Home
last modified time | relevance | path

Searched refs:expected_attach_type (Results 1 – 25 of 43) sorted by relevance

12

/linux/tools/testing/selftests/bpf/prog_tests/
A Dsockopt.c22 enum bpf_attach_type expected_attach_type; member
49 .expected_attach_type = 0,
61 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
72 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
93 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
117 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
143 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
159 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
186 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
394 .expected_attach_type = 0,
[all …]
A Dsection_names.c12 enum bpf_attach_type expected_attach_type; member
165 enum bpf_attach_type expected_attach_type; in test_prog_type_by_name() local
170 &expected_attach_type); in test_prog_type_by_name()
182 CHECK(expected_attach_type != test->expected_load.expected_attach_type, in test_prog_type_by_name()
184 expected_attach_type, test->sec_name); in test_prog_type_by_name()
A Dfexit_stress.c28 .expected_attach_type = BPF_TRACE_FEXIT, in test_fexit_stress()
44 load_attr.expected_attach_type); in test_fexit_stress()
A Dtcp_rtt.c97 .expected_attach_type = BPF_CGROUP_SOCK_OPS, in run_test()
/linux/tools/testing/selftests/bpf/verifier/
A Dctx_sk_lookup.c241 .expected_attach_type = BPF_SK_LOOKUP,
256 .expected_attach_type = BPF_SK_LOOKUP,
269 .expected_attach_type = BPF_SK_LOOKUP,
283 .expected_attach_type = BPF_SK_LOOKUP,
296 .expected_attach_type = BPF_SK_LOOKUP,
310 .expected_attach_type = BPF_SK_LOOKUP,
324 .expected_attach_type = BPF_SK_LOOKUP,
337 .expected_attach_type = BPF_SK_LOOKUP,
351 .expected_attach_type = BPF_SK_LOOKUP,
366 .expected_attach_type = BPF_SK_LOOKUP,
[all …]
A Dctx.c102 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG,
115 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG,
128 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG,
142 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG,
156 .expected_attach_type = BPF_CGROUP_INET4_CONNECT,
169 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
181 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
194 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
A Dd_path.c16 .expected_attach_type = BPF_TRACE_FENTRY,
35 .expected_attach_type = BPF_TRACE_FENTRY,
A Dwide_access.c12 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
54 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
A Devent_output.c115 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
A Datomic_fetch_add.c102 .expected_attach_type = BPF_TRACE_FENTRY,
A Dbpf_get_stack.c83 .expected_attach_type = BPF_TRACE_ITER,
/linux/tools/testing/selftests/bpf/
A Dtest_stub.c18 attr.expected_attach_type = 0; in bpf_prog_test_load()
34 load_attr.expected_attach_type = 0; in bpf_test_load_program()
A Dtest_sock.c30 enum bpf_attach_type expected_attach_type; member
336 attr.expected_attach_type = attach_type; in load_sock_prog()
405 progfd = load_sock_prog(test->insns, test->expected_attach_type); in run_test_case()
A Dtest_sock_addr.c68 enum bpf_attach_type expected_attach_type; member
653 load_attr.expected_attach_type = test->expected_attach_type; in load_insns()
676 attr.expected_attach_type = test->expected_attach_type; in load_path()
A Dtest_verifier.c126 enum bpf_attach_type expected_attach_type; member
1134 attr.expected_attach_type = test->expected_attach_type; in do_test_single()
1148 attr.expected_attach_type); in do_test_single()
/linux/tools/lib/bpf/
A Dlibbpf_probes.c76 xattr.expected_attach_type = BPF_CGROUP_INET4_CONNECT; in probe_load()
79 xattr.expected_attach_type = BPF_CGROUP_GETSOCKOPT; in probe_load()
82 xattr.expected_attach_type = BPF_SK_LOOKUP; in probe_load()
A Dbpf.c270 attr.expected_attach_type = load_attr->expected_attach_type; in libbpf__bpf_prog_load()
379 p.expected_attach_type = load_attr->expected_attach_type; in bpf_load_program_xattr()
422 load_attr.expected_attach_type = 0; in bpf_load_program()
/linux/kernel/bpf/
A Dsyscall.c2041 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type()
2042 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type()
2046 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type()
2047 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type()
2086 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2096 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2114 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2122 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2134 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2143 if (expected_attach_type) in bpf_prog_load_check_attach()
[all …]
A Dcgroup.c1945 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) in cg_sockopt_func_proto()
1949 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) in cg_sockopt_func_proto()
1980 return prog->expected_attach_type == in cg_sockopt_is_valid_access()
1987 return prog->expected_attach_type == in cg_sockopt_is_valid_access()
2015 return prog->expected_attach_type == BPF_CGROUP_GETSOCKOPT; in cg_sockopt_is_valid_access()
A Dbpf_iter.c415 link->prog->expected_attach_type != new_prog->expected_attach_type || in bpf_iter_link_replace()
/linux/tools/bpf/bpftool/
A Dprog.c1367 enum bpf_attach_type *expected_attach_type) in get_prog_type_by_name() argument
1372 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); in get_prog_type_by_name()
1378 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); in get_prog_type_by_name()
1391 enum bpf_attach_type expected_attach_type; in load_with_options() local
1434 &expected_attach_type); in load_with_options()
1534 &expected_attach_type); in load_with_options()
1541 bpf_program__set_expected_attach_type(pos, expected_attach_type); in load_with_options()
/linux/net/bpf/
A Dbpf_dummy_struct_ops.c108 op_idx = prog->expected_attach_type; in bpf_struct_ops_test_run()
/linux/net/core/
A Dsock_reuseport.c391 (prog && prog->expected_attach_type == BPF_SK_REUSEPORT_SELECT_OR_MIGRATE)) { in reuseport_stop_listen_sock()
547 if (!prog || prog->expected_attach_type != BPF_SK_REUSEPORT_SELECT_OR_MIGRATE) { in reuseport_migrate_sock()
/linux/kernel/trace/
A Dbpf_trace.c930 prog->expected_attach_type == BPF_TRACE_ITER) in BTF_ID()
1621 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
1625 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
1629 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
1636 if (!fn && prog->expected_attach_type == BPF_TRACE_ITER) in tracing_prog_func_proto()
/linux/net/ipv4/
A Dbpf_tcp_ca.c168 midx = prog->expected_attach_type; in prog_ops_moff()

Completed in 75 milliseconds

12