/linux-master/kernel/bpf/ |
H A D | syscall.c | 2964 return bpf_obj_pin_user(attr->bpf_fd, path_fd, 2972 if (CHECK_ATTR(BPF_OBJ) || attr->bpf_fd != 0 || 4933 int ufd = attr->info.bpf_fd;
|
/linux-master/tools/perf/util/ |
H A D | evsel.h | 101 int bpf_fd; member in struct:evsel::__anon1601
|
H A D | evsel.c | 284 evsel->bpf_fd = -1; 2079 if (evsel->bpf_fd >= 0) { 2081 int bpf_fd = evsel->bpf_fd; local 2085 bpf_fd); 2088 bpf_fd, strerror(errno));
|
/linux-master/tools/lib/bpf/ |
H A D | bpf.h | 503 LIBBPF_API int bpf_obj_get_info_by_fd(int bpf_fd, void *info, __u32 *info_len);
|
H A D | bpf.c | 595 attr.bpf_fd = fd; 1139 int bpf_obj_get_info_by_fd(int bpf_fd, void *info, __u32 *info_len) argument 1146 attr.info.bpf_fd = bpf_fd;
|
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 267 * Pin an eBPF program or map referred by the specified *bpf_fd* 274 * *bpf_fd* is closed. This allow the eBPF object to live beyond 275 * **close**\ (\ *bpf_fd*\ ), and hence the lifetime of the parent 440 * *bpf_fd*. 444 * of *bpf_fd*: 1572 __u32 bpf_fd; member in struct:bpf_attr::__anon3136 1636 __u32 bpf_fd; member in struct:bpf_attr::__anon3143
|
/linux-master/net/sched/ |
H A D | cls_bpf.c | 382 u32 bpf_fd; local 384 bpf_fd = nla_get_u32(tb[TCA_BPF_FD]); 387 fp = bpf_prog_get_type_dev(bpf_fd, BPF_PROG_TYPE_SCHED_CLS, skip_sw);
|
H A D | act_bpf.c | 228 u32 bpf_fd; local 230 bpf_fd = nla_get_u32(tb[TCA_ACT_BPF_FD]); 232 fp = bpf_prog_get_type(bpf_fd, BPF_PROG_TYPE_SCHED_ACT);
|
/linux-master/net/kcm/ |
H A D | kcmsock.c | 1326 prog = bpf_prog_get_type(info->bpf_fd, BPF_PROG_TYPE_SOCKET_FILTER);
|
/linux-master/include/uapi/linux/ |
H A D | bpf.h | 267 * Pin an eBPF program or map referred by the specified *bpf_fd* 274 * *bpf_fd* is closed. This allow the eBPF object to live beyond 275 * **close**\ (\ *bpf_fd*\ ), and hence the lifetime of the parent 440 * *bpf_fd*. 444 * of *bpf_fd*: 1572 __u32 bpf_fd; member in struct:bpf_attr::__anon2595 1636 __u32 bpf_fd; member in struct:bpf_attr::__anon2602
|
H A D | kcm.h | 20 int bpf_fd; member in struct:kcm_attach
|
/linux-master/tools/testing/selftests/net/ |
H A D | reuseport_bpf.c | 97 int bpf_fd; local 120 bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr)); 121 if (bpf_fd < 0) 124 if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &bpf_fd, 125 sizeof(bpf_fd))) 128 close(bpf_fd); 349 int fd, bpf_fd; local 365 bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &eprog, sizeof(eprog)); 366 if (bpf_fd < 0) 376 if (!setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &bpf_fd, [all...] |
H A D | reuseport_bpf_numa.c | 78 int bpf_fd; local 96 bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr)); 97 if (bpf_fd < 0) 100 if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &bpf_fd, 101 sizeof(bpf_fd))) 104 close(bpf_fd);
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | raw_tp_writable_test_run.c | 26 int bpf_fd = bpf_prog_load(BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE, NULL, "GPL v2", local 29 if (CHECK(bpf_fd < 0, "bpf_raw_tracepoint_writable loaded", 30 "failed: %d errno %d\n", bpf_fd, errno)) 50 int tp_fd = bpf_raw_tracepoint_open("bpf_test_finish", bpf_fd); 81 close(bpf_fd);
|
H A D | raw_tp_writable_reject_nbd_invalid.c | 10 int bpf_fd = -1, tp_fd = -1; local 27 bpf_fd = bpf_prog_load(BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE, NULL, "GPL v2", 30 if (CHECK(bpf_fd < 0, "bpf_raw_tracepoint_writable load", 31 "failed: %d errno %d\n", bpf_fd, errno)) 34 tp_fd = bpf_raw_tracepoint_open("nbd_send_request", bpf_fd); 41 close(bpf_fd);
|
/linux-master/include/net/tc_act/ |
H A D | tc_bpf.h | 16 u32 bpf_fd; member in union:tcf_bpf::__anon1493
|