/third_party/ltp/testcases/kernel/syscalls/bpf/ |
H A D | bpf_map01.c | 11 * too low bpf() call can fail with EPERM due to deffered freeing. 62 TEST(bpf(BPF_MAP_LOOKUP_ELEM, attr, sizeof(*attr))); in run() 96 TEST(bpf(BPF_MAP_UPDATE_ELEM, attr, sizeof(*attr))); in run() 112 TEST(bpf(BPF_MAP_LOOKUP_ELEM, attr, sizeof(*attr))); in run()
|
H A D | bpf_common.c | 34 ret = TST_RETRY_FUNC(bpf(BPF_MAP_CREATE, attr, sizeof(*attr)), in bpf_map_create() 41 "bpf() requires CAP_SYS_ADMIN or CAP_BPF on this system"); in bpf_map_create() 73 const int ret = bpf(BPF_MAP_LOOKUP_ELEM, &elem_attr, sizeof(elem_attr)); in bpf_map_array_get() 110 const int ret = TST_RETRY_FUNC(bpf(BPF_PROG_LOAD, attr, sizeof(*attr)), in bpf_load_prog() 119 tst_brk(TBROK, "Invalid bpf() return value: %d", ret); in bpf_load_prog()
|
H A D | bpf_prog03.c | 7 * "bpf: fix incorrect sign extension in check_alu_op()" 90 ret = TST_RETRY_FUNC(bpf(BPF_PROG_LOAD, attr, sizeof(*attr)), in load_prog() 94 tst_brk(TBROK, "Invalid bpf() return value %d", ret); in load_prog() 127 TEST(bpf(BPF_MAP_UPDATE_ELEM, attr, sizeof(*attr))); in run()
|
H A D | bpf_prog06.c | 33 * bpf: Fix out of bounds access for ringbuf helpers 46 #include "lapi/bpf.h" 86 ret = TST_RETRY_FUNC(bpf(BPF_PROG_LOAD, attr, sizeof(*attr)), in load_prog() 93 tst_brk(TBROK, "Invalid bpf() return value: %d", ret); in load_prog()
|
H A D | bpf_prog04.c | 19 * bpf: 32-bit RSH verification must truncate input before the ALU op 64 ret = TST_RETRY_FUNC(bpf(BPF_PROG_LOAD, attr, sizeof(*attr)), in load_prog() 74 tst_brk(TBROK, "Invalid bpf() return value %d", ret); in load_prog()
|
H A D | bpf_prog05.c | 12 * The commit "bpf: fix subprog verifier bypass by div/mod by 0 23 * "bpf: Fix 32 bit src register truncation on div/mod" 24 * "bpf: Fix truncation handling for mod32 dst reg wrt zero" 85 ret = TST_RETRY_FUNC(bpf(BPF_PROG_LOAD, attr, sizeof(*attr)), in ensure_ptr_arithmetic() 95 tst_brk(TBROK, "Invalid bpf() return value: %d", ret); in ensure_ptr_arithmetic()
|
H A D | bpf_prog07.c | 34 * bpf: Fix out of bounds access for ringbuf helpers 46 #include "lapi/bpf.h" 94 ret = TST_RETRY_FUNC(bpf(BPF_PROG_LOAD, attr, sizeof(*attr)), in load_prog() 101 tst_brk(TBROK, "Invalid bpf() return value: %d", ret); in load_prog()
|
/third_party/libbpf/scripts/ |
H A D | sync-kernel.sh | 4 echo "USAGE: ./sync-kernel.sh <libbpf-repo> <kernel-repo> <bpf-branch>" 6 echo "Set BPF_NEXT_BASELINE to override bpf-next tree commit, otherwise read from <libbpf-repo>/CHECKPOINT-COMMIT." 7 echo "Set BPF_BASELINE to override bpf tree commit, otherwise read from <libbpf-repo>/BPF-CHECKPOINT-COMMIT." 25 echo "Error: linux's bpf tree branch is not specified" 29 echo "Error: bpf or bpf-next baseline commits are not provided" 41 [tools/lib/bpf]=src \ 43 [tools/include/uapi/linux/bpf.h]=include/uapi/linux/bpf.h \ 54 [Documentation/bpf/libbp [all...] |
/third_party/libbpf/src/ |
H A D | Makefile | 55 OBJS := bpf.o btf.o libbpf.o libbpf_errno.o netlink.o \ 70 HEADERS := bpf.h libbpf.h btf.h libbpf_common.h libbpf_legacy.h \ 73 usdt.bpf.h 75 bpf.h bpf_common.h btf.h) 161 $(call do_install,$(HEADERS),$(INCLUDEDIR)/bpf,644)
|
H A D | libbpf_legacy.h | 13 #include <linux/bpf.h>
|
H A D | relo_core.h | 7 #include <linux/bpf.h>
|
H A D | bpf_prog_linfo.c | 7 #include <linux/bpf.h>
|
H A D | skel_internal.h | 11 #include <linux/bpf.h> 17 #include "bpf.h" 108 * skel_finalize_map_data() sets skel->rodata to point to actual value in a bpf map and 116 * skel_finalize_map_data() remaps bpf array map value from the kernel memory into 153 * 'fd' is a valid bpf map FD. All sanity checks below should succeed. in skel_finalize_map_data()
|
H A D | bpf.h | 26 #include <linux/bpf.h> 67 /* libbpf can retry BPF_PROG_LOAD command if bpf() syscall returns 377 union bpf_iter_link_info; /* defined in up-to-date linux/bpf.h */ 604 enum bpf_stats_type; /* defined in up-to-date linux/bpf.h */
|
H A D | ringbuf.c | 15 #include <linux/bpf.h> 23 #include "bpf.h"
|
/third_party/libbpf/ci/vmtest/ |
H A D | run_selftests.sh | 65 configs_path=/${PROJECT_NAME}/selftests/bpf 83 cd ${PROJECT_NAME}/selftests/bpf
|
/third_party/nghttp2/src/ |
H A D | shrpx_worker.cc | 38 # include <bpf/bpf.h> 39 # include <bpf/libbpf.h> 676 if (quicconf.bpf.disabled) { in should_attach_bpf() 691 return !quicconf.bpf.disabled; in should_update_bpf_map() 920 auto &bpfconf = config->quic.bpf; in create_quic_server_socket() 925 LOG(FATAL) << "Failed to open bpf object file: " in create_quic_server_socket() 934 LOG(FATAL) << "Failed to load bpf object file: " in create_quic_server_socket() 1027 LOG(FATAL) << "Failed to attach bpf program: " in create_quic_server_socket()
|
H A D | shrpx_connection_handler.h | 44 # include <bpf/libbpf.h>
|
/third_party/libbpf/include/linux/ |
H A D | filter.h | 6 #include <linux/bpf.h>
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/l2_packet/ |
H A D | l2_packet_freebsd.c | 12 #include <net/bpf.h>
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/l2_packet/ |
H A D | l2_packet_freebsd.c | 12 #include <net/bpf.h>
|
/third_party/nghttp2/bpf/ |
H A D | reuseport_kern.c | 26 #include <linux/bpf.h> 28 #include <bpf/bpf_helpers.h> 33 * clang-12 -O2 -Wall -target bpf -g -c reuseport_kern.c -o reuseport_kern.o \
|
/third_party/ltp/include/lapi/ |
H A D | bpf.h | 7 * Mostly copied/adapted from linux/bpf.h and libbpf so that we can perform 476 /* End copy from linux/bpf.h */ 615 /* Start copy from tools/lib/bpf */ 621 static inline int bpf(enum bpf_cmd cmd, union bpf_attr *attr, unsigned int size) in bpf() function 625 /* End copy from tools/lib/bpf */
|
/third_party/lwip/src/netif/ppp/ |
H A D | demand.c | 52 #include <pcap-bpf.h>
|
/third_party/lame/libmp3lame/ |
H A D | set_get.c | 2326 int const bpf = ((cfg->version + 1) * 72000 * kbps / cfg->samplerate_out + pad); in calc_maximum_input_samples_for_buffer_size() local 2327 frames_per_buffer = buffer_size / bpf; in calc_maximum_input_samples_for_buffer_size()
|