/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | cgroup_attach_override.c | 45 if (CHECK(bpf_prog_attach(drop_prog, foo, BPF_CGROUP_INET_EGRESS, 63 if (CHECK(bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 81 if (CHECK(bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 95 if (CHECK(bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 101 if (CHECK(!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 0), 116 if (CHECK(bpf_prog_attach(allow_prog, foo, BPF_CGROUP_INET_EGRESS, 0), 121 if (CHECK(!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 0), 126 if (CHECK(!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 132 if (CHECK(!bpf_prog_attach(allow_prog, foo, BPF_CGROUP_INET_EGRESS, 138 if (CHECK(bpf_prog_attach(drop_pro [all...] |
H A D | cgroup_attach_multi.c | 116 if (CHECK(bpf_prog_attach(allow_prog[0], cg1, BPF_CGROUP_INET_EGRESS, 121 if (CHECK(!bpf_prog_attach(allow_prog[0], cg1, BPF_CGROUP_INET_EGRESS, 126 if (CHECK(bpf_prog_attach(allow_prog[1], cg1, BPF_CGROUP_INET_EGRESS, 131 if (CHECK(bpf_prog_attach(allow_prog[2], cg2, BPF_CGROUP_INET_EGRESS, 136 if (CHECK(bpf_prog_attach(allow_prog[3], cg3, BPF_CGROUP_INET_EGRESS, 141 if (CHECK(bpf_prog_attach(allow_prog[4], cg4, BPF_CGROUP_INET_EGRESS, 146 if (CHECK(bpf_prog_attach(allow_prog[5], cg5, BPF_CGROUP_INET_EGRESS, 0),
|
H A D | connect_force_port.c | 78 err = bpf_prog_attach(bpf_program__fd(prog), cgroup_fd, v4 ? 94 err = bpf_prog_attach(bpf_program__fd(prog), cgroup_fd, v4 ? 110 err = bpf_prog_attach(bpf_program__fd(prog), cgroup_fd, v4 ?
|
H A D | load_bytes_relative.c | 47 err = bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_INET_EGRESS,
|
H A D | netns_cookie.c | 37 err = bpf_prog_attach(verdict, map, BPF_SK_MSG_VERDICT, 0);
|
H A D | cgroup_attach_autodetach.c | 52 if (CHECK(bpf_prog_attach(allow_prog[i], cg,
|
H A D | cgroup_link.c | 112 err = bpf_prog_attach(prog_fd, cgs[last_cg].fd, 136 err = bpf_prog_attach(prog_fd, cgs[last_cg].fd, 169 err = bpf_prog_attach(prog_fd, cgs[last_cg].fd,
|
H A D | flow_dissector_reattach.c | 94 err = bpf_prog_attach(prog1, 0, BPF_FLOW_DISSECTOR, 0); 96 perror("bpf_prog_attach(prog1)"); 102 err = bpf_prog_attach(prog2, 0, BPF_FLOW_DISSECTOR, 0); 104 perror("bpf_prog_attach(prog2) #1"); 110 err = bpf_prog_attach(prog2, 0, BPF_FLOW_DISSECTOR, 0); 112 perror("bpf_prog_attach(prog2) #2"); 138 perror("bpf_prog_attach(prog2) expected E2BIG"); 152 err = bpf_prog_attach(prog1, 0, BPF_FLOW_DISSECTOR, 0); 154 perror("bpf_prog_attach(prog1)"); 188 err = bpf_prog_attach(prog [all...] |
H A D | lsm_cgroup.c | 108 err = bpf_prog_attach(alloc_prog_fd, cgroup_fd, BPF_LSM_CGROUP, 0); 119 err = bpf_prog_attach(clone_prog_fd, cgroup_fd, BPF_LSM_CGROUP, 0); 128 err = bpf_prog_attach(post_create_prog_fd, cgroup_fd,
|
H A D | tcp_rtt.c | 105 err = bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_SOCK_OPS, 0);
|
H A D | sockmap_basic.c | 123 err = bpf_prog_attach(verdict, map, BPF_SK_MSG_VERDICT, 0); 124 if (!ASSERT_OK(err, "bpf_prog_attach")) 287 err = bpf_prog_attach(verdict, map, first, 0); 288 if (!ASSERT_OK(err, "bpf_prog_attach")) 291 err = bpf_prog_attach(verdict, map, second, 0); 340 err = bpf_prog_attach(verdict_fd, map_fd, attach_type, 0); 341 if (!ASSERT_OK(err, "bpf_prog_attach failed")) 375 err = bpf_prog_attach(verdict, map, BPF_SK_SKB_STREAM_VERDICT, 0); 376 if (!ASSERT_OK(err, "bpf_prog_attach")) 440 err = bpf_prog_attach(verdic [all...] |
H A D | mptcp.c | 171 err = bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_SOCK_OPS, 0); 172 if (!ASSERT_OK(err, "bpf_prog_attach"))
|
H A D | sockmap_helpers.h | 150 bpf_prog_attach((prog), (target), (type), (flags)); \
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | flow_dissector_load.c | 35 ret = bpf_prog_attach(prog_fd, 0 /* Ignore */, BPF_FLOW_DISSECTOR, 0); 37 error(1, 0, "bpf_prog_attach %s", cfg_path_name);
|
H A D | test_dev_cgroup.c | 46 if (bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_DEVICE, 0)) {
|
H A D | test_lirc_mode2_user.c | 101 ret = bpf_prog_attach(progfd, lircfd, BPF_LIRC_MODE2, 0);
|
H A D | test_cgroup_storage.c | 84 if (bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_INET_EGRESS, 0)) {
|
H A D | test_tcpnotify_user.c | 99 rv = bpf_prog_attach(prog_fd, cg_fd, BPF_CGROUP_SOCK_OPS, 0); 101 printf("FAILED: bpf_prog_attach: %d (%s)\n",
|
H A D | test_maps.c | 777 err = bpf_prog_attach(-1, fd, BPF_SK_SKB_STREAM_PARSER, 0); 783 err = bpf_prog_attach(-1, fd, BPF_SK_SKB_STREAM_VERDICT, 0); 789 err = bpf_prog_attach(-1, fd, BPF_SK_MSG_VERDICT, 0); 795 err = bpf_prog_attach(-1, fd, __MAX_BPF_ATTACH_TYPE, 0); 895 err = bpf_prog_attach(parse_prog, map_fd_break, 902 err = bpf_prog_attach(parse_prog, map_fd_rx, 909 err = bpf_prog_attach(verdict_prog, map_fd_rx, 916 err = bpf_prog_attach(msg_prog, map_fd_msg, BPF_SK_MSG_VERDICT, 0); 922 err = bpf_prog_attach(verdict_prog, map_fd_rx, 1043 err = bpf_prog_attach(parse_pro [all...] |
H A D | test_sockmap.c | 963 err = bpf_prog_attach(prog_fd[0], map_fd[0], 967 "ERROR: bpf_prog_attach (sockmap %i->%i): %d (%s)\n", 973 err = bpf_prog_attach(prog_fd[1], map_fd[0], 976 fprintf(stderr, "ERROR: bpf_prog_attach (sockmap): %d (%s)\n", 984 err = bpf_prog_attach(prog_fd[0], map_fd[8], 988 "ERROR: bpf_prog_attach (TLS sockmap %i->%i): %d (%s)\n", 994 err = bpf_prog_attach(prog_fd[2], map_fd[8], 997 fprintf(stderr, "ERROR: bpf_prog_attach (TLS sockmap): %d (%s)\n", 1004 err = bpf_prog_attach(prog_fd[3], cg_fd, BPF_CGROUP_SOCK_OPS, 0); 1006 fprintf(stderr, "ERROR: bpf_prog_attach (group [all...] |
H A D | test_sock.c | 410 return bpf_prog_attach(progfd, cgfd, attach_type, BPF_F_ALLOW_OVERRIDE);
|
/linux-master/samples/bpf/ |
H A D | test_cgrp2_attach.c | 113 ret = bpf_prog_attach(prog_fd, cg_fd, type, 0);
|
H A D | test_cgrp2_sock.c | 276 ret = bpf_prog_attach(prog_fd, cg_fd,
|
/linux-master/tools/bpf/bpftool/ |
H A D | cgroup.c | 554 if (bpf_prog_attach(prog_fd, cgroup_fd, attach_type, attach_flags)) {
|
/linux-master/tools/lib/bpf/ |
H A D | bpf.h | 330 LIBBPF_API int bpf_prog_attach(int prog_fd, int attachable_fd,
|