/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | metadata.c | 18 struct bpf_prog_info prog_info = {}; local 32 prog_info_len = sizeof(prog_info); 33 ret = bpf_prog_get_info_by_fd(prog_fd, &prog_info, &prog_info_len); 37 map_ids = calloc(prog_info.nr_map_ids, sizeof(__u32)); 41 nr_maps = prog_info.nr_map_ids; 42 memset(&prog_info, 0, sizeof(prog_info)); 43 prog_info.nr_map_ids = nr_maps; 44 prog_info.map_ids = ptr_to_u64(map_ids); 45 prog_info_len = sizeof(prog_info); [all...] |
H A D | tc_helpers.h | 13 struct bpf_prog_info prog_info = {}; local 14 __u32 prog_info_len = sizeof(prog_info); 17 err = bpf_obj_get_info_by_fd(fd, &prog_info, &prog_info_len); 21 ASSERT_NEQ(prog_info.id, 0, "prog_info.id"); 22 return prog_info.id;
|
H A D | recursion.c | 8 struct bpf_prog_info prog_info = {}; local 9 __u32 prog_info_len = sizeof(prog_info); 35 &prog_info, &prog_info_len); 38 ASSERT_EQ(prog_info.recursion_misses, 2, "recursion_misses");
|
H A D | xdp_link.c | 15 struct bpf_prog_info prog_info; local 19 __u32 prog_info_len = sizeof(prog_info); 31 memset(&prog_info, 0, sizeof(prog_info)); 32 err = bpf_prog_get_info_by_fd(prog_fd1, &prog_info, &prog_info_len); 35 id1 = prog_info.id; 37 memset(&prog_info, 0, sizeof(prog_info)); 38 err = bpf_prog_get_info_by_fd(prog_fd2, &prog_info, &prog_info_len); 41 id2 = prog_info [all...] |
H A D | tp_attach_query.c | 13 struct bpf_prog_info prog_info; local 48 bzero(&prog_info, sizeof(prog_info)); 49 prog_info.jited_prog_len = 0; 50 prog_info.xlated_prog_len = 0; 51 prog_info.nr_map_ids = 0; 52 info_len = sizeof(prog_info); 53 err = bpf_prog_get_info_by_fd(prog_fd[i], &prog_info, 58 saved_prog_ids[i] = prog_info.id;
|
H A D | bpf_obj_id.c | 155 struct bpf_prog_info prog_info = {}; local 159 info_len = sizeof(prog_info); 178 * prog_info.nr_map_ids = 1 179 * prog_info.map_ids = NULL 181 prog_info.nr_map_ids = 1; 182 err = bpf_prog_get_info_by_fd(prog_fd, &prog_info, &info_len); 186 bzero(&prog_info, sizeof(prog_info)); 187 info_len = sizeof(prog_info); 190 prog_info [all...] |
H A D | unpriv_bpf_disabled.c | 233 struct bpf_prog_info prog_info = {}; local 234 __u32 prog_info_len = sizeof(prog_info); 276 ASSERT_OK(bpf_prog_get_info_by_fd(prog_fd, &prog_info, &prog_info_len), 278 prog_id = prog_info.id;
|
H A D | fexit_bpf2bpf.c | 65 struct bpf_prog_info prog_info = {}; local 81 info_len = sizeof(prog_info); 82 err = bpf_prog_get_info_by_fd(tgt_fd, &prog_info, &info_len); 86 tgt_prog_id = prog_info.id;
|
H A D | ctx_rewrite.c | 686 struct prog_info { struct 695 struct prog_info *pinfo, 759 struct prog_info pinfo = {};
|
/linux-master/samples/bpf/ |
H A D | xdp_fwd_user.c | 53 struct bpf_prog_info prog_info = {}; local 71 info_len = sizeof(prog_info); 79 err = bpf_prog_get_info_by_fd(prog_fd, &prog_info, &info_len); 88 if (strcmp(prog_info.name, prog_name)) {
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | xdp_synproxy.c | 274 struct bpf_prog_info prog_info; local 290 prog_info = (struct bpf_prog_info) { 294 info_len = sizeof(prog_info); 296 err = bpf_prog_get_info_by_fd(prog_fd, &prog_info, &info_len); 303 if (prog_info.nr_map_ids < 2) { 305 prog_info.nr_map_ids); 310 for (i = 0; i < prog_info.nr_map_ids; i++) {
|
H A D | test_bpftool_synctypes.py | 539 prog_info = ProgFileExtractor() 540 source_prog_attach_types = set(prog_info.get_attach_types().values()) 542 help_prog_attach_types = prog_info.get_prog_attach_help() 543 help_prog_options = prog_info.get_options() 544 prog_info.close()
|
/linux-master/tools/bpf/bpftool/ |
H A D | prog.c | 221 struct bpf_prog_info prog_info; local 232 memset(&prog_info, 0, sizeof(prog_info)); 233 prog_info_len = sizeof(prog_info); 234 ret = bpf_prog_get_info_by_fd(prog_fd, &prog_info, &prog_info_len); 238 if (!prog_info.nr_map_ids) 241 map_ids = calloc(prog_info.nr_map_ids, sizeof(__u32)); 245 nr_maps = prog_info.nr_map_ids; 246 memset(&prog_info, 0, sizeof(prog_info)); [all...] |
H A D | link.c | 475 struct bpf_prog_info prog_info; local 489 err = get_prog_info(info->prog_id, &prog_info); 493 prog_type_str = libbpf_bpf_prog_type_str(prog_info.type); 498 jsonw_uint_field(json_wtr, "prog_type", prog_info.type); 865 struct bpf_prog_info prog_info; local 877 err = get_prog_info(info->prog_id, &prog_info); 881 prog_type_str = libbpf_bpf_prog_type_str(prog_info.type); 886 printf("\n\tprog_type %u ", prog_info.type);
|
H A D | common.c | 336 void get_prog_full_name(const struct bpf_prog_info *prog_info, int prog_fd, argument 339 const char *prog_name = prog_info->name; 347 strlen(prog_info->name) < BPF_OBJ_NAME_LEN - 1) 350 if (!prog_info->btf_id || prog_info->nr_func_info == 0) 354 info.func_info_rec_size = prog_info->func_info_rec_size;
|
H A D | main.h | 137 void get_prog_full_name(const struct bpf_prog_info *prog_info, int prog_fd,
|
H A D | btf.c | 837 struct bpf_prog_info prog_info; local 838 __u32 prog_len = sizeof(prog_info); 843 err = build_btf_type_table(btf_prog_table, BPF_OBJ_PROG, &prog_info,
|
/linux-master/include/uapi/linux/ |
H A D | cec-funcs.h | 372 __u8 prog_info, 381 (prog_info ? 0x10 : 0) | 382 (prog_info ? prog_info : prog_error); 383 if (prog_info == CEC_OP_PROG_INFO_NOT_ENOUGH_SPACE || 384 prog_info == CEC_OP_PROG_INFO_MIGHT_NOT_BE_ENOUGH_SPACE || 395 __u8 *prog_info, 403 *prog_info = msg->msg[2] & 0xf; 406 *prog_info = 0; 409 if (*prog_info 369 cec_msg_timer_status(struct cec_msg *msg, __u8 timer_overlap_warning, __u8 media_info, __u8 prog_info, __u8 prog_error, __u8 duration_hr, __u8 duration_min) argument 392 cec_ops_timer_status(const struct cec_msg *msg, __u8 *timer_overlap_warning, __u8 *media_info, __u8 *prog_info, __u8 *prog_error, __u8 *duration_hr, __u8 *duration_min) argument [all...] |
/linux-master/tools/lib/bpf/ |
H A D | libbpf.c | 6044 void **prog_info, __u32 *prog_rec_cnt, 6081 new_prog_info = realloc(*prog_info, new_sz); 6084 *prog_info = new_prog_info; 6041 adjust_prog_btf_ext_info(const struct bpf_object *obj, const struct bpf_program *prog, const struct btf_ext_info *ext_info, void **prog_info, __u32 *prog_rec_cnt, __u32 *prog_rec_sz) argument
|