Searched refs:prog_fd (Results  1 – 9 of 9) sorted by relevance
| /linux-4.4.14/samples/bpf/ | 
| D | sock_example.c | 33 	int sock = -1, map_fd, prog_fd, i, key;  in test_sock()  local 58 	prog_fd = bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER, prog, sizeof(prog),  in test_sock() 60 	if (prog_fd < 0) {  in test_sock() 67 	if (setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd,  in test_sock() 68 		       sizeof(prog_fd)) < 0) {  in test_sock()
  | 
| D | sockex1_user.c | 24 	assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, prog_fd,  in main() 25 			  sizeof(prog_fd[0])) == 0);  in main()
  | 
| D | sockex2_user.c | 29 	assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, prog_fd,  in main() 30 			  sizeof(prog_fd[0])) == 0);  in main()
  | 
| D | bpf_load.c | 30 int prog_fd[MAX_PROGS];  variable 35 static int populate_prog_array(const char *event, int prog_fd)  in populate_prog_array()  argument 39 	err = bpf_update_elem(prog_array_fd, &ind, &prog_fd, BPF_ANY);  in populate_prog_array() 77 	prog_fd[prog_cnt++] = fd;  in load_and_attach()
  | 
| D | bpf_load.h | 8 extern int prog_fd[MAX_PROGS];
  | 
| D | sockex3_user.c | 39 	assert(setsockopt(sock, SOL_SOCKET, SO_ATTACH_BPF, &prog_fd[4],  in main()
  | 
| D | test_verifier.c | 1222 	int prog_fd, i, pass_cnt = 0, err_cnt = 0;  in test()  local 1253 		prog_fd = bpf_prog_load(prog_type ?: BPF_PROG_TYPE_SOCKET_FILTER,  in test() 1268 			if (prog_fd < 0) {  in test() 1276 			if (prog_fd >= 0) {  in test() 1297 		close(prog_fd);  in test()
  | 
| D | fds_example.c | 59 		return prog_fd[0];  in bpf_prog_create()
  | 
| /linux-4.4.14/kernel/events/ | 
| D | core.c | 4246 static int perf_event_set_bpf_prog(struct perf_event *event, u32 prog_fd); 7065 static int perf_event_set_bpf_prog(struct perf_event *event, u32 prog_fd)  in perf_event_set_bpf_prog()  argument 7079 	prog = bpf_prog_get(prog_fd);  in perf_event_set_bpf_prog() 7123 static int perf_event_set_bpf_prog(struct perf_event *event, u32 prog_fd)  in perf_event_set_bpf_prog()  argument
  |