_ids[i] = item->prog->aux->id; 2519 __u32 __user *prog_ids, u32 cnt) 2535 err = copy_to_user(prog_ids, ids, cnt * sizeof(u32)); 2683 u32 *prog_ids, u32 request_cnt, 2698 return bpf_prog_array_copy_core(array, prog_ids, request_cnt) ? -ENOSPC 2498 bpf_prog_array_copy_core(struct bpf_prog_array *array, u32 *prog_ids, u32 request_cnt) argument 2518 bpf_prog_array_copy_to_user(struct bpf_prog_array *array, __u32 __user *prog_ids, u32 cnt) argument 2682 bpf_prog_array_copy_info(struct bpf_prog_array *array, u32 *prog_ids, u32 request_cnt, u32 *prog_cnt) argument
|
H A D | mprog.c | 420 uprog_id = u64_to_user_ptr(attr->query.prog_ids);
|
/linux-master/tools/lib/bpf/ |
H A D | bpf.h | 589 __u32 *prog_ids; member in struct:bpf_prog_query_opts 618 __u32 *prog_ids, __u32 *prog_cnt);
|
H A D | bpf.c | 943 attr.query.prog_ids = ptr_to_u64(OPTS_GET(opts, prog_ids, NULL)); 958 __u32 *attach_flags, __u32 *prog_ids, __u32 *prog_cnt) 964 opts.prog_ids = prog_ids; 957 bpf_prog_query(int target_fd, enum bpf_attach_type type, __u32 query_flags, __u32 *attach_flags, __u32 *prog_ids, __u32 *prog_cnt) argument
|
/linux-master/net/core/ |
H A D | sock_map.c | 1517 __u32 __user *prog_ids = u64_to_user_ptr(attr->query.prog_ids); local 1543 if (!attr->query.prog_cnt || !prog_ids || !prog_cnt) 1557 (id != 0 && copy_to_user(prog_ids, &id, sizeof(u32))) ||
|
/linux-master/include/linux/ |
H A D | bpf.h | 2004 __u32 __user *prog_ids, u32 cnt); 2012 u32 *prog_ids, u32 request_cnt,
|
/linux-master/include/uapi/linux/ |
H A D | bpf.h | 486 * programs. Additionally, if *prog_ids* is nonzero and the number 488 * *prog_ids* with the eBPF program ids of the programs attached 1649 __aligned_u64 prog_ids; member in struct:bpf_attr::__anon2603
|
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 486 * programs. Additionally, if *prog_ids* is nonzero and the number 488 * *prog_ids* with the eBPF program ids of the programs attached 1649 __aligned_u64 prog_ids; member in struct:bpf_attr::__anon3144
|