/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | xdp_info.c | 9 __u32 len = sizeof(struct bpf_prog_info), duration = 0, prog_id; local 16 /* Get prog_id for XDP_ATTACHED_NONE mode */ 18 err = bpf_xdp_query_id(IFINDEX_LO, 0, &prog_id); 21 if (CHECK(prog_id, "prog_id_none", "unexpected prog_id=%u\n", prog_id)) 24 err = bpf_xdp_query_id(IFINDEX_LO, XDP_FLAGS_SKB_MODE, &prog_id); 27 if (CHECK(prog_id, "prog_id_none_skb", "unexpected prog_id=%u\n", 28 prog_id)) [all...] |
H A D | task_fd_query_rawtp.c | 8 __u32 len, prog_id, fd_type; local 24 err = bpf_task_fd_query(getpid(), efd, 0, buf, &len, &prog_id, 38 err = bpf_task_fd_query(getpid(), efd, 0, buf, &len, &prog_id, 50 err = bpf_task_fd_query(getpid(), efd, 0, 0, &len, &prog_id, 62 err = bpf_task_fd_query(getpid(), efd, 0, buf, &len, &prog_id,
|
H A D | unpriv_bpf_disabled.c | 59 __u32 prog_id, int prog_fd, int perf_fd, 119 expected_val = prog_id; 142 __u32 prog_id, int prog_fd, int perf_fd, 182 ASSERT_EQ(bpf_prog_get_fd_by_id(prog_id), -EPERM, "prog_get_fd_by_id_fails"); 183 ASSERT_EQ(bpf_prog_get_next_id(prog_id, &next), -EPERM, "prog_get_next_id_fails"); 238 __u32 prog_id; local 278 prog_id = prog_info.id; 279 ASSERT_GT(prog_id, 0, "valid_prog_id"); 297 test_unpriv_bpf_disabled_positive(skel, prog_id, prog_fd, perf_fd, map_paths, 301 test_unpriv_bpf_disabled_negative(skel, prog_id, prog_f 58 test_unpriv_bpf_disabled_positive(struct test_unpriv_bpf_disabled *skel, __u32 prog_id, int prog_fd, int perf_fd, char **map_paths, int *map_fds) argument 141 test_unpriv_bpf_disabled_negative(struct test_unpriv_bpf_disabled *skel, __u32 prog_id, int prog_fd, int perf_fd, char **map_paths, int *map_fds) argument [all...] |
H A D | tc_bpf.c | 19 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_hpi, .handle = 1, .priority = 1, .prog_id = 42); \ 23 .prog_id = 42); \ 43 !ASSERT_EQ(opts.prog_id, info.id, "prog_id set")) 46 opts.prog_id = 0; 52 opts.flags = opts.prog_fd = opts.prog_id = 0; 59 !ASSERT_EQ(opts.prog_id, info.id, "prog_id set")) 63 opts.flags = opts.prog_fd = opts.prog_id = 0; 92 attach_opts.prog_id [all...] |
H A D | task_fd_query_tp.c | 11 __u32 len, prog_id, fd_type; local 59 err = bpf_task_fd_query(getpid(), pmu_fd, 0, buf, &len, &prog_id,
|
H A D | cgroup_link.c | 41 __u32 prog_ids[ARRAY_SIZE(cgs)], prog_cnt = 0, attach_flags, prog_id; local 218 prog_id = link_info_prog_id(links[0], &info); 219 CHECK(prog_id == 0, "link_info", "failed\n"); 227 prog_id = link_info_prog_id(links[0], &info); 228 CHECK(prog_id == 0, "link_info", "failed\n");
|
H A D | xdp_link.c | 128 ASSERT_EQ(link_info.prog_id, id1, "link_prog_id"); 145 ASSERT_EQ(link_info.prog_id, id1, "link_prog_id");
|
H A D | perf_link.c | 63 ASSERT_GT(info.prog_id, 0, "link_prog_id");
|
H A D | sk_lookup.c | 522 __u32 prog_id; local 556 prog_id = link_info_prog_id(link[0], &info); 557 CHECK(prog_ids[0] != prog_id, "bpf_prog_query", 559 prog_ids[0], prog_id); 562 prog_id = link_info_prog_id(link[1], &info); 563 CHECK(prog_ids[1] != prog_id, "bpf_prog_query", 565 prog_ids[1], prog_id); 568 prog_id = link_info_prog_id(link[2], &info); 569 CHECK(prog_ids[2] != prog_id, "bpf_prog_query", 571 prog_ids[2], prog_id); [all...] |
H A D | crypto_sanity.c | 163 tc_attach_enc.flags = tc_attach_enc.prog_fd = tc_attach_enc.prog_id = 0; 188 tc_attach_dec.flags = tc_attach_dec.prog_fd = tc_attach_dec.prog_id = 0;
|
/linux-master/kernel/bpf/ |
H A D | prog_iter.c | 10 u32 prog_id; member in struct:bpf_iter_seq_prog_info 18 prog = bpf_prog_get_curr_or_next(&info->prog_id); 32 ++info->prog_id; 34 return bpf_prog_get_curr_or_next(&info->prog_id);
|
/linux-master/tools/bpf/bpftool/ |
H A D | perf.c | 27 __u32 len, prog_id, fd_type; local 46 bpf_task_fd_query(getpid(), fd, 0, buf, &len, &prog_id, local 65 static void print_perf_json(int pid, int fd, __u32 prog_id, __u32 fd_type, argument 71 jsonw_uint_field(json_wtr, "prog_id", prog_id); 115 static void print_perf_plain(int pid, int fd, __u32 prog_id, __u32 fd_type, argument 118 printf("pid %d fd %d: prog_id %u ", pid, fd, prog_id); 156 __u32 len, prog_id, fd_type; local 201 &prog_id, [all...] |
/linux-master/tools/testing/selftests/bpf/ |
H A D | xdp_synproxy.c | 73 fprintf(stderr, "Usage: %s [--iface <iface>|--prog <prog_id>] [--mss4 <mss ipv4> --mss6 <mss ipv6> --wscale <wscale> --ttl <ttl>] [--ports <port1>,<port2>,...] [--single] [--tc]\n", 91 static void parse_options(int argc, char *argv[], unsigned int *ifindex, __u32 *prog_id, argument 115 *prog_id = 0; 138 *prog_id = parse_arg_ul(argv[0], optarg, UINT32_MAX); 139 if (*prog_id == 0) 182 if (*ifindex != 0 && *prog_id != 0) 184 if (*ifindex == 0 && *prog_id == 0) 272 static int syncookie_open_bpf_maps(__u32 prog_id, int *values_map_fd, int *ports_map_fd) argument 284 prog_fd = bpf_prog_get_fd_by_id(prog_id); 366 __u32 prog_id; local [all...] |
H A D | test_skb_cgroup_id_user.c | 79 int get_map_fd_by_prog_id(int prog_id) argument 87 prog_fd = bpf_prog_get_fd_by_id(prog_id); 89 log_err("Failed to get fd by prog id %d", prog_id); 115 int check_ancestor_cgroup_ids(int prog_id) argument 127 map_fd = get_map_fd_by_prog_id(prog_id); 158 fprintf(stderr, "Usage: %s iface prog_id\n", argv[0]);
|
H A D | xdp_redirect_multi.c | 30 __u32 prog_id = 0; local 34 if (bpf_xdp_query_id(ifaces[i], xdp_flags, &prog_id)) { 38 if (prog_id)
|
H A D | test_tcp_check_syncookie_user.c | 21 static int get_map_fd_by_prog_id(int prog_id, bool *xdp) argument 29 prog_fd = bpf_prog_get_fd_by_id(prog_id); 31 log_err("Failed to get fd by prog id %d", prog_id); 171 fprintf(stderr, "Usage: %s prog_id\n", argv[0]);
|
/linux-master/tools/lib/bpf/ |
H A D | netlink.c | 32 __u32 prog_id; member in struct:xdp_link_info 387 xdp_id->info.prog_id = libbpf_nla_getattr_u32( 465 OPTS_SET(opts, prog_id, xdp_id.info.prog_id); 506 int bpf_xdp_query_id(int ifindex, int flags, __u32 *prog_id) argument 518 *prog_id = opts.prog_id; 520 *prog_id = opts.drv_prog_id; 522 *prog_id = opts.hw_prog_id; 524 *prog_id 720 __u32 protocol, bpf_flags, handle, priority, parent, prog_id, flags; local 796 __u32 protocol = 0, handle, priority, parent, prog_id, flags; local 867 __u32 protocol, handle, priority, parent, prog_id, flags; local [all...] |
/linux-master/samples/bpf/ |
H A D | xdp_adjust_tail_user.c | 29 static __u32 prog_id; variable 40 if (prog_id == curr_prog_id) 192 prog_id = info.id;
|
H A D | task_fd_query_user.c | 95 __u32 len, prog_id, fd_type; local 102 &prog_id, &fd_type, &probe_offset, 125 char *buf, __u32 *buf_len, __u32 *prog_id, __u32 *fd_type, 165 prog_id, fd_type, probe_offset, probe_addr) < 0); 180 __u32 prog_id, fd_type; local 185 buf, &buf_len, &prog_id, 233 __u32 len, prog_id, fd_type; local 281 &prog_id, &fd_type, &probe_offset, 123 test_nondebug_fs_kuprobe_common(const char *event_type, const char *name, __u64 offset, __u64 addr, bool is_return, char *buf, __u32 *buf_len, __u32 *prog_id, __u32 *fd_type, __u64 *probe_offset, __u64 *probe_addr) argument
|
H A D | xdp_tx_iptunnel_user.c | 27 static __u32 prog_id; variable 38 if (prog_id == curr_prog_id) 303 prog_id = info.id;
|
/linux-master/tools/perf/util/ |
H A D | bpf_counter.c | 102 static int bpf_program_profiler_load_one(struct evsel *evsel, u32 prog_id) argument 111 prog_fd = bpf_prog_get_fd_by_id(prog_id); 113 pr_err("Failed to open fd for bpf prog %u\n", prog_id); 136 pr_err("Failed to get program name for bpf prog %u. Does it have BTF?\n", prog_id); 144 "Does bpf prog %u have BTF?\n", prog_id); 172 u32 prog_id; local 180 prog_id = strtoul(tok, &p, 10); 181 if (prog_id == 0 || prog_id == UINT_MAX || 189 ret = bpf_program_profiler_load_one(evsel, prog_id); [all...] |
H A D | env.c | 35 __u32 prog_id = info_node->info_linear->info.id; local 45 if (prog_id < node->info_linear->info.id) { 47 } else if (prog_id > node->info_linear->info.id) { 50 pr_debug("duplicated bpf prog info %u\n", prog_id); 61 __u32 prog_id) 71 if (prog_id < node->info_linear->info.id) 73 else if (prog_id > node->info_linear->info.id) 60 perf_env__find_bpf_prog_info(struct perf_env *env, __u32 prog_id) argument
|
H A D | bpf_counter.h | 110 return link_info.prog_id;
|
H A D | env.h | 184 __u32 prog_id);
|
/linux-master/include/trace/events/ |
H A D | xdp.h | 37 __field(int, prog_id) 43 __entry->prog_id = xdp->aux->id; 48 TP_printk("prog_id=%d action=%s ifindex=%d", 49 __entry->prog_id, 101 __field(int, prog_id) 124 __entry->prog_id = xdp->aux->id; 133 TP_printk("prog_id=%d action=%s ifindex=%d to_ifindex=%d err=%d" 135 __entry->prog_id,
|