Home
last modified time | relevance | path

Searched refs:expected_attach_type (Results 1 – 25 of 40) sorted by relevance

12

/linux/tools/testing/selftests/bpf/prog_tests/
H A Dsockopt.c29 enum bpf_attach_type expected_attach_type; member
57 .expected_attach_type = 0,
69 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
80 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
101 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
125 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
151 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
167 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
194 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
212 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
[all …]
H A Dsection_names.c12 enum bpf_attach_type expected_attach_type; member
210 enum bpf_attach_type expected_attach_type; in test_prog_type_by_name() local
215 &expected_attach_type); in test_prog_type_by_name()
227 CHECK(expected_attach_type != test->expected_load.expected_attach_type, in test_prog_type_by_name()
229 expected_attach_type, test->sec_name); in test_prog_type_by_name()
H A Dctx_rewrite.c35 enum bpf_attach_type expected_attach_type; member
167 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
173 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
179 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
185 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
197 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
202 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
207 .expected_attach_type = BPF_CGROUP_GETSOCKOPT,
637 enum bpf_attach_type expected_attach_type; member
666 opts.expected_attach_type = pinfo->expected_attach_type; in match_program()
[all …]
H A Dfexit_stress.c26 .expected_attach_type = BPF_TRACE_FEXIT, in serial_test_fexit_stress()
32 trace_opts.expected_attach_type); in serial_test_fexit_stress()
H A Dmodule_fentry_shadow.c71 .expected_attach_type = BPF_TRACE_FENTRY, in test_module_fentry_shadow()
/linux/tools/testing/selftests/bpf/verifier/
H A Dsleepable.c8 .expected_attach_type = BPF_TRACE_FENTRY,
21 .expected_attach_type = BPF_TRACE_FENTRY,
34 .expected_attach_type = BPF_MODIFY_RETURN,
47 .expected_attach_type = BPF_TRACE_ITER,
61 .expected_attach_type = BPF_LSM_MAC,
85 .expected_attach_type = BPF_TRACE_RAW_TP,
H A Dctx_sk_lookup.c259 .expected_attach_type = BPF_SK_LOOKUP,
274 .expected_attach_type = BPF_SK_LOOKUP,
287 .expected_attach_type = BPF_SK_LOOKUP,
301 .expected_attach_type = BPF_SK_LOOKUP,
314 .expected_attach_type = BPF_SK_LOOKUP,
328 .expected_attach_type = BPF_SK_LOOKUP,
342 .expected_attach_type = BPF_SK_LOOKUP,
355 .expected_attach_type = BPF_SK_LOOKUP,
369 .expected_attach_type = BPF_SK_LOOKUP,
383 .expected_attach_type = BPF_SK_LOOKUP,
[all …]
H A Dbpf_st_mem.c13 .expected_attach_type = BPF_SK_LOOKUP,
35 .expected_attach_type = BPF_SK_LOOKUP,
65 .expected_attach_type = BPF_SK_LOOKUP,
93 .expected_attach_type = BPF_SK_LOOKUP,
H A Dwide_access.c12 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
54 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
H A Devent_output.c115 .expected_attach_type = BPF_CGROUP_SETSOCKOPT,
H A Datomic_fetch_add.c102 .expected_attach_type = BPF_TRACE_FENTRY,
/linux/tools/lib/bpf/
H A Dlibbpf_probes.c118 opts.expected_attach_type = BPF_CGROUP_INET4_CONNECT; in probe_prog_load()
121 opts.expected_attach_type = BPF_CGROUP_GETSOCKOPT; in probe_prog_load()
124 opts.expected_attach_type = BPF_SK_LOOKUP; in probe_prog_load()
130 opts.expected_attach_type = BPF_LIRC_MODE2; in probe_prog_load()
138 opts.expected_attach_type = BPF_TRACE_FENTRY; in probe_prog_load()
140 opts.expected_attach_type = BPF_MODIFY_RETURN; in probe_prog_load()
185 opts.expected_attach_type = BPF_NETFILTER; in probe_prog_load()
H A Dfeatures.c226 .expected_attach_type = BPF_CGROUP_INET_SOCK_CREATE, in probe_kern_exp_attach_type()
365 .expected_attach_type = BPF_TRACE_UPROBE_MULTI, in probe_uprobe_multi_link()
H A Dlibbpf.c427 enum bpf_attach_type expected_attach_type; member
497 enum bpf_attach_type expected_attach_type; member
1317 prog->expected_attach_type = kern_member_idx; in bpf_map__init_kern_struct_ops()
1331 if (prog->expected_attach_type != kern_member_idx) { in bpf_map__init_kern_struct_ops()
1334 prog->expected_attach_type, kern_member_idx); in bpf_map__init_kern_struct_ops()
7723 opts->expected_attach_type = 0; in libbpf_prepare_prog_load()
7737 prog->expected_attach_type = BPF_TRACE_UPROBE_MULTI; in libbpf_prepare_prog_load()
7738 opts->expected_attach_type = BPF_TRACE_UPROBE_MULTI; in libbpf_prepare_prog_load()
7828 load_attr.expected_attach_type = prog->expected_attach_type; in bpf_object_load_prog()
8275 prog->expected_attach_type = prog->sec_def->expected_attach_type; in bpf_object_init_progs()
[all …]
/linux/kernel/bpf/
H A Dsyscall.c2640 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type()
2641 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type()
2645 if (!attr->expected_attach_type) in bpf_prog_load_fixup_attach_type()
2646 attr->expected_attach_type = in bpf_prog_load_fixup_attach_type()
2654 enum bpf_attach_type expected_attach_type, in bpf_prog_load_check_attach() argument
2685 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2695 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2718 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2726 switch (expected_attach_type) { in bpf_prog_load_check_attach()
2734 if (expected_attach_type == BPF_SK_LOOKUP) in bpf_prog_load_check_attach()
[all …]
H A Dbpf_lsm.c229 if (prog->expected_attach_type == BPF_LSM_CGROUP) { in bpf_lsm_func_proto()
260 if (prog->expected_attach_type != BPF_LSM_CGROUP) in bpf_lsm_func_proto()
270 if (prog->expected_attach_type != BPF_LSM_CGROUP) in bpf_lsm_func_proto()
H A Dtrampoline.c139 enum bpf_attach_type eatype = prog->expected_attach_type; in bpf_prog_has_trampoline()
727 switch (prog->expected_attach_type) { in bpf_attach_type_to_tramp()
950 p->expected_attach_type = BPF_LSM_MAC; in cgroup_shim_alloc()
1312 prog->expected_attach_type == BPF_LSM_CGROUP) in bpf_trampoline_enter()
1327 prog->expected_attach_type == BPF_LSM_CGROUP) in bpf_trampoline_exit()
H A Dcgroup.c324 if (pl->prog->expected_attach_type == BPF_LSM_CGROUP) in cgroup_bpf_release()
329 if (pl->link->link.prog->expected_attach_type == BPF_LSM_CGROUP) in cgroup_bpf_release()
2521 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) in cg_sockopt_func_proto()
2525 if (prog->expected_attach_type == BPF_CGROUP_SETSOCKOPT) in cg_sockopt_func_proto()
2558 return prog->expected_attach_type == in cg_sockopt_is_valid_access()
2565 return prog->expected_attach_type == in cg_sockopt_is_valid_access()
2593 return prog->expected_attach_type == BPF_CGROUP_GETSOCKOPT; in cg_sockopt_is_valid_access()
2719 switch (prog->expected_attach_type) { in cgroup_common_func_proto()
2737 switch (prog->expected_attach_type) { in cgroup_common_func_proto()
H A Dbpf_iter.c421 link->prog->expected_attach_type != new_prog->expected_attach_type || in bpf_iter_link_replace()
H A Dverifier.c7668 prog->expected_attach_type == BPF_LSM_MAC && in get_func_retval_range()
10111 enum bpf_attach_type eatype = env->prog->expected_attach_type; in may_update_sockmap()
11830 env->prog->expected_attach_type == BPF_LSM_CGROUP) { in check_helper_call()
13325 if (env->prog->expected_attach_type == BPF_TRACE_ITER) in check_css_task_iter_allowlist()
17932 if (prog->expected_attach_type == BPF_LSM_CGROUP) in check_return_code()
17993 if (env->prog->expected_attach_type == BPF_CGROUP_UDP4_RECVMSG || in check_return_code()
17994 env->prog->expected_attach_type == BPF_CGROUP_UDP6_RECVMSG || in check_return_code()
17995 env->prog->expected_attach_type == BPF_CGROUP_UNIX_RECVMSG || in check_return_code()
17996 env->prog->expected_attach_type == BPF_CGROUP_INET4_GETPEERNAME || in check_return_code()
17997 env->prog->expected_attach_type == BPF_CGROUP_INET6_GETPEERNAME || in check_return_code()
[all …]
/linux/net/bpf/
H A Dbpf_dummy_struct_ops.c175 prog->expected_attach_type); in bpf_struct_ops_test_run()
177 op_idx = prog->expected_attach_type; in bpf_struct_ops_test_run()
/linux/kernel/trace/
H A Dbpf_trace.c950 prog->expected_attach_type == BPF_TRACE_ITER) in BTF_ID()
1283 return prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI || in is_kprobe_multi()
1284 prog->expected_attach_type == BPF_TRACE_KPROBE_SESSION; in is_kprobe_multi()
1290 prog->expected_attach_type == BPF_TRACE_KPROBE_SESSION; in is_kprobe_session()
1295 return prog->expected_attach_type == BPF_TRACE_UPROBE_MULTI || in is_uprobe_multi()
1296 prog->expected_attach_type == BPF_TRACE_UPROBE_SESSION; in is_uprobe_multi()
1302 prog->expected_attach_type == BPF_TRACE_UPROBE_SESSION; in is_uprobe_session()
1308 prog->expected_attach_type == BPF_TRACE_FSESSION; in is_trace_fsession()
1731 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
1735 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
[all …]
/linux/net/core/
H A Dsock_reuseport.c476 (prog && prog->expected_attach_type == BPF_SK_REUSEPORT_SELECT_OR_MIGRATE)) { in reuseport_stop_listen_sock()
646 if (!prog || prog->expected_attach_type != BPF_SK_REUSEPORT_SELECT_OR_MIGRATE) { in reuseport_migrate_sock()
/linux/tools/testing/selftests/bpf/
H A Dtest_verifier.c159 enum bpf_attach_type expected_attach_type; member
1561 opts.expected_attach_type = test->expected_attach_type; in do_test_single()
1577 opts.expected_attach_type); in do_test_single()
/linux/net/ipv4/
H A Dbpf_tcp_ca.c144 midx = prog->expected_attach_type; in prog_ops_moff()

12