Lines Matching refs:EINVAL

77 	if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook = NULL"))
78 return -EINVAL;
82 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook ifindex == 0"))
83 return -EINVAL;
86 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_destroy invalid hook ifindex == 0"))
87 return -EINVAL;
90 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook ifindex == 0"))
91 return -EINVAL;
95 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook ifindex == 0"))
96 return -EINVAL;
99 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook ifindex == 0"))
100 return -EINVAL;
106 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook ifindex < 0"))
107 return -EINVAL;
110 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_destroy invalid hook ifindex < 0"))
111 return -EINVAL;
114 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook ifindex < 0"))
115 return -EINVAL;
119 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook ifindex < 0"))
120 return -EINVAL;
123 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook ifindex < 0"))
124 return -EINVAL;
131 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook.attach_point"))
132 return -EINVAL;
135 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_destroy invalid hook.attach_point"))
136 return -EINVAL;
139 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook.attach_point"))
140 return -EINVAL;
143 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook.attach_point"))
144 return -EINVAL;
147 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook.attach_point"))
148 return -EINVAL;
155 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook parent"))
156 return -EINVAL;
159 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_destroy invalid hook parent"))
160 return -EINVAL;
163 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook parent"))
164 return -EINVAL;
167 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook parent"))
168 return -EINVAL;
171 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook parent"))
172 return -EINVAL;
176 /* These return EOPNOTSUPP instead of EINVAL as parent is checked after
181 return -EINVAL;
185 return -EINVAL;
188 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook parent"))
189 return -EINVAL;
192 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook parent"))
193 return -EINVAL;
196 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook parent"))
197 return -EINVAL;
206 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook = NULL"))
207 return -EINVAL;
210 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid opts = NULL"))
211 return -EINVAL;
214 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid flags set"))
215 return -EINVAL;
218 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid prog_fd set"))
219 return -EINVAL;
222 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid prog_id set"))
223 return -EINVAL;
226 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid handle unset"))
227 return -EINVAL;
230 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid priority unset"))
231 return -EINVAL;
234 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid priority > UINT16_MAX"))
235 return -EINVAL;
243 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook = NULL"))
244 return -EINVAL;
247 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid opts = NULL"))
248 return -EINVAL;
251 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid flags set"))
252 return -EINVAL;
255 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid prog_fd set"))
256 return -EINVAL;
259 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid prog_id set"))
260 return -EINVAL;
263 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid handle unset"))
264 return -EINVAL;
267 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid priority unset"))
268 return -EINVAL;
271 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid priority > UINT16_MAX"))
272 return -EINVAL;
274 /* when chain is not present, kernel returns -EINVAL */
276 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query valid handle, priority set"))
277 return -EINVAL;
285 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook = NULL"))
286 return -EINVAL;
289 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid opts = NULL"))
290 return -EINVAL;
294 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid flags"))
295 return -EINVAL;
298 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid prog_fd unset"))
299 return -EINVAL;
302 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid prog_id set"))
303 return -EINVAL;
307 return -EINVAL;
313 return -EINVAL;
318 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid priority > UINT16_MAX"))
319 return -EINVAL;
323 return -EINVAL;