Lines Matching +full:stdout +full:- +full:path

1 // SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
17 int i, set_len = 0, new_len, num, start = 0, end = -1; in parse_num_list()
25 return -errno; in parse_num_list()
32 if (!parsing_end && *next == '-') { in parse_num_list()
45 return -EINVAL; in parse_num_list()
49 return -EINVAL; in parse_num_list()
56 return -ENOMEM; in parse_num_list()
68 return -EINVAL; in parse_num_list()
84 for (i = 0; i < set->cnt; i++) { in do_insert_test()
85 test = &set->tests[i]; in do_insert_test()
87 if (strcmp(test_str, test->name) == 0) { in do_insert_test()
93 tmp = realloc(set->tests, sizeof(*test) * (set->cnt + 1)); in do_insert_test()
95 return -ENOMEM; in do_insert_test()
97 set->tests = tmp; in do_insert_test()
98 test = &set->tests[set->cnt]; in do_insert_test()
100 test->name = test_str; in do_insert_test()
101 test->subtests = NULL; in do_insert_test()
102 test->subtest_cnt = 0; in do_insert_test()
104 set->cnt++; in do_insert_test()
110 for (i = 0; i < test->subtest_cnt; i++) { in do_insert_test()
111 if (strcmp(subtest_str, test->subtests[i]) == 0) { in do_insert_test()
117 ctmp = realloc(test->subtests, in do_insert_test()
118 sizeof(*test->subtests) * (test->subtest_cnt + 1)); in do_insert_test()
120 return -ENOMEM; in do_insert_test()
122 test->subtests = ctmp; in do_insert_test()
123 test->subtests[test->subtest_cnt] = subtest_str; in do_insert_test()
125 test->subtest_cnt++; in do_insert_test()
170 return -ENOMEM; in insert_test()
173 int parse_test_list_file(const char *path, in parse_test_list_file() argument
182 f = fopen(path, "r"); in parse_test_list_file()
184 err = -errno; in parse_test_list_file()
185 fprintf(stderr, "Failed to open '%s': %d\n", path, err); in parse_test_list_file()
189 while (getline(&buf, &buflen, f) != -1) { in parse_test_list_file()
229 return -ENOMEM; in parse_test_list()
249 printf("failed to get link info: %d\n", -errno); in link_info_prog_id()
252 return info->prog_id; in link_info_prog_id()
259 static int cached_flags = -1; in testing_prog_flags()
273 fd = bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER, "flag-test", "GPL", in testing_prog_flags()
298 return -errno; in bpf_prog_test_load()
302 err = -ENOENT; in bpf_prog_test_load()
349 "return default value: 5000\n", -errno); in read_perf_max_sample_freq()
354 "return default value: 5000\n", -errno); in read_perf_max_sample_freq()
376 fprintf(stdout, "Failed to trigger kernel-side RCU sync!\n"); in unload_module()
383 fprintf(stdout, "Unload of %s timed out\n", name); in unload_module()
392 fprintf(stdout, "%s.ko is already unloaded.\n", name); in unload_module()
393 return -1; in unload_module()
395 fprintf(stdout, "Failed to unload %s.ko from kernel: %d\n", name, -errno); in unload_module()
396 return -1; in unload_module()
399 fprintf(stdout, "Successfully unloaded %s.ko.\n", name); in unload_module()
403 static int __load_module(const char *path, const char *param_values, bool verbose) in __load_module() argument
408 fprintf(stdout, "Loading %s...\n", path); in __load_module()
410 fd = open(path, O_RDONLY); in __load_module()
412 fprintf(stdout, "Can't find %s kernel module: %d\n", path, -errno); in __load_module()
413 return -ENOENT; in __load_module()
416 fprintf(stdout, "Failed to load %s into the kernel: %d\n", path, -errno); in __load_module()
418 return -EINVAL; in __load_module()
423 fprintf(stdout, "Successfully loaded %s.\n", path); in __load_module()
427 int load_module_params(const char *path, const char *param_values, bool verbose) in load_module_params() argument
429 return __load_module(path, param_values, verbose); in load_module_params()
432 int load_module(const char *path, bool verbose) in load_module() argument
434 return __load_module(path, "", verbose); in load_module()
464 return -1; in get_xlated_program()
471 return -1; in get_xlated_program()
478 return -ENOMEM; in get_xlated_program()
494 return -1; in get_xlated_program()
504 if (sysctl_fd != -1) { in is_jit_enabled()