/linux-master/kernel/bpf/ |
H A D | syscall.c | 4043 static int bpf_prog_attach(const union bpf_attr *attr) function 5669 err = bpf_prog_attach(&attr);
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_sock_addr.c | 1331 err = bpf_prog_attach(progfd, cgfd, test->attach_type,
|
H A D | test_maps.c | 777 err = bpf_prog_attach(-1, fd, BPF_SK_SKB_STREAM_PARSER, 0); 783 err = bpf_prog_attach(-1, fd, BPF_SK_SKB_STREAM_VERDICT, 0); 789 err = bpf_prog_attach(-1, fd, BPF_SK_MSG_VERDICT, 0); 795 err = bpf_prog_attach(-1, fd, __MAX_BPF_ATTACH_TYPE, 0); 895 err = bpf_prog_attach(parse_prog, map_fd_break, 902 err = bpf_prog_attach(parse_prog, map_fd_rx, 909 err = bpf_prog_attach(verdict_prog, map_fd_rx, 916 err = bpf_prog_attach(msg_prog, map_fd_msg, BPF_SK_MSG_VERDICT, 0); 922 err = bpf_prog_attach(verdict_prog, map_fd_rx, 1043 err = bpf_prog_attach(parse_pro [all...] |
H A D | test_sockmap.c | 963 err = bpf_prog_attach(prog_fd[0], map_fd[0], 967 "ERROR: bpf_prog_attach (sockmap %i->%i): %d (%s)\n", 973 err = bpf_prog_attach(prog_fd[1], map_fd[0], 976 fprintf(stderr, "ERROR: bpf_prog_attach (sockmap): %d (%s)\n", 984 err = bpf_prog_attach(prog_fd[0], map_fd[8], 988 "ERROR: bpf_prog_attach (TLS sockmap %i->%i): %d (%s)\n", 994 err = bpf_prog_attach(prog_fd[2], map_fd[8], 997 fprintf(stderr, "ERROR: bpf_prog_attach (TLS sockmap): %d (%s)\n", 1004 err = bpf_prog_attach(prog_fd[3], cg_fd, BPF_CGROUP_SOCK_OPS, 0); 1006 fprintf(stderr, "ERROR: bpf_prog_attach (group [all...] |
H A D | test_tcpnotify_user.c | 99 rv = bpf_prog_attach(prog_fd, cg_fd, BPF_CGROUP_SOCK_OPS, 0); 101 printf("FAILED: bpf_prog_attach: %d (%s)\n",
|
H A D | test_sysctl.c | 1563 if (bpf_prog_attach(progfd, cgfd, atype, BPF_F_ALLOW_OVERRIDE) < 0) {
|
H A D | test_lirc_mode2_user.c | 101 ret = bpf_prog_attach(progfd, lircfd, BPF_LIRC_MODE2, 0);
|
H A D | test_dev_cgroup.c | 46 if (bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_DEVICE, 0)) {
|
H A D | test_sock.c | 410 return bpf_prog_attach(progfd, cgfd, attach_type, BPF_F_ALLOW_OVERRIDE);
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | mptcp.c | 171 err = bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_SOCK_OPS, 0); 172 if (!ASSERT_OK(err, "bpf_prog_attach"))
|
H A D | sockmap_basic.c | 123 err = bpf_prog_attach(verdict, map, BPF_SK_MSG_VERDICT, 0); 124 if (!ASSERT_OK(err, "bpf_prog_attach")) 287 err = bpf_prog_attach(verdict, map, first, 0); 288 if (!ASSERT_OK(err, "bpf_prog_attach")) 291 err = bpf_prog_attach(verdict, map, second, 0); 340 err = bpf_prog_attach(verdict_fd, map_fd, attach_type, 0); 341 if (!ASSERT_OK(err, "bpf_prog_attach failed")) 375 err = bpf_prog_attach(verdict, map, BPF_SK_SKB_STREAM_VERDICT, 0); 376 if (!ASSERT_OK(err, "bpf_prog_attach")) 440 err = bpf_prog_attach(verdic [all...] |
H A D | sockopt.c | 1054 err = bpf_prog_attach(prog_fd, cgroup_fd, test->attach_type, 0);
|
H A D | sockmap_helpers.h | 150 bpf_prog_attach((prog), (target), (type), (flags)); \
|
H A D | flow_dissector.c | 586 err = bpf_prog_attach(prog_fd, 0, BPF_FLOW_DISSECTOR, 0); 587 if (CHECK(err, "bpf_prog_attach", "err %d errno %d\n", err, errno))
|
H A D | lsm_cgroup.c | 108 err = bpf_prog_attach(alloc_prog_fd, cgroup_fd, BPF_LSM_CGROUP, 0); 119 err = bpf_prog_attach(clone_prog_fd, cgroup_fd, BPF_LSM_CGROUP, 0); 128 err = bpf_prog_attach(post_create_prog_fd, cgroup_fd,
|
H A D | flow_dissector_reattach.c | 94 err = bpf_prog_attach(prog1, 0, BPF_FLOW_DISSECTOR, 0); 96 perror("bpf_prog_attach(prog1)"); 102 err = bpf_prog_attach(prog2, 0, BPF_FLOW_DISSECTOR, 0); 104 perror("bpf_prog_attach(prog2) #1"); 110 err = bpf_prog_attach(prog2, 0, BPF_FLOW_DISSECTOR, 0); 112 perror("bpf_prog_attach(prog2) #2"); 138 perror("bpf_prog_attach(prog2) expected E2BIG"); 152 err = bpf_prog_attach(prog1, 0, BPF_FLOW_DISSECTOR, 0); 154 perror("bpf_prog_attach(prog1)"); 188 err = bpf_prog_attach(prog [all...] |
H A D | tcp_rtt.c | 105 err = bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_SOCK_OPS, 0);
|
H A D | load_bytes_relative.c | 47 err = bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_INET_EGRESS,
|
H A D | connect_force_port.c | 78 err = bpf_prog_attach(bpf_program__fd(prog), cgroup_fd, v4 ? 94 err = bpf_prog_attach(bpf_program__fd(prog), cgroup_fd, v4 ? 110 err = bpf_prog_attach(bpf_program__fd(prog), cgroup_fd, v4 ?
|
H A D | cgroup_link.c | 112 err = bpf_prog_attach(prog_fd, cgs[last_cg].fd, 136 err = bpf_prog_attach(prog_fd, cgs[last_cg].fd, 169 err = bpf_prog_attach(prog_fd, cgs[last_cg].fd,
|
/linux-master/tools/lib/bpf/ |
H A D | bpf.h | 330 LIBBPF_API int bpf_prog_attach(int prog_fd, int attachable_fd,
|
H A D | bpf.c | 629 int bpf_prog_attach(int prog_fd, int target_fd, enum bpf_attach_type type, function
|
/linux-master/tools/bpf/bpftool/ |
H A D | prog.c | 1076 err = bpf_prog_attach(progfd, mapfd, attach_type, 0);
|
H A D | cgroup.c | 554 if (bpf_prog_attach(prog_fd, cgroup_fd, attach_type, attach_flags)) {
|
/linux-master/samples/bpf/ |
H A D | test_cgrp2_attach.c | 113 ret = bpf_prog_attach(prog_fd, cg_fd, type, 0);
|