| /linux/tools/lib/bpf/ |
| H A D | features.c | 39 attr.prog_flags |= BPF_F_TOKEN_FD; in probe_kern_prog_name() 61 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_kern_global_data() 228 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_kern_exp_attach_type() 249 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_kern_probe_read_kernel() 277 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_prog_bind_map() 340 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_perf_link() 367 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_uprobe_multi_link() 435 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_kern_bpf_cookie() 489 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_kern_arg_ctx_tag() 520 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_ldimm64_full_range_off()
|
| H A D | libbpf_probes.c | 156 opts.prog_flags = BPF_F_SLEEPABLE; in probe_prog_load()
|
| H A D | libbpf.c | 512 __u32 prog_flags; member 5126 .prog_flags = obj->token_fd ? BPF_F_TOKEN_FD : 0, in bpf_object__probe_loading() 7726 opts->prog_flags |= BPF_F_SLEEPABLE; in libbpf_prepare_prog_load() 7729 opts->prog_flags |= BPF_F_XDP_HAS_FRAGS; in libbpf_prepare_prog_load() 7841 load_attr.prog_flags = prog->prog_flags; in bpf_object_load_prog() 7846 load_attr.prog_flags |= BPF_F_TOKEN_FD; in bpf_object_load_prog() 9735 return prog->prog_flags; in bpf_program__flags() 9743 prog->prog_flags = flags; in bpf_program__set_flags()
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | test_loader.c | 89 int prog_flags; 427 spec->prog_flags = testing_prog_flags(); in parse_test_spec() 561 update_flags(&spec->prog_flags, BPF_F_STRICT_ALIGNMENT, clear); in parse_test_spec() 563 update_flags(&spec->prog_flags, BPF_F_ANY_ALIGNMENT, clear); in parse_test_spec() 565 update_flags(&spec->prog_flags, BPF_F_TEST_RND_HI32, clear); in parse_test_spec() 567 update_flags(&spec->prog_flags, BPF_F_TEST_STATE_FREQ, clear); in parse_test_spec() 569 update_flags(&spec->prog_flags, BPF_F_SLEEPABLE, clear); in parse_test_spec() 571 update_flags(&spec->prog_flags, BPF_F_XDP_HAS_FRAGS, clear); in parse_test_spec() 573 update_flags(&spec->prog_flags, BPF_F_TEST_REG_INVARIANTS, clear); in parse_test_spec() 578 update_flags(&spec->prog_flags, flag in parse_test_spec() 93 int prog_flags; global() member 665 int min_log_level = 0, prog_flags; prepare_case() local [all...] |
| H A D | test_lirc_mode2_user.c | 55 u32 prog_ids[10], prog_flags[10], prog_cnt; in main() local 89 ret = bpf_prog_query(lircfd, BPF_LIRC_MODE2, 0, prog_flags, prog_ids, in main() 157 ret = bpf_prog_query(lircfd, BPF_LIRC_MODE2, 0, prog_flags, prog_ids, in main()
|
| H A D | testing_helpers.c | 260 static int prog_flags[] = { BPF_F_TEST_RND_HI32, BPF_F_TEST_REG_INVARIANTS }; in testing_prog_flags() local 271 for (i = 0; i < ARRAY_SIZE(prog_flags); i++) { in testing_prog_flags() 272 opts.prog_flags = prog_flags[i]; in testing_prog_flags() 276 flags |= prog_flags[i]; in testing_prog_flags() 332 .prog_flags = testing_prog_flags(), in bpf_test_load_program()
|
| H A D | test_verifier.c | 1568 opts.prog_flags = pflags; in do_test_single()
|
| /linux/kernel/bpf/ |
| H A D | offload.c | 228 if (attr->prog_flags & ~(BPF_F_XDP_DEV_BOUND_ONLY | BPF_F_XDP_HAS_FRAGS)) in bpf_prog_dev_bound_init() 234 if (attr->prog_flags & BPF_F_XDP_HAS_FRAGS && in bpf_prog_dev_bound_init() 235 !(attr->prog_flags & BPF_F_XDP_DEV_BOUND_ONLY)) in bpf_prog_dev_bound_init() 239 attr->prog_flags & BPF_F_XDP_DEV_BOUND_ONLY) in bpf_prog_dev_bound_init() 250 prog->aux->offload_requested = !(attr->prog_flags & BPF_F_XDP_DEV_BOUND_ONLY); in bpf_prog_dev_bound_init()
|
| H A D | syscall.c | 2884 if (attr->prog_flags & ~(BPF_F_STRICT_ALIGNMENT | in bpf_prog_load() 2897 if (attr->prog_flags & BPF_F_TOKEN_FD) { in bpf_prog_load() 2917 (attr->prog_flags & BPF_F_ANY_ALIGNMENT) && in bpf_prog_load() 3004 prog->sleepable = !!(attr->prog_flags & BPF_F_SLEEPABLE); in bpf_prog_load() 3009 prog->aux->xdp_has_frags = attr->prog_flags & BPF_F_XDP_HAS_FRAGS; in bpf_prog_load()
|
| H A D | verifier.c | 22385 rnd_hi32 = attr->prog_flags & BPF_F_TEST_RND_HI32; in opt_subreg_zext_lo32_rnd_hi32() 25981 env->strict_alignment = !!(attr->prog_flags & BPF_F_STRICT_ALIGNMENT); in bpf_check() 25984 if (attr->prog_flags & BPF_F_ANY_ALIGNMENT) in bpf_check() 25988 env->test_state_freq = attr->prog_flags & BPF_F_TEST_STATE_FREQ; in bpf_check() 25989 env->test_reg_invariants = attr->prog_flags & BPF_F_TEST_REG_INVARIANTS; in bpf_check()
|
| /linux/tools/build/feature/ |
| H A D | test-bpf.c | 41 attr.prog_flags = 0; in main()
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | xdp_dev_bound_only.c | 13 opts.prog_flags = flags; in load_dummy_prog()
|
| H A D | token.c | 665 prog_opts.prog_flags = BPF_F_TOKEN_FD; in userns_prog_load() 676 prog_opts.prog_flags = 0; in userns_prog_load() 690 prog_opts.prog_flags = BPF_F_TOKEN_FD; in userns_prog_load() 700 prog_opts.prog_flags = 0; in userns_prog_load()
|
| H A D | custom_sec_handlers.c | 25 opts->prog_flags |= BPF_F_SLEEPABLE; in custom_prepare_load_prog()
|
| H A D | tc_opts.c | 672 __u32 prog_ids[4], prog_flags[4]; in test_tc_opts_replace_target() local 717 optq.prog_attach_flags = prog_flags; in test_tc_opts_replace_target() 720 memset(prog_flags, 0, sizeof(prog_flags)); in test_tc_opts_replace_target() 1401 __u32 prog_flags[4], link_flags[4]; in test_tc_opts_mixed_target() local 1519 optq.prog_attach_flags = prog_flags; in test_tc_opts_mixed_target() 1524 memset(prog_flags, 0, sizeof(prog_flags)); in test_tc_opts_mixed_target()
|
| H A D | align.c | 608 .prog_flags = BPF_F_STRICT_ALIGNMENT, in do_test_single()
|
| H A D | reg_bounds.c | 910 .prog_flags = testing_prog_flags(), in load_range_cmp_prog()
|
| /linux/tools/bpf/bpftool/ |
| H A D | net.c | 467 __u32 prog_flags[64] = {}, link_flags[64] = {}, i, j; in __show_dev_tc_bpf() local 474 optq.prog_attach_flags = prog_flags; in __show_dev_tc_bpf() 492 if (prog_flags[i] || json_output) { in __show_dev_tc_bpf() 494 for (j = 0; prog_flags[i] && j < 32; j++) { in __show_dev_tc_bpf() 495 if (!(prog_flags[i] & (1U << j))) in __show_dev_tc_bpf()
|
| /linux/include/uapi/linux/ |
| H A D | bpf.h | 1595 __u32 prog_flags; 1627 * If provided, prog_flags should have BPF_F_TOKEN_FD flag set. 1569 __u32 prog_flags; global() member
|
| /linux/tools/include/uapi/linux/ |
| H A D | bpf.h | 1595 __u32 prog_flags; 1627 * If provided, prog_flags should have BPF_F_TOKEN_FD flag set. 1569 __u32 prog_flags; global() member
|