| Function report | 
| Source Code: kernel\bpf\syscall.c | Create Date:2022-07-28 12:52:03 | 
| Last Modify:2022-05-19 18:06:12 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:bpf_get_file_flag
Proto:int bpf_get_file_flag(int flags)
Type:int
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| int | flags | 
| 535 | If flags & Flags for accessing BPF object from syscall side. && flags & BPF_F_WRONLY Then Return -EINVAL | 
| 537 | If flags & Flags for accessing BPF object from syscall side. Then Return O_RDONLY | 
| 539 | If flags & BPF_F_WRONLY Then Return O_WRONLY | 
| 541 | Return O_RDWR | 
| Name | Describe | 
|---|---|
| map_create | alled via syscall | 
| bpf_map_get_fd_by_id | |
| bpf_obj_get_user | 
| Source code conversion tool public plug-in interface | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |