/Linux-v4.19/tools/bpf/bpftool/ |
D | cgroup.c | 66 int prog_fd; in show_bpf_prog() local 68 prog_fd = bpf_prog_get_fd_by_id(id); in show_bpf_prog() 69 if (prog_fd < 0) in show_bpf_prog() 72 if (bpf_obj_get_info_by_fd(prog_fd, &info, &info_len)) { in show_bpf_prog() 73 close(prog_fd); in show_bpf_prog() 94 close(prog_fd); in show_bpf_prog() 336 int cgroup_fd, prog_fd; in do_attach() local 360 prog_fd = prog_parse_fd(&argc, &argv); in do_attach() 361 if (prog_fd < 0) in do_attach() 375 if (bpf_prog_attach(prog_fd, cgroup_fd, attach_type, attach_flags)) { in do_attach() [all …]
|
/Linux-v4.19/tools/testing/selftests/bpf/ |
D | test_skb_cgroup_id_user.c | 85 int prog_fd = -1; in get_map_fd_by_prog_id() local 88 prog_fd = bpf_prog_get_fd_by_id(prog_id); in get_map_fd_by_prog_id() 89 if (prog_fd < 0) { in get_map_fd_by_prog_id() 97 if (bpf_obj_get_info_by_fd(prog_fd, &info, &info_len)) { in get_map_fd_by_prog_id() 98 log_err("Failed to get info by prog fd %d", prog_fd); in get_map_fd_by_prog_id() 103 log_err("No maps found for prog fd %d", prog_fd); in get_map_fd_by_prog_id() 111 if (prog_fd >= 0) in get_map_fd_by_prog_id() 112 close(prog_fd); in get_map_fd_by_prog_id()
|
D | test_progs.c | 105 int err, prog_fd; in test_pkt_access() local 107 err = bpf_prog_load(file, BPF_PROG_TYPE_SCHED_CLS, &obj, &prog_fd); in test_pkt_access() 113 err = bpf_prog_test_run(prog_fd, 100000, &pkt_v4, sizeof(pkt_v4), in test_pkt_access() 119 err = bpf_prog_test_run(prog_fd, 100000, &pkt_v6, sizeof(pkt_v6), in test_pkt_access() 139 int err, prog_fd, map_fd; in test_xdp() local 141 err = bpf_prog_load(file, BPF_PROG_TYPE_XDP, &obj, &prog_fd); in test_xdp() 153 err = bpf_prog_test_run(prog_fd, 1, &pkt_v4, sizeof(pkt_v4), in test_xdp() 161 err = bpf_prog_test_run(prog_fd, 1, &pkt_v6, sizeof(pkt_v6), in test_xdp() 177 int err, prog_fd; in test_xdp_adjust_tail() local 179 err = bpf_prog_load(file, BPF_PROG_TYPE_XDP, &obj, &prog_fd); in test_xdp_adjust_tail() [all …]
|
D | test_cgroup_storage.c | 31 int map_fd, prog_fd, cgroup_fd; in main() local 43 prog_fd = bpf_load_program(BPF_PROG_TYPE_CGROUP_SKB, in main() 46 if (prog_fd < 0) { in main() 69 if (bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_INET_EGRESS, 0)) { in main()
|
D | test_dev_cgroup.c | 30 int prog_fd, cgroup_fd; in main() local 34 &obj, &prog_fd)) { in main() 57 if (bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_DEVICE, 0)) { in main()
|
D | test_tcpbpf_user.c | 77 int prog_fd, map_fd; in main() local 92 if (bpf_prog_load(file, BPF_PROG_TYPE_SOCK_OPS, &obj, &prog_fd)) { in main() 97 rv = bpf_prog_attach(prog_fd, cg_fd, BPF_CGROUP_SOCK_OPS, 0); in main()
|
D | get_cgroup_id_user.c | 52 int err, bytes, efd, prog_fd, pmu_fd; in main() local 75 err = bpf_prog_load(file, BPF_PROG_TYPE_TRACEPOINT, &obj, &prog_fd); in main() 122 err = ioctl(pmu_fd, PERF_EVENT_IOC_SET_BPF, prog_fd); in main()
|
D | test_sockmap.c | 61 int prog_fd[11]; variable 629 err = bpf_prog_attach(prog_fd[0], map_fd[0], in run_options() 634 prog_fd[0], map_fd[0], err, strerror(errno)); in run_options() 638 err = bpf_prog_attach(prog_fd[1], map_fd[0], in run_options() 647 err = bpf_prog_attach(prog_fd[2], cg_fd, BPF_CGROUP_SOCK_OPS, 0); in run_options() 663 tx_prog_fd = prog_fd[3]; in run_options() 665 tx_prog_fd = prog_fd[4]; in run_options() 667 tx_prog_fd = prog_fd[5]; in run_options() 669 tx_prog_fd = prog_fd[6]; in run_options() 671 tx_prog_fd = prog_fd[9]; in run_options() [all …]
|
D | test_socket_cookie.c | 145 int prog_fd = -1; in run_test() local 152 err = bpf_prog_load_xattr(&attr, &pobj, &prog_fd); in run_test()
|
/Linux-v4.19/samples/bpf/ |
D | xdp_fwd_user.c | 73 int prog_fd, map_fd; in main() local 106 if (bpf_prog_load_xattr(&prog_load_attr, &obj, &prog_fd)) in main() 110 prog_fd = bpf_program__fd(prog); in main() 111 if (prog_fd < 0) { in main() 112 printf("program not found: %s\n", strerror(prog_fd)); in main() 141 err = do_attach(idx, prog_fd, argv[i]); in main()
|
D | sock_example.c | 37 int sock = -1, map_fd, prog_fd, i, key; in test_sock() local 63 prog_fd = bpf_load_program(BPF_PROG_TYPE_SOCKET_FILTER, prog, insns_cnt, in test_sock() 65 if (prog_fd < 0) { in test_sock() 72 if (setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd, in test_sock() 73 sizeof(prog_fd)) < 0) { in test_sock()
|
D | xdp1_user.c | 78 int prog_fd, map_fd, opt; in main() local 112 if (bpf_prog_load_xattr(&prog_load_attr, &obj, &prog_fd)) in main() 122 if (!prog_fd) { in main() 130 if (bpf_set_link_xdp_fd(ifindex, prog_fd, xdp_flags) < 0) { in main()
|
D | xdp_adjust_tail_user.c | 75 int i, prog_fd, map_fd, opt; in main() local 122 if (bpf_prog_load_xattr(&prog_load_attr, &obj, &prog_fd)) in main() 132 if (!prog_fd) { in main() 140 if (bpf_set_link_xdp_fd(ifindex, prog_fd, xdp_flags) < 0) { in main()
|
D | xdp_sample_pkts_user.c | 107 int prog_fd, map_fd; in main() local 124 if (bpf_prog_load_xattr(&prog_load_attr, &obj, &prog_fd)) in main() 127 if (!prog_fd) { in main() 148 err = do_attach(if_idx, prog_fd, argv[1]); in main()
|
D | test_cgrp2_attach.c | 89 int prog_fd, map_fd, ret, key; in attach_filter() local 100 prog_fd = prog_load(map_fd, verdict); in attach_filter() 103 if (prog_fd < 0) { in attach_filter() 108 ret = bpf_prog_attach(prog_fd, cg_fd, type, 0); in attach_filter()
|
D | xdp_redirect_map_user.c | 118 if (!prog_fd[0]) { in main() 123 if (bpf_set_link_xdp_fd(ifindex_in, prog_fd[0], xdp_flags) < 0) { in main() 129 if (bpf_set_link_xdp_fd(ifindex_out, prog_fd[1], in main()
|
D | xdp_redirect_user.c | 119 if (!prog_fd[0]) { in main() 124 if (bpf_set_link_xdp_fd(ifindex_in, prog_fd[0], xdp_flags) < 0) { in main() 130 if (bpf_set_link_xdp_fd(ifindex_out, prog_fd[1], in main()
|
D | cookie_uid_helper_example.c | 64 static int map_fd, prog_fd; variable 160 prog_fd = bpf_load_program(BPF_PROG_TYPE_SOCKET_FILTER, prog, in prog_load() 163 if (prog_fd < 0) in prog_load() 172 if (bpf_obj_pin(prog_fd, file)) in prog_attach_iptables() 320 close(prog_fd); in main()
|
D | sockex1_user.c | 26 assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, prog_fd, in main() 27 sizeof(prog_fd[0])) == 0); in main()
|
D | sockex2_user.c | 34 assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, prog_fd, in main() 35 sizeof(prog_fd[0])) == 0); in main()
|
D | test_cgrp2_sock.c | 208 int cg_fd, prog_fd, ret; in main() local 264 prog_fd = prog_load(idx, mark, prio); in main() 265 if (prog_fd < 0) { in main() 272 ret = bpf_prog_attach(prog_fd, cg_fd, in main()
|
D | sockex3_user.c | 13 #define PARSE_IP_PROG_FD (prog_fd[0]) 57 assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd[4], in main()
|
D | test_overhead_user.c | 123 close(prog_fd[0]); in unload_progs() 124 close(prog_fd[1]); in unload_progs()
|
/Linux-v4.19/tools/lib/bpf/ |
D | bpf.h | 93 int bpf_prog_attach(int prog_fd, int attachable_fd, enum bpf_attach_type type, 96 int bpf_prog_detach2(int prog_fd, int attachable_fd, enum bpf_attach_type type); 97 int bpf_prog_test_run(int prog_fd, int repeat, void *data, __u32 size, 105 int bpf_obj_get_info_by_fd(int prog_fd, void *info, __u32 *info_len); 108 int bpf_raw_tracepoint_open(const char *name, int prog_fd);
|
D | bpf.c | 333 int bpf_prog_attach(int prog_fd, int target_fd, enum bpf_attach_type type, in bpf_prog_attach() argument 340 attr.attach_bpf_fd = prog_fd; in bpf_prog_attach() 358 int bpf_prog_detach2(int prog_fd, int target_fd, enum bpf_attach_type type) in bpf_prog_detach2() argument 364 attr.attach_bpf_fd = prog_fd; in bpf_prog_detach2() 390 int bpf_prog_test_run(int prog_fd, int repeat, void *data, __u32 size, in bpf_prog_test_run() argument 398 attr.test.prog_fd = prog_fd; in bpf_prog_test_run() 474 int bpf_obj_get_info_by_fd(int prog_fd, void *info, __u32 *info_len) in bpf_obj_get_info_by_fd() argument 480 attr.info.bpf_fd = prog_fd; in bpf_obj_get_info_by_fd() 491 int bpf_raw_tracepoint_open(const char *name, int prog_fd) in bpf_raw_tracepoint_open() argument 497 attr.raw_tracepoint.prog_fd = prog_fd; in bpf_raw_tracepoint_open()
|