Searched refs:prog_fd (Results 1 – 9 of 9) sorted by relevance
/linux-4.4.14/samples/bpf/ |
D | sock_example.c | 33 int sock = -1, map_fd, prog_fd, i, key; in test_sock() local 58 prog_fd = bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER, prog, sizeof(prog), in test_sock() 60 if (prog_fd < 0) { in test_sock() 67 if (setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd, in test_sock() 68 sizeof(prog_fd)) < 0) { in test_sock()
|
D | sockex1_user.c | 24 assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, prog_fd, in main() 25 sizeof(prog_fd[0])) == 0); in main()
|
D | sockex2_user.c | 29 assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, prog_fd, in main() 30 sizeof(prog_fd[0])) == 0); in main()
|
D | bpf_load.c | 30 int prog_fd[MAX_PROGS]; variable 35 static int populate_prog_array(const char *event, int prog_fd) in populate_prog_array() argument 39 err = bpf_update_elem(prog_array_fd, &ind, &prog_fd, BPF_ANY); in populate_prog_array() 77 prog_fd[prog_cnt++] = fd; in load_and_attach()
|
D | bpf_load.h | 8 extern int prog_fd[MAX_PROGS];
|
D | sockex3_user.c | 39 assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd[4], in main()
|
D | test_verifier.c | 1222 int prog_fd, i, pass_cnt = 0, err_cnt = 0; in test() local 1253 prog_fd = bpf_prog_load(prog_type ?: BPF_PROG_TYPE_SOCKET_FILTER, in test() 1268 if (prog_fd < 0) { in test() 1276 if (prog_fd >= 0) { in test() 1297 close(prog_fd); in test()
|
D | fds_example.c | 59 return prog_fd[0]; in bpf_prog_create()
|
/linux-4.4.14/kernel/events/ |
D | core.c | 4246 static int perf_event_set_bpf_prog(struct perf_event *event, u32 prog_fd); 7065 static int perf_event_set_bpf_prog(struct perf_event *event, u32 prog_fd) in perf_event_set_bpf_prog() argument 7079 prog = bpf_prog_get(prog_fd); in perf_event_set_bpf_prog() 7123 static int perf_event_set_bpf_prog(struct perf_event *event, u32 prog_fd) in perf_event_set_bpf_prog() argument
|