Lines Matching refs:res
64 const char *define_name, bool res, const char *define_prefix) in print_bool_feature() argument
67 jsonw_bool_field(json_wtr, feat_name, res); in print_bool_feature()
70 res ? "" : "NO_", define_name); in print_bool_feature()
72 printf("%s is %savailable\n", plain_name, res ? "" : "NOT "); in print_bool_feature()
78 int res; in print_kernel_option() local
88 res = strtol(value, &endptr, 0); in print_kernel_option()
90 jsonw_int_field(json_wtr, name, res); in print_kernel_option()
136 int res; in read_procfs() local
142 res = getline(&line, &len, fd); in read_procfs()
144 if (res < 0) in read_procfs()
148 res = strtol(line, &endptr, 10); in read_procfs()
150 res = -1; in read_procfs()
153 return res; in read_procfs()
158 int res; in probe_unprivileged_disabled() local
162 res = read_procfs("/proc/sys/kernel/unprivileged_bpf_disabled"); in probe_unprivileged_disabled()
164 jsonw_int_field(json_wtr, "unprivileged_bpf_disabled", res); in probe_unprivileged_disabled()
166 switch (res) { in probe_unprivileged_disabled()
177 printf("bpf() syscall restriction has unknown value %d\n", res); in probe_unprivileged_disabled()
184 int res; in probe_jit_enable() local
188 res = read_procfs("/proc/sys/net/core/bpf_jit_enable"); in probe_jit_enable()
190 jsonw_int_field(json_wtr, "bpf_jit_enable", res); in probe_jit_enable()
192 switch (res) { in probe_jit_enable()
207 res); in probe_jit_enable()
214 int res; in probe_jit_harden() local
218 res = read_procfs("/proc/sys/net/core/bpf_jit_harden"); in probe_jit_harden()
220 jsonw_int_field(json_wtr, "bpf_jit_harden", res); in probe_jit_harden()
222 switch (res) { in probe_jit_harden()
237 res); in probe_jit_harden()
244 int res; in probe_jit_kallsyms() local
248 res = read_procfs("/proc/sys/net/core/bpf_jit_kallsyms"); in probe_jit_kallsyms()
250 jsonw_int_field(json_wtr, "bpf_jit_kallsyms", res); in probe_jit_kallsyms()
252 switch (res) { in probe_jit_kallsyms()
263 printf("JIT kallsyms exports status has unknown value %d\n", res); in probe_jit_kallsyms()
270 int res; in probe_jit_limit() local
274 res = read_procfs("/proc/sys/net/core/bpf_jit_limit"); in probe_jit_limit()
276 jsonw_int_field(json_wtr, "bpf_jit_limit", res); in probe_jit_limit()
278 switch (res) { in probe_jit_limit()
283 printf("Global memory limit for JIT compiler for unprivileged users is %d bytes\n", res); in probe_jit_limit()
447 bool res; in probe_bpf_syscall() local
450 res = (errno != ENOSYS); in probe_bpf_syscall()
455 res, define_prefix); in probe_bpf_syscall()
457 return res; in probe_bpf_syscall()
467 bool res; in probe_prog_type() local
479 res = bpf_probe_prog_type(prog_type, ifindex); in probe_prog_type()
481 supported_types[prog_type] |= res; in probe_prog_type()
493 print_bool_feature(feat_name, plain_desc, define_name, res, in probe_prog_type()
504 bool res; in probe_map_type() local
506 res = bpf_probe_map_type(map_type, ifindex); in probe_map_type()
518 print_bool_feature(feat_name, plain_desc, define_name, res, in probe_map_type()
529 bool res; in probe_helpers_for_progtype() local
552 res = false; in probe_helpers_for_progtype()
554 res = bpf_probe_helper(id, prog_type, ifindex); in probe_helpers_for_progtype()
557 if (res) in probe_helpers_for_progtype()
562 res ? "1" : "0"); in probe_helpers_for_progtype()
564 if (res) in probe_helpers_for_progtype()