Lines Matching refs:ret

31 	int ret;  in test_tc_bpf_basic()  local
33 ret = bpf_prog_get_info_by_fd(fd, &info, &info_len); in test_tc_bpf_basic()
34 if (!ASSERT_OK(ret, "bpf_prog_get_info_by_fd")) in test_tc_bpf_basic()
35 return ret; in test_tc_bpf_basic()
37 ret = bpf_tc_attach(hook, &opts); in test_tc_bpf_basic()
38 if (!ASSERT_OK(ret, "bpf_tc_attach")) in test_tc_bpf_basic()
39 return ret; in test_tc_bpf_basic()
48 ret = bpf_tc_attach(hook, &opts); in test_tc_bpf_basic()
49 if (!ASSERT_OK(ret, "bpf_tc_attach replace mode")) in test_tc_bpf_basic()
53 ret = bpf_tc_query(hook, &opts); in test_tc_bpf_basic()
54 if (!ASSERT_OK(ret, "bpf_tc_query")) in test_tc_bpf_basic()
64 ret = bpf_tc_detach(hook, &opts); in test_tc_bpf_basic()
65 ASSERT_OK(ret, "bpf_tc_detach"); in test_tc_bpf_basic()
66 return ret; in test_tc_bpf_basic()
74 int ret; in test_tc_bpf_api() local
76 ret = bpf_tc_hook_create(NULL); in test_tc_bpf_api()
77 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook = NULL")) in test_tc_bpf_api()
81 ret = bpf_tc_hook_create(&inv_hook); in test_tc_bpf_api()
82 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook ifindex == 0")) in test_tc_bpf_api()
85 ret = bpf_tc_hook_destroy(&inv_hook); in test_tc_bpf_api()
86 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_destroy invalid hook ifindex == 0")) in test_tc_bpf_api()
89 ret = bpf_tc_attach(&inv_hook, &attach_opts); in test_tc_bpf_api()
90 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook ifindex == 0")) in test_tc_bpf_api()
94 ret = bpf_tc_detach(&inv_hook, &opts); in test_tc_bpf_api()
95 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook ifindex == 0")) in test_tc_bpf_api()
98 ret = bpf_tc_query(&inv_hook, &opts); in test_tc_bpf_api()
99 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook ifindex == 0")) in test_tc_bpf_api()
105 ret = bpf_tc_hook_create(&inv_hook); in test_tc_bpf_api()
106 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook ifindex < 0")) in test_tc_bpf_api()
109 ret = bpf_tc_hook_destroy(&inv_hook); in test_tc_bpf_api()
110 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_destroy invalid hook ifindex < 0")) in test_tc_bpf_api()
113 ret = bpf_tc_attach(&inv_hook, &attach_opts); in test_tc_bpf_api()
114 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook ifindex < 0")) in test_tc_bpf_api()
118 ret = bpf_tc_detach(&inv_hook, &opts); in test_tc_bpf_api()
119 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook ifindex < 0")) in test_tc_bpf_api()
122 ret = bpf_tc_query(&inv_hook, &opts); in test_tc_bpf_api()
123 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook ifindex < 0")) in test_tc_bpf_api()
130 ret = bpf_tc_hook_create(&inv_hook); in test_tc_bpf_api()
131 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook.attach_point")) in test_tc_bpf_api()
134 ret = bpf_tc_hook_destroy(&inv_hook); in test_tc_bpf_api()
135 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_destroy invalid hook.attach_point")) in test_tc_bpf_api()
138 ret = bpf_tc_attach(&inv_hook, &attach_opts); in test_tc_bpf_api()
139 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook.attach_point")) in test_tc_bpf_api()
142 ret = bpf_tc_detach(&inv_hook, &opts); in test_tc_bpf_api()
143 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook.attach_point")) in test_tc_bpf_api()
146 ret = bpf_tc_query(&inv_hook, &opts); in test_tc_bpf_api()
147 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook.attach_point")) in test_tc_bpf_api()
154 ret = bpf_tc_hook_create(&inv_hook); in test_tc_bpf_api()
155 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_create invalid hook parent")) in test_tc_bpf_api()
158 ret = bpf_tc_hook_destroy(&inv_hook); in test_tc_bpf_api()
159 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_hook_destroy invalid hook parent")) in test_tc_bpf_api()
162 ret = bpf_tc_attach(&inv_hook, &attach_opts); in test_tc_bpf_api()
163 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook parent")) in test_tc_bpf_api()
166 ret = bpf_tc_detach(&inv_hook, &opts); in test_tc_bpf_api()
167 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook parent")) in test_tc_bpf_api()
170 ret = bpf_tc_query(&inv_hook, &opts); in test_tc_bpf_api()
171 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook parent")) in test_tc_bpf_api()
179 ret = bpf_tc_hook_create(&inv_hook); in test_tc_bpf_api()
180 if (!ASSERT_EQ(ret, -EOPNOTSUPP, "bpf_tc_hook_create invalid hook parent")) in test_tc_bpf_api()
183 ret = bpf_tc_hook_destroy(&inv_hook); in test_tc_bpf_api()
184 if (!ASSERT_EQ(ret, -EOPNOTSUPP, "bpf_tc_hook_destroy invalid hook parent")) in test_tc_bpf_api()
187 ret = bpf_tc_attach(&inv_hook, &attach_opts); in test_tc_bpf_api()
188 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook parent")) in test_tc_bpf_api()
191 ret = bpf_tc_detach(&inv_hook, &opts); in test_tc_bpf_api()
192 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook parent")) in test_tc_bpf_api()
195 ret = bpf_tc_query(&inv_hook, &opts); in test_tc_bpf_api()
196 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook parent")) in test_tc_bpf_api()
205 ret = bpf_tc_detach(NULL, &opts_hp); in test_tc_bpf_api()
206 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid hook = NULL")) in test_tc_bpf_api()
209 ret = bpf_tc_detach(hook, NULL); in test_tc_bpf_api()
210 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid opts = NULL")) in test_tc_bpf_api()
213 ret = bpf_tc_detach(hook, &opts_hpr); in test_tc_bpf_api()
214 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid flags set")) in test_tc_bpf_api()
217 ret = bpf_tc_detach(hook, &opts_hpf); in test_tc_bpf_api()
218 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid prog_fd set")) in test_tc_bpf_api()
221 ret = bpf_tc_detach(hook, &opts_hpi); in test_tc_bpf_api()
222 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid prog_id set")) in test_tc_bpf_api()
225 ret = bpf_tc_detach(hook, &opts_p); in test_tc_bpf_api()
226 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid handle unset")) in test_tc_bpf_api()
229 ret = bpf_tc_detach(hook, &opts_h); in test_tc_bpf_api()
230 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid priority unset")) in test_tc_bpf_api()
233 ret = bpf_tc_detach(hook, &opts_prio_max); in test_tc_bpf_api()
234 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_detach invalid priority > UINT16_MAX")) in test_tc_bpf_api()
242 ret = bpf_tc_query(NULL, &opts); in test_tc_bpf_api()
243 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid hook = NULL")) in test_tc_bpf_api()
246 ret = bpf_tc_query(hook, NULL); in test_tc_bpf_api()
247 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid opts = NULL")) in test_tc_bpf_api()
250 ret = bpf_tc_query(hook, &opts_hpr); in test_tc_bpf_api()
251 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid flags set")) in test_tc_bpf_api()
254 ret = bpf_tc_query(hook, &opts_hpf); in test_tc_bpf_api()
255 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid prog_fd set")) in test_tc_bpf_api()
258 ret = bpf_tc_query(hook, &opts_hpi); in test_tc_bpf_api()
259 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid prog_id set")) in test_tc_bpf_api()
262 ret = bpf_tc_query(hook, &opts_p); in test_tc_bpf_api()
263 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid handle unset")) in test_tc_bpf_api()
266 ret = bpf_tc_query(hook, &opts_h); in test_tc_bpf_api()
267 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid priority unset")) in test_tc_bpf_api()
270 ret = bpf_tc_query(hook, &opts_prio_max); in test_tc_bpf_api()
271 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query invalid priority > UINT16_MAX")) in test_tc_bpf_api()
275 ret = bpf_tc_query(hook, &opts_hp); in test_tc_bpf_api()
276 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_query valid handle, priority set")) in test_tc_bpf_api()
284 ret = bpf_tc_attach(NULL, &opts_hp); in test_tc_bpf_api()
285 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid hook = NULL")) in test_tc_bpf_api()
288 ret = bpf_tc_attach(hook, NULL); in test_tc_bpf_api()
289 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid opts = NULL")) in test_tc_bpf_api()
293 ret = bpf_tc_attach(hook, &opts_hp); in test_tc_bpf_api()
294 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid flags")) in test_tc_bpf_api()
297 ret = bpf_tc_attach(hook, NULL); in test_tc_bpf_api()
298 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid prog_fd unset")) in test_tc_bpf_api()
301 ret = bpf_tc_attach(hook, &opts_hpi); in test_tc_bpf_api()
302 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid prog_id set")) in test_tc_bpf_api()
305 ret = bpf_tc_attach(hook, &opts_pf); in test_tc_bpf_api()
306 if (!ASSERT_OK(ret, "bpf_tc_attach valid handle unset")) in test_tc_bpf_api()
311 ret = bpf_tc_attach(hook, &opts_hf); in test_tc_bpf_api()
312 if (!ASSERT_OK(ret, "bpf_tc_attach valid priority unset")) in test_tc_bpf_api()
317 ret = bpf_tc_attach(hook, &opts_prio_max); in test_tc_bpf_api()
318 if (!ASSERT_EQ(ret, -EINVAL, "bpf_tc_attach invalid priority > UINT16_MAX")) in test_tc_bpf_api()
321 ret = bpf_tc_attach(hook, &opts_f); in test_tc_bpf_api()
322 if (!ASSERT_OK(ret, "bpf_tc_attach valid both handle and priority unset")) in test_tc_bpf_api()
337 int cls_fd, ret; in tc_bpf_root() local
345 ret = bpf_tc_hook_create(&hook); in tc_bpf_root()
346 if (ret == 0) in tc_bpf_root()
349 ret = ret == -EEXIST ? 0 : ret; in tc_bpf_root()
350 if (!ASSERT_OK(ret, "bpf_tc_hook_create(BPF_TC_INGRESS)")) in tc_bpf_root()
355 ret = bpf_tc_hook_create(&hook); in tc_bpf_root()
356 if (!ASSERT_EQ(ret, -EOPNOTSUPP, "bpf_tc_hook_create invalid hook.attach_point")) in tc_bpf_root()
359 ret = test_tc_bpf_basic(&hook, cls_fd); in tc_bpf_root()
360 if (!ASSERT_OK(ret, "test_tc_internal ingress")) in tc_bpf_root()
363 ret = bpf_tc_hook_destroy(&hook); in tc_bpf_root()
364 if (!ASSERT_EQ(ret, -EOPNOTSUPP, "bpf_tc_hook_destroy invalid hook.attach_point")) in tc_bpf_root()
371 ret = test_tc_bpf_basic(&hook, cls_fd); in tc_bpf_root()
372 if (!ASSERT_OK(ret, "test_tc_internal ingress")) in tc_bpf_root()
378 ret = test_tc_bpf_basic(&hook, cls_fd); in tc_bpf_root()
379 if (!ASSERT_OK(ret, "test_tc_internal egress")) in tc_bpf_root()
384 ret = test_tc_bpf_api(&hook, cls_fd); in tc_bpf_root()
385 if (!ASSERT_OK(ret, "test_tc_bpf_api")) in tc_bpf_root()
402 int ret; in tc_bpf_non_root() local
405 ret = cap_enable_effective(1ULL << CAP_BPF | 1ULL << CAP_NET_ADMIN, &caps); in tc_bpf_non_root()
406 if (!ASSERT_OK(ret, "set_cap_bpf_cap_net_admin")) in tc_bpf_non_root()
408 ret = cap_disable_effective(1ULL << CAP_SYS_ADMIN | 1ULL << CAP_PERFMON, NULL); in tc_bpf_non_root()
409 if (!ASSERT_OK(ret, "disable_cap_sys_admin")) in tc_bpf_non_root()