/linux-master/kernel/bpf/ |
H A D | syscall.c | 3878 #define BPF_RAW_TRACEPOINT_OPEN_LAST_FIELD raw_tracepoint.prog_fd 3888 prog = bpf_prog_get(attr->raw_tracepoint.prog_fd); 4264 prog = bpf_prog_get(attr->test.prog_fd); 5198 prog = bpf_prog_get(attr->link_create.prog_fd); 5555 prog = bpf_prog_get(attr->prog_bind_map.prog_fd); 5822 prog = bpf_prog_get_type(attr->test.prog_fd, BPF_PROG_TYPE_SYSCALL);
|
/linux-master/tools/lib/bpf/ |
H A D | libbpf.c | 7317 const char *license, __u32 kern_version, int *prog_fd) 7387 *prog_fd = -1; 7448 *prog_fd = ret; 8349 int prog_fd; local 8354 prog_fd = bpf_program__fd(prog); 8356 *(unsigned long *)kern_data = prog_fd; 10604 int prog_fd, link_fd = -1, err; local 10615 prog_fd = bpf_program__fd(prog); 10616 if (prog_fd < 0) { 10634 link_fd = bpf_link_create(prog_fd, pf 7315 bpf_object_load_prog(struct bpf_object *obj, struct bpf_program *prog, struct bpf_insn *insns, int insns_cnt, const char *license, __u32 kern_version, int *prog_fd) argument 11332 int err, link_fd, prog_fd; local 11753 int err = 0, link_fd, prog_fd; local 12279 int prog_fd, pfd; local 12352 int prog_fd, pfd; local 12418 int prog_fd, link_fd; local 12576 int prog_fd, link_fd; local 12620 int prog_fd, link_fd; local [all...] |
H A D | netlink.c | 322 int bpf_xdp_attach(int ifindex, int prog_fd, __u32 flags, const struct bpf_xdp_attach_opts *opts) argument 335 err = __bpf_set_link_xdp_fd_replace(ifindex, prog_fd, old_prog_fd, flags); 721 int ret, ifindex, attach_point, prog_fd; local 737 prog_fd = OPTS_GET(opts, prog_fd, 0); 741 if (ifindex <= 0 || !prog_fd || prog_id) 772 ret = tc_add_fd_and_name(&req, prog_fd); 797 int ret, ifindex, attach_point, prog_fd; local 811 prog_fd = OPTS_GET(opts, prog_fd, 868 int ret, ifindex, attach_point, prog_fd; local [all...] |
H A D | libbpf.h | 1214 LIBBPF_API int bpf_xdp_attach(int ifindex, int prog_fd, __u32 flags, 1246 int prog_fd; member in struct:bpf_tc_opts
|
H A D | features.c | 347 int prog_fd, link_fd, err; local 349 prog_fd = bpf_prog_load(BPF_PROG_TYPE_TRACEPOINT, NULL, "GPL", 351 if (prog_fd < 0) 357 link_fd = bpf_link_create(prog_fd, -1, BPF_PERF_EVENT, NULL); 362 close(prog_fd); 379 int prog_fd, link_fd, err; local 382 prog_fd = bpf_prog_load(BPF_PROG_TYPE_KPROBE, NULL, "GPL", 384 if (prog_fd < 0) 392 link_fd = bpf_link_create(prog_fd, -1, BPF_TRACE_UPROBE_MULTI, &link_opts); 397 close(prog_fd); 466 int prog_fd, btf_fd, insn_cnt = ARRAY_SIZE(insns); local [all...] |
H A D | bpf.h | 330 LIBBPF_API int bpf_prog_attach(int prog_fd, int attachable_fd, 333 LIBBPF_API int bpf_prog_detach2(int prog_fd, int attachable_fd, 362 * *prog_fd* to a *target* which can represent a file descriptor or netdevice 365 * @param prog_fd BPF program file descriptor 372 LIBBPF_API int bpf_prog_attach_opts(int prog_fd, int target, 378 * *prog_fd* from a *target* which can represent a file descriptor or netdevice 381 * @param prog_fd BPF program file descriptor 388 LIBBPF_API int bpf_prog_detach_opts(int prog_fd, int target, 443 LIBBPF_API int bpf_link_create(int prog_fd, int target_fd, 463 int prog_fd; member in struct:bpf_prog_test_run_attr [all...] |
H A D | bpf.c | 115 int prog_fd; local 127 prog_fd = sys_bpf_fd(BPF_PROG_LOAD, &attr, attr_sz); 128 if (prog_fd >= 0) { 129 close(prog_fd); 629 int bpf_prog_attach(int prog_fd, int target_fd, enum bpf_attach_type type, argument 636 return bpf_prog_attach_opts(prog_fd, target_fd, type, &opts); 639 int bpf_prog_attach_opts(int prog_fd, int target, enum bpf_attach_type type, argument 660 attr.attach_bpf_fd = prog_fd; 677 int bpf_prog_detach_opts(int prog_fd, int target, enum bpf_attach_type type, argument 698 attr.attach_bpf_fd = prog_fd; 719 bpf_prog_detach2(int prog_fd, int target_fd, enum bpf_attach_type type) argument 724 bpf_link_create(int prog_fd, int target_fd, enum bpf_attach_type attach_type, const struct bpf_link_create_opts *opts) argument 976 bpf_prog_test_run_opts(int prog_fd, struct bpf_test_run_opts *opts) argument 1156 bpf_prog_get_info_by_fd(int prog_fd, struct bpf_prog_info *info, __u32 *info_len) argument 1176 bpf_raw_tracepoint_open(const char *name, int prog_fd) argument 1283 bpf_prog_bind_map(int prog_fd, int map_fd, const struct bpf_prog_bind_opts *opts) argument [all...] |
/linux-master/tools/perf/util/ |
H A D | bpf_lock_contention.c | 191 int prog_fd = bpf_program__fd(skel->progs.end_timestamp); local 193 bpf_prog_test_run_opts(prog_fd, &opts); 435 int prog_fd = bpf_program__fd(skel->progs.collect_lock_syms); local 437 bpf_prog_test_run_opts(prog_fd, &opts);
|
/linux-master/tools/perf/ |
H A D | builtin-trace.c | 3463 int prog_fd; local 3471 prog_fd = trace__bpf_prog_sys_enter_fd(trace, key); 3472 err = bpf_map_update_elem(map_enter_fd, &key, &prog_fd, BPF_ANY); 3475 prog_fd = trace__bpf_prog_sys_exit_fd(trace, key); 3476 err = bpf_map_update_elem(map_exit_fd, &key, &prog_fd, BPF_ANY); 3512 int prog_fd; local 3538 prog_fd = bpf_program__fd(sc->bpf_prog.sys_enter); 3539 err = bpf_map_update_elem(map_enter_fd, &key, &prog_fd, BPF_ANY);
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | testing_helpers.c | 284 struct bpf_object **pobj, int *prog_fd) 315 *prog_fd = bpf_program__fd(prog); 283 bpf_prog_test_load(const char *file, enum bpf_prog_type type, struct bpf_object **pobj, int *prog_fd) argument
|
H A D | testing_helpers.h | 18 struct bpf_object **pobj, int *prog_fd);
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | token.c | 638 int err, token_fd = -1, prog_fd = -1; local 666 prog_fd = bpf_prog_load(BPF_PROG_TYPE_XDP, "token_prog", "GPL", 668 if (!ASSERT_GT(prog_fd, 0, "prog_fd")) { 676 prog_fd = bpf_prog_load(BPF_PROG_TYPE_XDP, "token_prog", "GPL", 678 if (!ASSERT_EQ(prog_fd, -EPERM, "prog_fd_eperm")) { 690 prog_fd = bpf_prog_load(BPF_PROG_TYPE_XDP, "token_prog", "GPL", 692 if (!ASSERT_EQ(prog_fd, -EPERM, "prog_fd_eperm")) { 700 prog_fd = bpf_prog_load(BPF_PROG_TYPE_XDP, "token_prog", "GPL", 702 if (!ASSERT_EQ(prog_fd, [all...] |
H A D | test_tunnel.c | 370 .priority = 1, .prog_fd = igr_fd); 372 .priority = 1, .prog_fd = egr_fd);
|
H A D | tc_redirect.c | 340 tc_attach.prog_fd = bpf_program__fd(prog);
|
H A D | tcp_custom_syncookie.c | 54 .prog_fd = bpf_program__fd(skel->progs.tcp_custom_syncookie));
|
H A D | task_local_storage.c | 82 int err, map_fd, prog_fd, task_fd; local 120 prog_fd = bpf_program__fd(skel->progs.on_update); 122 err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 126 prog_fd = bpf_program__fd(skel->progs.on_enter); 128 err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 170 int i, prog_fd, err; local 217 prog_fd = bpf_program__fd(skel->progs.socket_post_create); 218 err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len);
|
H A D | spin_lock.c | 117 int err, prog_fd = *(u32 *) arg; local 124 err = bpf_prog_test_run_opts(prog_fd, &topts); 134 int prog_fd, i; local 140 prog_fd = bpf_program__fd(skel->progs.bpf_spin_lock_test); 144 err = pthread_create(&thread_id[i], NULL, &spin_lock_thread, &prog_fd); 152 if (!ASSERT_EQ(ret, &prog_fd, "ret == prog_fd"))
|
H A D | mptcp.c | 158 int client_fd, prog_fd, map_fd, err; local 169 prog_fd = bpf_program__fd(sock_skel->progs._sockops); 171 err = bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_SOCK_OPS, 0);
|
H A D | fib_lookup.c | 233 int prog_fd, err, ret, i; local 248 prog_fd = bpf_program__fd(skel->progs.fib_lookup); 271 err = bpf_prog_test_run_opts(prog_fd, &run_opts);
|
H A D | decap_sanity.c | 48 tc_attach.prog_fd = bpf_program__fd(skel->progs.decap_sanity);
|
H A D | ctx_rewrite.c | 701 int err = 0, prog_fd = 0; local 719 prog_fd = bpf_prog_load(pinfo->prog_type, NULL, "GPL", 721 if (prog_fd < 0) { 729 err = get_xlated_program(prog_fd, &buf, &cnt); 751 if (prog_fd) 752 close(prog_fd);
|
H A D | btf.c | 4793 int i, err, prog_fd; local 4830 prog_fd = bpf_program__fd(prog); 4850 err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 4882 err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 6490 int prog_fd) 6501 err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 6531 err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 6572 __u32 cnt, int prog_fd) 6595 err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len); 6669 err = bpf_prog_get_info_by_fd(prog_fd, 6489 test_get_finfo(const struct prog_info_raw_test *test, int prog_fd) argument 6570 test_get_linfo(const struct prog_info_raw_test *test, const void *patched_linfo, __u32 cnt, int prog_fd) argument 6792 int btf_fd = -1, prog_fd = -1, err = 0; local [all...] |
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 357 * Run the eBPF program associated with the *prog_fd* a *repeat* 391 * the program referred to by *prog_fd*. 506 * The *prog_fd* must be a valid file descriptor associated with 866 * identified by *prog_fd* and only released when *prog_fd* is 1550 /* valid prog_fd to attach to bpf prog */ 1600 __u32 prog_fd; member in struct:bpf_attr::__anon3140 1666 __u32 prog_fd; member in struct:bpf_attr::__anon3147 1705 __u32 prog_fd; /* eBPF program to attach */ member in union:bpf_attr::__anon3150::__anon3151 1810 __u32 prog_fd; member in struct:bpf_attr::__anon3170 [all...] |
/linux-master/tools/bpf/bpftool/ |
H A D | prog.c | 219 static void *find_metadata(int prog_fd, struct bpf_map_info *map_info) argument 234 ret = bpf_prog_get_info_by_fd(prog_fd, &prog_info, &prog_info_len); 251 ret = bpf_prog_get_info_by_fd(prog_fd, &prog_info, &prog_info_len);
|
H A D | link.c | 238 int err, prog_fd; local 240 prog_fd = bpf_prog_get_fd_by_id(prog_id); 241 if (prog_fd < 0) 242 return prog_fd; 245 err = bpf_prog_get_info_by_fd(prog_fd, info, &len); 248 close(prog_fd);
|