/openbmc/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | sockopt.c | 27 enum bpf_attach_type expected_attach_type; member 54 .expected_attach_type = 0, 66 .expected_attach_type = BPF_CGROUP_SETSOCKOPT, 77 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 98 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 122 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 148 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 164 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 191 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 209 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, [all …]
|
H A D | section_names.c | 12 enum bpf_attach_type expected_attach_type; member 165 enum bpf_attach_type expected_attach_type; in test_prog_type_by_name() local 170 &expected_attach_type); in test_prog_type_by_name() 182 CHECK(expected_attach_type != test->expected_load.expected_attach_type, in test_prog_type_by_name() 184 expected_attach_type, test->sec_name); in test_prog_type_by_name()
|
H A D | ctx_rewrite.c | 34 enum bpf_attach_type expected_attach_type; member 164 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 170 .expected_attach_type = BPF_CGROUP_SETSOCKOPT, 176 .expected_attach_type = BPF_CGROUP_SETSOCKOPT, 182 .expected_attach_type = BPF_CGROUP_SETSOCKOPT, 194 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 199 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 204 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 733 enum bpf_attach_type expected_attach_type; member 761 opts.expected_attach_type = pinfo->expected_attach_type; in match_program() [all …]
|
H A D | fexit_stress.c | 25 .expected_attach_type = BPF_TRACE_FEXIT, in serial_test_fexit_stress() 31 trace_opts.expected_attach_type); in serial_test_fexit_stress()
|
H A D | module_fentry_shadow.c | 70 .expected_attach_type = BPF_TRACE_FENTRY, in test_module_fentry_shadow()
|
/openbmc/linux/tools/testing/selftests/bpf/ |
H A D | test_sock.c | 29 enum bpf_attach_type expected_attach_type; member 59 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND, 72 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND, 85 .expected_attach_type = BPF_CGROUP_INET6_POST_BIND, 98 .expected_attach_type = BPF_CGROUP_INET_SOCK_CREATE, 108 .expected_attach_type = 0, 122 .expected_attach_type = BPF_CGROUP_INET_SOCK_CREATE, 136 .expected_attach_type = BPF_CGROUP_INET4_POST_BIND, 146 .expected_attach_type = BPF_CGROUP_INET6_POST_BIND, 156 .expected_attach_type = 0, [all …]
|
H A D | test_sock_addr.c | 67 enum bpf_attach_type expected_attach_type; member 650 opts.expected_attach_type = test->expected_attach_type; in load_insns() 681 bpf_program__set_expected_attach_type(prog, test->expected_attach_type); in load_path()
|
H A D | test_verifier.c | 161 enum bpf_attach_type expected_attach_type; member 1604 opts.expected_attach_type = test->expected_attach_type; in do_test_single() 1620 opts.expected_attach_type); in do_test_single()
|
/openbmc/linux/tools/testing/selftests/bpf/verifier/ |
H A D | sleepable.c | 8 .expected_attach_type = BPF_TRACE_FENTRY, 21 .expected_attach_type = BPF_TRACE_FENTRY, 34 .expected_attach_type = BPF_MODIFY_RETURN, 47 .expected_attach_type = BPF_TRACE_ITER, 61 .expected_attach_type = BPF_LSM_MAC, 85 .expected_attach_type = BPF_TRACE_RAW_TP,
|
H A D | ctx_sk_lookup.c | 259 .expected_attach_type = BPF_SK_LOOKUP, 274 .expected_attach_type = BPF_SK_LOOKUP, 287 .expected_attach_type = BPF_SK_LOOKUP, 301 .expected_attach_type = BPF_SK_LOOKUP, 314 .expected_attach_type = BPF_SK_LOOKUP, 328 .expected_attach_type = BPF_SK_LOOKUP, 342 .expected_attach_type = BPF_SK_LOOKUP, 355 .expected_attach_type = BPF_SK_LOOKUP, 369 .expected_attach_type = BPF_SK_LOOKUP, 383 .expected_attach_type = BPF_SK_LOOKUP, [all …]
|
H A D | bpf_st_mem.c | 13 .expected_attach_type = BPF_SK_LOOKUP, 35 .expected_attach_type = BPF_SK_LOOKUP, 65 .expected_attach_type = BPF_SK_LOOKUP,
|
H A D | wide_access.c | 12 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \ 54 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
|
H A D | event_output.c | 115 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
|
H A D | atomic_fetch_add.c | 102 .expected_attach_type = BPF_TRACE_FENTRY,
|
/openbmc/linux/tools/lib/bpf/ |
H A D | libbpf_probes.c | 118 opts.expected_attach_type = BPF_CGROUP_INET4_CONNECT; in probe_prog_load() 121 opts.expected_attach_type = BPF_CGROUP_GETSOCKOPT; in probe_prog_load() 124 opts.expected_attach_type = BPF_SK_LOOKUP; in probe_prog_load() 130 opts.expected_attach_type = BPF_LIRC_MODE2; in probe_prog_load() 138 opts.expected_attach_type = BPF_TRACE_FENTRY; in probe_prog_load() 140 opts.expected_attach_type = BPF_MODIFY_RETURN; in probe_prog_load() 185 opts.expected_attach_type = BPF_NETFILTER; in probe_prog_load()
|
/openbmc/linux/kernel/bpf/ |
H A D | bpf_lsm.c | 201 if (prog->expected_attach_type == BPF_LSM_CGROUP) { in bpf_lsm_func_proto() 232 if (prog->expected_attach_type != BPF_LSM_CGROUP) in bpf_lsm_func_proto() 242 if (prog->expected_attach_type != BPF_LSM_CGROUP) in bpf_lsm_func_proto()
|
H A D | syscall.c | 2421 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type() 2422 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type() 2426 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type() 2427 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type() 2435 enum bpf_attach_type expected_attach_type, in bpf_prog_load_check_attach() argument 2466 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2476 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2494 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2502 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2510 if (expected_attach_type == BPF_SK_LOOKUP) in bpf_prog_load_check_attach() [all …]
|
H A D | trampoline.c | 109 enum bpf_attach_type eatype = prog->expected_attach_type; in bpf_prog_has_trampoline() 493 switch (prog->expected_attach_type) { in bpf_attach_type_to_tramp() 652 p->expected_attach_type = BPF_LSM_MAC; in cgroup_shim_alloc() 1013 prog->expected_attach_type == BPF_LSM_CGROUP) in bpf_trampoline_enter() 1028 prog->expected_attach_type == BPF_LSM_CGROUP) in bpf_trampoline_exit()
|
H A D | cgroup.c | 312 if (pl->prog->expected_attach_type == BPF_LSM_CGROUP) in cgroup_bpf_release() 317 if (pl->link->link.prog->expected_attach_type == BPF_LSM_CGROUP) in cgroup_bpf_release() 2352 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) in cg_sockopt_func_proto() 2356 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) in cg_sockopt_func_proto() 2389 return prog->expected_attach_type == in cg_sockopt_is_valid_access() 2396 return prog->expected_attach_type == in cg_sockopt_is_valid_access() 2424 return prog->expected_attach_type == BPF_CGROUP_GETSOCKOPT; in cg_sockopt_is_valid_access() 2550 switch (prog->expected_attach_type) { in cgroup_common_func_proto() 2565 switch (prog->expected_attach_type) { in cgroup_common_func_proto()
|
H A D | bpf_iter.c | 424 link->prog->expected_attach_type != new_prog->expected_attach_type || in bpf_iter_link_replace()
|
/openbmc/linux/kernel/trace/ |
H A D | bpf_trace.c | 953 prog->expected_attach_type == BPF_TRACE_ITER) in BTF_ID() 1582 if (prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI) in kprobe_prog_func_proto() 1584 if (prog->expected_attach_type == BPF_TRACE_UPROBE_MULTI) in kprobe_prog_func_proto() 1588 if (prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI) in kprobe_prog_func_proto() 1590 if (prog->expected_attach_type == BPF_TRACE_UPROBE_MULTI) in kprobe_prog_func_proto() 1984 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 1988 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 1992 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 2007 if (!fn && prog->expected_attach_type == BPF_TRACE_ITER) in tracing_prog_func_proto() 2899 if (prog->expected_attach_type != BPF_TRACE_KPROBE_MULTI) in bpf_kprobe_multi_link_attach() [all …]
|
/openbmc/linux/tools/bpf/bpftool/ |
H A D | prog.c | 1451 enum bpf_attach_type *expected_attach_type) in get_prog_type_by_name() argument 1456 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); in get_prog_type_by_name() 1462 ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type); in get_prog_type_by_name() 1522 enum bpf_attach_type expected_attach_type; in load_with_options() local 1555 &expected_attach_type); in load_with_options() 1569 &expected_attach_type); in load_with_options() 1706 &expected_attach_type); in load_with_options() 1719 bpf_program__set_expected_attach_type(pos, expected_attach_type); in load_with_options()
|
/openbmc/linux/net/bpf/ |
H A D | bpf_dummy_struct_ops.c | 120 op_idx = prog->expected_attach_type; in bpf_struct_ops_test_run()
|
/openbmc/linux/net/core/ |
H A D | sock_reuseport.c | 477 (prog && prog->expected_attach_type == BPF_SK_REUSEPORT_SELECT_OR_MIGRATE)) { in reuseport_stop_listen_sock() 647 if (!prog || prog->expected_attach_type != BPF_SK_REUSEPORT_SELECT_OR_MIGRATE) { in reuseport_migrate_sock()
|
/openbmc/linux/net/ipv4/ |
H A D | bpf_tcp_ca.c | 151 midx = prog->expected_attach_type; in prog_ops_moff()
|