| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | tc_opts.c | 20 __u32 prog_ids[2]; in test_ns_tc_opts_basic() local 48 optq.prog_ids = prog_ids; in test_ns_tc_opts_basic() 50 memset(prog_ids, 0, sizeof(prog_ids)); in test_ns_tc_opts_basic() 51 optq.count = ARRAY_SIZE(prog_ids); in test_ns_tc_opts_basic() 59 ASSERT_EQ(optq.prog_ids[0], id1, "prog_ids[0]"); in test_ns_tc_opts_basic() 60 ASSERT_EQ(optq.prog_ids[1], 0, "prog_ids[1]"); in test_ns_tc_opts_basic() 75 memset(prog_ids, 0, sizeof(prog_ids)); in test_ns_tc_opts_basic() 76 optq.count = ARRAY_SIZE(prog_ids); in test_ns_tc_opts_basic() 84 ASSERT_EQ(optq.prog_ids[0], id2, "prog_ids[0]"); in test_ns_tc_opts_basic() 85 ASSERT_EQ(optq.prog_ids[1], 0, "prog_ids[1]"); in test_ns_tc_opts_basic() [all …]
|
| H A D | tc_links.c | 20 __u32 prog_ids[2], link_ids[2]; in serial_test_tc_links_basic() local 52 optq.prog_ids = prog_ids; in serial_test_tc_links_basic() 55 memset(prog_ids, 0, sizeof(prog_ids)); in serial_test_tc_links_basic() 57 optq.count = ARRAY_SIZE(prog_ids); in serial_test_tc_links_basic() 65 ASSERT_EQ(optq.prog_ids[0], pid1, "prog_ids[0]"); in serial_test_tc_links_basic() 67 ASSERT_EQ(optq.prog_ids[1], 0, "prog_ids[ in serial_test_tc_links_basic() 119 __u32 prog_ids[5], link_ids[5]; test_tc_links_before_target() local 273 __u32 prog_ids[5], link_ids[5]; test_tc_links_after_target() local 427 __u32 prog_ids[3], link_ids[3]; test_tc_links_revision_target() local 634 __u32 prog_ids[4], link_ids[4]; test_tc_links_replace_target() local 1171 __u32 prog_ids[5], link_ids[5]; test_tc_links_prepend_target() local 1327 __u32 prog_ids[5], link_ids[5]; test_tc_links_append_target() local [all...] |
| H A D | cgroup_mprog_opts.c | 25 __u32 prog_ids[10]; in test_prog_attach_detach() local 103 memset(prog_ids, 0, sizeof(prog_ids)); in test_prog_attach_detach() 104 optq.prog_ids = prog_ids; in test_prog_attach_detach() 111 ASSERT_EQ(optq.prog_ids[0], id2, "prog_ids[0]"); in test_prog_attach_detach() 112 ASSERT_EQ(optq.prog_ids[1], id3, "prog_ids[1]"); in test_prog_attach_detach() 113 ASSERT_EQ(optq.prog_ids[2], id1, "prog_ids[2]"); in test_prog_attach_detach() 114 ASSERT_EQ(optq.prog_ids[3], id4, "prog_ids[3]"); in test_prog_attach_detach() 115 ASSERT_EQ(optq.prog_ids[4], 0, "prog_ids[4]"); in test_prog_attach_detach() 158 __u32 prog_ids[10]; in test_link_attach_detach() local 235 memset(prog_ids, 0, sizeof(prog_ids)); in test_link_attach_detach() [all …]
|
| H A D | cgroup_attach_multi.c | 79 __u32 prog_ids[4], prog_cnt = 0, attach_flags, saved_prog_id; in serial_test_cgroup_attach_multi() local 161 prog_ids, &prog_cnt)); in serial_test_cgroup_attach_multi() 164 saved_prog_id = prog_ids[0]; in serial_test_cgroup_attach_multi() 166 prog_ids[0] = 0; in serial_test_cgroup_attach_multi() 170 prog_ids, &prog_cnt) >= 0); in serial_test_cgroup_attach_multi() 174 CHECK_FAIL(prog_ids[0] != saved_prog_id); in serial_test_cgroup_attach_multi() 176 prog_ids[0] = 0; in serial_test_cgroup_attach_multi() 178 prog_ids, &prog_cnt)); in serial_test_cgroup_attach_multi() 180 CHECK_FAIL(prog_ids[0] != saved_prog_id); in serial_test_cgroup_attach_multi() 275 prog_ids, &prog_cnt)); in serial_test_cgroup_attach_multi() [all …]
|
| H A D | cgroup_attach_autodetach.c | 28 __u32 prog_ids[2] = {0}; in serial_test_cgroup_attach_autodetach() local 60 prog_ids, &prog_cnt), in serial_test_cgroup_attach_autodetach() 86 for (i = 0; i < ARRAY_SIZE(prog_ids); i++) { in serial_test_cgroup_attach_autodetach() 88 int fd = bpf_prog_get_fd_by_id(prog_ids[i]); in serial_test_cgroup_attach_autodetach()
|
| H A D | cgroup_link.c | 41 __u32 prog_ids[ARRAY_SIZE(cgs)], prog_cnt = 0, attach_flags, prog_id; in serial_test_cgroup_link() local 93 BPF_F_QUERY_EFFECTIVE, NULL, prog_ids, in serial_test_cgroup_link() 100 CHECK(prog_ids[i - 1] != prog_ids[i], "prog_id_check", in serial_test_cgroup_link() 102 i, prog_ids[i - 1], prog_ids[i]); in serial_test_cgroup_link()
|
| H A D | sk_lookup.c | 460 __u32 prog_ids[3] = {}; in query_lookup_prog() local 483 &attach_flags, prog_ids, &prog_cnt); in query_lookup_prog() 497 CHECK(prog_ids[0] != prog_id, "bpf_prog_query", in query_lookup_prog() 499 prog_ids[0], prog_id); in query_lookup_prog() 503 CHECK(prog_ids[1] != prog_id, "bpf_prog_query", in query_lookup_prog() 505 prog_ids[1], prog_id); in query_lookup_prog() 509 CHECK(prog_ids[2] != prog_id, "bpf_prog_query", in query_lookup_prog() 511 prog_ids[2], prog_id); in query_lookup_prog() 521 CHECK(prog_ids[0] != prog_id, "bpf_prog_query", in query_lookup_prog() 523 prog_ids[0], prog_id); in query_lookup_prog()
|
| H A D | flow_dissector_reattach.c | 23 __u32 prog_ids[1] = {}; in query_attached_prog_id() local 24 __u32 prog_cnt = ARRAY_SIZE(prog_ids); in query_attached_prog_id() 28 prog_ids, &prog_cnt); in query_attached_prog_id() 34 return prog_cnt == 1 ? prog_ids[0] : 0; in query_attached_prog_id()
|
| H A D | unpriv_bpf_disabled.c | 158 __u32 prog_ids[3] = {}; in test_unpriv_bpf_disabled_negative() local 204 ASSERT_EQ(bpf_prog_query(prog_fd, BPF_TRACE_FENTRY, 0, &attach_flags, prog_ids, in test_unpriv_bpf_disabled_negative()
|
| H A D | sockmap_basic.c | 457 __u32 prog_ids[3] = {}; in test_sockmap_progs_query() local 472 &attach_flags, prog_ids, &prog_cnt); in test_sockmap_progs_query() 483 &attach_flags, prog_ids, &prog_cnt); in test_sockmap_progs_query() 487 ASSERT_EQ(prog_ids[0], query_prog_id(verdict_fd), in test_sockmap_progs_query()
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | test_lirc_mode2_user.c | 55 u32 prog_ids[10], prog_flags[10], prog_cnt; in main() local 89 ret = bpf_prog_query(lircfd, BPF_LIRC_MODE2, 0, prog_flags, prog_ids, in main() 157 ret = bpf_prog_query(lircfd, BPF_LIRC_MODE2, 0, prog_flags, prog_ids, in main()
|
| /linux/tools/bpf/bpftool/ |
| H A D | net.c | 468 __u32 prog_ids[64] = {}, link_ids[64] = {}; in __show_dev_tc_bpf() local 473 optq.prog_ids = prog_ids; in __show_dev_tc_bpf() 477 optq.count = ARRAY_SIZE(prog_ids); in __show_dev_tc_bpf() 487 ret = __show_dev_tc_bpf_name(prog_ids[i], prog_name, in __show_dev_tc_bpf() 491 NET_DUMP_UINT("prog_id", " prog_id %u ", prog_ids[i]); in __show_dev_tc_bpf() 590 __u32 prog_ids[1]; in query_flow_dissector() local 601 prog_cnt = ARRAY_SIZE(prog_ids); in query_flow_dissector() 603 &attach_flags, prog_ids, &prog_cnt); in query_flow_dissector() 618 attach_info->flow_dissector_id = prog_ids[0]; in query_flow_dissector()
|
| /linux/drivers/media/rc/ |
| H A D | bpf-lirc.c | 297 __u32 __user *prog_ids = u64_to_user_ptr(attr->query.prog_ids); in lirc_prog_query() local 332 if (attr->query.prog_cnt != 0 && prog_ids && cnt) in lirc_prog_query() 333 ret = bpf_prog_array_copy_to_user(progs, prog_ids, in lirc_prog_query()
|
| /linux/kernel/bpf/ |
| H A D | net_namespace.c | 250 __u32 __user *prog_ids = u64_to_user_ptr(attr->query.prog_ids); in __netns_bpf_prog_query() local 263 if (!attr->query.prog_cnt || !prog_ids || !prog_cnt) in __netns_bpf_prog_query() 266 return bpf_prog_array_copy_to_user(run_array, prog_ids, in __netns_bpf_prog_query()
|
| H A D | cgroup.c | 1215 __u32 __user *prog_ids = u64_to_user_ptr(attr->query.prog_ids); in __cgroup_bpf_query() local 1230 prog_ids && !prog_attach_flags) in __cgroup_bpf_query() 1264 if (attr->query.prog_cnt == 0 || !prog_ids || !total_cnt) in __cgroup_bpf_query() 1278 ret = bpf_prog_array_copy_to_user(effective, prog_ids, cnt); in __cgroup_bpf_query() 1291 if (copy_to_user(prog_ids + i, &id, sizeof(id))) in __cgroup_bpf_query() 1308 prog_ids += cnt; in __cgroup_bpf_query()
|
| H A D | core.c | 2683 u32 *prog_ids, in bpf_prog_array_copy_core() argument 2692 prog_ids[i] = item->prog->aux->id; in bpf_prog_array_copy_core() 2703 __u32 __user *prog_ids, u32 cnt) in bpf_prog_array_copy_to_user() argument 2719 err = copy_to_user(prog_ids, ids, cnt * sizeof(u32)); in bpf_prog_array_copy_to_user() 2867 u32 *prog_ids, u32 request_cnt, in bpf_prog_array_copy_info() argument 2882 return bpf_prog_array_copy_core(array, prog_ids, request_cnt) ? -ENOSPC in bpf_prog_array_copy_info()
|
| H A D | mprog.c | 420 uprog_id = u64_to_user_ptr(attr->query.prog_ids); in bpf_mprog_query()
|
| /linux/net/core/ |
| H A D | sock_map.c | 1558 __u32 __user *prog_ids = u64_to_user_ptr(attr->query.prog_ids); in sock_map_bpf_prog_query() local 1583 if (!attr->query.prog_cnt || !prog_ids || !prog_cnt) in sock_map_bpf_prog_query() 1597 (id != 0 && copy_to_user(prog_ids, &id, sizeof(u32))) || in sock_map_bpf_prog_query()
|
| /linux/include/uapi/linux/ |
| H A D | bpf.h | 498 * programs. Additionally, if *prog_ids* is nonzero and the number 500 * *prog_ids* with the eBPF program ids of the programs attached 1732 __aligned_u64 prog_ids; 1706 __aligned_u64 prog_ids; global() member
|
| /linux/tools/include/uapi/linux/ |
| H A D | bpf.h | 498 * programs. Additionally, if *prog_ids* is nonzero and the number 500 * *prog_ids* with the eBPF program ids of the programs attached 1732 __aligned_u64 prog_ids; 1706 __aligned_u64 prog_ids; global() member
|
| /linux/include/linux/ |
| H A D | bpf.h | 2388 __u32 __user *prog_ids, u32 cnt); 2396 u32 *prog_ids, u32 request_cnt,
|