Home
last modified time | relevance | path

Searched refs:prog_flags (Results 1 – 20 of 20) sorted by relevance

/linux/tools/lib/bpf/
H A Dfeatures.c39 attr.prog_flags |= BPF_F_TOKEN_FD; in probe_kern_prog_name()
61 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_kern_global_data()
228 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_kern_exp_attach_type()
249 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_kern_probe_read_kernel()
277 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_prog_bind_map()
340 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_perf_link()
367 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_uprobe_multi_link()
435 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_kern_bpf_cookie()
489 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_kern_arg_ctx_tag()
520 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_ldimm64_full_range_off()
H A Dlibbpf_probes.c156 opts.prog_flags = BPF_F_SLEEPABLE; in probe_prog_load()
H A Dlibbpf.c512 __u32 prog_flags; member
5126 .prog_flags = obj->token_fd ? BPF_F_TOKEN_FD : 0, in bpf_object__probe_loading()
7726 opts->prog_flags |= BPF_F_SLEEPABLE; in libbpf_prepare_prog_load()
7729 opts->prog_flags |= BPF_F_XDP_HAS_FRAGS; in libbpf_prepare_prog_load()
7841 load_attr.prog_flags = prog->prog_flags; in bpf_object_load_prog()
7846 load_attr.prog_flags |= BPF_F_TOKEN_FD; in bpf_object_load_prog()
9735 return prog->prog_flags; in bpf_program__flags()
9743 prog->prog_flags = flags; in bpf_program__set_flags()
/linux/tools/testing/selftests/bpf/
H A Dtest_loader.c89 int prog_flags;
427 spec->prog_flags = testing_prog_flags(); in parse_test_spec()
561 update_flags(&spec->prog_flags, BPF_F_STRICT_ALIGNMENT, clear); in parse_test_spec()
563 update_flags(&spec->prog_flags, BPF_F_ANY_ALIGNMENT, clear); in parse_test_spec()
565 update_flags(&spec->prog_flags, BPF_F_TEST_RND_HI32, clear); in parse_test_spec()
567 update_flags(&spec->prog_flags, BPF_F_TEST_STATE_FREQ, clear); in parse_test_spec()
569 update_flags(&spec->prog_flags, BPF_F_SLEEPABLE, clear); in parse_test_spec()
571 update_flags(&spec->prog_flags, BPF_F_XDP_HAS_FRAGS, clear); in parse_test_spec()
573 update_flags(&spec->prog_flags, BPF_F_TEST_REG_INVARIANTS, clear); in parse_test_spec()
578 update_flags(&spec->prog_flags, flag in parse_test_spec()
93 int prog_flags; global() member
665 int min_log_level = 0, prog_flags; prepare_case() local
[all...]
H A Dtest_lirc_mode2_user.c55 u32 prog_ids[10], prog_flags[10], prog_cnt; in main() local
89 ret = bpf_prog_query(lircfd, BPF_LIRC_MODE2, 0, prog_flags, prog_ids, in main()
157 ret = bpf_prog_query(lircfd, BPF_LIRC_MODE2, 0, prog_flags, prog_ids, in main()
H A Dtesting_helpers.c260 static int prog_flags[] = { BPF_F_TEST_RND_HI32, BPF_F_TEST_REG_INVARIANTS }; in testing_prog_flags() local
271 for (i = 0; i < ARRAY_SIZE(prog_flags); i++) { in testing_prog_flags()
272 opts.prog_flags = prog_flags[i]; in testing_prog_flags()
276 flags |= prog_flags[i]; in testing_prog_flags()
332 .prog_flags = testing_prog_flags(), in bpf_test_load_program()
H A Dtest_verifier.c1568 opts.prog_flags = pflags; in do_test_single()
/linux/kernel/bpf/
H A Doffload.c228 if (attr->prog_flags & ~(BPF_F_XDP_DEV_BOUND_ONLY | BPF_F_XDP_HAS_FRAGS)) in bpf_prog_dev_bound_init()
234 if (attr->prog_flags & BPF_F_XDP_HAS_FRAGS && in bpf_prog_dev_bound_init()
235 !(attr->prog_flags & BPF_F_XDP_DEV_BOUND_ONLY)) in bpf_prog_dev_bound_init()
239 attr->prog_flags & BPF_F_XDP_DEV_BOUND_ONLY) in bpf_prog_dev_bound_init()
250 prog->aux->offload_requested = !(attr->prog_flags & BPF_F_XDP_DEV_BOUND_ONLY); in bpf_prog_dev_bound_init()
H A Dsyscall.c2884 if (attr->prog_flags & ~(BPF_F_STRICT_ALIGNMENT | in bpf_prog_load()
2897 if (attr->prog_flags & BPF_F_TOKEN_FD) { in bpf_prog_load()
2917 (attr->prog_flags & BPF_F_ANY_ALIGNMENT) && in bpf_prog_load()
3004 prog->sleepable = !!(attr->prog_flags & BPF_F_SLEEPABLE); in bpf_prog_load()
3009 prog->aux->xdp_has_frags = attr->prog_flags & BPF_F_XDP_HAS_FRAGS; in bpf_prog_load()
H A Dverifier.c22385 rnd_hi32 = attr->prog_flags & BPF_F_TEST_RND_HI32; in opt_subreg_zext_lo32_rnd_hi32()
25981 env->strict_alignment = !!(attr->prog_flags & BPF_F_STRICT_ALIGNMENT); in bpf_check()
25984 if (attr->prog_flags & BPF_F_ANY_ALIGNMENT) in bpf_check()
25988 env->test_state_freq = attr->prog_flags & BPF_F_TEST_STATE_FREQ; in bpf_check()
25989 env->test_reg_invariants = attr->prog_flags & BPF_F_TEST_REG_INVARIANTS; in bpf_check()
/linux/tools/build/feature/
H A Dtest-bpf.c41 attr.prog_flags = 0; in main()
/linux/tools/testing/selftests/bpf/prog_tests/
H A Dxdp_dev_bound_only.c13 opts.prog_flags = flags; in load_dummy_prog()
H A Dtoken.c665 prog_opts.prog_flags = BPF_F_TOKEN_FD; in userns_prog_load()
676 prog_opts.prog_flags = 0; in userns_prog_load()
690 prog_opts.prog_flags = BPF_F_TOKEN_FD; in userns_prog_load()
700 prog_opts.prog_flags = 0; in userns_prog_load()
H A Dcustom_sec_handlers.c25 opts->prog_flags |= BPF_F_SLEEPABLE; in custom_prepare_load_prog()
H A Dtc_opts.c672 __u32 prog_ids[4], prog_flags[4]; in test_tc_opts_replace_target() local
717 optq.prog_attach_flags = prog_flags; in test_tc_opts_replace_target()
720 memset(prog_flags, 0, sizeof(prog_flags)); in test_tc_opts_replace_target()
1401 __u32 prog_flags[4], link_flags[4]; in test_tc_opts_mixed_target() local
1519 optq.prog_attach_flags = prog_flags; in test_tc_opts_mixed_target()
1524 memset(prog_flags, 0, sizeof(prog_flags)); in test_tc_opts_mixed_target()
H A Dalign.c608 .prog_flags = BPF_F_STRICT_ALIGNMENT, in do_test_single()
H A Dreg_bounds.c910 .prog_flags = testing_prog_flags(), in load_range_cmp_prog()
/linux/tools/bpf/bpftool/
H A Dnet.c467 __u32 prog_flags[64] = {}, link_flags[64] = {}, i, j; in __show_dev_tc_bpf() local
474 optq.prog_attach_flags = prog_flags; in __show_dev_tc_bpf()
492 if (prog_flags[i] || json_output) { in __show_dev_tc_bpf()
494 for (j = 0; prog_flags[i] && j < 32; j++) { in __show_dev_tc_bpf()
495 if (!(prog_flags[i] & (1U << j))) in __show_dev_tc_bpf()
/linux/include/uapi/linux/
H A Dbpf.h1595 __u32 prog_flags;
1627 * If provided, prog_flags should have BPF_F_TOKEN_FD flag set.
1569 __u32 prog_flags; global() member
/linux/tools/include/uapi/linux/
H A Dbpf.h1595 __u32 prog_flags;
1627 * If provided, prog_flags should have BPF_F_TOKEN_FD flag set.
1569 __u32 prog_flags; global() member