Lines Matching refs:err

277 	      "err: %s, flags: 0x%x\n", strerror(errno), map_opts.map_flags);
284 "err: %s\n", strerror(ret));
654 #include <linux/err.h>
664 int err, i, fd, udp, sfd[6] = {0xdeadbeef};
679 err = setsockopt(sfd[i], SOL_SOCKET, SO_REUSEADDR,
681 if (err) {
685 err = ioctl(sfd[i], FIONBIO, (char *)&one);
686 if (err < 0) {
694 err = bind(sfd[i], (struct sockaddr *)&addr, sizeof(addr));
695 if (err < 0) {
696 printf("failed to bind: err %i: %i:%i\n",
697 err, i, sfd[i]);
700 err = listen(sfd[i], 32);
701 if (err < 0) {
711 err = setsockopt(sfd[i], SOL_SOCKET, SO_REUSEADDR,
713 if (err) {
721 err = connect(sfd[i], (struct sockaddr *)&addr, sizeof(addr));
722 if (err) {
758 err = bpf_map_update_elem(fd, &i, &udp, BPF_ANY);
759 if (err) {
768 err = bpf_map_update_elem(fd, &i, &sfd[i], BPF_ANY);
769 if (err) {
777 err = bpf_prog_attach(-1, fd, BPF_SK_SKB_STREAM_PARSER, 0);
778 if (!err) {
783 err = bpf_prog_attach(-1, fd, BPF_SK_SKB_STREAM_VERDICT, 0);
784 if (!err) {
789 err = bpf_prog_attach(-1, fd, BPF_SK_MSG_VERDICT, 0);
790 if (!err) {
795 err = bpf_prog_attach(-1, fd, __MAX_BPF_ATTACH_TYPE, 0);
796 if (!err) {
801 err = bpf_prog_detach(fd, BPF_SK_SKB_STREAM_PARSER);
802 if (!err) {
807 err = bpf_prog_detach(fd, BPF_SK_SKB_STREAM_VERDICT);
808 if (!err) {
813 err = bpf_prog_detach(fd, BPF_SK_MSG_VERDICT);
814 if (!err) {
819 err = bpf_prog_detach(fd, __MAX_BPF_ATTACH_TYPE);
820 if (!err) {
826 err = bpf_prog_test_load(SOCKMAP_PARSE_PROG,
828 if (err) {
833 err = bpf_prog_test_load(SOCKMAP_TCP_MSG_PROG,
835 if (err) {
840 err = bpf_prog_test_load(SOCKMAP_VERDICT_PROG,
842 if (err) {
895 err = bpf_prog_attach(parse_prog, map_fd_break,
897 if (!err) {
902 err = bpf_prog_attach(parse_prog, map_fd_rx,
904 if (err) {
909 err = bpf_prog_attach(verdict_prog, map_fd_rx,
911 if (err) {
916 err = bpf_prog_attach(msg_prog, map_fd_msg, BPF_SK_MSG_VERDICT, 0);
917 if (err) {
922 err = bpf_prog_attach(verdict_prog, map_fd_rx,
924 if (!err) {
931 err = bpf_map_update_elem(map_fd_rx, &i, &sfd[i], BPF_ANY);
932 if (err) {
934 err, i, sfd[i]);
937 err = bpf_map_update_elem(map_fd_tx, &i, &sfd[i], BPF_ANY);
938 if (err) {
940 err, i, sfd[i]);
947 err = bpf_map_delete_elem(map_fd_rx, &i);
948 if (err) {
950 err, i, sfd[i]);
953 err = bpf_map_delete_elem(map_fd_tx, &i);
954 if (err) {
956 err, i, sfd[i]);
963 err = bpf_map_update_elem(map_fd_msg, &i, &sfd[2], BPF_ANY);
964 if (err) {
965 printf("Failed map_fd_msg update sockmap %i\n", err);
1015 err = bpf_map_update_elem(fd, &i, &sfd[i], BPF_NOEXIST);
1016 if (!err) {
1021 err = bpf_map_update_elem(fd, &i, &sfd[i], BPF_ANY);
1022 if (err) {
1027 err = bpf_map_update_elem(fd, &i, &sfd[i], BPF_EXIST);
1028 if (err) {
1035 err = bpf_map_delete_elem(fd, &i);
1036 if (err) {
1038 err, i, sfd[i]);
1043 err = bpf_prog_attach(parse_prog, fd,
1045 if (err) {
1049 err = bpf_prog_attach(verdict_prog, fd,
1051 if (err) {
1057 err = bpf_map_update_elem(fd, &i, &sfd[i], BPF_ANY);
1058 if (!err) {
1060 err, i, sfd[i]);
1063 err = bpf_map_update_elem(fd, &i, &sfd[i], BPF_NOEXIST);
1064 if (!err) {
1066 err, i, sfd[i]);
1069 err = bpf_map_update_elem(fd, &i, &sfd[i], BPF_EXIST);
1070 if (!err) {
1072 err, i, sfd[i]);
1103 err = bpf_prog_detach2(parse_prog, map_fd_rx, __MAX_BPF_ATTACH_TYPE);
1104 if (!err) {
1109 err = bpf_prog_detach2(parse_prog, map_fd_rx, BPF_SK_SKB_STREAM_PARSER);
1110 if (err) {
1115 err = bpf_prog_detach2(verdict_prog, map_fd_rx, BPF_SK_SKB_STREAM_VERDICT);
1116 if (err) {
1156 int mim_fd, fd, err;
1176 err = bpf_map__set_inner_map_fd(map, fd);
1177 if (err) {
1187 err = bpf_map__set_inner_map_fd(map, fd);
1188 if (err) {
1193 err = bpf_object__load(obj);
1194 if (err) {
1210 err = bpf_map_update_elem(mim_fd, &pos, &fd, 0);
1211 if (err) {
1227 err = bpf_map_update_elem(mim_fd, &pos, &fd, 0);
1228 if (err) {
1239 err = libbpf_get_error(obj);
1240 if (err) {
1242 MAPINMAP_INVALID_PROG, err, errno);
1254 err = bpf_object__load(obj);
1255 if (!err) {
1266 err = bpf_map_get_next_id(id, &id);
1267 if (err) {
1282 err = bpf_map_get_info_by_fd(fd, &info, &len);
1283 if (err) {
1403 static bool retry_for_again_or_busy(int err)
1405 return (err == EAGAIN || err == EBUSY);
1449 int i, key, value, err;
1457 err = map_update_retriable(fd, &key, &value, BPF_NOEXIST, MAP_RETRIES,
1459 if (err)
1460 printf("error %d %d\n", err, errno);
1461 assert(err == 0);
1462 err = map_update_retriable(fd, &key, &value, BPF_EXIST, MAP_RETRIES,
1464 if (err)
1465 printf("error %d %d\n", err, errno);
1466 assert(err == 0);
1468 err = map_delete_retriable(fd, &key, MAP_RETRIES);
1469 if (err)
1470 printf("error %d %d\n", err, errno);
1471 assert(err == 0);
1646 int err;
1660 err = setsockopt(fd64, SOL_SOCKET, SO_REUSEPORT,
1662 CHECK(err == -1, "setsockopt(SO_REUSEPORT)",
1663 "err:%d errno:%d\n", err, errno);
1673 err = bpf_map_update_elem(map_fd, &index0, value, BPF_ANY);
1674 CHECK(err >= 0 || errno != EINVAL,
1676 "sock_type:%d err:%d errno:%d\n",
1677 type, err, errno);
1679 err = bind(fd64, (struct sockaddr *)&s6, sizeof(s6));
1680 CHECK(err == -1, "bind()",
1681 "sock_type:%d err:%d errno:%d\n", type, err, errno);
1684 err = getsockname(fd64, (struct sockaddr *)&s6,
1686 CHECK(err == -1, "getsockname()",
1687 "sock_type:%d err:%d errno:%d\n",
1688 type, err, errno);
1691 err = getsockopt(fd64, SOL_SOCKET, SO_COOKIE, &sk_cookie,
1693 CHECK(err == -1, "getsockopt(SO_COOKIE)",
1694 "sock_type:%d err:%d errno:%d\n", type, err, errno);
1701 err = bpf_map_update_elem(map_fd, &index0, value,
1703 CHECK(err >= 0 || errno != EINVAL,
1705 "sock_type:%d err:%d errno:%d\n",
1706 type, err, errno);
1707 err = listen(fd64, 0);
1708 CHECK(err == -1, "listen()",
1709 "sock_type:%d, err:%d errno:%d\n",
1710 type, err, errno);
1720 #define REUSEPORT_FD_IDX(err, last) ({ (err) ? last : !last; })
1727 int map_fd, err, t, f;
1737 err = bpf_map_delete_elem(map_fd, &bad_index);
1738 CHECK(err >= 0 || errno != E2BIG, "reuseport array del >=max_entries",
1739 "err:%d errno:%d\n", err, errno);
1741 err = bpf_map_update_elem(map_fd, &bad_index, &fd64, BPF_ANY);
1742 CHECK(err >= 0 || errno != E2BIG,
1744 "err:%d errno:%d\n", err, errno);
1746 err = bpf_map_lookup_elem(map_fd, &bad_index, &map_cookie);
1747 CHECK(err >= 0 || errno != ENOENT,
1749 "err:%d errno:%d\n", err, errno);
1752 err = bpf_map_lookup_elem(map_fd, &index3, &map_cookie);
1753 CHECK(err >= 0 || errno != ENOENT,
1755 "err:%d errno:%d\n", err, errno);
1756 err = bpf_map_delete_elem(map_fd, &index3);
1757 CHECK(err >= 0 || errno != ENOENT,
1759 "err:%d errno:%d\n", err, errno);
1769 err = bpf_map_update_elem(map_fd, &index3, &grpa_fds64[fds_idx],
1771 CHECK(err >= 0 || errno != ENOENT,
1773 "sock_type:%d err:%d errno:%d\n",
1774 type, err, errno);
1775 fds_idx = REUSEPORT_FD_IDX(err, fds_idx);
1778 err = bpf_map_update_elem(map_fd, &index3, &grpa_fds64[fds_idx],
1780 CHECK(err < 0,
1782 "sock_type:%d err:%d errno:%d\n",
1783 type, err, errno);
1784 fds_idx = REUSEPORT_FD_IDX(err, fds_idx);
1787 err = bpf_map_update_elem(map_fd, &index3, &grpa_fds64[fds_idx],
1789 CHECK(err < 0,
1791 "sock_type:%d err:%d errno:%d\n", type, err, errno);
1792 fds_idx = REUSEPORT_FD_IDX(err, fds_idx);
1795 err = bpf_map_update_elem(map_fd, &index3, &grpa_fds64[fds_idx],
1797 CHECK(err >= 0 || errno != EEXIST,
1799 "sock_type:%d err:%d errno:%d\n",
1800 type, err, errno);
1801 fds_idx = REUSEPORT_FD_IDX(err, fds_idx);
1804 err = bpf_map_update_elem(map_fd, &index3, &grpa_fds64[fds_idx],
1806 CHECK(err < 0,
1808 "sock_type:%d err:%d errno:%d\n", type, err, errno);
1814 err = bpf_map_update_elem(map_fd, &index3, &fd64, BPF_ANY);
1815 CHECK(err >= 0 || errno != EBUSY,
1817 "sock_type:%d err:%d errno:%d\n",
1818 type, err, errno);
1820 err = bpf_map_update_elem(map_fd, &index0, &fd64, BPF_ANY);
1821 CHECK(err >= 0 || errno != EBUSY,
1823 "sock_type:%d err:%d errno:%d\n",
1824 type, err, errno);
1827 err = bpf_map_delete_elem(map_fd, &index3);
1828 CHECK(err < 0, "reuseport array delete sk",
1829 "sock_type:%d err:%d errno:%d\n",
1830 type, err, errno);
1833 err = bpf_map_update_elem(map_fd, &index3, &fd64, BPF_NOEXIST);
1834 CHECK(err < 0,
1836 "sock_type:%d err:%d errno:%d\n", type, err, errno);
1839 err = bpf_map_lookup_elem(map_fd, &index3, &map_cookie);
1840 CHECK(err < 0 || sk_cookie != map_cookie,
1842 "sock_type:%d err:%d errno:%d sk_cookie:0x%llx map_cookie:0x%llxn",
1843 type, err, errno, sk_cookie, map_cookie);
1848 err = bpf_map_lookup_elem(map_fd, &index3, &map_cookie);
1849 CHECK(err >= 0 || errno != ENOENT,
1851 "sock_type:%d err:%d errno:%d\n",
1852 type, err, errno);
1857 CHECK(fd64 == -1, "socket(SOCK_RAW)", "err:%d errno:%d\n",
1858 err, errno);
1859 err = bpf_map_update_elem(map_fd, &index3, &fd64, BPF_NOEXIST);
1860 CHECK(err >= 0 || errno != ENOTSUPP, "reuseport array update SOCK_RAW",
1861 "err:%d errno:%d\n", err, errno);
1875 err = bpf_map_update_elem(map_fd, &index3, &fd, BPF_NOEXIST);
1876 CHECK(err < 0, "reuseport array update 32 bit fd",
1877 "err:%d errno:%d\n", err, errno);
1878 err = bpf_map_lookup_elem(map_fd, &index3, &map_cookie);
1879 CHECK(err >= 0 || errno != ENOSPC,
1881 "err:%d errno:%d\n", err, errno);