| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | cgroup_attach_multi.c | 79 __u32 prog_ids[4], prog_cnt = 0, attach_flags, saved_prog_id; in serial_test_cgroup_attach_multi() local 160 BPF_F_QUERY_EFFECTIVE, &attach_flags, in serial_test_cgroup_attach_multi() 163 CHECK_FAIL(attach_flags != 0); in serial_test_cgroup_attach_multi() 169 BPF_F_QUERY_EFFECTIVE, &attach_flags, in serial_test_cgroup_attach_multi() 274 BPF_F_QUERY_EFFECTIVE, &attach_flags, in serial_test_cgroup_attach_multi() 277 CHECK_FAIL(attach_flags != 0); in serial_test_cgroup_attach_multi()
|
| H A D | tc_helpers.h | 26 __u32 count = 0, attach_flags = 0; in __assert_mprog_count() local 29 err = bpf_prog_query(ifindex, target, 0, &attach_flags, in __assert_mprog_count()
|
| H A D | cgroup_attach_autodetach.c | 26 __u32 duration = 0, prog_cnt = 4, attach_flags; in serial_test_cgroup_attach_autodetach() local 59 if (CHECK(bpf_prog_query(cg, BPF_CGROUP_INET_EGRESS, 0, &attach_flags, in serial_test_cgroup_attach_autodetach()
|
| H A D | cgroup_link.c | 41 __u32 prog_ids[ARRAY_SIZE(cgs)], prog_cnt = 0, attach_flags, prog_id; in serial_test_cgroup_link() local 76 0, &attach_flags, NULL, &prog_cnt); in serial_test_cgroup_link() 78 CHECK_FAIL(attach_flags != BPF_F_ALLOW_MULTI); in serial_test_cgroup_link()
|
| H A D | unpriv_bpf_disabled.c | 157 __u32 attach_flags = 0; in test_unpriv_bpf_disabled_negative() local 204 ASSERT_EQ(bpf_prog_query(prog_fd, BPF_TRACE_FENTRY, 0, &attach_flags, prog_ids, in test_unpriv_bpf_disabled_negative()
|
| H A D | sockmap_basic.c | 446 __u32 attach_flags = 0; in test_sockmap_progs_query() local 462 &attach_flags, prog_ids, &prog_cnt); in test_sockmap_progs_query() 464 ASSERT_EQ(attach_flags, 0, "wrong attach_flags on query"); in test_sockmap_progs_query() 473 &attach_flags, prog_ids, &prog_cnt); in test_sockmap_progs_query() 475 ASSERT_EQ(attach_flags, 0, "wrong attach_flags on query"); in test_sockmap_progs_query()
|
| H A D | sk_lookup.c | 459 __u32 attach_flags = 0; in query_lookup_prog() local 483 &attach_flags, prog_ids, &prog_cnt); in query_lookup_prog() 490 if (CHECK(attach_flags != 0, "bpf_prog_query", in query_lookup_prog() 491 "wrong attach_flags on query: %u", attach_flags)) in query_lookup_prog()
|
| H A D | cgroup_mprog_opts.c | 9 __u32 count = 0, attach_flags = 0; in assert_mprog_count() local 12 err = bpf_prog_query(cg, atype, 0, &attach_flags, in assert_mprog_count()
|
| H A D | tc_opts.c | 2567 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target() 2585 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target() 2614 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target() 2643 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target() 2671 ASSERT_EQ(attr.query.attach_flags, 0, "attach_flags"); in test_tc_opts_query_target() [all...] |
| /linux/drivers/media/rc/ |
| H A D | bpf-lirc.c | 253 if (attr->attach_flags) in lirc_prog_attach() 273 if (attr->attach_flags) in lirc_prog_detach() 327 if (copy_to_user(&uattr->query.attach_flags, &flags, sizeof(flags))) { in lirc_prog_query()
|
| /linux/kernel/bpf/ |
| H A D | tcx.c | 25 if (attr->attach_flags & BPF_F_REPLACE) { in tcx_prog_attach() 40 attr->attach_flags, attr->relative_fd, in tcx_prog_attach() 78 ret = bpf_mprog_detach(entry, &entry_new, prog, NULL, attr->attach_flags, in tcx_prog_detach()
|
| H A D | mprog.c | 408 if (attr->query.query_flags || attr->query.attach_flags) in bpf_mprog_query() 414 if (copy_to_user(&uattr->query.attach_flags, &flags, sizeof(flags))) in bpf_mprog_query()
|
| H A D | net_namespace.c | 259 if (copy_to_user(&uattr->query.attach_flags, &flags, sizeof(flags))) in __netns_bpf_prog_query() 304 if (attr->target_fd || attr->attach_flags || attr->replace_bpf_fd) in netns_bpf_prog_attach()
|
| H A D | syscall.c | 4493 if (attr->attach_flags & ~BPF_F_ATTACH_MASK_MPROG) in bpf_prog_attach() 4496 if (attr->attach_flags & ~(BPF_F_ATTACH_MASK_BASE | BPF_F_ATTACH_MASK_MPROG)) in bpf_prog_attach() 4499 if (attr->attach_flags & ~BPF_F_ATTACH_MASK_BASE) in bpf_prog_attach() 4562 if (attr->attach_flags & ~BPF_F_ATTACH_MASK_MPROG) in bpf_prog_detach() 4570 if (attr->attach_flags || attr->relative_fd) in bpf_prog_detach() 4572 } else if (attr->attach_flags || in bpf_prog_detach()
|
| /linux/tools/bpf/bpftool/ |
| H A D | net.c | 586 __u32 attach_flags; in query_flow_dissector() local 600 &attach_flags, prog_ids, &prog_cnt); in query_flow_dissector()
|
| /linux/net/core/ |
| H A D | sock_map.c | 73 if (attr->attach_flags || attr->replace_bpf_fd) in sock_map_get_from_fd() 92 if (attr->attach_flags || attr->replace_bpf_fd) in sock_map_prog_detach() 1596 if (copy_to_user(&uattr->query.attach_flags, &flags, sizeof(flags)) || in sock_map_bpf_prog_query()
|
| /linux/include/uapi/linux/ |
| H A D | bpf.h | 489 * attached and the *attach_flags* which were used to attach those 1443 * attach_flags with this flag are always returned 0. 1650 __u32 attach_flags; 1709 __u32 attach_flags; 1716 /* output: per-program attach_flags. 1646 __u32 attach_flags; global() member 1705 __u32 attach_flags; global() member
|
| /linux/tools/include/uapi/linux/ |
| H A D | bpf.h | 489 * attached and the *attach_flags* which were used to attach those 1443 * attach_flags with this flag are always returned 0. 1650 __u32 attach_flags; 1709 __u32 attach_flags; 1716 /* output: per-program attach_flags. 1646 __u32 attach_flags; global() member 1705 __u32 attach_flags; global() member
|