Home
last modified time | relevance | path

Searched refs:expected_attach_type (Results 1 – 10 of 10) sorted by relevance

/kernel/bpf/
Dsyscall.c2031 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type()
2032 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type()
2036 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type()
2037 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type()
2045 enum bpf_attach_type expected_attach_type, in bpf_prog_load_check_attach() argument
2076 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2086 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2104 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2112 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2120 if (expected_attach_type == BPF_SK_LOOKUP) in bpf_prog_load_check_attach()
[all …]
Dcgroup.c1979 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) in cg_sockopt_func_proto()
1983 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) in cg_sockopt_func_proto()
2014 return prog->expected_attach_type == in cg_sockopt_is_valid_access()
2021 return prog->expected_attach_type == in cg_sockopt_is_valid_access()
2049 return prog->expected_attach_type == BPF_CGROUP_GETSOCKOPT; in cg_sockopt_is_valid_access()
Dbpf_iter.c415 link->prog->expected_attach_type != new_prog->expected_attach_type || in bpf_iter_link_replace()
Dverifier.c5531 enum bpf_attach_type eatype = env->prog->expected_attach_type; in may_update_sockmap()
6425 enum bpf_attach_type eatype = env->prog->expected_attach_type; in check_get_func_ip()
9621 if (env->prog->expected_attach_type == BPF_CGROUP_UDP4_RECVMSG || in check_return_code()
9622 env->prog->expected_attach_type == BPF_CGROUP_UDP6_RECVMSG || in check_return_code()
9623 env->prog->expected_attach_type == BPF_CGROUP_INET4_GETPEERNAME || in check_return_code()
9624 env->prog->expected_attach_type == BPF_CGROUP_INET6_GETPEERNAME || in check_return_code()
9625 env->prog->expected_attach_type == BPF_CGROUP_INET4_GETSOCKNAME || in check_return_code()
9626 env->prog->expected_attach_type == BPF_CGROUP_INET6_GETSOCKNAME) in check_return_code()
9628 if (env->prog->expected_attach_type == BPF_CGROUP_INET4_BIND || in check_return_code()
9629 env->prog->expected_attach_type == BPF_CGROUP_INET6_BIND) in check_return_code()
[all …]
Dbpf_struct_ops.c428 prog->expected_attach_type != i) { in bpf_struct_ops_map_update_elem()
Dtrampoline.c393 switch (prog->expected_attach_type) { in bpf_attach_type_to_tramp()
Dcpumap.c416 if (prog->expected_attach_type != BPF_XDP_CPUMAP) { in __cpu_map_load_bpf_program()
Ddevmap.c871 if (prog->expected_attach_type != BPF_XDP_DEVMAP) in __dev_map_alloc_node()
Dbtf.c4763 switch (prog->expected_attach_type) { in btf_ctx_access()
/kernel/trace/
Dbpf_trace.c902 prog->expected_attach_type == BPF_TRACE_ITER) in BTF_ID()
1555 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
1559 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
1563 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
1570 if (!fn && prog->expected_attach_type == BPF_TRACE_ITER) in tracing_prog_func_proto()