/linux-master/tools/testing/selftests/bpf/verifier/ |
H A D | sleepable.c | 8 .expected_attach_type = BPF_TRACE_FENTRY, 21 .expected_attach_type = BPF_TRACE_FENTRY, 34 .expected_attach_type = BPF_MODIFY_RETURN, 47 .expected_attach_type = BPF_TRACE_ITER, 61 .expected_attach_type = BPF_LSM_MAC, 85 .expected_attach_type = BPF_TRACE_RAW_TP,
|
H A D | bpf_st_mem.c | 13 .expected_attach_type = BPF_SK_LOOKUP, 35 .expected_attach_type = BPF_SK_LOOKUP, 65 .expected_attach_type = BPF_SK_LOOKUP, 93 .expected_attach_type = BPF_SK_LOOKUP,
|
H A D | ctx_sk_lookup.c | 259 .expected_attach_type = BPF_SK_LOOKUP, 274 .expected_attach_type = BPF_SK_LOOKUP, 287 .expected_attach_type = BPF_SK_LOOKUP, 301 .expected_attach_type = BPF_SK_LOOKUP, 314 .expected_attach_type = BPF_SK_LOOKUP, 328 .expected_attach_type = BPF_SK_LOOKUP, 342 .expected_attach_type = BPF_SK_LOOKUP, 355 .expected_attach_type = BPF_SK_LOOKUP, 369 .expected_attach_type = BPF_SK_LOOKUP, 383 .expected_attach_type [all...] |
H A D | wide_access.c | 12 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \ 54 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
|
H A D | event_output.c | 115 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
|
H A D | atomic_fetch_add.c | 102 .expected_attach_type = BPF_TRACE_FENTRY,
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_sock.c | 29 enum bpf_attach_type expected_attach_type; member in struct:sock_test 59 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND, 72 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND, 85 .expected_attach_type = BPF_CGROUP_INET6_POST_BIND, 98 .expected_attach_type = BPF_CGROUP_INET_SOCK_CREATE, 103 .descr = "sock_create load w/o expected_attach_type (compat mode)", 108 .expected_attach_type = 0, 117 .descr = "sock_create load w/ expected_attach_type", 122 .expected_attach_type = BPF_CGROUP_INET_SOCK_CREATE, 136 .expected_attach_type [all...] |
H A D | test_sock_addr.c | 68 enum bpf_attach_type expected_attach_type; member in struct:sock_addr_test 651 opts.expected_attach_type = test->expected_attach_type; 682 bpf_program__set_expected_attach_type(prog, test->expected_attach_type);
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | sockopt.c | 28 enum bpf_attach_type expected_attach_type; member in struct:sockopt_test 48 .descr = "getsockopt: no expected_attach_type", 56 .expected_attach_type = 0, 60 .descr = "getsockopt: wrong expected_attach_type", 68 .expected_attach_type = BPF_CGROUP_SETSOCKOPT, 79 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 100 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 124 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 150 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 166 .expected_attach_type 933 load_prog(const struct bpf_insn *insns, enum bpf_attach_type expected_attach_type) argument [all...] |
H A D | section_names.c | 12 enum bpf_attach_type expected_attach_type; member in struct:sec_name_test::__anon3690 210 enum bpf_attach_type expected_attach_type; local 215 &expected_attach_type); 227 CHECK(expected_attach_type != test->expected_load.expected_attach_type, 228 "check_attach_type", "prog: unexpected expected_attach_type=%d for %s\n", 229 expected_attach_type, test->sec_name);
|
H A D | fexit_stress.c | 25 .expected_attach_type = BPF_TRACE_FEXIT, 31 trace_opts.expected_attach_type);
|
H A D | ctx_rewrite.c | 34 enum bpf_attach_type expected_attach_type; member in struct:test_case 164 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 170 .expected_attach_type = BPF_CGROUP_SETSOCKOPT, 176 .expected_attach_type = BPF_CGROUP_SETSOCKOPT, 182 .expected_attach_type = BPF_CGROUP_SETSOCKOPT, 194 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 199 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 204 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 689 enum bpf_attach_type expected_attach_type; member in struct:prog_info 717 opts.expected_attach_type [all...] |
H A D | module_fentry_shadow.c | 70 .expected_attach_type = BPF_TRACE_FENTRY,
|
H A D | fexit_bpf2bpf.c | 462 .expected_attach_type = BPF_TRACE_FENTRY,
|
/linux-master/tools/lib/bpf/ |
H A D | libbpf_probes.c | 118 opts.expected_attach_type = BPF_CGROUP_INET4_CONNECT; 121 opts.expected_attach_type = BPF_CGROUP_GETSOCKOPT; 124 opts.expected_attach_type = BPF_SK_LOOKUP; 130 opts.expected_attach_type = BPF_LIRC_MODE2; 138 opts.expected_attach_type = BPF_TRACE_FENTRY; 140 opts.expected_attach_type = BPF_MODIFY_RETURN; 185 opts.expected_attach_type = BPF_NETFILTER;
|
H A D | features.c | 229 .expected_attach_type = BPF_CGROUP_INET_SOCK_CREATE, 241 * to see if kernel supports expected_attach_type field for 370 .expected_attach_type = BPF_TRACE_UPROBE_MULTI, 514 "BPF_PROG_LOAD expected_attach_type attribute",
|
/linux-master/kernel/bpf/ |
H A D | bpf_lsm.c | 201 if (prog->expected_attach_type == BPF_LSM_CGROUP) { 232 if (prog->expected_attach_type != BPF_LSM_CGROUP) 242 if (prog->expected_attach_type != BPF_LSM_CGROUP)
|
H A D | syscall.c | 2494 * expected_attach_type. Later for some of them specifying expected_attach_type 2497 * backward compatibility) expected_attach_type, should have the default attach 2498 * type assigned to expected_attach_type for the latter case, so that it can be 2501 * bpf_prog_load_fixup_attach_type() sets expected_attach_type in @attr if 2512 if (!attr->expected_attach_type) 2513 attr->expected_attach_type = 2517 if (!attr->expected_attach_type) 2518 attr->expected_attach_type = 2526 enum bpf_attach_type expected_attach_type, 2525 bpf_prog_load_check_attach(enum bpf_prog_type prog_type, enum bpf_attach_type expected_attach_type, struct btf *attach_btf, u32 btf_id, struct bpf_prog *dst_prog) argument [all...] |
H A D | trampoline.c | 109 enum bpf_attach_type eatype = prog->expected_attach_type; 504 switch (prog->expected_attach_type) { 663 p->expected_attach_type = BPF_LSM_MAC; 1024 prog->expected_attach_type == BPF_LSM_CGROUP) 1039 prog->expected_attach_type == BPF_LSM_CGROUP)
|
H A D | cgroup.c | 295 if (pl->prog->expected_attach_type == BPF_LSM_CGROUP) 300 if (pl->link->link.prog->expected_attach_type == BPF_LSM_CGROUP) 2333 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) 2337 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) 2370 return prog->expected_attach_type == 2377 return prog->expected_attach_type == 2405 return prog->expected_attach_type == BPF_CGROUP_GETSOCKOPT; 2531 switch (prog->expected_attach_type) { 2549 switch (prog->expected_attach_type) {
|
/linux-master/tools/bpf/bpftool/ |
H A D | prog.c | 1448 enum bpf_attach_type *expected_attach_type) 1453 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); 1459 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); 1519 enum bpf_attach_type expected_attach_type; local 1552 &expected_attach_type); 1566 &expected_attach_type); 1703 &expected_attach_type); 1716 bpf_program__set_expected_attach_type(pos, expected_attach_type); 1447 get_prog_type_by_name(const char *name, enum bpf_prog_type *prog_type, enum bpf_attach_type *expected_attach_type) argument
|
/linux-master/net/bpf/ |
H A D | bpf_dummy_struct_ops.c | 127 op_idx = prog->expected_attach_type;
|
/linux-master/net/core/ |
H A D | sock_reuseport.c | 477 (prog && prog->expected_attach_type == BPF_SK_REUSEPORT_SELECT_OR_MIGRATE)) { 647 if (!prog || prog->expected_attach_type != BPF_SK_REUSEPORT_SELECT_OR_MIGRATE) {
|
/linux-master/net/ipv4/ |
H A D | bpf_tcp_ca.c | 157 midx = prog->expected_attach_type;
|
/linux-master/kernel/trace/ |
H A D | bpf_trace.c | 956 prog->expected_attach_type == BPF_TRACE_ITER) 1651 if (prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI) 1653 if (prog->expected_attach_type == BPF_TRACE_UPROBE_MULTI) 1657 if (prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI) 1659 if (prog->expected_attach_type == BPF_TRACE_UPROBE_MULTI) 2053 return prog->expected_attach_type == BPF_TRACE_ITER ? 2057 return prog->expected_attach_type == BPF_TRACE_ITER ? 2061 return prog->expected_attach_type == BPF_TRACE_ITER ? 2076 if (!fn && prog->expected_attach_type == BPF_TRACE_ITER) 2976 if (prog->expected_attach_type ! [all...] |