Searched refs:BPF_PROG_LOAD (Results 1 - 16 of 16) sorted by relevance
/linux-master/tools/build/feature/ |
H A D | test-bpf.c | 44 * Test existence of __NR_bpf and BPF_PROG_LOAD. 47 return syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | obj_name.c | 29 /* test different attr.prog_name during BPF_PROG_LOAD */ 39 fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
|
H A D | token.c | 1001 .cmds = bit(BPF_PROG_LOAD), 1011 .cmds = bit(BPF_MAP_CREATE) | bit(BPF_PROG_LOAD), 1022 .cmds = bit(BPF_BTF_LOAD) | bit(BPF_MAP_CREATE) | bit(BPF_PROG_LOAD), 1033 .cmds = bit(BPF_BTF_LOAD) | bit(BPF_MAP_CREATE) | bit(BPF_PROG_LOAD), 1044 .cmds = bit(BPF_BTF_LOAD) | bit(BPF_MAP_CREATE) | bit(BPF_PROG_LOAD),
|
H A D | btf.c | 6847 prog_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
|
/linux-master/tools/testing/selftests/net/ |
H A D | reuseport_bpf_numa.c | 96 bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
|
H A D | reuseport_bpf.c | 120 bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr)); 365 bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &eprog, sizeof(eprog));
|
H A D | psock_fanout.c | 172 pfd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | syscall.c | 153 ret = bpf_sys_bpf(BPF_PROG_LOAD, &prog_load_attr, sizeof(prog_load_attr));
|
/linux-master/tools/lib/bpf/ |
H A D | skel_internal.h | 341 err = prog_fd = skel_sys_bpf(BPF_PROG_LOAD, &attr, prog_load_attr_sz);
|
H A D | bpf.c | 92 fd = sys_bpf_fd(BPF_PROG_LOAD, attr, size); 127 prog_fd = sys_bpf_fd(BPF_PROG_LOAD, &attr, attr_sz);
|
H A D | gen_loader.c | 1018 emit_sys_bpf(gen, BPF_PROG_LOAD, prog_load_attr, attr_size);
|
/linux-master/tools/bpf/bpftool/ |
H A D | common.c | 129 prog_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
|
/linux-master/include/uapi/linux/ |
H A D | bpf.h | 250 * BPF_PROG_LOAD 256 * **BPF_PROG_LOAD** will unload the eBPF program (but see NOTES). 530 * subcommands such as **BPF_PROG_LOAD** or **BPF_MAP_CREATE** to 533 * Similar to **BPF_PROG_LOAD**, **BPF_BTF_LOAD** has optional 884 * types to be loaded with BPF_PROG_LOAD command, if 885 * BPF_PROG_LOAD itself is allowed. 928 BPF_PROG_LOAD, enumerator in enum:bpf_cmd 1206 /* If BPF_F_STRICT_ALIGNMENT is used in BPF_PROG_LOAD command, the 1213 /* If BPF_F_ANY_ALIGNMENT is used in BPF_PROG_LOAD command, the 1227 /* BPF_F_TEST_RND_HI32 is used in BPF_PROG_LOAD comman [all...] |
/linux-master/kernel/bpf/ |
H A D | syscall.c | 2693 if (CHECK_ATTR(BPF_PROG_LOAD)) 2717 if (!bpf_token_allow_cmd(token, BPF_PROG_LOAD) || 5630 case BPF_PROG_LOAD: 5761 case BPF_PROG_LOAD:
|
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 250 * BPF_PROG_LOAD 256 * **BPF_PROG_LOAD** will unload the eBPF program (but see NOTES). 530 * subcommands such as **BPF_PROG_LOAD** or **BPF_MAP_CREATE** to 533 * Similar to **BPF_PROG_LOAD**, **BPF_BTF_LOAD** has optional 884 * types to be loaded with BPF_PROG_LOAD command, if 885 * BPF_PROG_LOAD itself is allowed. 928 BPF_PROG_LOAD, enumerator in enum:bpf_cmd 1206 /* If BPF_F_STRICT_ALIGNMENT is used in BPF_PROG_LOAD command, the 1213 /* If BPF_F_ANY_ALIGNMENT is used in BPF_PROG_LOAD command, the 1227 /* BPF_F_TEST_RND_HI32 is used in BPF_PROG_LOAD comman [all...] |
/linux-master/security/selinux/ |
H A D | hooks.c | 6850 case BPF_PROG_LOAD:
|
Completed in 1444 milliseconds