/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | tc_opts.c | 20 __u32 prog_ids[2]; in test_ns_tc_opts_basic() local 48 optq.prog_ids = prog_ids; in test_ns_tc_opts_basic() 50 memset(prog_ids, 0, sizeof(prog_ids)); in test_ns_tc_opts_basic() 51 optq.count = ARRAY_SIZE(prog_ids); in test_ns_tc_opts_basic() 59 ASSERT_EQ(optq.prog_ids[0], id1, "prog_ids[0]"); in test_ns_tc_opts_basic() 60 ASSERT_EQ(optq.prog_ids[1], 0, "prog_ids[ in test_ns_tc_opts_basic() 118 __u32 prog_ids[5]; test_tc_opts_before_target() local 270 __u32 prog_ids[5]; test_tc_opts_after_target() local 461 __u32 prog_ids[3]; test_tc_opts_revision_target() local 672 __u32 prog_ids[4], prog_flags[4]; test_tc_opts_replace_target() local 1033 __u32 prog_ids[5]; test_tc_opts_prepend_target() local 1173 __u32 prog_ids[5]; test_tc_opts_append_target() local 1404 __u32 prog_ids[4], link_ids[4]; test_tc_opts_mixed_target() local 1658 __u32 prog_ids[5]; test_tc_opts_detach_target() local 1829 __u32 prog_ids[5]; test_tc_opts_detach_before_target() local 2036 __u32 prog_ids[5]; test_tc_opts_detach_after_target() local 2470 __u32 prog_ids[10]; test_tc_opts_query_target() local 2763 __u32 prog_ids[2]; test_tc_opts_query_attach_target() local [all...] |
H A D | cgroup_mprog_opts.c | 25 __u32 prog_ids[10]; in test_prog_attach_detach() local 103 memset(prog_ids, 0, sizeof(prog_ids)); in test_prog_attach_detach() 104 optq.prog_ids = prog_ids; in test_prog_attach_detach() 111 ASSERT_EQ(optq.prog_ids[0], id2, "prog_ids[0]"); in test_prog_attach_detach() 112 ASSERT_EQ(optq.prog_ids[1], id3, "prog_ids[1]"); in test_prog_attach_detach() 113 ASSERT_EQ(optq.prog_ids[ in test_prog_attach_detach() 158 __u32 prog_ids[10]; test_link_attach_detach() local [all...] |
H A D | cgroup_attach_multi.c | 79 __u32 prog_ids[4], prog_cnt = 0, attach_flags, saved_prog_id; in serial_test_cgroup_attach_multi() local 158 /* retrieve prog_ids of effective progs in cg5 */ in serial_test_cgroup_attach_multi() 161 prog_ids, &prog_cnt)); in serial_test_cgroup_attach_multi() 164 saved_prog_id = prog_ids[0]; in serial_test_cgroup_attach_multi() 166 prog_ids[0] = 0; in serial_test_cgroup_attach_multi() 170 prog_ids, &prog_cnt) >= 0); in serial_test_cgroup_attach_multi() 173 /* check that prog_ids are returned even when buffer is too small */ in serial_test_cgroup_attach_multi() 174 CHECK_FAIL(prog_ids[0] != saved_prog_id); in serial_test_cgroup_attach_multi() 176 prog_ids[0] = 0; in serial_test_cgroup_attach_multi() 178 prog_ids, in serial_test_cgroup_attach_multi() [all...] |
H A D | cgroup_attach_autodetach.c | 28 __u32 prog_ids[2] = {0}; in serial_test_cgroup_attach_autodetach() local 60 prog_ids, &prog_cnt), in serial_test_cgroup_attach_autodetach() 86 for (i = 0; i < ARRAY_SIZE(prog_ids); i++) { in serial_test_cgroup_attach_autodetach() 88 int fd = bpf_prog_get_fd_by_id(prog_ids[i]); in serial_test_cgroup_attach_autodetach()
|
H A D | cgroup_link.c | 41 __u32 prog_ids[ARRAY_SIZE(cgs)], prog_cnt = 0, attach_flags, prog_id; in serial_test_cgroup_link() local 93 BPF_F_QUERY_EFFECTIVE, NULL, prog_ids, in serial_test_cgroup_link() 100 CHECK(prog_ids[i - 1] != prog_ids[i], "prog_id_check", in serial_test_cgroup_link() 102 i, prog_ids[i - 1], prog_ids[i]); in serial_test_cgroup_link()
|
H A D | sk_lookup.c | 460 __u32 prog_ids[3] = {}; in query_lookup_prog() local 483 &attach_flags, prog_ids, &prog_cnt); in query_lookup_prog() 497 CHECK(prog_ids[0] != prog_id, "bpf_prog_query", in query_lookup_prog() 499 prog_ids[0], prog_id); in query_lookup_prog() 503 CHECK(prog_ids[1] != prog_id, "bpf_prog_query", in query_lookup_prog() 505 prog_ids[1], prog_id); in query_lookup_prog() 509 CHECK(prog_ids[2] != prog_id, "bpf_prog_query", in query_lookup_prog() 511 prog_ids[2], prog_id); in query_lookup_prog() 521 CHECK(prog_ids[0] != prog_id, "bpf_prog_query", in query_lookup_prog() 523 prog_ids[ in query_lookup_prog() [all...] |
H A D | lsm_cgroup.c | 35 p.prog_ids = malloc(sizeof(u32) * p.prog_cnt); in query_prog_cnt() 44 fd = bpf_prog_get_fd_by_id(p.prog_ids[i]); in query_prog_cnt() 55 free(p.prog_ids); in query_prog_cnt()
|
H A D | flow_dissector_reattach.c | 23 __u32 prog_ids[1] = {}; in query_attached_prog_id() local 24 __u32 prog_cnt = ARRAY_SIZE(prog_ids); in query_attached_prog_id() 28 prog_ids, &prog_cnt); in query_attached_prog_id() 34 return prog_cnt == 1 ? prog_ids[0] : 0; in query_attached_prog_id()
|
H A D | unpriv_bpf_disabled.c | 158 __u32 prog_ids[3] = {}; in test_unpriv_bpf_disabled_negative() local 204 ASSERT_EQ(bpf_prog_query(prog_fd, BPF_TRACE_FENTRY, 0, &attach_flags, prog_ids, in test_unpriv_bpf_disabled_negative()
|
H A D | sockmap_basic.c | 447 __u32 prog_ids[3] = {}; in test_sockmap_progs_query() local 462 &attach_flags, prog_ids, &prog_cnt); in test_sockmap_progs_query() 473 &attach_flags, prog_ids, &prog_cnt); in test_sockmap_progs_query() 477 ASSERT_EQ(prog_ids[0], query_prog_id(verdict_fd), in test_sockmap_progs_query() 478 "wrong prog_ids on query"); in test_sockmap_progs_query()
|
/linux/tools/bpf/bpftool/ |
H A D | cgroup.c | 240 __u32 prog_ids[1024] = {0}; in show_effective_bpf_progs() local 245 p.prog_cnt = ARRAY_SIZE(prog_ids); in show_effective_bpf_progs() 246 p.prog_ids = prog_ids; in show_effective_bpf_progs() 256 show_bpf_prog(prog_ids[iter], type, NULL, level); in show_effective_bpf_progs() 267 __u32 prog_ids[1024] = {0}; in show_attached_bpf_progs() local 273 p.prog_cnt = ARRAY_SIZE(prog_ids); in show_attached_bpf_progs() 274 p.prog_ids = prog_ids; in show_attached_bpf_progs() 304 show_bpf_prog(prog_ids[ite in show_attached_bpf_progs() [all...] |
/linux/tools/testing/selftests/bpf/ |
H A D | test_lirc_mode2_user.c | 55 u32 prog_ids[10], prog_flags[10], prog_cnt; in main() local 89 ret = bpf_prog_query(lircfd, BPF_LIRC_MODE2, 0, prog_flags, prog_ids, in main() 157 ret = bpf_prog_query(lircfd, BPF_LIRC_MODE2, 0, prog_flags, prog_ids, in main()
|
/linux/drivers/media/rc/ |
H A D | bpf-lirc.c | 297 __u32 __user *prog_ids = u64_to_user_ptr(attr->query.prog_ids); in lirc_prog_query() local 332 if (attr->query.prog_cnt != 0 && prog_ids && cnt) in lirc_prog_query() 333 ret = bpf_prog_array_copy_to_user(progs, prog_ids, in lirc_prog_query()
|
/linux/kernel/bpf/ |
H A D | net_namespace.c | 250 __u32 __user *prog_ids = u64_to_user_ptr(attr->query.prog_ids); in __netns_bpf_prog_query() local 263 if (!attr->query.prog_cnt || !prog_ids || !prog_cnt) in __netns_bpf_prog_query() 266 return bpf_prog_array_copy_to_user(run_array, prog_ids, in __netns_bpf_prog_query()
|
H A D | cgroup.c | 1216 __u32 __user *prog_ids = u64_to_user_ptr(attr->query.prog_ids); in __cgroup_bpf_query() local 1231 prog_ids && !prog_attach_flags) in __cgroup_bpf_query() 1265 if (attr->query.prog_cnt == 0 || !prog_ids || !total_cnt) in __cgroup_bpf_query() 1279 ret = bpf_prog_array_copy_to_user(effective, prog_ids, cnt); in __cgroup_bpf_query() 1292 if (copy_to_user(prog_ids + i, &id, sizeof(id))) in __cgroup_bpf_query() 1309 prog_ids += cnt; in __cgroup_bpf_query()
|
H A D | core.c | 2639 u32 *prog_ids, in bpf_prog_array_copy_core() argument 2648 prog_ids[i] = item->prog->aux->id; in bpf_prog_array_copy_core() 2659 __u32 __user *prog_ids, u32 cnt) in bpf_prog_array_copy_to_user() argument 2675 err = copy_to_user(prog_ids, ids, cnt * sizeof(u32)); in bpf_prog_array_copy_to_user() 2823 u32 *prog_ids, u32 request_cnt, in bpf_prog_array_copy_info() argument 2838 return bpf_prog_array_copy_core(array, prog_ids, request_cnt) ? -ENOSPC in bpf_prog_array_copy_info()
|
H A D | mprog.c | 420 uprog_id = u64_to_user_ptr(attr->query.prog_ids); in bpf_mprog_query()
|
/linux/tools/lib/bpf/ |
H A D | bpf.h | 598 __u32 *prog_ids; member 627 __u32 *prog_ids, __u32 *prog_cnt);
|
H A D | bpf.c | 991 attr.query.prog_ids = ptr_to_u64(OPTS_GET(opts, prog_ids, NULL)); in bpf_prog_query_opts() 1006 __u32 *attach_flags, __u32 *prog_ids, __u32 *prog_cnt) in bpf_prog_query() argument 1012 opts.prog_ids = prog_ids; in bpf_prog_query()
|
/linux/net/core/ |
H A D | sock_map.c | 1558 __u32 __user *prog_ids = u64_to_user_ptr(attr->query.prog_ids); in sock_map_bpf_prog_query() local 1583 if (!attr->query.prog_cnt || !prog_ids || !prog_cnt) in sock_map_bpf_prog_query() 1597 (id != 0 && copy_to_user(prog_ids, &id, sizeof(u32))) || in sock_map_bpf_prog_query()
|
/linux/include/linux/ |
H A D | bpf.h | 2209 __u32 __user *prog_ids, u32 cnt); 2217 u32 *prog_ids, u32 request_cnt,
|
/linux/tools/include/uapi/linux/ |
H A D | bpf.h | 490 * programs. Additionally, if *prog_ids* is nonzero and the number 492 * *prog_ids* with the eBPF program ids of the programs attached 1690 __aligned_u64 prog_ids; member
|
/linux/include/uapi/linux/ |
H A D | bpf.h | 490 * programs. Additionally, if *prog_ids* is nonzero and the number 492 * *prog_ids* with the eBPF program ids of the programs attached 1690 __aligned_u64 prog_ids; member
|