Searched refs:bpf_strcmp (Results 1 – 4 of 4) sorted by relevance
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | string_kfuncs_failure1.c | 32 SEC("syscall") __retval(USER_PTR_ERR) int test_strcmp_null1(void *ctx) { return bpf_strcmp(NULL, "hello"); } in __retval() 33 SEC("syscall") __retval(USER_PTR_ERR)int test_strcmp_null2(void *ctx) { return bpf_strcmp("hello", NULL); } in __retval() 56 SEC("syscall") __retval(USER_PTR_ERR) int test_strcmp_user_ptr1(void *ctx) { return bpf_strcmp(user_ptr, "hello"); } in __retval() 57 SEC("syscall") __retval(USER_PTR_ERR) int test_strcmp_user_ptr2(void *ctx) { return bpf_strcmp("hello", user_ptr); } in __retval() 82 SEC("syscall") __retval(-EFAULT) int test_strcmp_pagefault1(void *ctx) { return bpf_strcmp(invalid_kern_ptr, "hello"); } in test_strstr_pagefault1() 83 SEC("syscall") __retval(-EFAULT) int test_strcmp_pagefault2(void *ctx) { return bpf_strcmp("hello", invalid_kern_ptr); } in test_strstr_pagefault2()
|
| H A D | string_kfuncs_success.c | 13 __test(0) int test_strcmp_eq(void *ctx) { return bpf_strcmp(str, "hello world"); } in test_strcmp_eq() 14 __test(1) int test_strcmp_neq(void *ctx) { return bpf_strcmp(str, "hello"); } in test_strcmp_neq()
|
| H A D | string_kfuncs_failure2.c | 9 SEC("syscall") int test_strcmp_too_long(void *ctx) { return bpf_strcmp(long_str, long_str); } in test_strcmp_too_long()
|
| /linux/kernel/bpf/ |
| H A D | helpers.c | 3452 __bpf_kfunc int bpf_strcmp(const char *s1__ign, const char *s2__ign) in bpf_strcmp() function 4522 BTF_ID_FLAGS(func, bpf_strcmp);
|