Lines Matching refs:opts

107 	LIBBPF_OPTS(bpf_prog_load_opts, opts,
118 opts.expected_attach_type = BPF_CGROUP_INET4_CONNECT;
121 opts.expected_attach_type = BPF_CGROUP_GETSOCKOPT;
124 opts.expected_attach_type = BPF_SK_LOOKUP;
127 opts.kern_version = get_kernel_version();
130 opts.expected_attach_type = BPF_LIRC_MODE2;
134 opts.log_buf = buf;
135 opts.log_size = sizeof(buf);
136 opts.log_level = 1;
138 opts.expected_attach_type = BPF_TRACE_FENTRY;
140 opts.expected_attach_type = BPF_MODIFY_RETURN;
141 opts.attach_btf_id = 1;
147 opts.log_buf = buf;
148 opts.log_size = sizeof(buf);
149 opts.log_level = 1;
150 opts.attach_btf_id = 1;
156 opts.prog_flags = BPF_F_SLEEPABLE;
185 opts.expected_attach_type = BPF_NETFILTER;
191 fd = bpf_prog_load(prog_type, NULL, "GPL", insns, insns_cnt, &opts);
205 int libbpf_probe_bpf_prog_type(enum bpf_prog_type prog_type, const void *opts)
214 if (opts)
233 LIBBPF_OPTS(bpf_btf_load_opts, opts,
249 btf_fd = bpf_btf_load(raw_btf, btf_len, &opts);
284 LIBBPF_OPTS(bpf_map_create_opts, opts);
300 opts.map_flags = BPF_F_NO_PREALLOC;
320 opts.map_flags = BPF_F_NO_PREALLOC;
333 opts.btf_vmlinux_value_type_id = 1;
334 opts.value_type_btf_obj_fd = -1;
345 opts.map_extra = 0; /* can mmap() at any address */
346 opts.map_flags = BPF_F_MMAPABLE;
379 opts.inner_map_fd = fd_inner;
383 opts.btf_fd = btf_fd;
384 opts.btf_key_type_id = btf_key_type_id;
385 opts.btf_value_type_id = btf_value_type_id;
388 fd = bpf_map_create(map_type, NULL, key_size, value_size, max_entries, &opts);
405 int libbpf_probe_bpf_map_type(enum bpf_map_type map_type, const void *opts)
409 if (opts)
417 const void *opts)
427 if (opts)