/samples/bpf/ |
D | tracex5_user.c | 27 struct sock_fprog prog = { in install_accept_all_seccomp() local 31 if (prctl(PR_SET_SECCOMP, 2, &prog)) in install_accept_all_seccomp() 38 struct bpf_program *prog; in main() local 52 prog = bpf_object__find_program_by_name(obj, "bpf_prog1"); in main() 53 if (!prog) { in main() 64 link = bpf_program__attach(prog); in main() 77 bpf_object__for_each_program(prog, obj) { in main() 78 section = bpf_program__section_name(prog); in main() 83 fd = bpf_program__fd(prog); in main()
|
D | tracex1_user.c | 10 struct bpf_program *prog; in main() local 22 prog = bpf_object__find_program_by_name(obj, "bpf_prog1"); in main() 23 if (!prog) { in main() 34 link = bpf_program__attach(prog); in main()
|
D | tracex7_user.c | 10 struct bpf_program *prog; in main() local 29 prog = bpf_object__find_program_by_name(obj, "bpf_prog1"); in main() 30 if (!prog) { in main() 41 link = bpf_program__attach(prog); in main()
|
D | xdp_fwd_user.c | 64 static void usage(const char *prog) in usage() argument 73 prog); in usage() 82 struct bpf_program *prog; in main() local 137 prog = bpf_object__find_program_by_title(obj, prog_name); in main() 138 prog_fd = bpf_program__fd(prog); in main()
|
D | test_current_task_under_cgroup_user.c | 18 struct bpf_program *prog; in main() local 31 prog = bpf_object__find_program_by_name(obj, "bpf_prog1"); in main() 32 if (!prog) { in main() 50 link = bpf_program__attach(prog); in main()
|
D | spintest_user.c | 17 struct bpf_program *prog; in main() local 47 bpf_object__for_each_program(prog, obj) { in main() 48 section = bpf_program__section_name(prog); in main() 54 links[j] = bpf_program__attach(prog); in main()
|
D | trace_output_user.c | 48 struct bpf_program *prog; in main() local 74 prog = bpf_object__find_program_by_name(obj, "bpf_prog1"); in main() 75 if (libbpf_get_error(prog)) { in main() 80 link = bpf_program__attach(prog); in main()
|
D | sockex3_user.c | 29 struct bpf_program *prog; in main() local 56 bpf_object__for_each_program(prog, obj) { in main() 57 fd = bpf_program__fd(prog); in main() 59 section = bpf_program__section_name(prog); in main()
|
D | test_cgrp2_sock2.c | 39 struct bpf_program *prog; in main() local 60 bpf_object__for_each_program(prog, obj) { in main() 61 progs[prog_cnt] = prog; in main()
|
D | sampleip_user.c | 36 static int sampling_start(int freq, struct bpf_program *prog, in sampling_start() argument 56 links[i] = bpf_program__attach_perf_event(prog, pmu_fd); in sampling_start() 143 struct bpf_program *prog; in main() local 188 prog = bpf_object__find_program_by_name(obj, "do_sample"); in main() 189 if (!prog) { in main() 212 if (sampling_start(freq, prog, links) != 0) in main()
|
D | hbm.c | 121 static int prog_load(char *prog) in prog_load() argument 123 obj = bpf_object__open_file(prog, NULL); in prog_load() 154 static int run_bpf_prog(char *prog, int cg_id) in run_bpf_prog() argument 164 rc = prog_load(prog); in run_bpf_prog() 445 char *prog = "hbm_out_kern.o"; in main() local 461 prog = "hbm_edt_kern.o"; in main() 502 prog = argv[optind]; in main() 503 printf("HBM prog: %s\n", prog != NULL ? prog : "NULL"); in main() 505 return run_bpf_prog(prog, cg_id); in main()
|
D | tracex4_user.c | 52 struct bpf_program *prog; in main() local 76 bpf_object__for_each_program(prog, obj) { in main() 77 links[j] = bpf_program__attach(prog); in main()
|
D | xdp2skb_meta.sh | 180 local prog="tc_mark" 189 prio 1 handle 1 bpf da obj $file sec $prog 196 local prog="xdp_mark" 204 call_ip link set dev $device xdp obj $file sec $prog
|
D | sock_example.c | 47 struct bpf_insn prog[] = { in test_sock() local 61 size_t insns_cnt = sizeof(prog) / sizeof(struct bpf_insn); in test_sock() 63 prog_fd = bpf_load_program(BPF_PROG_TYPE_SOCKET_FILTER, prog, insns_cnt, in test_sock()
|
D | test_probe_write_user_user.c | 17 struct bpf_program *prog; in main() local 34 prog = bpf_object__find_program_by_name(obj, "bpf_prog1"); in main() 35 if (libbpf_get_error(prog)) { in main() 52 link = bpf_program__attach(prog); in main()
|
D | ibumad_user.c | 86 struct bpf_program *prog; in main() local 136 bpf_object__for_each_program(prog, obj) { in main() 137 tp_links[tp_cnt] = bpf_program__attach(prog); in main()
|
D | test_map_in_map_user.c | 118 struct bpf_program *prog; in main() local 129 prog = bpf_object__find_program_by_name(obj, "trace_sys_connect"); in main() 130 if (!prog) { in main() 154 link = bpf_program__attach(prog); in main()
|
D | syscall_tp_user.c | 51 struct bpf_program *prog; in test() local 76 bpf_object__for_each_program(prog, objs[i]) { in test() 77 links[j] = bpf_program__attach(prog); in test()
|
D | lathist_user.c | 84 struct bpf_program *prog; in main() local 108 bpf_object__for_each_program(prog, obj) { in main() 109 links[i] = bpf_program__attach(prog); in main()
|
D | test_cgrp2_sock.c | 74 struct bpf_insn *prog; in prog_load() local 89 p = prog = malloc(insns_cnt); in prog_load() 90 if (!prog) { in prog_load() 118 ret = bpf_load_program(BPF_PROG_TYPE_CGROUP_SOCK, prog, insns_cnt, in prog_load() 121 free(prog); in prog_load()
|
D | test_overhead_raw_tp_kern.c | 7 int prog(struct bpf_raw_tracepoint_args *ctx) in prog() function
|
D | cpustat_user.c | 193 struct bpf_program *prog; in main() local 205 prog = bpf_object__find_program_by_name(obj, "bpf_prog1"); in main() 206 if (!prog) { in main() 224 link = bpf_program__attach(prog); in main()
|
D | tcp_bpf.readme | 14 bpftool prog load tcp_basertt_kern.o /sys/fs/bpf/tcp_prog 16 bpftool prog tracelog 18 "bpftool prog tracelog" will continue to run printing the BPF log buffer.
|
D | xdp_redirect_map_user.c | 55 struct bpf_program *prog; in main() local 157 prog = skel->progs.xdp_redirect_map_native; in main() 160 if (sample_install_xdp(prog, ifindex_in, generic, force) < 0) { in main() 167 prog = skel->progs.xdp_redirect_map_general; in main()
|
/samples/seccomp/ |
D | dropper.c | 41 struct sock_fprog prog = { in install_filter() local 49 if (prctl(PR_SET_SECCOMP, 2, &prog)) { in install_filter()
|