/Linux-v5.10/tools/testing/selftests/bpf/prog_tests/ |
D | raw_tp_writable_reject_nbd_invalid.c | 10 int bpf_fd = -1, tp_fd = -1; in test_raw_tp_writable_reject_nbd_invalid() local 29 bpf_fd = bpf_load_program_xattr(&load_attr, error, sizeof(error)); in test_raw_tp_writable_reject_nbd_invalid() 30 if (CHECK(bpf_fd < 0, "bpf_raw_tracepoint_writable load", in test_raw_tp_writable_reject_nbd_invalid() 31 "failed: %d errno %d\n", bpf_fd, errno)) in test_raw_tp_writable_reject_nbd_invalid() 34 tp_fd = bpf_raw_tracepoint_open("nbd_send_request", bpf_fd); in test_raw_tp_writable_reject_nbd_invalid() 41 close(bpf_fd); in test_raw_tp_writable_reject_nbd_invalid()
|
D | raw_tp_writable_test_run.c | 27 int bpf_fd = bpf_load_program_xattr(&load_attr, error, sizeof(error)); in test_raw_tp_writable_test_run() local 28 if (CHECK(bpf_fd < 0, "bpf_raw_tracepoint_writable loaded", in test_raw_tp_writable_test_run() 29 "failed: %d errno %d\n", bpf_fd, errno)) in test_raw_tp_writable_test_run() 50 int tp_fd = bpf_raw_tracepoint_open("bpf_test_finish", bpf_fd); in test_raw_tp_writable_test_run() 79 close(bpf_fd); in test_raw_tp_writable_test_run()
|
/Linux-v5.10/tools/testing/selftests/net/ |
D | reuseport_bpf_numa.c | 78 int bpf_fd; in attach_bpf() local 96 bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr)); in attach_bpf() 97 if (bpf_fd < 0) in attach_bpf() 100 if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &bpf_fd, in attach_bpf() 101 sizeof(bpf_fd))) in attach_bpf() 104 close(bpf_fd); in attach_bpf()
|
D | reuseport_bpf.c | 99 int bpf_fd; in attach_ebpf() local 122 bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr)); in attach_ebpf() 123 if (bpf_fd < 0) in attach_ebpf() 126 if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &bpf_fd, in attach_ebpf() 127 sizeof(bpf_fd))) in attach_ebpf() 130 close(bpf_fd); in attach_ebpf() 351 int fd, bpf_fd; in test_filter_no_reuseport() local 367 bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &eprog, sizeof(eprog)); in test_filter_no_reuseport() 368 if (bpf_fd < 0) in test_filter_no_reuseport() 378 if (!setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &bpf_fd, in test_filter_no_reuseport() [all …]
|
/Linux-v5.10/include/uapi/linux/ |
D | kcm.h | 20 int bpf_fd; member
|
D | bpf.h | 564 __u32 bpf_fd; member 615 __u32 bpf_fd; member
|
/Linux-v5.10/include/net/tc_act/ |
D | tc_bpf.h | 16 u32 bpf_fd; member
|
/Linux-v5.10/net/sched/ |
D | act_bpf.c | 227 u32 bpf_fd; in tcf_bpf_init_from_efd() local 229 bpf_fd = nla_get_u32(tb[TCA_ACT_BPF_FD]); in tcf_bpf_init_from_efd() 231 fp = bpf_prog_get_type(bpf_fd, BPF_PROG_TYPE_SCHED_ACT); in tcf_bpf_init_from_efd()
|
D | cls_bpf.c | 381 u32 bpf_fd; in cls_bpf_prog_from_efd() local 383 bpf_fd = nla_get_u32(tb[TCA_BPF_FD]); in cls_bpf_prog_from_efd() 386 fp = bpf_prog_get_type_dev(bpf_fd, BPF_PROG_TYPE_SCHED_CLS, skip_sw); in cls_bpf_prog_from_efd()
|
/Linux-v5.10/tools/lib/bpf/ |
D | bpf.c | 518 attr.bpf_fd = fd; in bpf_obj_pin() 833 int bpf_obj_get_info_by_fd(int bpf_fd, void *info, __u32 *info_len) in bpf_obj_get_info_by_fd() argument 839 attr.info.bpf_fd = bpf_fd; in bpf_obj_get_info_by_fd()
|
D | bpf.h | 233 LIBBPF_API int bpf_obj_get_info_by_fd(int bpf_fd, void *info, __u32 *info_len);
|
/Linux-v5.10/tools/perf/util/ |
D | evsel.c | 248 evsel->bpf_fd = -1; in evsel__init() 1820 if (evsel->bpf_fd >= 0) { in evsel__open_cpu() 1822 int bpf_fd = evsel->bpf_fd; in evsel__open_cpu() local 1826 bpf_fd); in evsel__open_cpu() 1829 bpf_fd, strerror(errno)); in evsel__open_cpu()
|
D | evsel.h | 80 int bpf_fd; member
|
D | parse-events.c | 718 pos->bpf_fd = fd; in add_bpf_event()
|
/Linux-v5.10/Documentation/networking/ |
D | kcm.rst | 153 int bpf_fd; 161 info.bpf_fd = bpf_prog_fd;
|
/Linux-v5.10/tools/include/uapi/linux/ |
D | bpf.h | 564 __u32 bpf_fd; member 615 __u32 bpf_fd; member
|
/Linux-v5.10/kernel/bpf/ |
D | syscall.c | 2268 return bpf_obj_pin_user(attr->bpf_fd, u64_to_user_ptr(attr->pathname)); in bpf_obj_pin() 2273 if (CHECK_ATTR(BPF_OBJ) || attr->bpf_fd != 0 || in bpf_obj_get() 3771 int ufd = attr->info.bpf_fd; in bpf_obj_get_info_by_fd()
|
/Linux-v5.10/net/kcm/ |
D | kcmsock.c | 1483 prog = bpf_prog_get_type(info->bpf_fd, BPF_PROG_TYPE_SOCKET_FILTER); in kcm_attach_ioctl()
|