/external/bcc/libbpf-tools/ |
D | Android.bp | 31 "--target=bpf", 123 name: "bindsnoop.bpf.o", 124 srcs: ["bindsnoop.bpf.c"], 130 srcs: [":bindsnoop.bpf.o"], 143 name: "cpudist.bpf.o", 144 srcs: ["cpudist.bpf.c"], 150 srcs: [":cpudist.bpf.o"], 163 name: "cpufreq.bpf.o", 164 srcs: ["cpufreq.bpf.c"], 170 srcs: [":cpufreq.bpf.o"], [all …]
|
/external/bcc/src/lua/ |
D | bpf-scm-1.rockspec | 1 package = "bpf" 29 bpf = "src/lua/bpf/bpf.lua", 30 ["bpf.builtins"] = "src/lua/bpf/builtins.lua", 31 ["bpf.cdef"] = "src/lua/bpf/cdef.lua", 32 ["bpf.elf"] = "src/lua/bpf/elf.lua", 33 ["bpf.init"] = "src/lua/bpf/init.lua", 34 ["bpf.ljbytecode"] = "src/lua/bpf/ljbytecode.lua", 35 ["bpf.proto"] = "src/lua/bpf/proto.lua",
|
D | squishy | 9 Module "bcc.bpf" "bcc/bpf.lua" 16 Module "bpf" "bpf/init.lua" 17 Module "bpf.bpf" "bpf/bpf.lua" 18 Module "bpf.builtins" "bpf/builtins.lua" 19 Module "bpf.cdef" "bpf/cdef.lua" 20 Module "bpf.elf" "bpf/elf.lua" 21 Module "bpf.ljbytecode" "bpf/ljbytecode.lua" 22 Module "bpf.proto" "bpf/proto.lua"
|
/external/bcc/tests/cc/ |
D | test_map_in_map.cc | 61 ebpf::BPF bpf; variable 63 res = bpf.init(BPF_PROGRAM); 66 auto t = bpf.get_map_in_map_table<int>("maps_hash"); 67 auto ex1_table = bpf.get_array_table<int>("ex1"); 68 auto ex2_table = bpf.get_array_table<int>("ex2"); 69 auto ex3_table = bpf.get_array_table<unsigned long long>("ex3"); 99 std::string getuid_fnname = bpf.get_syscall_fnname("getuid"); 100 res = bpf.attach_kprobe(getuid_fnname, "syscall__getuid"); 103 auto cntl_table = bpf.get_array_table<int>("cntl"); 110 res = bpf.detach_kprobe(getuid_fnname); [all …]
|
D | test_perf_event.cc | 56 ebpf::BPF bpf; variable 58 res = bpf.init( 63 bpf.open_perf_event("cnt", PERF_TYPE_SOFTWARE, PERF_COUNT_SW_CPU_CLOCK); 65 std::string getuid_fnname = bpf.get_syscall_fnname("getuid"); 66 res = bpf.attach_kprobe(getuid_fnname, "on_sys_getuid"); 69 res = bpf.detach_kprobe(getuid_fnname); 71 res = bpf.close_perf_event("cnt"); 74 auto val = bpf.get_hash_table<int, uint64_t>("val"); 80 bpf.get_hash_table<int, struct bpf_perf_event_value>("counter"); 82 auto ret = bpf.get_hash_table<int, int>("ret"); [all …]
|
D | test_pinned_table.cc | 39 ebpf::BPF bpf; variable 41 res = bpf.init(BPF_PROGRAM); 44 …REQUIRE(bpf_obj_pin(bpf.get_hash_table<int, int>("ids").get_fd(), "/sys/fs/bpf/test_pinned_table")… 50 … BPF_TABLE_PINNED("hash", u64, u64, ids, 0, "/sys/fs/bpf/test_pinned_table", BPF_F_NO_PREALLOC); 53 ebpf::BPF bpf; variable 55 res = bpf.init(BPF_PROGRAM); 59 auto t = bpf.get_hash_table<int, int>("ids"); 73 BPF_TABLE_PINNED("hash", u64, u64, ids, 1024, "/sys/fs/bpf/test_pinned_table"); 76 ebpf::BPF bpf; variable 78 res = bpf.init(BPF_PROGRAM); [all …]
|
D | test_bpf_table.cc | 29 ebpf::BPF *bpf(new ebpf::BPF); in bpf_module_rw_engine_enabled() local 32 res = bpf->init(BPF_PROGRAM); in bpf_module_rw_engine_enabled() 35 ebpf::BPFTable t = bpf->get_table("myhash"); in bpf_module_rw_engine_enabled() 82 delete bpf; in bpf_module_rw_engine_enabled() 100 ebpf::BPF bpf; in bpf_module_rw_engine_enabled() local 102 res = bpf.init(BPF_PROGRAM); in bpf_module_rw_engine_enabled() 105 ebpf::BPFTable t = bpf.get_table("myhash"); in bpf_module_rw_engine_enabled() 130 ebpf::BPF bpf; variable 132 res = bpf.init(BPF_PROGRAM); 135 auto t = bpf.get_hash_table<int, int>("myhash"); [all …]
|
D | test_usdt_probes.cc | 88 ebpf::BPF bpf; variable 91 auto res = bpf.init("int on_event() { return 0; }", {}, {u}); 94 res = bpf.attach_usdt(u); 97 res = bpf.detach_usdt(u); 102 ebpf::BPF bpf; variable 105 auto res = bpf.init("int on_event() { return 0; }", {}, {u}); 108 res = bpf.attach_usdt_all(); 111 res = bpf.detach_usdt_all(); 116 ebpf::BPF bpf; variable 119 auto res = bpf.init("int on_event() { return 0; }", {}, {u}); [all …]
|
/external/libbpf/ |
D | Android.bp | 39 cmd: "mkdir -p $(genDir)/bpf && cp $(in) $(genDir)/bpf/", 41 "bpf/bpf_core_read.h", 42 "bpf/bpf_endian.h", 43 "bpf/bpf.h", 44 "bpf/bpf_helper_defs.h", 45 "bpf/bpf_helpers.h", 46 "bpf/bpf_tracing.h", 47 "bpf/btf.h", 48 "bpf/hashmap.h", 49 "bpf/libbpf_common.h", [all …]
|
/external/minijail/tools/ |
D | compiler_unittest.py | 28 import bpf 49 self.arch, kill_action=bpf.KillProcess()) 54 kill_action=bpf.KillProcess()) 76 bpf.SockFilter(bpf.BPF_LD | bpf.BPF_W | bpf.BPF_ABS, 0, 0, 77 bpf.arg_offset(0, True)), 79 bpf.SockFilter(bpf.BPF_JMP | bpf.BPF_JEQ | bpf.BPF_K, 0, 2, 0), 80 bpf.SockFilter(bpf.BPF_LD | bpf.BPF_W | bpf.BPF_ABS, 0, 0, 81 bpf.arg_offset(0, False)), 83 bpf.SockFilter(bpf.BPF_JMP | bpf.BPF_JEQ | bpf.BPF_K, 1, 0, 85 bpf.SockFilter(bpf.BPF_RET, 0, 0, [all …]
|
D | compiler.py | 24 import bpf 27 from minijail import bpf 66 return bpf.simulate(self.filter.instructions, arch, syscall_number, 118 bpf.SyscallEntry( 119 entry.numbers[0], action, reject_action, op=bpf.BPF_JEQ)) 124 bpf.SyscallEntry( 125 entry.numbers[1], reject_action, action, op=bpf.BPF_JGE)) 130 bpf.SyscallEntry( 131 entry.numbers[0], action, reject_action, op=bpf.BPF_JGE)) 134 upper_entry = bpf.SyscallEntry( [all …]
|
D | parser_unittest.py | 29 import bpf 115 self.arch, kill_action=bpf.KillProcess()) 261 self.arch, kill_action=bpf.KillProcess()) 342 self.arch, kill_action=bpf.KillProcess()) 352 parser.Filter([[parser.Atom(0, '==', 0)]], bpf.Allow()), 356 parser.Filter(None, bpf.KillProcess()), 360 parser.Filter(None, bpf.KillThread()), 364 parser.Filter(None, bpf.Trap()), 369 bpf.ReturnErrno(self.arch.constants['ENOSYS'])), 373 parser.Filter(None, bpf.Trace()), [all …]
|
/external/llvm/test/CodeGen/BPF/ |
D | sockex2.ll | 13 %2 = call i64 @llvm.bpf.load.half(i8* %1, i64 12) #2 18 %5 = call i64 @llvm.bpf.load.half(i8* %1, i64 16) #2 29 %10 = call i64 @llvm.bpf.load.half(i8* %1, i64 %9) #2 43 %15 = call i64 @llvm.bpf.load.half(i8* %1, i64 %14) #2 50 %20 = call i64 @llvm.bpf.load.byte(i8* %1, i64 %19) #2 57 %24 = call i64 @llvm.bpf.load.word(i8* %1, i64 %23) #2 59 %26 = call i64 @llvm.bpf.load.word(i8* %1, i64 %25) #2 66 %31 = call i64 @llvm.bpf.load.byte(i8* %1, i64 %nhoff.1.i) #2 82 %41 = call i64 @llvm.bpf.load.byte(i8* %1, i64 %40) #2 84 %43 = call i64 @llvm.bpf.load.word(i8* %1, i64 %42) #2 [all …]
|
/external/bcc/examples/networking/ |
D | sockmap.py | 109 bpf = BPF(text=bpf_text) variable 110 func_sock_ops = bpf.load_func("bpf_sockhash", bpf.SOCK_OPS) 111 func_sock_redir = bpf.load_func("bpf_redir", bpf.SK_MSG) 114 map_fd = lib.bpf_table_fd(bpf.module, b"sock_hash") 115 bpf.attach_func(func_sock_ops, fd, BPFAttachType.CGROUP_SOCK_OPS) 116 bpf.attach_func(func_sock_redir, map_fd, BPFAttachType.SK_MSG_VERDICT) 119 bpf.detach_func(func_sock_ops, fd, BPFAttachType.CGROUP_SOCK_OPS) 120 bpf.detach_func(func_sock_redir, map_fd, BPFAttachType.SK_MSG_VERDICT) 127 bpf.trace_print()
|
/external/bcc/src/cc/export/ |
D | helpers.h | 546 int bpf_trace_printk(const char *fmt, ...) asm("llvm.bpf.extra"); 989 unsigned long long off) asm("llvm.bpf.load.byte"); 991 unsigned long long off) asm("llvm.bpf.load.half"); 993 unsigned long long off) asm("llvm.bpf.load.word"); 1063 void bpf_store_byte(void *skb, u64 off, u64 val) asm("llvm.bpf.store.byte"); 1064 void bpf_store_half(void *skb, u64 off, u64 val) asm("llvm.bpf.store.half"); 1065 void bpf_store_word(void *skb, u64 off, u64 val) asm("llvm.bpf.store.word"); 1066 u64 bpf_pseudo_fd(u64, u64) asm("llvm.bpf.pseudo"); 1219 int incr_cksum_l3(void *off, u64 oldval, u64 newval) asm("llvm.bpf.extra"); 1220 int incr_cksum_l4(void *off, u64 oldval, u64 newval, u64 flags) asm("llvm.bpf.extra"); [all …]
|
/external/libpcap/msdos/ |
D | makefile | 107 bpf_filt.obj: bpf_filt.c pcap-int.h pcap.h pcap-bpf.h gnuc.h 109 bpf_imag.obj: bpf_imag.c pcap-int.h pcap.h pcap-bpf.h 111 bpf_dump.obj: bpf_dump.c pcap.h pcap-bpf.h 113 etherent.obj: etherent.c pcap-int.h pcap.h pcap-bpf.h pcap-namedb.h 115 optimize.obj: optimize.c pcap-int.h pcap.h pcap-bpf.h gencode.h 117 savefile.obj: savefile.c pcap-int.h pcap.h pcap-bpf.h 119 pcap.obj: pcap.c pcap-dos.h pcap-int.h pcap.h pcap-bpf.h 121 grammar.obj: grammar.c pcap-int.h pcap.h pcap-bpf.h gencode.h \ 124 scanner.obj: scanner.c pcap-int.h pcap.h pcap-bpf.h gencode.h \ 127 gencode.obj: gencode.c pcap-dos.h pcap-int.h pcap.h pcap-bpf.h \ [all …]
|
D | makefile.wc | 55 $(OBJDIR)\bpf_filter.obj: bpf\net\bpf_filter.c 56 *$(CC) $(CFLAGS) bpf\net\bpf_filter.c -fo=$@ 97 $(OBJDIR)\bpf_filter.obj: bpf\net\bpf_filter.c pcap-int.h pcap.h pcap-bpf.h 99 $(OBJDIR)\bpf_imag.obj: bpf_imag.c pcap-int.h pcap.h pcap-bpf.h 101 $(OBJDIR)\bpf_dump.obj: bpf_dump.c pcap.h pcap-bpf.h 103 $(OBJDIR)\etherent.obj: etherent.c pcap-int.h pcap.h pcap-bpf.h pcap-namedb.h 105 $(OBJDIR)\optimize.obj: optimize.c pcap-int.h pcap.h pcap-bpf.h gencode.h 107 $(OBJDIR)\savefile.obj: savefile.c pcap-int.h pcap.h pcap-bpf.h 109 $(OBJDIR)\pcap.obj: pcap.c pcap-dos.h pcap-int.h pcap.h pcap-bpf.h 111 $(OBJDIR)\grammar.obj: grammar.c pcap-int.h pcap.h pcap-bpf.h gencode.h & [all …]
|
/external/bcc/examples/cpp/ |
D | KModRetExample.cc | 99 static int modify_return(ebpf::BPF &bpf) { in modify_return() argument 101 auto res = bpf.load_func("kmod_ret____x64_sys_openat", in modify_return() 121 auto fname_table = bpf.get_array_table<struct fname_buf>("fname_table"); in modify_return() 137 static int not_modify_return(ebpf::BPF &bpf) { in not_modify_return() argument 139 auto res = bpf.load_func("kmod_ret__security_file_open", in not_modify_return() 159 auto count_table = bpf.get_array_table<uint32_t>("count"); in not_modify_return() 174 ebpf::BPF bpf; in main() local 175 auto res = bpf.init(BPF_PROGRAM); in main() 182 auto pid_table = bpf.get_array_table<uint32_t>("target_pid"); in main() 189 if (modify_return(bpf)) in main() [all …]
|
D | RandomRead.cc | 69 ebpf::BPF* bpf; variable 73 delete bpf; in signal_handler() 107 bpf = new ebpf::BPF(0, nullptr, true, "", allow_rlimit); in main() 108 auto init_res = bpf->init(BPF_PROGRAM, cflags, {}); in main() 114 auto cgroup_array = bpf->get_cgroup_array("cgroup"); in main() 123 bpf->attach_raw_tracepoint("urandom_read", "on_urandom_read"); in main() 129 auto open_res = bpf->open_perf_buffer("events", &handle_output); in main() 136 if (bpf->free_bcc_memory()) { in main() 144 bpf->poll_perf_buffer("events"); in main()
|
/external/bcc/src/lua/bcc/ |
D | table.lua | 34 function BaseTable:initialize(t_type, bpf, map_id, map_fd, key_type, leaf_type) 35 assert(t_type == libbcc.bpf_table_type_id(bpf.module, map_id)) 38 self.bpf = bpf 51 self.bpf.module, self.map_id, pbuf, buf_len, pkey) 63 self.bpf.module, self.map_id, pbuf, buf_len, pleaf) 72 self.bpf.module, self.map_id, key_str, pkey) 80 self.bpf.module, self.map_id, leaf_str, pleaf) 152 function HashTable:initialize(bpf, map_id, map_fd, key_type, leaf_type) 153 BaseTable.initialize(self, BaseTable.BPF_MAP_TYPE_HASH, bpf, map_id, map_fd, key_type, leaf_type) 171 function BaseArray:initialize(t_type, bpf, map_id, map_fd, key_type, leaf_type) [all …]
|
/external/bpftool/docs/ |
D | bpftool-iter.rst | 35 A bpf iterator combines a kernel iterating of 37 and a bpf program called for each kernel data object 41 The *pin* command creates a bpf iterator from *OBJ*, 47 Map element bpf iterator requires an additional parameter 48 *MAP* so bpf program can iterate over map elements for 49 that map. User can have a bpf program in kernel to run 53 User can then *cat PATH* to see the bpf iterator output. 64 **# bpftool iter pin bpf_iter_netlink.o /sys/fs/bpf/my_netlink** 68 Create a file-based bpf iterator from bpf_iter_netlink.o and pin it 69 to /sys/fs/bpf/my_netlink [all …]
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
D | test_bpftool_build.sh | 23 if [ ! -e tools/bpf/bpftool/Makefile ]; then 92 make_and_clean tools/bpf 100 make_with_tmpdir tools/bpf O 109 make_and_clean -C tools/bpf/bpftool 111 make_with_tmpdir -C tools/bpf/bpftool OUTPUT 113 make_with_tmpdir -C tools/bpf/bpftool O 118 make_and_clean bpf 138 make_with_tmpdir bpf O 141 cd bpf/bpftool
|
/external/libbpf/travis-ci/diffs/ |
D | 001-fix-oob-write-in-test_verifier.diff | 2 To: bpf@vger.kernel.org 6 Subject: [PATCH bpf-next] selftests/bpf: Fix OOB write in test_verifier 15 Fixes: e60e6962c503 ("selftests/bpf: Add tests for restricted helpers") 18 tools/testing/selftests/bpf/test_verifier.c | 2 +- 21 diff --git a/tools/testing/selftests/bpf/test_verifier.c b/tools/testing/selftests/bpf/test_verifie… 23 --- a/tools/testing/selftests/bpf/test_verifier.c 24 +++ b/tools/testing/selftests/bpf/test_verifier.c
|
/external/bpftool/ |
D | README.md | 4 This is a mirror of [bpf-next Linux source tree's 5 `tools/bpf/bpftool`](https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/tree/tools/bp… 6 directory, plus its few dependencies from under `kernel/bpf/`, and its 14 [bpf-next](https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/)'s 22 post](https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/tree/tools/bpf/bpftool). 25 usage, should be sent to bpf@vger.kernel.org mailing list. You can subscribe to 26 it [here](http://vger.kernel.org/vger-lists.html#bpf) and search its archive 27 [here](https://lore.kernel.org/bpf/). Please search the archive before asking 31 bpf@vger.kernel.org is monitored by many more people and they will happily try
|
/external/bcc/scripts/ |
D | README.md | 6 `./build_bpf_demo.sh -n bpf-demo -k bpf_demo.ks.erb` 11 To set up a kernel with the right options, run `bpf-kernel-setup`. 14 [root@bpf-demo ~]# bpf-kernel-setup 21 [*] Enable bpf() system call 30 kernel. This kernel has updated userspace headers (e.g. the bpf() syscall) which 34 Next, run `bpf-llvm-setup` to pull and compile LLVM with BPF support enabled. 36 [root@bpf-demo ~]# bpf-llvm-setup 43 [root@bpf-demo ~]# kexec-4.1.0-rc1+ 50 [root@bpf-demo ~]# bcc-setup
|