/kernel/linux/linux-5.10/tools/testing/selftests/bpf/prog_tests/ |
D | sockopt.c | 22 enum bpf_attach_type expected_attach_type; member 49 .expected_attach_type = 0, 61 .expected_attach_type = BPF_CGROUP_SETSOCKOPT, 72 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 93 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 117 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 143 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 159 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 186 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 204 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, [all …]
|
D | section_names.c | 12 enum bpf_attach_type expected_attach_type; member 165 enum bpf_attach_type expected_attach_type; in test_prog_type_by_name() local 170 &expected_attach_type); in test_prog_type_by_name() 182 CHECK(expected_attach_type != test->expected_load.expected_attach_type, in test_prog_type_by_name() 184 expected_attach_type, test->sec_name); in test_prog_type_by_name()
|
D | fexit_stress.c | 28 .expected_attach_type = BPF_TRACE_FEXIT, in test_fexit_stress() 44 load_attr.expected_attach_type); in test_fexit_stress()
|
D | tcp_rtt.c | 97 .expected_attach_type = BPF_CGROUP_SOCK_OPS, in run_test()
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/verifier/ |
D | ctx.c | 103 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, 116 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, 129 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, 143 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, 157 .expected_attach_type = BPF_CGROUP_INET4_CONNECT, 170 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND, 182 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND, 195 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
|
D | ctx_sk_lookup.c | 241 .expected_attach_type = BPF_SK_LOOKUP, 255 .expected_attach_type = BPF_SK_LOOKUP, 268 .expected_attach_type = BPF_SK_LOOKUP, 281 .expected_attach_type = BPF_SK_LOOKUP, 294 .expected_attach_type = BPF_SK_LOOKUP, 307 .expected_attach_type = BPF_SK_LOOKUP, 320 .expected_attach_type = BPF_SK_LOOKUP, 333 .expected_attach_type = BPF_SK_LOOKUP, 346 .expected_attach_type = BPF_SK_LOOKUP, 360 .expected_attach_type = BPF_SK_LOOKUP, [all …]
|
D | d_path.c | 16 .expected_attach_type = BPF_TRACE_FENTRY, 35 .expected_attach_type = BPF_TRACE_FENTRY,
|
D | wide_access.c | 12 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \ 49 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
|
D | event_output.c | 115 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/ |
D | test_stub.c | 18 attr.expected_attach_type = 0; in bpf_prog_test_load() 34 load_attr.expected_attach_type = 0; in bpf_test_load_program()
|
D | test_sock.c | 30 enum bpf_attach_type expected_attach_type; member 336 attr.expected_attach_type = attach_type; in load_sock_prog() 405 progfd = load_sock_prog(test->insns, test->expected_attach_type); in run_test_case()
|
D | test_sock_addr.c | 64 enum bpf_attach_type expected_attach_type; member 649 load_attr.expected_attach_type = test->expected_attach_type; in load_insns() 856 attr.expected_attach_type = test->expected_attach_type; in load_path()
|
D | test_verifier.c | 117 enum bpf_attach_type expected_attach_type; member 986 attr.expected_attach_type = test->expected_attach_type; in do_test_single() 1000 attr.expected_attach_type); in do_test_single()
|
/kernel/linux/linux-5.10/tools/lib/bpf/ |
D | libbpf_probes.c | 76 xattr.expected_attach_type = BPF_CGROUP_INET4_CONNECT; in probe_load() 79 xattr.expected_attach_type = BPF_CGROUP_GETSOCKOPT; in probe_load() 82 xattr.expected_attach_type = BPF_SK_LOOKUP; in probe_load()
|
D | libbpf.c | 208 enum bpf_attach_type expected_attach_type; member 277 enum bpf_attach_type expected_attach_type; member 887 prog->expected_attach_type = kern_member_idx; in bpf_map__init_kern_struct_ops() 3930 attr.expected_attach_type = BPF_CGROUP_INET_SOCK_CREATE; in probe_kern_exp_attach_type() 6700 load_attr.expected_attach_type = 0; in load_program() 6702 load_attr.expected_attach_type = prog->expected_attach_type; in load_program() 6792 load_attr.expected_attach_type = 0; in load_program() 6993 prog->sec_def->expected_attach_type); in __bpf_object__open() 8248 return prog->expected_attach_type; in bpf_program__get_expected_attach_type() 8254 prog->expected_attach_type = type; in bpf_program__set_expected_attach_type() [all …]
|
D | bpf.c | 234 attr.expected_attach_type = load_attr->expected_attach_type; in bpf_load_program_xattr() 338 load_attr.expected_attach_type = 0; in bpf_load_program()
|
D | bpf.h | 76 enum bpf_attach_type expected_attach_type; member
|
D | libbpf.h | 172 enum bpf_attach_type *expected_attach_type); 488 enum bpf_attach_type expected_attach_type; member
|
/kernel/linux/linux-5.10/kernel/bpf/ |
D | syscall.c | 1976 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type() 1977 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type() 1985 enum bpf_attach_type expected_attach_type, in bpf_prog_load_check_attach() argument 2009 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2019 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2037 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2045 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2053 if (expected_attach_type == BPF_SK_LOOKUP) in bpf_prog_load_check_attach() 2057 if (expected_attach_type) in bpf_prog_load_check_attach() 2163 if (bpf_prog_load_check_attach(type, attr->expected_attach_type, in bpf_prog_load() [all …]
|
D | bpf_iter.c | 379 link->prog->expected_attach_type != new_prog->expected_attach_type || in bpf_iter_link_replace()
|
D | verifier.c | 4707 enum bpf_attach_type eatype = env->prog->expected_attach_type; in may_update_sockmap() 8396 if (env->prog->expected_attach_type == BPF_CGROUP_UDP4_RECVMSG || in check_return_code() 8397 env->prog->expected_attach_type == BPF_CGROUP_UDP6_RECVMSG || in check_return_code() 8398 env->prog->expected_attach_type == BPF_CGROUP_INET4_GETPEERNAME || in check_return_code() 8399 env->prog->expected_attach_type == BPF_CGROUP_INET6_GETPEERNAME || in check_return_code() 8400 env->prog->expected_attach_type == BPF_CGROUP_INET4_GETSOCKNAME || in check_return_code() 8401 env->prog->expected_attach_type == BPF_CGROUP_INET6_GETSOCKNAME) in check_return_code() 8405 if (env->prog->expected_attach_type == BPF_CGROUP_INET_EGRESS) { in check_return_code() 8422 switch (env->prog->expected_attach_type) { in check_return_code() 11954 member_idx = prog->expected_attach_type; in check_struct_ops_btf_id() [all …]
|
D | cgroup.c | 1800 return prog->expected_attach_type == in cg_sockopt_is_valid_access() 1807 return prog->expected_attach_type == in cg_sockopt_is_valid_access() 1835 return prog->expected_attach_type == BPF_CGROUP_GETSOCKOPT; in cg_sockopt_is_valid_access()
|
/kernel/linux/linux-5.10/tools/bpf/bpftool/ |
D | prog.c | 1344 enum bpf_attach_type *expected_attach_type) in get_prog_type_by_name() argument 1349 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); in get_prog_type_by_name() 1355 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); in get_prog_type_by_name() 1368 enum bpf_attach_type expected_attach_type; in load_with_options() local 1411 &expected_attach_type); in load_with_options() 1511 &expected_attach_type); in load_with_options() 1518 bpf_program__set_expected_attach_type(pos, expected_attach_type); in load_with_options()
|
/kernel/linux/linux-5.10/net/bpf/ |
D | test_run.c | 215 switch (prog->expected_attach_type) { in bpf_prog_test_run_tracing() 638 if (prog->expected_attach_type == BPF_XDP_DEVMAP || in bpf_prog_test_run_xdp() 639 prog->expected_attach_type == BPF_XDP_CPUMAP) in bpf_prog_test_run_xdp()
|
/kernel/linux/linux-5.10/samples/bpf/ |
D | hbm.c | 128 .expected_attach_type = BPF_CGROUP_INET_EGRESS, in prog_load()
|