/linux/tools/testing/selftests/bpf/prog_tests/ |
A D | raw_tp_writable_reject_nbd_invalid.c | 10 int bpf_fd = -1, tp_fd = -1; in test_raw_tp_writable_reject_nbd_invalid() local 29 bpf_fd = bpf_load_program_xattr(&load_attr, error, sizeof(error)); in test_raw_tp_writable_reject_nbd_invalid() 30 if (CHECK(bpf_fd < 0, "bpf_raw_tracepoint_writable load", in test_raw_tp_writable_reject_nbd_invalid() 31 "failed: %d errno %d\n", bpf_fd, errno)) in test_raw_tp_writable_reject_nbd_invalid() 34 tp_fd = bpf_raw_tracepoint_open("nbd_send_request", bpf_fd); in test_raw_tp_writable_reject_nbd_invalid() 41 close(bpf_fd); in test_raw_tp_writable_reject_nbd_invalid()
|
A D | raw_tp_writable_test_run.c | 28 int bpf_fd = bpf_load_program_xattr(&load_attr, error, sizeof(error)); in serial_test_raw_tp_writable_test_run() local 29 if (CHECK(bpf_fd < 0, "bpf_raw_tracepoint_writable loaded", in serial_test_raw_tp_writable_test_run() 30 "failed: %d errno %d\n", bpf_fd, errno)) in serial_test_raw_tp_writable_test_run() 51 int tp_fd = bpf_raw_tracepoint_open("bpf_test_finish", bpf_fd); in serial_test_raw_tp_writable_test_run() 80 close(bpf_fd); in serial_test_raw_tp_writable_test_run()
|
/linux/tools/testing/selftests/net/ |
A D | reuseport_bpf.c | 99 int bpf_fd; in attach_ebpf() local 122 bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr)); in attach_ebpf() 123 if (bpf_fd < 0) in attach_ebpf() 126 if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &bpf_fd, in attach_ebpf() 127 sizeof(bpf_fd))) in attach_ebpf() 130 close(bpf_fd); in attach_ebpf() 351 int fd, bpf_fd; in test_filter_no_reuseport() local 367 bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &eprog, sizeof(eprog)); in test_filter_no_reuseport() 368 if (bpf_fd < 0) in test_filter_no_reuseport() 378 if (!setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &bpf_fd, in test_filter_no_reuseport() [all …]
|
A D | reuseport_bpf_numa.c | 78 int bpf_fd; in attach_bpf() local 96 bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr)); in attach_bpf() 97 if (bpf_fd < 0) in attach_bpf() 100 if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &bpf_fd, in attach_bpf() 101 sizeof(bpf_fd))) in attach_bpf() 104 close(bpf_fd); in attach_bpf()
|
/linux/include/uapi/linux/ |
A D | kcm.h | 20 int bpf_fd; member
|
A D | bpf.h | 1351 __u32 bpf_fd; member 1402 __u32 bpf_fd; member
|
/linux/include/net/tc_act/ |
A D | tc_bpf.h | 16 u32 bpf_fd; member
|
/linux/net/sched/ |
A D | act_bpf.c | 225 u32 bpf_fd; in tcf_bpf_init_from_efd() local 227 bpf_fd = nla_get_u32(tb[TCA_ACT_BPF_FD]); in tcf_bpf_init_from_efd() 229 fp = bpf_prog_get_type(bpf_fd, BPF_PROG_TYPE_SCHED_ACT); in tcf_bpf_init_from_efd()
|
A D | cls_bpf.c | 378 u32 bpf_fd; in cls_bpf_prog_from_efd() local 380 bpf_fd = nla_get_u32(tb[TCA_BPF_FD]); in cls_bpf_prog_from_efd() 383 fp = bpf_prog_get_type_dev(bpf_fd, BPF_PROG_TYPE_SCHED_CLS, skip_sw); in cls_bpf_prog_from_efd()
|
/linux/tools/lib/bpf/ |
A D | bpf.c | 634 attr.bpf_fd = fd; in bpf_obj_pin() 1000 int bpf_obj_get_info_by_fd(int bpf_fd, void *info, __u32 *info_len) in bpf_obj_get_info_by_fd() argument 1006 attr.info.bpf_fd = bpf_fd; in bpf_obj_get_info_by_fd()
|
A D | bpf.h | 241 LIBBPF_API int bpf_obj_get_info_by_fd(int bpf_fd, void *info, __u32 *info_len);
|
/linux/tools/perf/util/ |
A D | evsel.c | 249 evsel->bpf_fd = -1; in evsel__init() 2065 if (evsel->bpf_fd >= 0) { in evsel__open_cpu() 2067 int bpf_fd = evsel->bpf_fd; in evsel__open_cpu() local 2071 bpf_fd); in evsel__open_cpu() 2074 bpf_fd, strerror(errno)); in evsel__open_cpu()
|
A D | evsel.h | 88 int bpf_fd; member
|
A D | parse-events.c | 728 pos->bpf_fd = fd; in add_bpf_event()
|
/linux/Documentation/networking/ |
A D | kcm.rst | 153 int bpf_fd; 161 info.bpf_fd = bpf_prog_fd;
|
/linux/tools/include/uapi/linux/ |
A D | bpf.h | 1351 __u32 bpf_fd; member 1402 __u32 bpf_fd; member
|
/linux/kernel/bpf/ |
A D | syscall.c | 2402 return bpf_obj_pin_user(attr->bpf_fd, u64_to_user_ptr(attr->pathname)); in bpf_obj_pin() 2407 if (CHECK_ATTR(BPF_OBJ) || attr->bpf_fd != 0 || in bpf_obj_get() 3999 int ufd = attr->info.bpf_fd; in bpf_obj_get_info_by_fd()
|
/linux/net/kcm/ |
A D | kcmsock.c | 1483 prog = bpf_prog_get_type(info->bpf_fd, BPF_PROG_TYPE_SOCKET_FILTER); in kcm_attach_ioctl()
|