/kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/ |
H A D | ctx_rewrite.c | 636 __u32 xlated_prog_len; in get_xlated_program() local 644 xlated_prog_len = info.xlated_prog_len; in get_xlated_program() 645 if (xlated_prog_len % buf_element_size) { in get_xlated_program() 647 xlated_prog_len, buf_element_size); in get_xlated_program() 651 *cnt = xlated_prog_len / buf_element_size; in get_xlated_program() 659 info.xlated_prog_len = xlated_prog_len; in get_xlated_program()
|
H A D | bpf_obj_id.c | 112 prog_infos[i].xlated_prog_len = sizeof(xlated_insns); in serial_test_bpf_obj_id() 131 !prog_infos[i].xlated_prog_len || in serial_test_bpf_obj_id() 140 "jit_enabled %d jited_prog_len %u xlated_prog_len %u " in serial_test_bpf_obj_id() 149 prog_infos[i].xlated_prog_len, in serial_test_bpf_obj_id()
|
H A D | tp_attach_query.c | 50 prog_info.xlated_prog_len = 0; in serial_test_tp_attach_query()
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/prog_tests/ |
H A D | bpf_obj_id.c | 112 prog_infos[i].xlated_prog_len = sizeof(xlated_insns); in test_bpf_obj_id() 131 !prog_infos[i].xlated_prog_len || in test_bpf_obj_id() 140 "jit_enabled %d jited_prog_len %u xlated_prog_len %u " in test_bpf_obj_id() 149 prog_infos[i].xlated_prog_len, in test_bpf_obj_id()
|
H A D | tp_attach_query.c | 45 prog_info.xlated_prog_len = 0; in test_tp_attach_query()
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/ |
H A D | test_verifier.c | 1349 __u32 xlated_prog_len; in get_xlated_program() local 1357 xlated_prog_len = info.xlated_prog_len; in get_xlated_program() 1358 if (xlated_prog_len % buf_element_size) { in get_xlated_program() 1360 xlated_prog_len, buf_element_size); in get_xlated_program() 1364 *cnt = xlated_prog_len / buf_element_size; in get_xlated_program() 1372 info.xlated_prog_len = xlated_prog_len; in get_xlated_program()
|
/kernel/linux/linux-6.6/tools/bpf/bpftool/ |
H A D | prog.c | 100 holder.xlated_prog_len = info->xlated_prog_len; in prep_prog_info() 101 needed += info->xlated_prog_len; in prep_prog_info() 137 ptr += holder.xlated_prog_len; in prep_prog_info() 464 jsonw_uint_field(json_wtr, "bytes_xlated", info->xlated_prog_len); in print_prog_json() 545 printf("\txlated %uB", info->xlated_prog_len); in print_prog_plain() 719 if (info->xlated_prog_len == 0 || !info->xlated_prog_insns) { in prog_dump() 724 member_len = info->xlated_prog_len; in prog_dump()
|
/kernel/linux/linux-6.6/tools/perf/util/ |
H A D | bpf-utils.c | 31 offsetof(struct bpf_prog_info, xlated_prog_len),
|
/kernel/linux/linux-5.10/tools/bpf/bpftool/ |
H A D | prog.c | 394 jsonw_uint_field(json_wtr, "bytes_xlated", info->xlated_prog_len); in print_prog_json() 469 printf("\txlated %uB", info->xlated_prog_len); in print_prog_plain() 635 if (info->xlated_prog_len == 0 || !info->xlated_prog_insns) { in prog_dump() 640 member_len = info->xlated_prog_len; in prog_dump()
|
/kernel/linux/linux-5.10/kernel/bpf/ |
H A D | syscall.c | 3483 info.xlated_prog_len = 0; in bpf_prog_get_info_by_fd() 3492 ulen = info.xlated_prog_len; in bpf_prog_get_info_by_fd() 3493 info.xlated_prog_len = bpf_prog_insn_size(prog); in bpf_prog_get_info_by_fd() 3494 if (info.xlated_prog_len && ulen) { in bpf_prog_get_info_by_fd() 3506 ulen = min_t(u32, info.xlated_prog_len, ulen); in bpf_prog_get_info_by_fd()
|
/kernel/linux/patches/linux-4.19/prebuilts/usr/include/linux/ |
H A D | bpf.h | 532 __u32 xlated_prog_len; member
|
/kernel/linux/linux-5.10/tools/include/uapi/linux/ |
H A D | bpf.h | 4395 __u32 xlated_prog_len; member
|
/kernel/linux/linux-5.10/include/uapi/linux/ |
H A D | bpf.h | 4395 __u32 xlated_prog_len; member
|
/kernel/linux/patches/linux-6.6/prebuilts/usr/include/linux/ |
H A D | bpf.h | 748 __u32 xlated_prog_len; member
|
/kernel/linux/patches/linux-5.10/prebuilts/usr/include/linux/ |
H A D | bpf.h | 748 __u32 xlated_prog_len; member
|
/kernel/linux/linux-6.6/kernel/bpf/ |
H A D | syscall.c | 4372 info.xlated_prog_len = 0; in bpf_prog_get_info_by_fd() 4381 ulen = info.xlated_prog_len; in bpf_prog_get_info_by_fd() 4382 info.xlated_prog_len = bpf_prog_insn_size(prog); in bpf_prog_get_info_by_fd() 4383 if (info.xlated_prog_len && ulen) { in bpf_prog_get_info_by_fd() 4395 ulen = min_t(u32, info.xlated_prog_len, ulen); in bpf_prog_get_info_by_fd()
|
/kernel/linux/linux-6.6/include/uapi/linux/ |
H A D | bpf.h | 6409 __u32 xlated_prog_len; member
|
/kernel/linux/linux-6.6/tools/include/uapi/linux/ |
H A D | bpf.h | 6409 __u32 xlated_prog_len; member
|
/kernel/linux/linux-5.10/tools/lib/bpf/ |
H A D | libbpf.c | 10429 offsetof(struct bpf_prog_info, xlated_prog_len),
|