Home
last modified time | relevance | path

Searched refs:expected_attach_type (Results 1 – 25 of 39) sorted by relevance

12

/kernel/linux/linux-5.10/tools/testing/selftests/bpf/prog_tests/
Dsockopt.c22 enum bpf_attach_type expected_attach_type; member
49 .expected_attach_type = 0,
61 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
72 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
93 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
117 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
143 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
159 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
186 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
204 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
[all …]
Dsection_names.c12 enum bpf_attach_type expected_attach_type; member
165 enum bpf_attach_type expected_attach_type; in test_prog_type_by_name() local
170 &expected_attach_type); in test_prog_type_by_name()
182 CHECK(expected_attach_type != test->expected_load.expected_attach_type, in test_prog_type_by_name()
184 expected_attach_type, test->sec_name); in test_prog_type_by_name()
Dfexit_stress.c28 .expected_attach_type = BPF_TRACE_FEXIT, in test_fexit_stress()
44 load_attr.expected_attach_type); in test_fexit_stress()
Dtcp_rtt.c97 .expected_attach_type = BPF_CGROUP_SOCK_OPS, in run_test()
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/verifier/
Dctx.c103 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG,
116 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG,
129 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG,
143 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG,
157 .expected_attach_type = BPF_CGROUP_INET4_CONNECT,
170 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
182 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
195 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
Dctx_sk_lookup.c241 .expected_attach_type = BPF_SK_LOOKUP,
255 .expected_attach_type = BPF_SK_LOOKUP,
268 .expected_attach_type = BPF_SK_LOOKUP,
281 .expected_attach_type = BPF_SK_LOOKUP,
294 .expected_attach_type = BPF_SK_LOOKUP,
307 .expected_attach_type = BPF_SK_LOOKUP,
320 .expected_attach_type = BPF_SK_LOOKUP,
333 .expected_attach_type = BPF_SK_LOOKUP,
346 .expected_attach_type = BPF_SK_LOOKUP,
360 .expected_attach_type = BPF_SK_LOOKUP,
[all …]
Dd_path.c16 .expected_attach_type = BPF_TRACE_FENTRY,
35 .expected_attach_type = BPF_TRACE_FENTRY,
Dwide_access.c12 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
49 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
Devent_output.c115 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/
Dtest_stub.c18 attr.expected_attach_type = 0; in bpf_prog_test_load()
34 load_attr.expected_attach_type = 0; in bpf_test_load_program()
Dtest_sock.c30 enum bpf_attach_type expected_attach_type; member
336 attr.expected_attach_type = attach_type; in load_sock_prog()
405 progfd = load_sock_prog(test->insns, test->expected_attach_type); in run_test_case()
Dtest_sock_addr.c64 enum bpf_attach_type expected_attach_type; member
649 load_attr.expected_attach_type = test->expected_attach_type; in load_insns()
856 attr.expected_attach_type = test->expected_attach_type; in load_path()
Dtest_verifier.c117 enum bpf_attach_type expected_attach_type; member
986 attr.expected_attach_type = test->expected_attach_type; in do_test_single()
1000 attr.expected_attach_type); in do_test_single()
/kernel/linux/linux-5.10/tools/lib/bpf/
Dlibbpf_probes.c76 xattr.expected_attach_type = BPF_CGROUP_INET4_CONNECT; in probe_load()
79 xattr.expected_attach_type = BPF_CGROUP_GETSOCKOPT; in probe_load()
82 xattr.expected_attach_type = BPF_SK_LOOKUP; in probe_load()
Dlibbpf.c208 enum bpf_attach_type expected_attach_type; member
277 enum bpf_attach_type expected_attach_type; member
887 prog->expected_attach_type = kern_member_idx; in bpf_map__init_kern_struct_ops()
3935 attr.expected_attach_type = BPF_CGROUP_INET_SOCK_CREATE; in probe_kern_exp_attach_type()
6713 load_attr.expected_attach_type = 0; in load_program()
6715 load_attr.expected_attach_type = prog->expected_attach_type; in load_program()
6805 load_attr.expected_attach_type = 0; in load_program()
7006 prog->sec_def->expected_attach_type); in __bpf_object__open()
8261 return prog->expected_attach_type; in bpf_program__get_expected_attach_type()
8267 prog->expected_attach_type = type; in bpf_program__set_expected_attach_type()
[all …]
Dbpf.c234 attr.expected_attach_type = load_attr->expected_attach_type; in bpf_load_program_xattr()
338 load_attr.expected_attach_type = 0; in bpf_load_program()
Dlibbpf.h172 enum bpf_attach_type *expected_attach_type);
488 enum bpf_attach_type expected_attach_type; member
Dbpf.h76 enum bpf_attach_type expected_attach_type; member
/kernel/linux/linux-5.10/kernel/bpf/
Dsyscall.c1979 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type()
1980 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type()
1988 enum bpf_attach_type expected_attach_type, in bpf_prog_load_check_attach() argument
2012 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2022 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2040 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2048 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2056 if (expected_attach_type == BPF_SK_LOOKUP) in bpf_prog_load_check_attach()
2060 if (expected_attach_type) in bpf_prog_load_check_attach()
2166 if (bpf_prog_load_check_attach(type, attr->expected_attach_type, in bpf_prog_load()
[all …]
Dbpf_iter.c379 link->prog->expected_attach_type != new_prog->expected_attach_type || in bpf_iter_link_replace()
Dverifier.c4739 enum bpf_attach_type eatype = env->prog->expected_attach_type; in may_update_sockmap()
8427 if (env->prog->expected_attach_type == BPF_CGROUP_UDP4_RECVMSG || in check_return_code()
8428 env->prog->expected_attach_type == BPF_CGROUP_UDP6_RECVMSG || in check_return_code()
8429 env->prog->expected_attach_type == BPF_CGROUP_INET4_GETPEERNAME || in check_return_code()
8430 env->prog->expected_attach_type == BPF_CGROUP_INET6_GETPEERNAME || in check_return_code()
8431 env->prog->expected_attach_type == BPF_CGROUP_INET4_GETSOCKNAME || in check_return_code()
8432 env->prog->expected_attach_type == BPF_CGROUP_INET6_GETSOCKNAME) in check_return_code()
8436 if (env->prog->expected_attach_type == BPF_CGROUP_INET_EGRESS) { in check_return_code()
8453 switch (env->prog->expected_attach_type) { in check_return_code()
11985 member_idx = prog->expected_attach_type; in check_struct_ops_btf_id()
[all …]
Dcgroup.c1852 return prog->expected_attach_type == in cg_sockopt_is_valid_access()
1859 return prog->expected_attach_type == in cg_sockopt_is_valid_access()
1887 return prog->expected_attach_type == BPF_CGROUP_GETSOCKOPT; in cg_sockopt_is_valid_access()
/kernel/linux/linux-5.10/tools/bpf/bpftool/
Dprog.c1344 enum bpf_attach_type *expected_attach_type) in get_prog_type_by_name() argument
1349 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); in get_prog_type_by_name()
1355 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); in get_prog_type_by_name()
1368 enum bpf_attach_type expected_attach_type; in load_with_options() local
1411 &expected_attach_type); in load_with_options()
1511 &expected_attach_type); in load_with_options()
1518 bpf_program__set_expected_attach_type(pos, expected_attach_type); in load_with_options()
/kernel/linux/linux-5.10/net/bpf/
Dtest_run.c216 switch (prog->expected_attach_type) { in bpf_prog_test_run_tracing()
639 if (prog->expected_attach_type == BPF_XDP_DEVMAP || in bpf_prog_test_run_xdp()
640 prog->expected_attach_type == BPF_XDP_CPUMAP) in bpf_prog_test_run_xdp()
/kernel/linux/linux-5.10/samples/bpf/
Dhbm.c128 .expected_attach_type = BPF_CGROUP_INET_EGRESS, in prog_load()

12