/external/linux-kselftest/tools/testing/selftests/bpf/ |
test_section_names.c | 13 enum bpf_prog_type prog_type; member in struct:sec_name_test::__anon30564 127 enum bpf_prog_type prog_type; local 130 rc = libbpf_prog_type_by_name(test->sec_name, &prog_type, 141 if (prog_type != test->expected_load.prog_type) { 142 warnx("prog: unexpected prog_type=%d for %s", prog_type,
|
test_align.c | 39 enum bpf_prog_type prog_type; member in struct:bpf_align_test 59 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 87 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 116 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 138 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 181 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 214 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 254 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 313 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 403 .prog_type = BPF_PROG_TYPE_SCHED_CLS 613 int prog_type = test->prog_type; local [all...] |
test_verifier.c | 85 enum bpf_prog_type prog_type; member in struct:bpf_test 302 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 314 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 326 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 338 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 352 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 364 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 376 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 388 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 400 .prog_type = BPF_PROG_TYPE_SCHED_CLS 14232 int prog_len, prog_type = test->prog_type; local [all...] |
test_socket_cookie.c | 150 attr.prog_type = BPF_PROG_TYPE_UNSPEC;
|
test_verifier_log.c | 53 attr.prog_type = BPF_PROG_TYPE_SOCKET_FILTER;
|
test_select_reuseport.c | 92 .prog_type = BPF_PROG_TYPE_SK_REUSEPORT, 101 bpf_program__set_type(prog, attr.prog_type);
|
test_sock.c | 330 attr.prog_type = BPF_PROG_TYPE_CGROUP_SOCK;
|
/external/bcc/introspection/ |
bps.c | 114 const char *prog_type; local 122 prog_type = unknown_prog_type; 124 prog_type = prog_type_strings[prog_info->type]; 143 prog_info->id, prog_type, prog_info->created_by_uid, 147 prog_info->id, prog_type, prog_info->created_by_uid,
|
/external/virglrenderer/src/ |
vrend_shader.c | 130 int prog_type; member in struct:dump_ctx [all...] |
/external/bcc/src/lua/bcc/ |
bpf.lua | 143 function Bpf:load_funcs(prog_type) 144 prog_type = prog_type or "BPF_PROG_TYPE_KPROBE" 151 table.insert(result, self:load_func(name, prog_type)) 157 function Bpf:load_func(fn_name, prog_type) 165 local fd = libbcc.bpf_prog_load(prog_type,
|
/external/strace/ |
bpf_attr.h | 115 uint32_t prog_type; member in struct:BPF_PROG_LOAD_struct
|
bpf_attr_check.c | 173 static_assert(SoM(struct BPF_PROG_LOAD_struct, prog_type) == SoM(union bpf_attr, prog_type), 174 "BPF_PROG_LOAD_struct.prog_type size mismatch"); 175 static_assert(offsetof(struct BPF_PROG_LOAD_struct, prog_type) == offsetof(union bpf_attr, prog_type), 176 "BPF_PROG_LOAD_struct.prog_type offset mismatch"); [all...] |
/external/strace/tests/ |
bpf.c | 550 printf("prog_type=BPF_PROG_TYPE_SOCKET_FILTER, insn_cnt=%u" 576 printf("prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=%u, insns=" INSNS_FMT 589 .data = { .BPF_PROG_LOAD_data = { .prog_type = 1 } }, 590 .size = offsetofend(struct BPF_PROG_LOAD_struct, prog_type), 591 .str = "prog_type=BPF_PROG_TYPE_SOCKET_FILTER" 596 .prog_type = 21, 607 .str = "prog_type=0x15 /* BPF_PROG_TYPE_??? */" 615 .prog_type = 20, 627 .str = "prog_type=BPF_PROG_TYPE_SK_REUSEPORT" 639 .prog_type = 1 [all...] |
bpf-obj_get_info_by_fd.c | 188 printf("bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SOCKET_FILTER" 253 .prog_type = BPF_PROG_TYPE_SOCKET_FILTER,
|
/external/strace/tests-m32/ |
bpf.c | 550 printf("prog_type=BPF_PROG_TYPE_SOCKET_FILTER, insn_cnt=%u" 576 printf("prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=%u, insns=" INSNS_FMT 589 .data = { .BPF_PROG_LOAD_data = { .prog_type = 1 } }, 590 .size = offsetofend(struct BPF_PROG_LOAD_struct, prog_type), 591 .str = "prog_type=BPF_PROG_TYPE_SOCKET_FILTER" 596 .prog_type = 21, 607 .str = "prog_type=0x15 /* BPF_PROG_TYPE_??? */" 615 .prog_type = 20, 627 .str = "prog_type=BPF_PROG_TYPE_SK_REUSEPORT" 639 .prog_type = 1 [all...] |
bpf-obj_get_info_by_fd.c | 188 printf("bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SOCKET_FILTER" 253 .prog_type = BPF_PROG_TYPE_SOCKET_FILTER,
|
/external/strace/tests-mx32/ |
bpf.c | 550 printf("prog_type=BPF_PROG_TYPE_SOCKET_FILTER, insn_cnt=%u" 576 printf("prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=%u, insns=" INSNS_FMT 589 .data = { .BPF_PROG_LOAD_data = { .prog_type = 1 } }, 590 .size = offsetofend(struct BPF_PROG_LOAD_struct, prog_type), 591 .str = "prog_type=BPF_PROG_TYPE_SOCKET_FILTER" 596 .prog_type = 21, 607 .str = "prog_type=0x15 /* BPF_PROG_TYPE_??? */" 615 .prog_type = 20, 627 .str = "prog_type=BPF_PROG_TYPE_SK_REUSEPORT" 639 .prog_type = 1 [all...] |
bpf-obj_get_info_by_fd.c | 188 printf("bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SOCKET_FILTER" 253 .prog_type = BPF_PROG_TYPE_SOCKET_FILTER,
|
/external/bcc/src/cc/ |
libbpf.h | 59 int bpf_prog_load(enum bpf_prog_type prog_type, const char *name,
|
libbpf.c | 459 fgets(fmt, sizeof(fmt), f); // prog_type 474 int bpf_prog_load(enum bpf_prog_type prog_type, const char *name, 487 attr.prog_type = prog_type; [all...] |
/external/linux-kselftest/tools/testing/selftests/net/ |
reuseport_bpf_numa.c | 88 attr.prog_type = BPF_PROG_TYPE_SOCKET_FILTER;
|
reuseport_bpf.c | 113 attr.prog_type = BPF_PROG_TYPE_SOCKET_FILTER; 356 eprog.prog_type = BPF_PROG_TYPE_SOCKET_FILTER;
|
/external/mesa3d/src/gallium/drivers/nouveau/nv50/ |
nv50_program.c | 451 uint8_t prog_type; local 483 prog_type = 1; 486 prog_type = prog->type; 506 (prog_type << NV50_CODE_BO_SIZE_LOG2) + prog->code_base,
|
/external/iproute2/include/uapi/linux/ |
bpf.h | 205 __u32 prog_type; /* one of enum bpf_prog_type */ member in struct:bpf_attr::__anon24466 212 __u32 kern_version; /* checked when prog_type=kprobe */
|
/external/bcc/src/python/bcc/ |
__init__.py | 339 def load_funcs(self, prog_type=KPROBE): 340 """load_funcs(prog_type=KPROBE) 348 fns.append(self.load_func(func_name, prog_type)) 352 def load_func(self, func_name, prog_type): 363 fd = lib.bpf_prog_load(prog_type, func_name, [all...] |