/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | cgroup_attach_multi.c | 79 __u32 prog_ids[4], prog_cnt = 0, attach_flags, saved_prog_id; in serial_test_cgroup_attach_multi() local 156 BPF_F_QUERY_EFFECTIVE, NULL, NULL, &prog_cnt)); in serial_test_cgroup_attach_multi() 157 CHECK_FAIL(prog_cnt != 4); in serial_test_cgroup_attach_multi() 161 prog_ids, &prog_cnt)); in serial_test_cgroup_attach_multi() 162 CHECK_FAIL(prog_cnt != 4); in serial_test_cgroup_attach_multi() 167 prog_cnt = 2; in serial_test_cgroup_attach_multi() 170 prog_ids, &prog_cnt) >= 0); in serial_test_cgroup_attach_multi() 172 CHECK_FAIL(prog_cnt != 4); in serial_test_cgroup_attach_multi() 178 prog_ids, &prog_cnt)); in serial_test_cgroup_attach_multi() 179 CHECK_FAIL(prog_cnt ! in serial_test_cgroup_attach_multi() [all...] |
H A D | helper_restricted.c | 8 int prog_i = 0, prog_cnt; in test_helper_restricted() local 18 prog_cnt = test->skeleton->prog_cnt; in test_helper_restricted() 20 for (int j = 0; j < prog_cnt; ++j) { in test_helper_restricted() 30 } while (++prog_i < prog_cnt); in test_helper_restricted()
|
H A D | cgroup_link.c | 41 __u32 prog_ids[ARRAY_SIZE(cgs)], prog_cnt = 0, attach_flags, prog_id; in serial_test_cgroup_link() local 76 0, &attach_flags, NULL, &prog_cnt); in serial_test_cgroup_link() 79 if (CHECK(prog_cnt != 1, "effect_cnt", "exp %d, got %d\n", 1, prog_cnt)) in serial_test_cgroup_link() 85 &prog_cnt); in serial_test_cgroup_link() 87 if (CHECK(prog_cnt != cg_nr, "effect_cnt", "exp %d, got %d\n", in serial_test_cgroup_link() 88 cg_nr, prog_cnt)) in serial_test_cgroup_link() 94 &prog_cnt); in serial_test_cgroup_link() 96 if (CHECK(prog_cnt != cg_nr, "effect_cnt", "exp %d, got %d\n", in serial_test_cgroup_link() 97 cg_nr, prog_cnt)) in serial_test_cgroup_link() [all...] |
H A D | tp_attach_query.c | 75 if (CHECK(err || query->prog_cnt != 0, in serial_test_tp_attach_query() 77 "err %d errno %d query->prog_cnt %u\n", in serial_test_tp_attach_query() 78 err, errno, query->prog_cnt)) in serial_test_tp_attach_query() 91 if (CHECK(err || query->prog_cnt != 2, in serial_test_tp_attach_query() 93 "err %d errno %d query->prog_cnt %u\n", in serial_test_tp_attach_query() 94 err, errno, query->prog_cnt)) in serial_test_tp_attach_query() 109 if (CHECK(!err || errno != ENOSPC || query->prog_cnt != 2, in serial_test_tp_attach_query() 111 "err %d errno %d query->prog_cnt %u\n", in serial_test_tp_attach_query() 112 err, errno, query->prog_cnt)) in serial_test_tp_attach_query() 118 if (CHECK(err || query->prog_cnt ! in serial_test_tp_attach_query() [all...] |
H A D | cgroup_attach_autodetach.c | 26 __u32 duration = 0, prog_cnt = 4, attach_flags; in serial_test_cgroup_attach_autodetach() local 60 prog_ids, &prog_cnt), in serial_test_cgroup_attach_autodetach()
|
H A D | lsm_cgroup.c | 24 return p.prog_cnt; in query_prog_cnt() 35 p.prog_ids = malloc(sizeof(u32) * p.prog_cnt); in query_prog_cnt() 36 p.prog_attach_flags = malloc(sizeof(u32) * p.prog_cnt); in query_prog_cnt() 39 for (i = 0; i < p.prog_cnt; i++) { in query_prog_cnt()
|
H A D | sockmap_basic.c | 448 __u32 prog_cnt = 3; in test_sockmap_progs_query() local 462 &attach_flags, prog_ids, &prog_cnt); in test_sockmap_progs_query() 465 ASSERT_EQ(prog_cnt, 0, "wrong program count on query"); in test_sockmap_progs_query() 471 prog_cnt = 1; in test_sockmap_progs_query() 473 &attach_flags, prog_ids, &prog_cnt); in test_sockmap_progs_query() 476 ASSERT_EQ(prog_cnt, 1, "wrong program count on query"); in test_sockmap_progs_query()
|
H A D | unpriv_bpf_disabled.c | 159 __u32 prog_cnt = 3; in test_unpriv_bpf_disabled_negative() local 205 &prog_cnt), -EPERM, "prog_query_fails"); in test_unpriv_bpf_disabled_negative()
|
H A D | flow_dissector_reattach.c | 24 __u32 prog_cnt = ARRAY_SIZE(prog_ids); in query_attached_prog_id() local 28 prog_ids, &prog_cnt); in query_attached_prog_id() 34 return prog_cnt == 1 ? prog_ids[0] : 0; in query_attached_prog_id()
|
H A D | sk_lookup.c | 461 __u32 prog_cnt = 3; in query_lookup_prog() local 483 &attach_flags, prog_ids, &prog_cnt); in query_lookup_prog() 493 if (CHECK(prog_cnt != 3, "bpf_prog_query", in query_lookup_prog() 494 "wrong program count on query: %u", prog_cnt)) in query_lookup_prog()
|
/linux/tools/testing/selftests/bpf/ |
H A D | test_lirc_mode2_user.c | 55 u32 prog_ids[10], prog_flags[10], prog_cnt; in main() local 88 prog_cnt = 10; in main() 90 &prog_cnt); in main() 96 if (prog_cnt != 0) { in main() 156 prog_cnt = 10; in main() 158 &prog_cnt); in main() 164 if (prog_cnt != 1) { in main()
|
H A D | veristat.c | 2135 int err = 0, prog_cnt = 0; in process_obj() local 2171 prog_cnt++; in process_obj() 2174 if (prog_cnt == 1) { in process_obj()
|
/linux/tools/bpf/bpftool/ |
H A D | cgroup.c | 205 __u32 prog_cnt = 0; in count_attached_bpf_progs() local 209 NULL, &prog_cnt); in count_attached_bpf_progs() 213 return prog_cnt; in count_attached_bpf_progs() 245 p.prog_cnt = ARRAY_SIZE(prog_ids); in show_effective_bpf_progs() 252 if (p.prog_cnt == 0) in show_effective_bpf_progs() 255 for (iter = 0; iter < p.prog_cnt; iter++) in show_effective_bpf_progs() 273 p.prog_cnt = ARRAY_SIZE(prog_ids); in show_attached_bpf_progs() 281 if (p.prog_cnt == 0) in show_attached_bpf_progs() 284 for (iter = 0; iter < p.prog_cnt; iter++) { in show_attached_bpf_progs()
|
H A D | gen.c | 920 codegen_progs_skeleton(struct bpf_object *obj, size_t prog_cnt, bool populate_links) in codegen_progs_skeleton() argument 925 if (!prog_cnt) in codegen_progs_skeleton() 932 s->prog_cnt = %zu; \n\ in codegen_progs_skeleton() 934 s->progs = (struct bpf_prog_skeleton *)calloc(s->prog_cnt, s->prog_skel_sz);\n\ in codegen_progs_skeleton() 940 prog_cnt in codegen_progs_skeleton() 1168 size_t map_cnt = 0, prog_cnt = 0, attach_map_cnt = 0, file_sz, mmap_sz; in do_skeleton() local 1259 prog_cnt++; in do_skeleton() 1319 if (prog_cnt) { in do_skeleton() 1332 if (prog_cnt + attach_map_cnt) { in do_skeleton() 1499 codegen_progs_skeleton(obj, prog_cnt, tru in do_skeleton() 1573 size_t i, len, file_sz, map_cnt = 0, prog_cnt = 0, mmap_sz, var_cnt = 0, var_idx = 0; do_subskeleton() local [all...] |
/linux/kernel/bpf/ |
H A D | net_namespace.c | 252 u32 prog_cnt = 0, flags = 0; in __netns_bpf_prog_query() local 257 prog_cnt = bpf_prog_array_length(run_array); in __netns_bpf_prog_query() 261 if (copy_to_user(&uattr->query.prog_cnt, &prog_cnt, sizeof(prog_cnt))) in __netns_bpf_prog_query() 263 if (!attr->query.prog_cnt || !prog_ids || !prog_cnt) in __netns_bpf_prog_query() 267 attr->query.prog_cnt); in __netns_bpf_prog_query()
|
H A D | cgroup.c | 1230 if (!effective_query && attr->query.prog_cnt && in __cgroup_bpf_query() 1259 if (copy_to_user(&uattr->query.prog_cnt, &total_cnt, sizeof(total_cnt))) in __cgroup_bpf_query() 1265 if (attr->query.prog_cnt == 0 || !prog_ids || !total_cnt) in __cgroup_bpf_query() 1269 if (attr->query.prog_cnt < total_cnt) { in __cgroup_bpf_query() 1270 total_cnt = attr->query.prog_cnt; in __cgroup_bpf_query()
|
H A D | core.c | 2577 struct bpf_prog_array *bpf_prog_array_alloc(u32 prog_cnt, gfp_t flags) in bpf_prog_array_alloc() argument 2581 if (prog_cnt) in bpf_prog_array_alloc() 2582 p = kzalloc(struct_size(p, items, prog_cnt + 1), flags); in bpf_prog_array_alloc() 2824 u32 *prog_cnt) in bpf_prog_array_copy_info() argument 2831 *prog_cnt = cnt; in bpf_prog_array_copy_info()
|
/linux/drivers/media/rc/ |
H A D | bpf-lirc.c | 322 if (copy_to_user(&uattr->query.prog_cnt, &cnt, sizeof(cnt))) { in lirc_prog_query() 332 if (attr->query.prog_cnt != 0 && prog_ids && cnt) in lirc_prog_query() 334 attr->query.prog_cnt); in lirc_prog_query()
|
/linux/tools/lib/bpf/ |
H A D | bpf.h | 601 __u32 prog_cnt; member 627 __u32 *prog_ids, __u32 *prog_cnt);
|
H A D | bpf.c | 1006 __u32 *attach_flags, __u32 *prog_ids, __u32 *prog_cnt) in bpf_prog_query() argument 1013 opts.prog_cnt = *prog_cnt; in bpf_prog_query() 1019 *prog_cnt = opts.prog_cnt; in bpf_prog_query()
|
H A D | libbpf.h | 1765 int prog_cnt; member 1793 int prog_cnt; member
|
/linux/net/core/ |
H A D | sock_map.c | 1559 u32 prog_cnt = 0, flags = 0; in sock_map_bpf_prog_query() local 1581 prog_cnt = !prog ? 0 : 1; in sock_map_bpf_prog_query() 1583 if (!attr->query.prog_cnt || !prog_ids || !prog_cnt) in sock_map_bpf_prog_query() 1591 prog_cnt = 0; in sock_map_bpf_prog_query() 1598 copy_to_user(&uattr->query.prog_cnt, &prog_cnt, sizeof(prog_cnt))) in sock_map_bpf_prog_query()
|
/linux/include/uapi/linux/ |
H A D | perf_event.h | 562 __u32 prog_cnt; member
|
/linux/tools/include/uapi/linux/ |
H A D | perf_event.h | 562 __u32 prog_cnt; member
|
/linux/kernel/trace/ |
H A D | bpf_trace.c | 2180 u32 *ids, prog_cnt, ids_len; in perf_event_query_prog_array() local 2198 * is required when user only wants to check for uquery->prog_cnt. in perf_event_query_prog_array() 2205 ret = bpf_prog_array_copy_info(progs, ids, ids_len, &prog_cnt); in perf_event_query_prog_array() 2208 if (copy_to_user(&uquery->prog_cnt, &prog_cnt, sizeof(prog_cnt)) || in perf_event_query_prog_array()
|