| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | sockopt.c | 29 enum bpf_attach_type expected_attach_type; member 57 .expected_attach_type = 0, 69 .expected_attach_type = BPF_CGROUP_SETSOCKOPT, 80 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 101 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 125 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 151 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 167 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 194 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 212 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, [all …]
|
| H A D | section_names.c | 12 enum bpf_attach_type expected_attach_type; member 210 enum bpf_attach_type expected_attach_type; in test_prog_type_by_name() local 215 &expected_attach_type); in test_prog_type_by_name() 227 CHECK(expected_attach_type != test->expected_load.expected_attach_type, in test_prog_type_by_name() 229 expected_attach_type, test->sec_name); in test_prog_type_by_name()
|
| H A D | ctx_rewrite.c | 35 enum bpf_attach_type expected_attach_type; member 167 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 173 .expected_attach_type = BPF_CGROUP_SETSOCKOPT, 179 .expected_attach_type = BPF_CGROUP_SETSOCKOPT, 185 .expected_attach_type = BPF_CGROUP_SETSOCKOPT, 197 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 202 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 207 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 635 enum bpf_attach_type expected_attach_type; member 664 opts.expected_attach_type = pinfo->expected_attach_type; in match_program() [all …]
|
| H A D | fexit_stress.c | 26 .expected_attach_type = BPF_TRACE_FEXIT, in serial_test_fexit_stress() 32 trace_opts.expected_attach_type); in serial_test_fexit_stress()
|
| H A D | module_fentry_shadow.c | 71 .expected_attach_type = BPF_TRACE_FENTRY, in test_module_fentry_shadow()
|
| H A D | fexit_bpf2bpf.c | 462 .expected_attach_type = BPF_TRACE_FENTRY, in load_fentry()
|
| /linux/tools/testing/selftests/bpf/verifier/ |
| H A D | sleepable.c | 8 .expected_attach_type = BPF_TRACE_FENTRY, 21 .expected_attach_type = BPF_TRACE_FENTRY, 34 .expected_attach_type = BPF_MODIFY_RETURN, 47 .expected_attach_type = BPF_TRACE_ITER, 61 .expected_attach_type = BPF_LSM_MAC, 85 .expected_attach_type = BPF_TRACE_RAW_TP,
|
| H A D | ctx_sk_lookup.c | 259 .expected_attach_type = BPF_SK_LOOKUP, 274 .expected_attach_type = BPF_SK_LOOKUP, 287 .expected_attach_type = BPF_SK_LOOKUP, 301 .expected_attach_type = BPF_SK_LOOKUP, 314 .expected_attach_type = BPF_SK_LOOKUP, 328 .expected_attach_type = BPF_SK_LOOKUP, 342 .expected_attach_type = BPF_SK_LOOKUP, 355 .expected_attach_type = BPF_SK_LOOKUP, 369 .expected_attach_type = BPF_SK_LOOKUP, 383 .expected_attach_type = BPF_SK_LOOKUP, [all …]
|
| H A D | bpf_st_mem.c | 13 .expected_attach_type = BPF_SK_LOOKUP, 35 .expected_attach_type = BPF_SK_LOOKUP, 65 .expected_attach_type = BPF_SK_LOOKUP, 93 .expected_attach_type = BPF_SK_LOOKUP,
|
| H A D | wide_access.c | 12 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \ 54 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
|
| H A D | event_output.c | 115 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
|
| H A D | atomic_fetch_add.c | 102 .expected_attach_type = BPF_TRACE_FENTRY,
|
| /linux/tools/lib/bpf/ |
| H A D | libbpf_probes.c | 118 opts.expected_attach_type = BPF_CGROUP_INET4_CONNECT; in probe_prog_load() 121 opts.expected_attach_type = BPF_CGROUP_GETSOCKOPT; in probe_prog_load() 124 opts.expected_attach_type = BPF_SK_LOOKUP; in probe_prog_load() 130 opts.expected_attach_type = BPF_LIRC_MODE2; in probe_prog_load() 138 opts.expected_attach_type = BPF_TRACE_FENTRY; in probe_prog_load() 140 opts.expected_attach_type = BPF_MODIFY_RETURN; in probe_prog_load() 185 opts.expected_attach_type = BPF_NETFILTER; in probe_prog_load()
|
| /linux/kernel/bpf/ |
| H A D | syscall.c | 2646 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type() 2647 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type() 2651 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type() 2652 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type() 2660 enum bpf_attach_type expected_attach_type, in bpf_prog_load_check_attach() argument 2691 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2701 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2724 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2732 switch (expected_attach_type) { in bpf_prog_load_check_attach() 2740 if (expected_attach_type == BPF_SK_LOOKUP) in bpf_prog_load_check_attach() [all …]
|
| H A D | bpf_lsm.c | 228 if (prog->expected_attach_type == BPF_LSM_CGROUP) { in bpf_lsm_func_proto() 259 if (prog->expected_attach_type != BPF_LSM_CGROUP) in bpf_lsm_func_proto() 269 if (prog->expected_attach_type != BPF_LSM_CGROUP) in bpf_lsm_func_proto()
|
| H A D | trampoline.c | 109 enum bpf_attach_type eatype = prog->expected_attach_type; in bpf_prog_has_trampoline() 555 switch (prog->expected_attach_type) { in bpf_attach_type_to_tramp() 748 p->expected_attach_type = BPF_LSM_MAC; in cgroup_shim_alloc() 1114 prog->expected_attach_type == BPF_LSM_CGROUP) in bpf_trampoline_enter() 1129 prog->expected_attach_type == BPF_LSM_CGROUP) in bpf_trampoline_exit()
|
| H A D | verifier.c | 7515 prog->expected_attach_type == BPF_LSM_MAC && in get_func_retval_range() 9983 enum bpf_attach_type eatype = env->prog->expected_attach_type; in may_update_sockmap() 11685 env->prog->expected_attach_type == BPF_LSM_CGROUP) { in check_helper_call() 13148 if (env->prog->expected_attach_type == BPF_TRACE_ITER) in check_css_task_iter_allowlist() 17313 if (prog->expected_attach_type == BPF_LSM_CGROUP) in check_return_code() 17374 if (env->prog->expected_attach_type == BPF_CGROUP_UDP4_RECVMSG || in check_return_code() 17375 env->prog->expected_attach_type == BPF_CGROUP_UDP6_RECVMSG || in check_return_code() 17376 env->prog->expected_attach_type == BPF_CGROUP_UNIX_RECVMSG || in check_return_code() 17377 env->prog->expected_attach_type == BPF_CGROUP_INET4_GETPEERNAME || in check_return_code() 17378 env->prog->expected_attach_type == BPF_CGROUP_INET6_GETPEERNAME || in check_return_code() [all …]
|
| H A D | core.c | 2401 map->owner->expected_attach_type = fp->expected_attach_type; in __bpf_prog_map_compatible() 2415 map->owner->expected_attach_type != fp->expected_attach_type) in bpf_prog_map_compatible()
|
| H A D | cpumap.c | 417 if (prog->expected_attach_type != BPF_XDP_CPUMAP || in __cpu_map_load_bpf_program()
|
| /linux/net/bpf/ |
| H A D | bpf_dummy_struct_ops.c | 175 prog->expected_attach_type); in bpf_struct_ops_test_run() 177 op_idx = prog->expected_attach_type; in bpf_struct_ops_test_run()
|
| H A D | test_run.c | 685 switch (prog->expected_attach_type) { in bpf_prog_test_run_tracing() 1282 if (prog->expected_attach_type == BPF_XDP_DEVMAP || in bpf_prog_test_run_xdp() 1283 prog->expected_attach_type == BPF_XDP_CPUMAP) in bpf_prog_test_run_xdp()
|
| /linux/kernel/trace/ |
| H A D | bpf_trace.c | 950 prog->expected_attach_type == BPF_TRACE_ITER) in BTF_ID() 1283 return prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI || in is_kprobe_multi() 1284 prog->expected_attach_type == BPF_TRACE_KPROBE_SESSION; in is_kprobe_multi() 1289 return prog->expected_attach_type == BPF_TRACE_KPROBE_SESSION; in is_kprobe_session() 1294 return prog->expected_attach_type == BPF_TRACE_UPROBE_MULTI || in is_uprobe_multi() 1295 prog->expected_attach_type == BPF_TRACE_UPROBE_SESSION; in is_uprobe_multi() 1300 return prog->expected_attach_type == BPF_TRACE_UPROBE_SESSION; in is_uprobe_session() 1723 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 1727 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 1731 return prog->expected_attach_type in tracing_prog_func_proto() [all...] |
| /linux/net/core/ |
| H A D | sock_reuseport.c | 476 (prog && prog->expected_attach_type == BPF_SK_REUSEPORT_SELECT_OR_MIGRATE)) { in reuseport_stop_listen_sock() 646 if (!prog || prog->expected_attach_type != BPF_SK_REUSEPORT_SELECT_OR_MIGRATE) { in reuseport_migrate_sock()
|
| H A D | bpf_sk_storage.c | 361 switch (prog->expected_attach_type) { in bpf_sk_storage_tracing_allowed()
|
| /linux/net/ipv4/ |
| H A D | bpf_tcp_ca.c | 144 midx = prog->expected_attach_type; in prog_ops_moff()
|