| /tools/bpf/bpftool/ |
| D | cgroup.c | 285 __u32 attach_flags; in show_attached_bpf_progs() local 287 attach_flags = prog_attach_flags[iter] ?: p.attach_flags; in show_attached_bpf_progs() 289 switch (attach_flags) { in show_attached_bpf_progs() 300 snprintf(buf, sizeof(buf), "unknown(%x)", attach_flags); in show_attached_bpf_progs() 548 int attach_flags = 0; in do_attach() local 577 attach_flags |= BPF_F_ALLOW_MULTI; in do_attach() 579 attach_flags |= BPF_F_ALLOW_OVERRIDE; in do_attach() 586 if (bpf_prog_attach(prog_fd, cgroup_fd, attach_type, attach_flags)) { in do_attach()
|
| D | net.c | 586 __u32 attach_flags; in query_flow_dissector() local 600 &attach_flags, prog_ids, &prog_cnt); in query_flow_dissector()
|
| /tools/testing/selftests/bpf/prog_tests/ |
| D | cgroup_attach_multi.c | 79 __u32 prog_ids[4], prog_cnt = 0, attach_flags, saved_prog_id; in serial_test_cgroup_attach_multi() local 160 BPF_F_QUERY_EFFECTIVE, &attach_flags, in serial_test_cgroup_attach_multi() 163 CHECK_FAIL(attach_flags != 0); in serial_test_cgroup_attach_multi() 169 BPF_F_QUERY_EFFECTIVE, &attach_flags, in serial_test_cgroup_attach_multi() 274 BPF_F_QUERY_EFFECTIVE, &attach_flags, in serial_test_cgroup_attach_multi() 277 CHECK_FAIL(attach_flags != 0); in serial_test_cgroup_attach_multi()
|
| D | tc_helpers.h | 54 __u32 count = 0, attach_flags = 0; in __assert_mprog_count() local 57 err = bpf_prog_query(ifindex, target, 0, &attach_flags, in __assert_mprog_count()
|
| D | cgroup_attach_autodetach.c | 26 __u32 duration = 0, prog_cnt = 4, attach_flags; in serial_test_cgroup_attach_autodetach() local 59 if (CHECK(bpf_prog_query(cg, BPF_CGROUP_INET_EGRESS, 0, &attach_flags, in serial_test_cgroup_attach_autodetach()
|
| D | cgroup_link.c | 41 __u32 prog_ids[ARRAY_SIZE(cgs)], prog_cnt = 0, attach_flags, prog_id; in serial_test_cgroup_link() local 76 0, &attach_flags, NULL, &prog_cnt); in serial_test_cgroup_link() 78 CHECK_FAIL(attach_flags != BPF_F_ALLOW_MULTI); in serial_test_cgroup_link()
|
| D | unpriv_bpf_disabled.c | 157 __u32 attach_flags = 0; in test_unpriv_bpf_disabled_negative() local 204 ASSERT_EQ(bpf_prog_query(prog_fd, BPF_TRACE_FENTRY, 0, &attach_flags, prog_ids, in test_unpriv_bpf_disabled_negative()
|
| D | sockmap_basic.c | 412 __u32 attach_flags = 0; in test_sockmap_progs_query() local 428 &attach_flags, prog_ids, &prog_cnt); in test_sockmap_progs_query() 430 ASSERT_EQ(attach_flags, 0, "wrong attach_flags on query"); in test_sockmap_progs_query() 439 &attach_flags, prog_ids, &prog_cnt); in test_sockmap_progs_query() 441 ASSERT_EQ(attach_flags, 0, "wrong attach_flags on query"); in test_sockmap_progs_query()
|
| D | sk_lookup.c | 459 __u32 attach_flags = 0; in query_lookup_prog() local 483 &attach_flags, prog_ids, &prog_cnt); in query_lookup_prog() 490 if (CHECK(attach_flags != 0, "bpf_prog_query", in query_lookup_prog() 491 "wrong attach_flags on query: %u", attach_flags)) in query_lookup_prog()
|
| D | tc_opts.c | 2567 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target() 2585 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target() 2614 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target() 2643 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target() 2671 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target() 2699 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target() 2713 attr.query.attach_flags = 0; in test_tc_opts_query_target() 2720 attr.query.attach_flags = 1; in test_tc_opts_query_target()
|
| /tools/lib/bpf/ |
| D | bpf.c | 666 attr.attach_flags = flags | BPF_F_ID; in bpf_prog_attach_opts() 669 attr.attach_flags = flags; in bpf_prog_attach_opts() 703 attr.attach_flags = flags | BPF_F_ID; in bpf_prog_detach_opts() 706 attr.attach_flags = flags; in bpf_prog_detach_opts() 952 OPTS_SET(opts, attach_flags, attr.query.attach_flags); in bpf_prog_query_opts() 960 __u32 *attach_flags, __u32 *prog_ids, __u32 *prog_cnt) in bpf_prog_query() argument 971 if (attach_flags) in bpf_prog_query() 972 *attach_flags = opts.attach_flags; in bpf_prog_query()
|
| D | bpf.h | 588 __u32 attach_flags; /* output argument */ member 617 __u32 query_flags, __u32 *attach_flags,
|
| /tools/include/uapi/linux/ |
| D | bpf.h | 1598 __u32 attach_flags; member 1656 __u32 attach_flags; member
|