/linux-6.3-rc2/tools/testing/selftests/bpf/ |
A D | test_lirc_mode2_user.c | 52 int ret, lircfd, progfd, inputfd; in main() local 63 BPF_PROG_TYPE_LIRC_MODE2, &obj, &progfd); in main() 76 ret = bpf_prog_detach2(progfd, lircfd, BPF_LIRC_MODE2); in main() 101 ret = bpf_prog_attach(progfd, lircfd, BPF_LIRC_MODE2, 0); in main() 170 ret = bpf_prog_detach2(progfd, lircfd, BPF_LIRC_MODE2); in main()
|
A D | test_sock.c | 407 static int attach_sock_prog(int cgfd, int progfd, in attach_sock_prog() argument 410 return bpf_prog_attach(progfd, cgfd, attach_type, BPF_F_ALLOW_OVERRIDE); in attach_sock_prog() 482 int progfd = -1; in run_test_case() local 487 progfd = load_sock_prog(test->insns, test->expected_attach_type); in run_test_case() 488 if (progfd < 0) { in run_test_case() 495 if (attach_sock_prog(cgfd, progfd, test->attach_type) < 0) { in run_test_case() 511 if (progfd != -1) in run_test_case() 513 close(progfd); in run_test_case()
|
A D | test_sock_addr.c | 1319 int progfd = -1; in run_test_case() local 1324 progfd = test->loadfn(test); in run_test_case() 1325 if (test->expected_result == LOAD_REJECT && progfd < 0) in run_test_case() 1327 else if (test->expected_result == LOAD_REJECT || progfd < 0) in run_test_case() 1330 err = bpf_prog_attach(progfd, cgfd, test->attach_type, in run_test_case() 1381 if (progfd != -1) in run_test_case() 1383 close(progfd); in run_test_case()
|
A D | test_sysctl.c | 1547 int progfd = -1; in run_test_case() local 1555 progfd = load_sysctl_prog(test, sysctl_path); in run_test_case() 1556 if (progfd < 0) { in run_test_case() 1563 if (bpf_prog_attach(progfd, cgfd, atype, BPF_F_ALLOW_OVERRIDE) < 0) { in run_test_case() 1588 if (progfd != -1) in run_test_case() 1590 close(progfd); in run_test_case()
|
/linux-6.3-rc2/tools/bpf/bpftool/ |
A D | net.c | 542 static int do_attach_detach_xdp(int progfd, enum net_attach_type attach_type, in do_attach_detach_xdp() argument 556 return bpf_xdp_attach(ifindex, progfd, flags, NULL); in do_attach_detach_xdp() 562 int progfd, ifindex, err = 0; in do_attach() local 576 progfd = prog_parse_fd(&argc, &argv); in do_attach() 577 if (progfd < 0) in do_attach() 598 err = do_attach_detach_xdp(progfd, attach_type, ifindex, in do_attach() 609 close(progfd); in do_attach() 616 int progfd, ifindex, err = 0; in do_detach() local 634 progfd = -1; in do_detach() 636 err = do_attach_detach_xdp(progfd, attach_type, ifindex, NULL); in do_detach()
|
A D | prog.c | 1024 static int parse_attach_detach_args(int argc, char **argv, int *progfd, in parse_attach_detach_args() argument 1031 *progfd = prog_parse_fd(&argc, &argv); in parse_attach_detach_args() 1032 if (*progfd < 0) in parse_attach_detach_args() 1033 return *progfd; in parse_attach_detach_args() 1060 int err, progfd; in do_attach() local 1064 &progfd, &attach_type, &mapfd); in do_attach() 1068 err = bpf_prog_attach(progfd, mapfd, attach_type, 0); in do_attach() 1082 int err, progfd; in do_detach() local 1086 &progfd, &attach_type, &mapfd); in do_detach() 1090 err = bpf_prog_detach2(progfd, mapfd, attach_type); in do_detach()
|
/linux-6.3-rc2/tools/testing/selftests/bpf/prog_tests/ |
A D | sockmap_listen.c | 274 static int enable_reuseport(int s, int progfd) in enable_reuseport() argument 281 err = xsetsockopt(s, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &progfd, in enable_reuseport() 282 sizeof(progfd)); in enable_reuseport() 289 static int socket_loopback_reuseport(int family, int sotype, int progfd) in socket_loopback_reuseport() argument 301 if (progfd >= 0) in socket_loopback_reuseport() 302 enable_reuseport(s, progfd); in socket_loopback_reuseport() 603 int progfd; in test_destroy_orphan_child() member 613 if (t->progfd != -1 && in test_destroy_orphan_child() 614 xbpf_prog_attach(t->progfd, mapfd, t->atype, 0) != 0) in test_destroy_orphan_child() 619 if (t->progfd != -1) in test_destroy_orphan_child() [all …]
|