BPF_PROG_LOAD
if (CHECK_ATTR(BPF_PROG_LOAD))
if (!bpf_token_allow_cmd(token, BPF_PROG_LOAD) ||
case BPF_PROG_LOAD:
case BPF_PROG_LOAD:
case BPF_PROG_LOAD:
if (bpf_token_cmd(token, BPF_PROG_LOAD)) {
case BPF_PROG_LOAD:
prog_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
return syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr)) == 0;
prog_fd = sys_bpf_fd(BPF_PROG_LOAD, &attr, attr_sz);
fd = sys_bpf_fd(BPF_PROG_LOAD, attr, size);
emit_sys_bpf(gen, BPF_PROG_LOAD, prog_load_attr, attr_size);
err = prog_fd = skel_sys_bpf(BPF_PROG_LOAD, &attr, prog_load_attr_sz);
prog_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
.cmds = bit(BPF_PROG_LOAD),
.cmds = bit(BPF_BTF_LOAD) | bit(BPF_PROG_LOAD) | bit(BPF_BTF_GET_FD_BY_ID),
.cmds = bit(BPF_BTF_LOAD) | bit(BPF_PROG_LOAD) | bit(BPF_BTF_GET_FD_BY_ID),
.cmds = bit(BPF_MAP_CREATE) | bit(BPF_PROG_LOAD),
.cmds = bit(BPF_BTF_LOAD) | bit(BPF_MAP_CREATE) | bit(BPF_PROG_LOAD),
.cmds = bit(BPF_BTF_LOAD) | bit(BPF_MAP_CREATE) | bit(BPF_PROG_LOAD),
.cmds = bit(BPF_BTF_LOAD) | bit(BPF_MAP_CREATE) | bit(BPF_PROG_LOAD),
ret = bpf_sys_bpf(BPF_PROG_LOAD, &prog_load_attr, sizeof(prog_load_attr));
pfd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &eprog, sizeof(eprog));
bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));