Lines Matching refs:ret

31 	int ret;
33 ret = bpf_prog_get_info_by_fd(fd, &info, &info_len);
34 if (!ASSERT_OK(ret, "bpf_prog_get_info_by_fd"))
35 return ret;
37 ret = bpf_tc_attach(hook, &opts);
38 if (!ASSERT_OK(ret, "bpf_tc_attach"))
39 return ret;
48 ret = bpf_tc_attach(hook, &opts);
49 if (!ASSERT_OK(ret, "bpf_tc_attach replace mode"))
53 ret = bpf_tc_query(hook, &opts);
54 if (!ASSERT_OK(ret, "bpf_tc_query"))
64 ret = bpf_tc_detach(hook, &opts);
65 ASSERT_OK(ret, "bpf_tc_detach");
66 return ret;
74 int ret;
76 ret = bpf_tc_hook_create(NULL);
77 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook = NULL"))
81 ret = bpf_tc_hook_create(&inv_hook);
82 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook ifindex == 0"))
85 ret = bpf_tc_hook_destroy(&inv_hook);
86 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_destroy invalid hook ifindex == 0"))
89 ret = bpf_tc_attach(&inv_hook, &attach_opts);
90 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook ifindex == 0"))
94 ret = bpf_tc_detach(&inv_hook, &opts);
95 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook ifindex == 0"))
98 ret = bpf_tc_query(&inv_hook, &opts);
99 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook ifindex == 0"))
105 ret = bpf_tc_hook_create(&inv_hook);
106 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook ifindex < 0"))
109 ret = bpf_tc_hook_destroy(&inv_hook);
110 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_destroy invalid hook ifindex < 0"))
113 ret = bpf_tc_attach(&inv_hook, &attach_opts);
114 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook ifindex < 0"))
118 ret = bpf_tc_detach(&inv_hook, &opts);
119 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook ifindex < 0"))
122 ret = bpf_tc_query(&inv_hook, &opts);
123 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook ifindex < 0"))
130 ret = bpf_tc_hook_create(&inv_hook);
131 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook.attach_point"))
134 ret = bpf_tc_hook_destroy(&inv_hook);
135 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_destroy invalid hook.attach_point"))
138 ret = bpf_tc_attach(&inv_hook, &attach_opts);
139 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook.attach_point"))
142 ret = bpf_tc_detach(&inv_hook, &opts);
143 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook.attach_point"))
146 ret = bpf_tc_query(&inv_hook, &opts);
147 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook.attach_point"))
154 ret = bpf_tc_hook_create(&inv_hook);
155 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook parent"))
158 ret = bpf_tc_hook_destroy(&inv_hook);
159 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_destroy invalid hook parent"))
162 ret = bpf_tc_attach(&inv_hook, &attach_opts);
163 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook parent"))
166 ret = bpf_tc_detach(&inv_hook, &opts);
167 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook parent"))
170 ret = bpf_tc_query(&inv_hook, &opts);
171 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook parent"))
179 ret = bpf_tc_hook_create(&inv_hook);
180 if (!ASSERT_EQ(ret, -EOPNOTSUPP, "bpf_tc_hook_create invalid hook parent"))
183 ret = bpf_tc_hook_destroy(&inv_hook);
184 if (!ASSERT_EQ(ret, -EOPNOTSUPP, "bpf_tc_hook_destroy invalid hook parent"))
187 ret = bpf_tc_attach(&inv_hook, &attach_opts);
188 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook parent"))
191 ret = bpf_tc_detach(&inv_hook, &opts);
192 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook parent"))
195 ret = bpf_tc_query(&inv_hook, &opts);
196 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook parent"))
205 ret = bpf_tc_detach(NULL, &opts_hp);
206 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook = NULL"))
209 ret = bpf_tc_detach(hook, NULL);
210 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid opts = NULL"))
213 ret = bpf_tc_detach(hook, &opts_hpr);
214 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid flags set"))
217 ret = bpf_tc_detach(hook, &opts_hpf);
218 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid prog_fd set"))
221 ret = bpf_tc_detach(hook, &opts_hpi);
222 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid prog_id set"))
225 ret = bpf_tc_detach(hook, &opts_p);
226 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid handle unset"))
229 ret = bpf_tc_detach(hook, &opts_h);
230 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid priority unset"))
233 ret = bpf_tc_detach(hook, &opts_prio_max);
234 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid priority > UINT16_MAX"))
242 ret = bpf_tc_query(NULL, &opts);
243 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook = NULL"))
246 ret = bpf_tc_query(hook, NULL);
247 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid opts = NULL"))
250 ret = bpf_tc_query(hook, &opts_hpr);
251 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid flags set"))
254 ret = bpf_tc_query(hook, &opts_hpf);
255 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid prog_fd set"))
258 ret = bpf_tc_query(hook, &opts_hpi);
259 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid prog_id set"))
262 ret = bpf_tc_query(hook, &opts_p);
263 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid handle unset"))
266 ret = bpf_tc_query(hook, &opts_h);
267 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid priority unset"))
270 ret = bpf_tc_query(hook, &opts_prio_max);
271 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid priority > UINT16_MAX"))
275 ret = bpf_tc_query(hook, &opts_hp);
276 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query valid handle, priority set"))
284 ret = bpf_tc_attach(NULL, &opts_hp);
285 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook = NULL"))
288 ret = bpf_tc_attach(hook, NULL);
289 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid opts = NULL"))
293 ret = bpf_tc_attach(hook, &opts_hp);
294 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid flags"))
297 ret = bpf_tc_attach(hook, NULL);
298 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid prog_fd unset"))
301 ret = bpf_tc_attach(hook, &opts_hpi);
302 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid prog_id set"))
305 ret = bpf_tc_attach(hook, &opts_pf);
306 if (!ASSERT_OK(ret, "bpf_tc_attach valid handle unset"))
311 ret = bpf_tc_attach(hook, &opts_hf);
312 if (!ASSERT_OK(ret, "bpf_tc_attach valid priority unset"))
317 ret = bpf_tc_attach(hook, &opts_prio_max);
318 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid priority > UINT16_MAX"))
321 ret = bpf_tc_attach(hook, &opts_f);
322 if (!ASSERT_OK(ret, "bpf_tc_attach valid both handle and priority unset"))
337 int cls_fd, ret;
345 ret = bpf_tc_hook_create(&hook);
346 if (ret == 0)
349 ret = ret == -EEXIST ? 0 : ret;
350 if (!ASSERT_OK(ret, "bpf_tc_hook_create(BPF_TC_INGRESS)"))
355 ret = bpf_tc_hook_create(&hook);
356 if (!ASSERT_EQ(ret, -EOPNOTSUPP, "bpf_tc_hook_create invalid hook.attach_point"))
359 ret = test_tc_bpf_basic(&hook, cls_fd);
360 if (!ASSERT_OK(ret, "test_tc_internal ingress"))
363 ret = bpf_tc_hook_destroy(&hook);
364 if (!ASSERT_EQ(ret, -EOPNOTSUPP, "bpf_tc_hook_destroy invalid hook.attach_point"))
371 ret = test_tc_bpf_basic(&hook, cls_fd);
372 if (!ASSERT_OK(ret, "test_tc_internal ingress"))
378 ret = test_tc_bpf_basic(&hook, cls_fd);
379 if (!ASSERT_OK(ret, "test_tc_internal egress"))
384 ret = test_tc_bpf_api(&hook, cls_fd);
385 if (!ASSERT_OK(ret, "test_tc_bpf_api"))
402 int ret;
405 ret = cap_enable_effective(1ULL << CAP_BPF | 1ULL << CAP_NET_ADMIN, &caps);
406 if (!ASSERT_OK(ret, "set_cap_bpf_cap_net_admin"))
408 ret = cap_disable_effective(1ULL << CAP_SYS_ADMIN | 1ULL << CAP_PERFMON, NULL);
409 if (!ASSERT_OK(ret, "disable_cap_sys_admin"))