/linux/tools/testing/selftests/bpf/prog_tests/ |
A D | sockopt.c | 22 enum bpf_attach_type expected_attach_type; member 49 .expected_attach_type = 0, 61 .expected_attach_type = BPF_CGROUP_SETSOCKOPT, 72 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 93 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 117 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 143 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 159 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 186 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 394 .expected_attach_type = 0, [all …]
|
A D | section_names.c | 12 enum bpf_attach_type expected_attach_type; member 165 enum bpf_attach_type expected_attach_type; in test_prog_type_by_name() local 170 &expected_attach_type); in test_prog_type_by_name() 182 CHECK(expected_attach_type != test->expected_load.expected_attach_type, in test_prog_type_by_name() 184 expected_attach_type, test->sec_name); in test_prog_type_by_name()
|
A D | fexit_stress.c | 28 .expected_attach_type = BPF_TRACE_FEXIT, in test_fexit_stress() 44 load_attr.expected_attach_type); in test_fexit_stress()
|
A D | tcp_rtt.c | 97 .expected_attach_type = BPF_CGROUP_SOCK_OPS, in run_test()
|
/linux/tools/testing/selftests/bpf/verifier/ |
A D | ctx_sk_lookup.c | 241 .expected_attach_type = BPF_SK_LOOKUP, 256 .expected_attach_type = BPF_SK_LOOKUP, 269 .expected_attach_type = BPF_SK_LOOKUP, 283 .expected_attach_type = BPF_SK_LOOKUP, 296 .expected_attach_type = BPF_SK_LOOKUP, 310 .expected_attach_type = BPF_SK_LOOKUP, 324 .expected_attach_type = BPF_SK_LOOKUP, 337 .expected_attach_type = BPF_SK_LOOKUP, 351 .expected_attach_type = BPF_SK_LOOKUP, 366 .expected_attach_type = BPF_SK_LOOKUP, [all …]
|
A D | ctx.c | 102 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, 115 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, 128 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, 142 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, 156 .expected_attach_type = BPF_CGROUP_INET4_CONNECT, 169 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND, 181 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND, 194 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
|
A D | d_path.c | 16 .expected_attach_type = BPF_TRACE_FENTRY, 35 .expected_attach_type = BPF_TRACE_FENTRY,
|
A D | wide_access.c | 12 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \ 54 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
|
A D | event_output.c | 115 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
|
A D | atomic_fetch_add.c | 102 .expected_attach_type = BPF_TRACE_FENTRY,
|
A D | bpf_get_stack.c | 83 .expected_attach_type = BPF_TRACE_ITER,
|
/linux/tools/testing/selftests/bpf/ |
A D | test_stub.c | 18 attr.expected_attach_type = 0; in bpf_prog_test_load() 34 load_attr.expected_attach_type = 0; in bpf_test_load_program()
|
A D | test_sock.c | 30 enum bpf_attach_type expected_attach_type; member 336 attr.expected_attach_type = attach_type; in load_sock_prog() 405 progfd = load_sock_prog(test->insns, test->expected_attach_type); in run_test_case()
|
A D | test_sock_addr.c | 68 enum bpf_attach_type expected_attach_type; member 653 load_attr.expected_attach_type = test->expected_attach_type; in load_insns() 676 attr.expected_attach_type = test->expected_attach_type; in load_path()
|
A D | test_verifier.c | 126 enum bpf_attach_type expected_attach_type; member 1134 attr.expected_attach_type = test->expected_attach_type; in do_test_single() 1148 attr.expected_attach_type); in do_test_single()
|
/linux/tools/lib/bpf/ |
A D | libbpf_probes.c | 76 xattr.expected_attach_type = BPF_CGROUP_INET4_CONNECT; in probe_load() 79 xattr.expected_attach_type = BPF_CGROUP_GETSOCKOPT; in probe_load() 82 xattr.expected_attach_type = BPF_SK_LOOKUP; in probe_load()
|
A D | bpf.c | 270 attr.expected_attach_type = load_attr->expected_attach_type; in libbpf__bpf_prog_load() 379 p.expected_attach_type = load_attr->expected_attach_type; in bpf_load_program_xattr() 422 load_attr.expected_attach_type = 0; in bpf_load_program()
|
/linux/kernel/bpf/ |
A D | syscall.c | 2041 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type() 2042 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type() 2046 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type() 2047 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type() 2086 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2096 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2114 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2122 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2134 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2143 if (expected_attach_type) in bpf_prog_load_check_attach() [all …]
|
A D | cgroup.c | 1945 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) in cg_sockopt_func_proto() 1949 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) in cg_sockopt_func_proto() 1980 return prog->expected_attach_type == in cg_sockopt_is_valid_access() 1987 return prog->expected_attach_type == in cg_sockopt_is_valid_access() 2015 return prog->expected_attach_type == BPF_CGROUP_GETSOCKOPT; in cg_sockopt_is_valid_access()
|
A D | bpf_iter.c | 415 link->prog->expected_attach_type != new_prog->expected_attach_type || in bpf_iter_link_replace()
|
/linux/tools/bpf/bpftool/ |
A D | prog.c | 1367 enum bpf_attach_type *expected_attach_type) in get_prog_type_by_name() argument 1372 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); in get_prog_type_by_name() 1378 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); in get_prog_type_by_name() 1391 enum bpf_attach_type expected_attach_type; in load_with_options() local 1434 &expected_attach_type); in load_with_options() 1534 &expected_attach_type); in load_with_options() 1541 bpf_program__set_expected_attach_type(pos, expected_attach_type); in load_with_options()
|
/linux/net/bpf/ |
A D | bpf_dummy_struct_ops.c | 108 op_idx = prog->expected_attach_type; in bpf_struct_ops_test_run()
|
/linux/net/core/ |
A D | sock_reuseport.c | 391 (prog && prog->expected_attach_type == BPF_SK_REUSEPORT_SELECT_OR_MIGRATE)) { in reuseport_stop_listen_sock() 547 if (!prog || prog->expected_attach_type != BPF_SK_REUSEPORT_SELECT_OR_MIGRATE) { in reuseport_migrate_sock()
|
/linux/kernel/trace/ |
A D | bpf_trace.c | 930 prog->expected_attach_type == BPF_TRACE_ITER) in BTF_ID() 1621 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 1625 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 1629 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 1636 if (!fn && prog->expected_attach_type == BPF_TRACE_ITER) in tracing_prog_func_proto()
|
/linux/net/ipv4/ |
A D | bpf_tcp_ca.c | 168 midx = prog->expected_attach_type; in prog_ops_moff()
|