Home
last modified time | relevance | path

Searched refs:expected_attach_type (Results 1 – 25 of 44) sorted by relevance

12

/openbmc/linux/tools/testing/selftests/bpf/prog_tests/
H A Dsockopt.c27 enum bpf_attach_type expected_attach_type; member
54 .expected_attach_type = 0,
66 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
77 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
98 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
122 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
148 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
164 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
191 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
209 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
[all …]
H A Dsection_names.c12 enum bpf_attach_type expected_attach_type; member
165 enum bpf_attach_type expected_attach_type; in test_prog_type_by_name() local
170 &expected_attach_type); in test_prog_type_by_name()
182 CHECK(expected_attach_type != test->expected_load.expected_attach_type, in test_prog_type_by_name()
184 expected_attach_type, test->sec_name); in test_prog_type_by_name()
H A Dctx_rewrite.c34 enum bpf_attach_type expected_attach_type; member
164 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
170 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
176 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
182 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
194 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
199 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
204 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
733 enum bpf_attach_type expected_attach_type; member
761 opts.expected_attach_type = pinfo->expected_attach_type; in match_program()
[all …]
H A Dfexit_stress.c25 .expected_attach_type = BPF_TRACE_FEXIT, in serial_test_fexit_stress()
31 trace_opts.expected_attach_type); in serial_test_fexit_stress()
H A Dmodule_fentry_shadow.c70 .expected_attach_type = BPF_TRACE_FENTRY, in test_module_fentry_shadow()
/openbmc/linux/tools/testing/selftests/bpf/
H A Dtest_sock.c29 enum bpf_attach_type expected_attach_type; member
59 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
72 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
85 .expected_attach_type = BPF_CGROUP_INET6_POST_BIND,
98 .expected_attach_type = BPF_CGROUP_INET_SOCK_CREATE,
108 .expected_attach_type = 0,
122 .expected_attach_type = BPF_CGROUP_INET_SOCK_CREATE,
136 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND,
146 .expected_attach_type = BPF_CGROUP_INET6_POST_BIND,
156 .expected_attach_type = 0,
[all …]
H A Dtest_sock_addr.c67 enum bpf_attach_type expected_attach_type; member
650 opts.expected_attach_type = test->expected_attach_type; in load_insns()
681 bpf_program__set_expected_attach_type(prog, test->expected_attach_type); in load_path()
H A Dtest_verifier.c161 enum bpf_attach_type expected_attach_type; member
1604 opts.expected_attach_type = test->expected_attach_type; in do_test_single()
1620 opts.expected_attach_type); in do_test_single()
/openbmc/linux/tools/testing/selftests/bpf/verifier/
H A Dsleepable.c8 .expected_attach_type = BPF_TRACE_FENTRY,
21 .expected_attach_type = BPF_TRACE_FENTRY,
34 .expected_attach_type = BPF_MODIFY_RETURN,
47 .expected_attach_type = BPF_TRACE_ITER,
61 .expected_attach_type = BPF_LSM_MAC,
85 .expected_attach_type = BPF_TRACE_RAW_TP,
H A Dctx_sk_lookup.c259 .expected_attach_type = BPF_SK_LOOKUP,
274 .expected_attach_type = BPF_SK_LOOKUP,
287 .expected_attach_type = BPF_SK_LOOKUP,
301 .expected_attach_type = BPF_SK_LOOKUP,
314 .expected_attach_type = BPF_SK_LOOKUP,
328 .expected_attach_type = BPF_SK_LOOKUP,
342 .expected_attach_type = BPF_SK_LOOKUP,
355 .expected_attach_type = BPF_SK_LOOKUP,
369 .expected_attach_type = BPF_SK_LOOKUP,
383 .expected_attach_type = BPF_SK_LOOKUP,
[all …]
H A Dbpf_st_mem.c13 .expected_attach_type = BPF_SK_LOOKUP,
35 .expected_attach_type = BPF_SK_LOOKUP,
65 .expected_attach_type = BPF_SK_LOOKUP,
H A Dwide_access.c12 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
54 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
H A Devent_output.c115 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
H A Datomic_fetch_add.c102 .expected_attach_type = BPF_TRACE_FENTRY,
/openbmc/linux/tools/lib/bpf/
H A Dlibbpf_probes.c118 opts.expected_attach_type = BPF_CGROUP_INET4_CONNECT; in probe_prog_load()
121 opts.expected_attach_type = BPF_CGROUP_GETSOCKOPT; in probe_prog_load()
124 opts.expected_attach_type = BPF_SK_LOOKUP; in probe_prog_load()
130 opts.expected_attach_type = BPF_LIRC_MODE2; in probe_prog_load()
138 opts.expected_attach_type = BPF_TRACE_FENTRY; in probe_prog_load()
140 opts.expected_attach_type = BPF_MODIFY_RETURN; in probe_prog_load()
185 opts.expected_attach_type = BPF_NETFILTER; in probe_prog_load()
/openbmc/linux/kernel/bpf/
H A Dbpf_lsm.c201 if (prog->expected_attach_type == BPF_LSM_CGROUP) { in bpf_lsm_func_proto()
232 if (prog->expected_attach_type != BPF_LSM_CGROUP) in bpf_lsm_func_proto()
242 if (prog->expected_attach_type != BPF_LSM_CGROUP) in bpf_lsm_func_proto()
H A Dsyscall.c2421 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type()
2422 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type()
2426 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type()
2427 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type()
2435 enum bpf_attach_type expected_attach_type, in bpf_prog_load_check_attach() argument
2466 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2476 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2494 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2502 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2510 if (expected_attach_type == BPF_SK_LOOKUP) in bpf_prog_load_check_attach()
[all …]
H A Dtrampoline.c109 enum bpf_attach_type eatype = prog->expected_attach_type; in bpf_prog_has_trampoline()
493 switch (prog->expected_attach_type) { in bpf_attach_type_to_tramp()
652 p->expected_attach_type = BPF_LSM_MAC; in cgroup_shim_alloc()
1013 prog->expected_attach_type == BPF_LSM_CGROUP) in bpf_trampoline_enter()
1028 prog->expected_attach_type == BPF_LSM_CGROUP) in bpf_trampoline_exit()
H A Dcgroup.c312 if (pl->prog->expected_attach_type == BPF_LSM_CGROUP) in cgroup_bpf_release()
317 if (pl->link->link.prog->expected_attach_type == BPF_LSM_CGROUP) in cgroup_bpf_release()
2352 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) in cg_sockopt_func_proto()
2356 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) in cg_sockopt_func_proto()
2389 return prog->expected_attach_type == in cg_sockopt_is_valid_access()
2396 return prog->expected_attach_type == in cg_sockopt_is_valid_access()
2424 return prog->expected_attach_type == BPF_CGROUP_GETSOCKOPT; in cg_sockopt_is_valid_access()
2550 switch (prog->expected_attach_type) { in cgroup_common_func_proto()
2565 switch (prog->expected_attach_type) { in cgroup_common_func_proto()
H A Dbpf_iter.c424 link->prog->expected_attach_type != new_prog->expected_attach_type || in bpf_iter_link_replace()
/openbmc/linux/kernel/trace/
H A Dbpf_trace.c953 prog->expected_attach_type == BPF_TRACE_ITER) in BTF_ID()
1582 if (prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI) in kprobe_prog_func_proto()
1584 if (prog->expected_attach_type == BPF_TRACE_UPROBE_MULTI) in kprobe_prog_func_proto()
1588 if (prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI) in kprobe_prog_func_proto()
1590 if (prog->expected_attach_type == BPF_TRACE_UPROBE_MULTI) in kprobe_prog_func_proto()
1984 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
1988 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
1992 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
2007 if (!fn && prog->expected_attach_type == BPF_TRACE_ITER) in tracing_prog_func_proto()
2899 if (prog->expected_attach_type != BPF_TRACE_KPROBE_MULTI) in bpf_kprobe_multi_link_attach()
[all …]
/openbmc/linux/tools/bpf/bpftool/
H A Dprog.c1451 enum bpf_attach_type *expected_attach_type) in get_prog_type_by_name() argument
1456 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); in get_prog_type_by_name()
1462 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); in get_prog_type_by_name()
1522 enum bpf_attach_type expected_attach_type; in load_with_options() local
1555 &expected_attach_type); in load_with_options()
1569 &expected_attach_type); in load_with_options()
1706 &expected_attach_type); in load_with_options()
1719 bpf_program__set_expected_attach_type(pos, expected_attach_type); in load_with_options()
/openbmc/linux/net/bpf/
H A Dbpf_dummy_struct_ops.c120 op_idx = prog->expected_attach_type; in bpf_struct_ops_test_run()
/openbmc/linux/net/core/
H A Dsock_reuseport.c477 (prog && prog->expected_attach_type == BPF_SK_REUSEPORT_SELECT_OR_MIGRATE)) { in reuseport_stop_listen_sock()
647 if (!prog || prog->expected_attach_type != BPF_SK_REUSEPORT_SELECT_OR_MIGRATE) { in reuseport_migrate_sock()
/openbmc/linux/net/ipv4/
H A Dbpf_tcp_ca.c151 midx = prog->expected_attach_type; in prog_ops_moff()

12