Home
last modified time | relevance | path

Searched refs:expected_attach_type (Results 1 – 25 of 41) sorted by relevance

12

/linux-5.19.10/tools/testing/selftests/bpf/prog_tests/
Dsockopt.c22 enum bpf_attach_type expected_attach_type; member
49 .expected_attach_type = 0,
61 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
72 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
93 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
117 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
143 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
159 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
186 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
204 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
[all …]
Dsection_names.c12 enum bpf_attach_type expected_attach_type; member
165 enum bpf_attach_type expected_attach_type; in test_prog_type_by_name() local
170 &expected_attach_type); in test_prog_type_by_name()
182 CHECK(expected_attach_type != test->expected_load.expected_attach_type, in test_prog_type_by_name()
184 expected_attach_type, test->sec_name); in test_prog_type_by_name()
Dfexit_stress.c20 .expected_attach_type = BPF_TRACE_FEXIT, in serial_test_fexit_stress()
26 trace_opts.expected_attach_type); in serial_test_fexit_stress()
/linux-5.19.10/tools/testing/selftests/bpf/
Dtest_sock.c29 enum bpf_attach_type expected_attach_type; member
59 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
72 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
85 .expected_attach_type = BPF_CGROUP_INET6_POST_BIND,
98 .expected_attach_type = BPF_CGROUP_INET_SOCK_CREATE,
108 .expected_attach_type = 0,
122 .expected_attach_type = BPF_CGROUP_INET_SOCK_CREATE,
136 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
146 .expected_attach_type = BPF_CGROUP_INET6_POST_BIND,
156 .expected_attach_type = 0,
[all …]
Dtest_sock_addr.c67 enum bpf_attach_type expected_attach_type; member
650 opts.expected_attach_type = test->expected_attach_type; in load_insns()
681 bpf_program__set_expected_attach_type(prog, test->expected_attach_type); in load_path()
Dtest_verifier.c136 enum bpf_attach_type expected_attach_type; member
1176 opts.expected_attach_type = test->expected_attach_type; in do_test_single()
1189 opts.expected_attach_type); in do_test_single()
/linux-5.19.10/tools/testing/selftests/bpf/verifier/
Dctx.c102 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG,
115 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG,
128 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG,
142 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG,
156 .expected_attach_type = BPF_CGROUP_INET4_CONNECT,
169 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
181 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
194 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
Dctx_sk_lookup.c259 .expected_attach_type = BPF_SK_LOOKUP,
274 .expected_attach_type = BPF_SK_LOOKUP,
287 .expected_attach_type = BPF_SK_LOOKUP,
301 .expected_attach_type = BPF_SK_LOOKUP,
314 .expected_attach_type = BPF_SK_LOOKUP,
328 .expected_attach_type = BPF_SK_LOOKUP,
342 .expected_attach_type = BPF_SK_LOOKUP,
355 .expected_attach_type = BPF_SK_LOOKUP,
369 .expected_attach_type = BPF_SK_LOOKUP,
383 .expected_attach_type = BPF_SK_LOOKUP,
[all …]
Dd_path.c16 .expected_attach_type = BPF_TRACE_FENTRY,
35 .expected_attach_type = BPF_TRACE_FENTRY,
Dwide_access.c12 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
54 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
Dbtf_ctx_access.c10 .expected_attach_type = BPF_TRACE_FENTRY,
Devent_output.c115 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
Datomic_fetch_add.c102 .expected_attach_type = BPF_TRACE_FENTRY,
Dbpf_get_stack.c83 .expected_attach_type = BPF_TRACE_ITER,
/linux-5.19.10/tools/lib/bpf/
Dlibbpf_probes.c68 opts.expected_attach_type = BPF_CGROUP_INET4_CONNECT; in probe_prog_load()
71 opts.expected_attach_type = BPF_CGROUP_GETSOCKOPT; in probe_prog_load()
74 opts.expected_attach_type = BPF_SK_LOOKUP; in probe_prog_load()
80 opts.expected_attach_type = BPF_LIRC_MODE2; in probe_prog_load()
88 opts.expected_attach_type = BPF_TRACE_FENTRY; in probe_prog_load()
90 opts.expected_attach_type = BPF_MODIFY_RETURN; in probe_prog_load()
Dbpf.h73 enum bpf_attach_type expected_attach_type; member
131 enum bpf_attach_type expected_attach_type; member
Dbpf.c264 attr.expected_attach_type = OPTS_GET(opts, expected_attach_type, 0); in bpf_prog_load_v0_6_0()
399 p.expected_attach_type = load_attr->expected_attach_type; in bpf_load_program_xattr2()
439 load_attr.expected_attach_type = 0; in bpf_load_program()
/linux-5.19.10/kernel/bpf/
Dsyscall.c2271 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type()
2272 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type()
2276 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type()
2277 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type()
2285 enum bpf_attach_type expected_attach_type, in bpf_prog_load_check_attach() argument
2316 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2326 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2344 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2352 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2360 if (expected_attach_type == BPF_SK_LOOKUP) in bpf_prog_load_check_attach()
[all …]
Dtrampoline.c32 enum bpf_attach_type eatype = prog->expected_attach_type; in bpf_prog_has_trampoline()
393 switch (prog->expected_attach_type) { in bpf_attach_type_to_tramp()
Dcgroup.c2043 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) in cg_sockopt_func_proto()
2047 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) in cg_sockopt_func_proto()
2078 return prog->expected_attach_type == in cg_sockopt_is_valid_access()
2085 return prog->expected_attach_type == in cg_sockopt_is_valid_access()
2113 return prog->expected_attach_type == BPF_CGROUP_GETSOCKOPT; in cg_sockopt_is_valid_access()
/linux-5.19.10/tools/bpf/bpftool/
Dprog.c1453 enum bpf_attach_type *expected_attach_type) in get_prog_type_by_name() argument
1458 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); in get_prog_type_by_name()
1464 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); in get_prog_type_by_name()
1476 enum bpf_attach_type expected_attach_type; in load_with_options() local
1507 &expected_attach_type); in load_with_options()
1521 &expected_attach_type); in load_with_options()
1624 &expected_attach_type); in load_with_options()
1631 bpf_program__set_expected_attach_type(pos, expected_attach_type); in load_with_options()
/linux-5.19.10/kernel/trace/
Dbpf_trace.c934 prog->expected_attach_type == BPF_TRACE_ITER) in BTF_ID()
1327 return prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI ? in kprobe_prog_func_proto()
1331 return prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI ? in kprobe_prog_func_proto()
1722 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
1726 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
1730 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
1745 if (!fn && prog->expected_attach_type == BPF_TRACE_ITER) in tracing_prog_func_proto()
2472 if (prog->expected_attach_type != BPF_TRACE_KPROBE_MULTI) in bpf_kprobe_multi_link_attach()
/linux-5.19.10/net/bpf/
Dbpf_dummy_struct_ops.c120 op_idx = prog->expected_attach_type; in bpf_struct_ops_test_run()
/linux-5.19.10/net/core/
Dsock_reuseport.c391 (prog && prog->expected_attach_type == BPF_SK_REUSEPORT_SELECT_OR_MIGRATE)) { in reuseport_stop_listen_sock()
547 if (!prog || prog->expected_attach_type != BPF_SK_REUSEPORT_SELECT_OR_MIGRATE) { in reuseport_migrate_sock()
/linux-5.19.10/net/ipv4/
Dbpf_tcp_ca.c171 midx = prog->expected_attach_type; in prog_ops_moff()

12