/linux-master/kernel/bpf/ |
H A D | syscall.c | 4043 static int bpf_prog_attach(const union bpf_attr *attr) function 5669 err = bpf_prog_attach(&attr);
|
/linux-master/samples/bpf/ |
H A D | test_cgrp2_attach.c | 113 ret = bpf_prog_attach(prog_fd, cg_fd, type, 0);
|
H A D | test_cgrp2_sock.c | 276 ret = bpf_prog_attach(prog_fd, cg_fd,
|
/linux-master/tools/bpf/bpftool/ |
H A D | cgroup.c | 554 if (bpf_prog_attach(prog_fd, cgroup_fd, attach_type, attach_flags)) {
|
H A D | prog.c | 1076 err = bpf_prog_attach(progfd, mapfd, attach_type, 0);
|
/linux-master/tools/lib/bpf/ |
H A D | bpf.c | 629 int bpf_prog_attach(int prog_fd, int target_fd, enum bpf_attach_type type, function
|
H A D | bpf.h | 330 LIBBPF_API int bpf_prog_attach(int prog_fd, int attachable_fd,
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | flow_dissector_load.c | 35 ret = bpf_prog_attach(prog_fd, 0 /* Ignore */, BPF_FLOW_DISSECTOR, 0); 37 error(1, 0, "bpf_prog_attach %s", cfg_path_name);
|
H A D | test_cgroup_storage.c | 84 if (bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_INET_EGRESS, 0)) {
|
H A D | test_dev_cgroup.c | 46 if (bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_DEVICE, 0)) {
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | cgroup_attach_autodetach.c | 52 if (CHECK(bpf_prog_attach(allow_prog[i], cg,
|
H A D | cgroup_attach_multi.c | 116 if (CHECK(bpf_prog_attach(allow_prog[0], cg1, BPF_CGROUP_INET_EGRESS, 121 if (CHECK(!bpf_prog_attach(allow_prog[0], cg1, BPF_CGROUP_INET_EGRESS, 126 if (CHECK(bpf_prog_attach(allow_prog[1], cg1, BPF_CGROUP_INET_EGRESS, 131 if (CHECK(bpf_prog_attach(allow_prog[2], cg2, BPF_CGROUP_INET_EGRESS, 136 if (CHECK(bpf_prog_attach(allow_prog[3], cg3, BPF_CGROUP_INET_EGRESS, 141 if (CHECK(bpf_prog_attach(allow_prog[4], cg4, BPF_CGROUP_INET_EGRESS, 146 if (CHECK(bpf_prog_attach(allow_prog[5], cg5, BPF_CGROUP_INET_EGRESS, 0),
|
H A D | cgroup_attach_override.c | 45 if (CHECK(bpf_prog_attach(drop_prog, foo, BPF_CGROUP_INET_EGRESS, 63 if (CHECK(bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 81 if (CHECK(bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 95 if (CHECK(bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 101 if (CHECK(!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 0), 116 if (CHECK(bpf_prog_attach(allow_prog, foo, BPF_CGROUP_INET_EGRESS, 0), 121 if (CHECK(!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 0), 126 if (CHECK(!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 132 if (CHECK(!bpf_prog_attach(allow_prog, foo, BPF_CGROUP_INET_EGRESS, 138 if (CHECK(bpf_prog_attach(drop_pro [all...] |
H A D | cgroup_link.c | 112 err = bpf_prog_attach(prog_fd, cgs[last_cg].fd, 136 err = bpf_prog_attach(prog_fd, cgs[last_cg].fd, 169 err = bpf_prog_attach(prog_fd, cgs[last_cg].fd,
|
H A D | connect_force_port.c | 78 err = bpf_prog_attach(bpf_program__fd(prog), cgroup_fd, v4 ? 94 err = bpf_prog_attach(bpf_program__fd(prog), cgroup_fd, v4 ? 110 err = bpf_prog_attach(bpf_program__fd(prog), cgroup_fd, v4 ?
|
H A D | flow_dissector.c | 586 err = bpf_prog_attach(prog_fd, 0, BPF_FLOW_DISSECTOR, 0); 587 if (CHECK(err, "bpf_prog_attach", "err %d errno %d\n", err, errno))
|
H A D | flow_dissector_reattach.c | 94 err = bpf_prog_attach(prog1, 0, BPF_FLOW_DISSECTOR, 0); 96 perror("bpf_prog_attach(prog1)"); 102 err = bpf_prog_attach(prog2, 0, BPF_FLOW_DISSECTOR, 0); 104 perror("bpf_prog_attach(prog2) #1"); 110 err = bpf_prog_attach(prog2, 0, BPF_FLOW_DISSECTOR, 0); 112 perror("bpf_prog_attach(prog2) #2"); 138 perror("bpf_prog_attach(prog2) expected E2BIG"); 152 err = bpf_prog_attach(prog1, 0, BPF_FLOW_DISSECTOR, 0); 154 perror("bpf_prog_attach(prog1)"); 188 err = bpf_prog_attach(prog [all...] |
H A D | load_bytes_relative.c | 47 err = bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_INET_EGRESS,
|
H A D | lsm_cgroup.c | 108 err = bpf_prog_attach(alloc_prog_fd, cgroup_fd, BPF_LSM_CGROUP, 0); 119 err = bpf_prog_attach(clone_prog_fd, cgroup_fd, BPF_LSM_CGROUP, 0); 128 err = bpf_prog_attach(post_create_prog_fd, cgroup_fd,
|
H A D | mptcp.c | 171 err = bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_SOCK_OPS, 0); 172 if (!ASSERT_OK(err, "bpf_prog_attach"))
|
H A D | netns_cookie.c | 37 err = bpf_prog_attach(verdict, map, BPF_SK_MSG_VERDICT, 0);
|
H A D | sockmap_basic.c | 123 err = bpf_prog_attach(verdict, map, BPF_SK_MSG_VERDICT, 0); 124 if (!ASSERT_OK(err, "bpf_prog_attach")) 287 err = bpf_prog_attach(verdict, map, first, 0); 288 if (!ASSERT_OK(err, "bpf_prog_attach")) 291 err = bpf_prog_attach(verdict, map, second, 0); 340 err = bpf_prog_attach(verdict_fd, map_fd, attach_type, 0); 341 if (!ASSERT_OK(err, "bpf_prog_attach failed")) 375 err = bpf_prog_attach(verdict, map, BPF_SK_SKB_STREAM_VERDICT, 0); 376 if (!ASSERT_OK(err, "bpf_prog_attach")) 440 err = bpf_prog_attach(verdic [all...] |
H A D | sockmap_helpers.h | 150 bpf_prog_attach((prog), (target), (type), (flags)); \
|
H A D | sockopt.c | 1054 err = bpf_prog_attach(prog_fd, cgroup_fd, test->attach_type, 0);
|
H A D | tcp_rtt.c | 105 err = bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_SOCK_OPS, 0);
|