Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

selftests/bpf: Use bpf_{btf,link,map,prog}_get_info_by_fd()

Use the new type-safe wrappers around bpf_obj_get_info_by_fd().
Fix a prog/map mixup in prog_holds_map().

Signed-off-by: Ilya Leoshkevich <iii@linux.ibm.com>
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/bpf/20230214231221.249277-6-iii@linux.ibm.com

authored by

Ilya Leoshkevich and committed by
Andrii Nakryiko
c5a237a4 c0ca277b

+109 -101
+1 -1
tools/testing/selftests/bpf/map_tests/map_in_map_batch_ops.c
··· 18 18 uint32_t info_len = sizeof(map_info); 19 19 int ret; 20 20 21 - ret = bpf_obj_get_info_by_fd(map_fd, &map_info, &info_len); 21 + ret = bpf_map_get_info_by_fd(map_fd, &map_info, &info_len); 22 22 CHECK(ret < 0, "Finding map info failed", "error:%s\n", 23 23 strerror(errno)); 24 24
+4 -4
tools/testing/selftests/bpf/prog_tests/bpf_iter.c
··· 195 195 return; 196 196 197 197 info_len = sizeof(info); 198 - err = bpf_obj_get_info_by_fd(bpf_link__fd(link), &info, &info_len); 199 - ASSERT_OK(err, "bpf_obj_get_info_by_fd"); 198 + err = bpf_link_get_info_by_fd(bpf_link__fd(link), &info, &info_len); 199 + ASSERT_OK(err, "bpf_link_get_info_by_fd"); 200 200 ASSERT_EQ(info.iter.task.tid, getpid(), "check_task_tid"); 201 201 202 202 bpf_link__destroy(link); ··· 684 684 685 685 /* setup filtering map_id in bpf program */ 686 686 map_info_len = sizeof(map_info); 687 - err = bpf_obj_get_info_by_fd(map1_fd, &map_info, &map_info_len); 687 + err = bpf_map_get_info_by_fd(map1_fd, &map_info, &map_info_len); 688 688 if (CHECK(err, "get_map_info", "get map info failed: %s\n", 689 689 strerror(errno))) 690 690 goto free_map2; 691 691 skel->bss->map1_id = map_info.id; 692 692 693 - err = bpf_obj_get_info_by_fd(map2_fd, &map_info, &map_info_len); 693 + err = bpf_map_get_info_by_fd(map2_fd, &map_info, &map_info_len); 694 694 if (CHECK(err, "get_map_info", "get map info failed: %s\n", 695 695 strerror(errno))) 696 696 goto free_map2;
+10 -10
tools/testing/selftests/bpf/prog_tests/bpf_obj_id.c
··· 44 44 CHECK(err >= 0 || errno != ENOENT, 45 45 "get-fd-by-notexist-link-id", "err %d errno %d\n", err, errno); 46 46 47 - /* Check bpf_obj_get_info_by_fd() */ 47 + /* Check bpf_map_get_info_by_fd() */ 48 48 bzero(zeros, sizeof(zeros)); 49 49 for (i = 0; i < nr_iters; i++) { 50 50 now = time(NULL); ··· 79 79 /* Check getting map info */ 80 80 info_len = sizeof(struct bpf_map_info) * 2; 81 81 bzero(&map_infos[i], info_len); 82 - err = bpf_obj_get_info_by_fd(map_fds[i], &map_infos[i], 82 + err = bpf_map_get_info_by_fd(map_fds[i], &map_infos[i], 83 83 &info_len); 84 84 if (CHECK(err || 85 85 map_infos[i].type != BPF_MAP_TYPE_ARRAY || ··· 118 118 err = clock_gettime(CLOCK_BOOTTIME, &boot_time_ts); 119 119 if (CHECK_FAIL(err)) 120 120 goto done; 121 - err = bpf_obj_get_info_by_fd(prog_fds[i], &prog_infos[i], 122 - &info_len); 121 + err = bpf_prog_get_info_by_fd(prog_fds[i], &prog_infos[i], 122 + &info_len); 123 123 load_time = (real_time_ts.tv_sec - boot_time_ts.tv_sec) 124 124 + (prog_infos[i].load_time / nsec_per_sec); 125 125 if (CHECK(err || ··· 161 161 bzero(&link_infos[i], info_len); 162 162 link_infos[i].raw_tracepoint.tp_name = ptr_to_u64(&tp_name); 163 163 link_infos[i].raw_tracepoint.tp_name_len = sizeof(tp_name); 164 - err = bpf_obj_get_info_by_fd(bpf_link__fd(links[i]), 165 - &link_infos[i], &info_len); 164 + err = bpf_link_get_info_by_fd(bpf_link__fd(links[i]), 165 + &link_infos[i], &info_len); 166 166 if (CHECK(err || 167 167 link_infos[i].type != BPF_LINK_TYPE_RAW_TRACEPOINT || 168 168 link_infos[i].prog_id != prog_infos[i].id || ··· 217 217 * prog_info.map_ids = NULL 218 218 */ 219 219 prog_info.nr_map_ids = 1; 220 - err = bpf_obj_get_info_by_fd(prog_fd, &prog_info, &info_len); 220 + err = bpf_prog_get_info_by_fd(prog_fd, &prog_info, &info_len); 221 221 if (CHECK(!err || errno != EFAULT, 222 222 "get-prog-fd-bad-nr-map-ids", "err %d errno %d(%d)", 223 223 err, errno, EFAULT)) ··· 228 228 saved_map_id = *(int *)((long)prog_infos[i].map_ids); 229 229 prog_info.map_ids = prog_infos[i].map_ids; 230 230 prog_info.nr_map_ids = 2; 231 - err = bpf_obj_get_info_by_fd(prog_fd, &prog_info, &info_len); 231 + err = bpf_prog_get_info_by_fd(prog_fd, &prog_info, &info_len); 232 232 prog_infos[i].jited_prog_insns = 0; 233 233 prog_infos[i].xlated_prog_insns = 0; 234 234 CHECK(err || info_len != sizeof(struct bpf_prog_info) || ··· 277 277 if (CHECK_FAIL(err)) 278 278 goto done; 279 279 280 - err = bpf_obj_get_info_by_fd(map_fd, &map_info, &info_len); 280 + err = bpf_map_get_info_by_fd(map_fd, &map_info, &info_len); 281 281 CHECK(err || info_len != sizeof(struct bpf_map_info) || 282 282 memcmp(&map_info, &map_infos[i], info_len) || 283 283 array_value != array_magic_value, ··· 322 322 323 323 nr_id_found++; 324 324 325 - err = bpf_obj_get_info_by_fd(link_fd, &link_info, &info_len); 325 + err = bpf_link_get_info_by_fd(link_fd, &link_info, &info_len); 326 326 cmp_res = memcmp(&link_info, &link_infos[i], 327 327 offsetof(struct bpf_link_info, raw_tracepoint)); 328 328 CHECK(err || info_len != sizeof(link_info) || cmp_res,
+12 -12
tools/testing/selftests/bpf/prog_tests/btf.c
··· 4422 4422 info->btf = ptr_to_u64(user_btf); 4423 4423 info->btf_size = raw_btf_size; 4424 4424 4425 - err = bpf_obj_get_info_by_fd(btf_fd, info, &info_len); 4425 + err = bpf_btf_get_info_by_fd(btf_fd, info, &info_len); 4426 4426 if (CHECK(!err, "!err")) { 4427 4427 err = -1; 4428 4428 goto done; ··· 4435 4435 * to userspace. 4436 4436 */ 4437 4437 info_garbage.garbage = 0; 4438 - err = bpf_obj_get_info_by_fd(btf_fd, info, &info_len); 4438 + err = bpf_btf_get_info_by_fd(btf_fd, info, &info_len); 4439 4439 if (CHECK(err || info_len != sizeof(*info), 4440 4440 "err:%d errno:%d info_len:%u sizeof(*info):%zu", 4441 4441 err, errno, info_len, sizeof(*info))) { ··· 4499 4499 4500 4500 /* Test BPF_OBJ_GET_INFO_BY_ID on btf_id */ 4501 4501 info_len = sizeof(info[0]); 4502 - err = bpf_obj_get_info_by_fd(btf_fd[0], &info[0], &info_len); 4502 + err = bpf_btf_get_info_by_fd(btf_fd[0], &info[0], &info_len); 4503 4503 if (CHECK(err, "errno:%d", errno)) { 4504 4504 err = -1; 4505 4505 goto done; ··· 4512 4512 } 4513 4513 4514 4514 ret = 0; 4515 - err = bpf_obj_get_info_by_fd(btf_fd[1], &info[1], &info_len); 4515 + err = bpf_btf_get_info_by_fd(btf_fd[1], &info[1], &info_len); 4516 4516 if (CHECK(err || info[0].id != info[1].id || 4517 4517 info[0].btf_size != info[1].btf_size || 4518 4518 (ret = memcmp(user_btf[0], user_btf[1], info[0].btf_size)), ··· 4535 4535 } 4536 4536 4537 4537 info_len = sizeof(map_info); 4538 - err = bpf_obj_get_info_by_fd(map_fd, &map_info, &info_len); 4538 + err = bpf_map_get_info_by_fd(map_fd, &map_info, &info_len); 4539 4539 if (CHECK(err || map_info.btf_id != info[0].id || 4540 4540 map_info.btf_key_type_id != 1 || map_info.btf_value_type_id != 2, 4541 4541 "err:%d errno:%d info.id:%u btf_id:%u btf_key_type_id:%u btf_value_type_id:%u", ··· 4638 4638 info.btf_size = user_btf_size; 4639 4639 4640 4640 ret = 0; 4641 - err = bpf_obj_get_info_by_fd(btf_fd, &info, &info_len); 4641 + err = bpf_btf_get_info_by_fd(btf_fd, &info, &info_len); 4642 4642 if (CHECK(err || !info.id || info_len != sizeof(info) || 4643 4643 info.btf_size != raw_btf_size || 4644 4644 (ret = memcmp(raw_btf, user_btf, expected_nbytes)), ··· 4755 4755 4756 4756 /* get necessary program info */ 4757 4757 info_len = sizeof(struct bpf_prog_info); 4758 - err = bpf_obj_get_info_by_fd(prog_fd, &info, &info_len); 4758 + err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 4759 4759 4760 4760 if (CHECK(err < 0, "invalid get info (1st) errno:%d", errno)) { 4761 4761 fprintf(stderr, "%s\n", btf_log_buf); ··· 4787 4787 info.func_info_rec_size = rec_size; 4788 4788 info.func_info = ptr_to_u64(func_info); 4789 4789 4790 - err = bpf_obj_get_info_by_fd(prog_fd, &info, &info_len); 4790 + err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 4791 4791 4792 4792 if (CHECK(err < 0, "invalid get info (2nd) errno:%d", errno)) { 4793 4793 fprintf(stderr, "%s\n", btf_log_buf); ··· 6405 6405 6406 6406 /* get necessary lens */ 6407 6407 info_len = sizeof(struct bpf_prog_info); 6408 - err = bpf_obj_get_info_by_fd(prog_fd, &info, &info_len); 6408 + err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 6409 6409 if (CHECK(err < 0, "invalid get info (1st) errno:%d", errno)) { 6410 6410 fprintf(stderr, "%s\n", btf_log_buf); 6411 6411 return -1; ··· 6435 6435 info.nr_func_info = nr_func_info; 6436 6436 info.func_info_rec_size = rec_size; 6437 6437 info.func_info = ptr_to_u64(func_info); 6438 - err = bpf_obj_get_info_by_fd(prog_fd, &info, &info_len); 6438 + err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 6439 6439 if (CHECK(err < 0, "invalid get info (2nd) errno:%d", errno)) { 6440 6440 fprintf(stderr, "%s\n", btf_log_buf); 6441 6441 err = -1; ··· 6499 6499 nr_jited_func_lens = nr_jited_ksyms; 6500 6500 6501 6501 info_len = sizeof(struct bpf_prog_info); 6502 - err = bpf_obj_get_info_by_fd(prog_fd, &info, &info_len); 6502 + err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 6503 6503 if (CHECK(err < 0, "err:%d errno:%d", err, errno)) { 6504 6504 err = -1; 6505 6505 goto done; ··· 6573 6573 info.jited_func_lens = ptr_to_u64(jited_func_lens); 6574 6574 } 6575 6575 6576 - err = bpf_obj_get_info_by_fd(prog_fd, &info, &info_len); 6576 + err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 6577 6577 6578 6578 /* 6579 6579 * Only recheck the info.*line_info* fields.
+1 -1
tools/testing/selftests/bpf/prog_tests/btf_map_in_map.c
··· 14 14 int err; 15 15 16 16 memset(&info, 0, info_len); 17 - err = bpf_obj_get_info_by_fd(bpf_map__fd(map), &info, &info_len); 17 + err = bpf_map_get_info_by_fd(bpf_map__fd(map), &info, &info_len); 18 18 if (err) 19 19 return 0; 20 20 return info.id;
+1 -1
tools/testing/selftests/bpf/prog_tests/check_mtu.c
··· 59 59 60 60 memset(&link_info, 0, sizeof(link_info)); 61 61 fd = bpf_link__fd(link); 62 - err = bpf_obj_get_info_by_fd(fd, &link_info, &link_info_len); 62 + err = bpf_link_get_info_by_fd(fd, &link_info, &link_info_len); 63 63 if (CHECK(err, "link_info", "failed: %d\n", err)) 64 64 goto out; 65 65
+1 -1
tools/testing/selftests/bpf/prog_tests/enable_stats.c
··· 28 28 29 29 prog_fd = bpf_program__fd(skel->progs.test_enable_stats); 30 30 memset(&info, 0, info_len); 31 - err = bpf_obj_get_info_by_fd(prog_fd, &info, &info_len); 31 + err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 32 32 if (CHECK(err, "get_prog_info", 33 33 "failed to get bpf_prog_info for fd %d\n", prog_fd)) 34 34 goto cleanup;
+7 -7
tools/testing/selftests/bpf/prog_tests/fexit_bpf2bpf.c
··· 79 79 return; 80 80 81 81 info_len = sizeof(prog_info); 82 - err = bpf_obj_get_info_by_fd(tgt_fd, &prog_info, &info_len); 82 + err = bpf_prog_get_info_by_fd(tgt_fd, &prog_info, &info_len); 83 83 if (!ASSERT_OK(err, "tgt_fd_get_info")) 84 84 goto close_prog; 85 85 ··· 136 136 137 137 info_len = sizeof(link_info); 138 138 memset(&link_info, 0, sizeof(link_info)); 139 - err = bpf_obj_get_info_by_fd(bpf_link__fd(link[i]), 140 - &link_info, &info_len); 139 + err = bpf_link_get_info_by_fd(bpf_link__fd(link[i]), 140 + &link_info, &info_len); 141 141 ASSERT_OK(err, "link_fd_get_info"); 142 142 ASSERT_EQ(link_info.tracing.attach_type, 143 143 bpf_program__expected_attach_type(prog[i]), ··· 417 417 struct btf *btf; 418 418 int ret; 419 419 420 - ret = bpf_obj_get_info_by_fd(attach_prog_fd, &info, &info_len); 420 + ret = bpf_prog_get_info_by_fd(attach_prog_fd, &info, &info_len); 421 421 if (ret) 422 422 return ret; 423 423 ··· 483 483 if (!ASSERT_GE(fentry_fd, 0, "load_fentry")) 484 484 goto cleanup; 485 485 486 - /* Make sure bpf_obj_get_info_by_fd works correctly when attaching 486 + /* Make sure bpf_prog_get_info_by_fd works correctly when attaching 487 487 * to another BPF program. 488 488 */ 489 489 490 - ASSERT_OK(bpf_obj_get_info_by_fd(fentry_fd, &info, &info_len), 491 - "bpf_obj_get_info_by_fd"); 490 + ASSERT_OK(bpf_prog_get_info_by_fd(fentry_fd, &info, &info_len), 491 + "bpf_prog_get_info_by_fd"); 492 492 493 493 ASSERT_EQ(info.btf_id, 0, "info.btf_id"); 494 494 ASSERT_EQ(info.attach_btf_id, btf_id, "info.attach_btf_id");
+5 -5
tools/testing/selftests/bpf/prog_tests/flow_dissector_reattach.c
··· 60 60 __u32 info_len = sizeof(info); 61 61 int err; 62 62 63 - err = bpf_obj_get_info_by_fd(prog, &info, &info_len); 63 + err = bpf_prog_get_info_by_fd(prog, &info, &info_len); 64 64 if (CHECK_FAIL(err || info_len != sizeof(info))) { 65 - perror("bpf_obj_get_info_by_fd"); 65 + perror("bpf_prog_get_info_by_fd"); 66 66 return 0; 67 67 } 68 68 ··· 497 497 } 498 498 499 499 info_len = sizeof(info); 500 - err = bpf_obj_get_info_by_fd(link, &info, &info_len); 500 + err = bpf_link_get_info_by_fd(link, &info, &info_len); 501 501 if (CHECK_FAIL(err)) { 502 502 perror("bpf_obj_get_info"); 503 503 goto out_unlink; ··· 521 521 522 522 link_id = info.id; 523 523 info_len = sizeof(info); 524 - err = bpf_obj_get_info_by_fd(link, &info, &info_len); 524 + err = bpf_link_get_info_by_fd(link, &info, &info_len); 525 525 if (CHECK_FAIL(err)) { 526 526 perror("bpf_obj_get_info"); 527 527 goto out_unlink; ··· 546 546 netns = -1; 547 547 548 548 info_len = sizeof(info); 549 - err = bpf_obj_get_info_by_fd(link, &info, &info_len); 549 + err = bpf_link_get_info_by_fd(link, &info, &info_len); 550 550 if (CHECK_FAIL(err)) { 551 551 perror("bpf_obj_get_info"); 552 552 goto out_unlink;
+2 -2
tools/testing/selftests/bpf/prog_tests/libbpf_get_fd_by_id_opts.c
··· 29 29 if (!ASSERT_OK(ret, "test_libbpf_get_fd_by_id_opts__attach")) 30 30 goto close_prog; 31 31 32 - ret = bpf_obj_get_info_by_fd(bpf_map__fd(skel->maps.data_input), 32 + ret = bpf_map_get_info_by_fd(bpf_map__fd(skel->maps.data_input), 33 33 &info_m, &len); 34 - if (!ASSERT_OK(ret, "bpf_obj_get_info_by_fd")) 34 + if (!ASSERT_OK(ret, "bpf_map_get_info_by_fd")) 35 35 goto close_prog; 36 36 37 37 fd = bpf_map_get_fd_by_id(info_m.id);
+2 -1
tools/testing/selftests/bpf/prog_tests/lsm_cgroup.c
··· 47 47 48 48 fd = bpf_prog_get_fd_by_id(p.prog_ids[i]); 49 49 ASSERT_GE(fd, 0, "prog_get_fd_by_id"); 50 - ASSERT_OK(bpf_obj_get_info_by_fd(fd, &info, &info_len), "prog_info_by_fd"); 50 + ASSERT_OK(bpf_prog_get_info_by_fd(fd, &info, &info_len), 51 + "prog_info_by_fd"); 51 52 close(fd); 52 53 53 54 if (info.attach_btf_id ==
+4 -4
tools/testing/selftests/bpf/prog_tests/metadata.c
··· 16 16 static int prog_holds_map(int prog_fd, int map_fd) 17 17 { 18 18 struct bpf_prog_info prog_info = {}; 19 - struct bpf_prog_info map_info = {}; 19 + struct bpf_map_info map_info = {}; 20 20 __u32 prog_info_len; 21 21 __u32 map_info_len; 22 22 __u32 *map_ids; ··· 25 25 int i; 26 26 27 27 map_info_len = sizeof(map_info); 28 - ret = bpf_obj_get_info_by_fd(map_fd, &map_info, &map_info_len); 28 + ret = bpf_map_get_info_by_fd(map_fd, &map_info, &map_info_len); 29 29 if (ret) 30 30 return -errno; 31 31 32 32 prog_info_len = sizeof(prog_info); 33 - ret = bpf_obj_get_info_by_fd(prog_fd, &prog_info, &prog_info_len); 33 + ret = bpf_prog_get_info_by_fd(prog_fd, &prog_info, &prog_info_len); 34 34 if (ret) 35 35 return -errno; 36 36 ··· 44 44 prog_info.map_ids = ptr_to_u64(map_ids); 45 45 prog_info_len = sizeof(prog_info); 46 46 47 - ret = bpf_obj_get_info_by_fd(prog_fd, &prog_info, &prog_info_len); 47 + ret = bpf_prog_get_info_by_fd(prog_fd, &prog_info, &prog_info_len); 48 48 if (ret) { 49 49 ret = -errno; 50 50 goto free_map_ids;
+1 -1
tools/testing/selftests/bpf/prog_tests/mmap.c
··· 64 64 65 65 /* get map's ID */ 66 66 memset(&map_info, 0, map_info_sz); 67 - err = bpf_obj_get_info_by_fd(data_map_fd, &map_info, &map_info_sz); 67 + err = bpf_map_get_info_by_fd(data_map_fd, &map_info, &map_info_sz); 68 68 if (CHECK(err, "map_get_info", "failed %d\n", errno)) 69 69 goto cleanup; 70 70 data_map_id = map_info.id;
+1 -1
tools/testing/selftests/bpf/prog_tests/perf_link.c
··· 54 54 goto cleanup; 55 55 56 56 memset(&info, 0, sizeof(info)); 57 - err = bpf_obj_get_info_by_fd(link_fd, &info, &info_len); 57 + err = bpf_link_get_info_by_fd(link_fd, &info, &info_len); 58 58 if (!ASSERT_OK(err, "link_get_info")) 59 59 goto cleanup; 60 60
+1 -1
tools/testing/selftests/bpf/prog_tests/pinning.c
··· 18 18 if (CHECK(!map, "find map", "NULL map")) 19 19 return 0; 20 20 21 - err = bpf_obj_get_info_by_fd(bpf_map__fd(map), 21 + err = bpf_map_get_info_by_fd(bpf_map__fd(map), 22 22 &map_info, &map_info_len); 23 23 CHECK(err, "get map info", "err %d errno %d", err, errno); 24 24 return map_info.id;
+1 -1
tools/testing/selftests/bpf/prog_tests/prog_run_opts.c
··· 12 12 __u32 info_len = sizeof(info); 13 13 int err; 14 14 15 - err = bpf_obj_get_info_by_fd(prog_fd, &info, &info_len); 15 + err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 16 16 if (CHECK(err, "get_prog_info", "failed to get bpf_prog_info for fd %d\n", prog_fd)) 17 17 return; 18 18
+2 -2
tools/testing/selftests/bpf/prog_tests/recursion.c
··· 31 31 bpf_map_delete_elem(bpf_map__fd(skel->maps.hash2), &key); 32 32 ASSERT_EQ(skel->bss->pass2, 2, "pass2 == 2"); 33 33 34 - err = bpf_obj_get_info_by_fd(bpf_program__fd(skel->progs.on_delete), 35 - &prog_info, &prog_info_len); 34 + err = bpf_prog_get_info_by_fd(bpf_program__fd(skel->progs.on_delete), 35 + &prog_info, &prog_info_len); 36 36 if (!ASSERT_OK(err, "get_prog_info")) 37 37 goto out; 38 38 ASSERT_EQ(prog_info.recursion_misses, 2, "recursion_misses");
+3 -3
tools/testing/selftests/bpf/prog_tests/sockmap_basic.c
··· 299 299 __u32 info_len = sizeof(info); 300 300 int err; 301 301 302 - err = bpf_obj_get_info_by_fd(prog_fd, &info, &info_len); 303 - if (!ASSERT_OK(err, "bpf_obj_get_info_by_fd") || 304 - !ASSERT_EQ(info_len, sizeof(info), "bpf_obj_get_info_by_fd")) 302 + err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 303 + if (!ASSERT_OK(err, "bpf_prog_get_info_by_fd") || 304 + !ASSERT_EQ(info_len, sizeof(info), "bpf_prog_get_info_by_fd")) 305 305 return 0; 306 306 307 307 return info.id;
+4 -4
tools/testing/selftests/bpf/prog_tests/task_local_storage.c
··· 119 119 120 120 prog_fd = bpf_program__fd(skel->progs.on_lookup); 121 121 memset(&info, 0, sizeof(info)); 122 - err = bpf_obj_get_info_by_fd(prog_fd, &info, &info_len); 122 + err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 123 123 ASSERT_OK(err, "get prog info"); 124 124 ASSERT_GT(info.recursion_misses, 0, "on_lookup prog recursion"); 125 125 126 126 prog_fd = bpf_program__fd(skel->progs.on_update); 127 127 memset(&info, 0, sizeof(info)); 128 - err = bpf_obj_get_info_by_fd(prog_fd, &info, &info_len); 128 + err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 129 129 ASSERT_OK(err, "get prog info"); 130 130 ASSERT_EQ(info.recursion_misses, 0, "on_update prog recursion"); 131 131 132 132 prog_fd = bpf_program__fd(skel->progs.on_enter); 133 133 memset(&info, 0, sizeof(info)); 134 - err = bpf_obj_get_info_by_fd(prog_fd, &info, &info_len); 134 + err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 135 135 ASSERT_OK(err, "get prog info"); 136 136 ASSERT_EQ(info.recursion_misses, 0, "on_enter prog recursion"); 137 137 ··· 221 221 222 222 info_len = sizeof(info); 223 223 prog_fd = bpf_program__fd(skel->progs.socket_post_create); 224 - err = bpf_obj_get_info_by_fd(prog_fd, &info, &info_len); 224 + err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 225 225 ASSERT_OK(err, "get prog info"); 226 226 ASSERT_EQ(info.recursion_misses, 0, "prog recursion"); 227 227
+2 -2
tools/testing/selftests/bpf/prog_tests/tc_bpf.c
··· 29 29 __u32 info_len = sizeof(info); 30 30 int ret; 31 31 32 - ret = bpf_obj_get_info_by_fd(fd, &info, &info_len); 33 - if (!ASSERT_OK(ret, "bpf_obj_get_info_by_fd")) 32 + ret = bpf_prog_get_info_by_fd(fd, &info, &info_len); 33 + if (!ASSERT_OK(ret, "bpf_prog_get_info_by_fd")) 34 34 return ret; 35 35 36 36 ret = bpf_tc_attach(hook, &opts);
+3 -2
tools/testing/selftests/bpf/prog_tests/tp_attach_query.c
··· 45 45 prog_info.xlated_prog_len = 0; 46 46 prog_info.nr_map_ids = 0; 47 47 info_len = sizeof(prog_info); 48 - err = bpf_obj_get_info_by_fd(prog_fd[i], &prog_info, &info_len); 49 - if (CHECK(err, "bpf_obj_get_info_by_fd", "err %d errno %d\n", 48 + err = bpf_prog_get_info_by_fd(prog_fd[i], &prog_info, 49 + &info_len); 50 + if (CHECK(err, "bpf_prog_get_info_by_fd", "err %d errno %d\n", 50 51 err, errno)) 51 52 goto cleanup1; 52 53 saved_prog_ids[i] = prog_info.id;
+4 -4
tools/testing/selftests/bpf/prog_tests/unpriv_bpf_disabled.c
··· 179 179 ASSERT_EQ(bpf_prog_get_next_id(prog_id, &next), -EPERM, "prog_get_next_id_fails"); 180 180 ASSERT_EQ(bpf_prog_get_next_id(0, &next), -EPERM, "prog_get_next_id_fails"); 181 181 182 - if (ASSERT_OK(bpf_obj_get_info_by_fd(map_fds[0], &map_info, &map_info_len), 182 + if (ASSERT_OK(bpf_map_get_info_by_fd(map_fds[0], &map_info, &map_info_len), 183 183 "obj_get_info_by_fd")) { 184 184 ASSERT_EQ(bpf_map_get_fd_by_id(map_info.id), -EPERM, "map_get_fd_by_id_fails"); 185 185 ASSERT_EQ(bpf_map_get_next_id(map_info.id, &next), -EPERM, ··· 187 187 } 188 188 ASSERT_EQ(bpf_map_get_next_id(0, &next), -EPERM, "map_get_next_id_fails"); 189 189 190 - if (ASSERT_OK(bpf_obj_get_info_by_fd(bpf_link__fd(skel->links.sys_nanosleep_enter), 191 - &link_info, &link_info_len), 190 + if (ASSERT_OK(bpf_link_get_info_by_fd(bpf_link__fd(skel->links.sys_nanosleep_enter), 191 + &link_info, &link_info_len), 192 192 "obj_get_info_by_fd")) { 193 193 ASSERT_EQ(bpf_link_get_fd_by_id(link_info.id), -EPERM, "link_get_fd_by_id_fails"); 194 194 ASSERT_EQ(bpf_link_get_next_id(link_info.id, &next), -EPERM, ··· 269 269 } 270 270 271 271 prog_fd = bpf_program__fd(skel->progs.sys_nanosleep_enter); 272 - ASSERT_OK(bpf_obj_get_info_by_fd(prog_fd, &prog_info, &prog_info_len), 272 + ASSERT_OK(bpf_prog_get_info_by_fd(prog_fd, &prog_info, &prog_info_len), 273 273 "obj_get_info_by_fd"); 274 274 prog_id = prog_info.id; 275 275 ASSERT_GT(prog_id, 0, "valid_prog_id");
+3 -2
tools/testing/selftests/bpf/prog_tests/verif_stats.c
··· 16 16 if (!ASSERT_OK_PTR(skel, "trace_vprintk__open_and_load")) 17 17 goto cleanup; 18 18 19 - err = bpf_obj_get_info_by_fd(skel->progs.sys_enter.prog_fd, &info, &len); 20 - if (!ASSERT_OK(err, "bpf_obj_get_info_by_fd")) 19 + err = bpf_prog_get_info_by_fd(skel->progs.sys_enter.prog_fd, 20 + &info, &len); 21 + if (!ASSERT_OK(err, "bpf_prog_get_info_by_fd")) 21 22 goto cleanup; 22 23 23 24 if (!ASSERT_GT(info.verified_insns, 0, "verified_insns"))
+2 -2
tools/testing/selftests/bpf/prog_tests/xdp_attach.c
··· 18 18 err = bpf_prog_test_load(file, BPF_PROG_TYPE_XDP, &obj1, &fd1); 19 19 if (CHECK_FAIL(err)) 20 20 return; 21 - err = bpf_obj_get_info_by_fd(fd1, &info, &len); 21 + err = bpf_prog_get_info_by_fd(fd1, &info, &len); 22 22 if (CHECK_FAIL(err)) 23 23 goto out_1; 24 24 id1 = info.id; ··· 28 28 goto out_1; 29 29 30 30 memset(&info, 0, sizeof(info)); 31 - err = bpf_obj_get_info_by_fd(fd2, &info, &len); 31 + err = bpf_prog_get_info_by_fd(fd2, &info, &len); 32 32 if (CHECK_FAIL(err)) 33 33 goto out_2; 34 34 id2 = info.id;
+4 -4
tools/testing/selftests/bpf/prog_tests/xdp_cpumap_attach.c
··· 33 33 34 34 prog_fd = bpf_program__fd(skel->progs.xdp_dummy_cm); 35 35 map_fd = bpf_map__fd(skel->maps.cpu_map); 36 - err = bpf_obj_get_info_by_fd(prog_fd, &info, &len); 37 - if (!ASSERT_OK(err, "bpf_obj_get_info_by_fd")) 36 + err = bpf_prog_get_info_by_fd(prog_fd, &info, &len); 37 + if (!ASSERT_OK(err, "bpf_prog_get_info_by_fd")) 38 38 goto out_close; 39 39 40 40 val.bpf_prog.fd = prog_fd; ··· 85 85 86 86 frags_prog_fd = bpf_program__fd(skel->progs.xdp_dummy_cm_frags); 87 87 map_fd = bpf_map__fd(skel->maps.cpu_map); 88 - err = bpf_obj_get_info_by_fd(frags_prog_fd, &info, &len); 89 - if (!ASSERT_OK(err, "bpf_obj_get_info_by_fd")) 88 + err = bpf_prog_get_info_by_fd(frags_prog_fd, &info, &len); 89 + if (!ASSERT_OK(err, "bpf_prog_get_info_by_fd")) 90 90 goto out_close; 91 91 92 92 val.bpf_prog.fd = frags_prog_fd;
+4 -4
tools/testing/selftests/bpf/prog_tests/xdp_devmap_attach.c
··· 35 35 36 36 dm_fd = bpf_program__fd(skel->progs.xdp_dummy_dm); 37 37 map_fd = bpf_map__fd(skel->maps.dm_ports); 38 - err = bpf_obj_get_info_by_fd(dm_fd, &info, &len); 39 - if (!ASSERT_OK(err, "bpf_obj_get_info_by_fd")) 38 + err = bpf_prog_get_info_by_fd(dm_fd, &info, &len); 39 + if (!ASSERT_OK(err, "bpf_prog_get_info_by_fd")) 40 40 goto out_close; 41 41 42 42 val.bpf_prog.fd = dm_fd; ··· 98 98 99 99 dm_fd_frags = bpf_program__fd(skel->progs.xdp_dummy_dm_frags); 100 100 map_fd = bpf_map__fd(skel->maps.dm_ports); 101 - err = bpf_obj_get_info_by_fd(dm_fd_frags, &info, &len); 102 - if (!ASSERT_OK(err, "bpf_obj_get_info_by_fd")) 101 + err = bpf_prog_get_info_by_fd(dm_fd_frags, &info, &len); 102 + if (!ASSERT_OK(err, "bpf_prog_get_info_by_fd")) 103 103 goto out_close; 104 104 105 105 val.bpf_prog.fd = dm_fd_frags;
+1 -1
tools/testing/selftests/bpf/prog_tests/xdp_info.c
··· 34 34 if (CHECK_FAIL(err)) 35 35 return; 36 36 37 - err = bpf_obj_get_info_by_fd(prog_fd, &info, &len); 37 + err = bpf_prog_get_info_by_fd(prog_fd, &info, &len); 38 38 if (CHECK(err, "get_prog_info", "errno=%d\n", errno)) 39 39 goto out_close; 40 40
+6 -4
tools/testing/selftests/bpf/prog_tests/xdp_link.c
··· 29 29 prog_fd2 = bpf_program__fd(skel2->progs.xdp_handler); 30 30 31 31 memset(&prog_info, 0, sizeof(prog_info)); 32 - err = bpf_obj_get_info_by_fd(prog_fd1, &prog_info, &prog_info_len); 32 + err = bpf_prog_get_info_by_fd(prog_fd1, &prog_info, &prog_info_len); 33 33 if (!ASSERT_OK(err, "fd_info1")) 34 34 goto cleanup; 35 35 id1 = prog_info.id; 36 36 37 37 memset(&prog_info, 0, sizeof(prog_info)); 38 - err = bpf_obj_get_info_by_fd(prog_fd2, &prog_info, &prog_info_len); 38 + err = bpf_prog_get_info_by_fd(prog_fd2, &prog_info, &prog_info_len); 39 39 if (!ASSERT_OK(err, "fd_info2")) 40 40 goto cleanup; 41 41 id2 = prog_info.id; ··· 119 119 goto cleanup; 120 120 121 121 memset(&link_info, 0, sizeof(link_info)); 122 - err = bpf_obj_get_info_by_fd(bpf_link__fd(link), &link_info, &link_info_len); 122 + err = bpf_link_get_info_by_fd(bpf_link__fd(link), 123 + &link_info, &link_info_len); 123 124 if (!ASSERT_OK(err, "link_info")) 124 125 goto cleanup; 125 126 ··· 138 137 goto cleanup; 139 138 140 139 memset(&link_info, 0, sizeof(link_info)); 141 - err = bpf_obj_get_info_by_fd(bpf_link__fd(link), &link_info, &link_info_len); 140 + err = bpf_link_get_info_by_fd(bpf_link__fd(link), 141 + &link_info, &link_info_len); 142 142 143 143 ASSERT_OK(err, "link_info"); 144 144 ASSERT_EQ(link_info.prog_id, id1, "link_prog_id");
+1 -1
tools/testing/selftests/bpf/test_maps.c
··· 1275 1275 goto out_map_in_map; 1276 1276 } 1277 1277 1278 - err = bpf_obj_get_info_by_fd(fd, &info, &len); 1278 + err = bpf_map_get_info_by_fd(fd, &info, &len); 1279 1279 if (err) { 1280 1280 printf("Failed to get map info by fd %d: %d", fd, 1281 1281 errno);
+1 -1
tools/testing/selftests/bpf/test_skb_cgroup_id_user.c
··· 93 93 info.nr_map_ids = 1; 94 94 info.map_ids = (__u64) (unsigned long) map_ids; 95 95 96 - if (bpf_obj_get_info_by_fd(prog_fd, &info, &info_len)) { 96 + if (bpf_prog_get_info_by_fd(prog_fd, &info, &info_len)) { 97 97 log_err("Failed to get info by prog fd %d", prog_fd); 98 98 goto err; 99 99 }
+1 -1
tools/testing/selftests/bpf/test_tcp_check_syncookie_user.c
··· 96 96 info.nr_map_ids = 1; 97 97 info.map_ids = (__u64)(unsigned long)map_ids; 98 98 99 - if (bpf_obj_get_info_by_fd(prog_fd, &info, &info_len)) { 99 + if (bpf_prog_get_info_by_fd(prog_fd, &info, &info_len)) { 100 100 log_err("Failed to get info by prog fd %d", prog_fd); 101 101 goto err; 102 102 }
+4 -4
tools/testing/selftests/bpf/test_verifier.c
··· 1239 1239 __u32 xlated_prog_len; 1240 1240 __u32 buf_element_size = sizeof(struct bpf_insn); 1241 1241 1242 - if (bpf_obj_get_info_by_fd(fd_prog, &info, &info_len)) { 1243 - perror("bpf_obj_get_info_by_fd failed"); 1242 + if (bpf_prog_get_info_by_fd(fd_prog, &info, &info_len)) { 1243 + perror("bpf_prog_get_info_by_fd failed"); 1244 1244 return -1; 1245 1245 } 1246 1246 ··· 1261 1261 bzero(&info, sizeof(info)); 1262 1262 info.xlated_prog_len = xlated_prog_len; 1263 1263 info.xlated_prog_insns = (__u64)(unsigned long)*buf; 1264 - if (bpf_obj_get_info_by_fd(fd_prog, &info, &info_len)) { 1265 - perror("second bpf_obj_get_info_by_fd failed"); 1264 + if (bpf_prog_get_info_by_fd(fd_prog, &info, &info_len)) { 1265 + perror("second bpf_prog_get_info_by_fd failed"); 1266 1266 goto out_free_buf; 1267 1267 } 1268 1268
+1 -1
tools/testing/selftests/bpf/testing_helpers.c
··· 164 164 int err; 165 165 166 166 memset(info, 0, sizeof(*info)); 167 - err = bpf_obj_get_info_by_fd(bpf_link__fd(link), info, &info_len); 167 + err = bpf_link_get_info_by_fd(bpf_link__fd(link), info, &info_len); 168 168 if (err) { 169 169 printf("failed to get link info: %d\n", -errno); 170 170 return 0;
+9 -6
tools/testing/selftests/bpf/xdp_synproxy.c
··· 217 217 218 218 prog_fd = bpf_program__fd(prog); 219 219 220 - err = bpf_obj_get_info_by_fd(prog_fd, &info, &info_len); 220 + err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 221 221 if (err < 0) { 222 - fprintf(stderr, "Error: bpf_obj_get_info_by_fd: %s\n", strerror(-err)); 222 + fprintf(stderr, "Error: bpf_prog_get_info_by_fd: %s\n", 223 + strerror(-err)); 223 224 goto out; 224 225 } 225 226 attached_tc = tc; ··· 293 292 }; 294 293 info_len = sizeof(prog_info); 295 294 296 - err = bpf_obj_get_info_by_fd(prog_fd, &prog_info, &info_len); 295 + err = bpf_prog_get_info_by_fd(prog_fd, &prog_info, &info_len); 297 296 if (err != 0) { 298 - fprintf(stderr, "Error: bpf_obj_get_info_by_fd: %s\n", strerror(-err)); 297 + fprintf(stderr, "Error: bpf_prog_get_info_by_fd: %s\n", 298 + strerror(-err)); 299 299 goto out; 300 300 } 301 301 ··· 319 317 map_fd = err; 320 318 321 319 info_len = sizeof(map_info); 322 - err = bpf_obj_get_info_by_fd(map_fd, &map_info, &info_len); 320 + err = bpf_map_get_info_by_fd(map_fd, &map_info, &info_len); 323 321 if (err != 0) { 324 - fprintf(stderr, "Error: bpf_obj_get_info_by_fd: %s\n", strerror(-err)); 322 + fprintf(stderr, "Error: bpf_map_get_info_by_fd: %s\n", 323 + strerror(-err)); 325 324 close(map_fd); 326 325 goto err_close_map_fds; 327 326 }