Home
last modified time | relevance | path

Searched refs:prog_fd (Results 1 – 9 of 9) sorted by relevance

/linux-4.4.14/samples/bpf/
Dsock_example.c33 int sock = -1, map_fd, prog_fd, i, key; in test_sock() local
58 prog_fd = bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER, prog, sizeof(prog), in test_sock()
60 if (prog_fd < 0) { in test_sock()
67 if (setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd, in test_sock()
68 sizeof(prog_fd)) < 0) { in test_sock()
Dsockex1_user.c24 assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, prog_fd, in main()
25 sizeof(prog_fd[0])) == 0); in main()
Dsockex2_user.c29 assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, prog_fd, in main()
30 sizeof(prog_fd[0])) == 0); in main()
Dbpf_load.c30 int prog_fd[MAX_PROGS]; variable
35 static int populate_prog_array(const char *event, int prog_fd) in populate_prog_array() argument
39 err = bpf_update_elem(prog_array_fd, &ind, &prog_fd, BPF_ANY); in populate_prog_array()
77 prog_fd[prog_cnt++] = fd; in load_and_attach()
Dbpf_load.h8 extern int prog_fd[MAX_PROGS];
Dsockex3_user.c39 assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd[4], in main()
Dtest_verifier.c1222 int prog_fd, i, pass_cnt = 0, err_cnt = 0; in test() local
1253 prog_fd = bpf_prog_load(prog_type ?: BPF_PROG_TYPE_SOCKET_FILTER, in test()
1268 if (prog_fd < 0) { in test()
1276 if (prog_fd >= 0) { in test()
1297 close(prog_fd); in test()
Dfds_example.c59 return prog_fd[0]; in bpf_prog_create()
/linux-4.4.14/kernel/events/
Dcore.c4246 static int perf_event_set_bpf_prog(struct perf_event *event, u32 prog_fd);
7065 static int perf_event_set_bpf_prog(struct perf_event *event, u32 prog_fd) in perf_event_set_bpf_prog() argument
7079 prog = bpf_prog_get(prog_fd); in perf_event_set_bpf_prog()
7123 static int perf_event_set_bpf_prog(struct perf_event *event, u32 prog_fd) in perf_event_set_bpf_prog() argument