/linux-5.19.10/tools/testing/selftests/bpf/prog_tests/ |
D | sockopt.c | 22 enum bpf_attach_type expected_attach_type; member 49 .expected_attach_type = 0, 61 .expected_attach_type = BPF_CGROUP_SETSOCKOPT, 72 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 93 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 117 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 143 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 159 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 186 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 204 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, [all …]
|
D | section_names.c | 12 enum bpf_attach_type expected_attach_type; member 165 enum bpf_attach_type expected_attach_type; in test_prog_type_by_name() local 170 &expected_attach_type); in test_prog_type_by_name() 182 CHECK(expected_attach_type != test->expected_load.expected_attach_type, in test_prog_type_by_name() 184 expected_attach_type, test->sec_name); in test_prog_type_by_name()
|
D | fexit_stress.c | 20 .expected_attach_type = BPF_TRACE_FEXIT, in serial_test_fexit_stress() 26 trace_opts.expected_attach_type); in serial_test_fexit_stress()
|
/linux-5.19.10/tools/testing/selftests/bpf/ |
D | test_sock.c | 29 enum bpf_attach_type expected_attach_type; member 59 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND, 72 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND, 85 .expected_attach_type = BPF_CGROUP_INET6_POST_BIND, 98 .expected_attach_type = BPF_CGROUP_INET_SOCK_CREATE, 108 .expected_attach_type = 0, 122 .expected_attach_type = BPF_CGROUP_INET_SOCK_CREATE, 136 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND, 146 .expected_attach_type = BPF_CGROUP_INET6_POST_BIND, 156 .expected_attach_type = 0, [all …]
|
D | test_sock_addr.c | 67 enum bpf_attach_type expected_attach_type; member 650 opts.expected_attach_type = test->expected_attach_type; in load_insns() 681 bpf_program__set_expected_attach_type(prog, test->expected_attach_type); in load_path()
|
D | test_verifier.c | 136 enum bpf_attach_type expected_attach_type; member 1176 opts.expected_attach_type = test->expected_attach_type; in do_test_single() 1189 opts.expected_attach_type); in do_test_single()
|
/linux-5.19.10/tools/testing/selftests/bpf/verifier/ |
D | ctx.c | 102 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, 115 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, 128 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, 142 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, 156 .expected_attach_type = BPF_CGROUP_INET4_CONNECT, 169 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND, 181 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND, 194 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
|
D | ctx_sk_lookup.c | 259 .expected_attach_type = BPF_SK_LOOKUP, 274 .expected_attach_type = BPF_SK_LOOKUP, 287 .expected_attach_type = BPF_SK_LOOKUP, 301 .expected_attach_type = BPF_SK_LOOKUP, 314 .expected_attach_type = BPF_SK_LOOKUP, 328 .expected_attach_type = BPF_SK_LOOKUP, 342 .expected_attach_type = BPF_SK_LOOKUP, 355 .expected_attach_type = BPF_SK_LOOKUP, 369 .expected_attach_type = BPF_SK_LOOKUP, 383 .expected_attach_type = BPF_SK_LOOKUP, [all …]
|
D | d_path.c | 16 .expected_attach_type = BPF_TRACE_FENTRY, 35 .expected_attach_type = BPF_TRACE_FENTRY,
|
D | wide_access.c | 12 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \ 54 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
|
D | btf_ctx_access.c | 10 .expected_attach_type = BPF_TRACE_FENTRY,
|
D | event_output.c | 115 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
|
D | atomic_fetch_add.c | 102 .expected_attach_type = BPF_TRACE_FENTRY,
|
D | bpf_get_stack.c | 83 .expected_attach_type = BPF_TRACE_ITER,
|
/linux-5.19.10/tools/lib/bpf/ |
D | libbpf_probes.c | 68 opts.expected_attach_type = BPF_CGROUP_INET4_CONNECT; in probe_prog_load() 71 opts.expected_attach_type = BPF_CGROUP_GETSOCKOPT; in probe_prog_load() 74 opts.expected_attach_type = BPF_SK_LOOKUP; in probe_prog_load() 80 opts.expected_attach_type = BPF_LIRC_MODE2; in probe_prog_load() 88 opts.expected_attach_type = BPF_TRACE_FENTRY; in probe_prog_load() 90 opts.expected_attach_type = BPF_MODIFY_RETURN; in probe_prog_load()
|
D | bpf.h | 73 enum bpf_attach_type expected_attach_type; member 131 enum bpf_attach_type expected_attach_type; member
|
D | bpf.c | 264 attr.expected_attach_type = OPTS_GET(opts, expected_attach_type, 0); in bpf_prog_load_v0_6_0() 399 p.expected_attach_type = load_attr->expected_attach_type; in bpf_load_program_xattr2() 439 load_attr.expected_attach_type = 0; in bpf_load_program()
|
/linux-5.19.10/kernel/bpf/ |
D | syscall.c | 2271 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type() 2272 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type() 2276 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type() 2277 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type() 2285 enum bpf_attach_type expected_attach_type, in bpf_prog_load_check_attach() argument 2316 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2326 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2344 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2352 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2360 if (expected_attach_type == BPF_SK_LOOKUP) in bpf_prog_load_check_attach() [all …]
|
D | trampoline.c | 32 enum bpf_attach_type eatype = prog->expected_attach_type; in bpf_prog_has_trampoline() 393 switch (prog->expected_attach_type) { in bpf_attach_type_to_tramp()
|
D | cgroup.c | 2043 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) in cg_sockopt_func_proto() 2047 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) in cg_sockopt_func_proto() 2078 return prog->expected_attach_type == in cg_sockopt_is_valid_access() 2085 return prog->expected_attach_type == in cg_sockopt_is_valid_access() 2113 return prog->expected_attach_type == BPF_CGROUP_GETSOCKOPT; in cg_sockopt_is_valid_access()
|
/linux-5.19.10/tools/bpf/bpftool/ |
D | prog.c | 1453 enum bpf_attach_type *expected_attach_type) in get_prog_type_by_name() argument 1458 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); in get_prog_type_by_name() 1464 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); in get_prog_type_by_name() 1476 enum bpf_attach_type expected_attach_type; in load_with_options() local 1507 &expected_attach_type); in load_with_options() 1521 &expected_attach_type); in load_with_options() 1624 &expected_attach_type); in load_with_options() 1631 bpf_program__set_expected_attach_type(pos, expected_attach_type); in load_with_options()
|
/linux-5.19.10/kernel/trace/ |
D | bpf_trace.c | 934 prog->expected_attach_type == BPF_TRACE_ITER) in BTF_ID() 1327 return prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI ? in kprobe_prog_func_proto() 1331 return prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI ? in kprobe_prog_func_proto() 1722 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 1726 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 1730 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 1745 if (!fn && prog->expected_attach_type == BPF_TRACE_ITER) in tracing_prog_func_proto() 2472 if (prog->expected_attach_type != BPF_TRACE_KPROBE_MULTI) in bpf_kprobe_multi_link_attach()
|
/linux-5.19.10/net/bpf/ |
D | bpf_dummy_struct_ops.c | 120 op_idx = prog->expected_attach_type; in bpf_struct_ops_test_run()
|
/linux-5.19.10/net/core/ |
D | sock_reuseport.c | 391 (prog && prog->expected_attach_type == BPF_SK_REUSEPORT_SELECT_OR_MIGRATE)) { in reuseport_stop_listen_sock() 547 if (!prog || prog->expected_attach_type != BPF_SK_REUSEPORT_SELECT_OR_MIGRATE) { in reuseport_migrate_sock()
|
/linux-5.19.10/net/ipv4/ |
D | bpf_tcp_ca.c | 171 midx = prog->expected_attach_type; in prog_ops_moff()
|