Home
last modified time | relevance | path

Searched refs:expected_attach_type (Results 26 – 46 of 46) sorted by relevance

12

/linux/tools/lib/bpf/
H A Dbpf.h77 enum bpf_attach_type expected_attach_type; member
H A Dlibbpf.c392 enum bpf_attach_type expected_attach_type; member
457 enum bpf_attach_type expected_attach_type; member
7308 opts->expected_attach_type = 0; in libbpf_prepare_prog_load()
7440 load_attr.expected_attach_type = prog->expected_attach_type; in bpf_object_load_prog()
7851 prog->expected_attach_type = prog->sec_def->expected_attach_type; in bpf_object_init_progs()
9228 return prog->expected_attach_type; in bpf_program__expected_attach_type()
9237 prog->expected_attach_type = type; in bpf_program__set_expected_attach_type()
9292 .expected_attach_type = atype, \
9604 *expected_attach_type = sec_def->expected_attach_type; in libbpf_prog_type_by_name()
10012 *attach_type = sec_def->expected_attach_type; in libbpf_attach_type_by_name()
[all …]
H A Dgen_loader.c952 attr.expected_attach_type = load_attr->expected_attach_type; in bpf_gen__prog_load()
H A Dbpf.c264 attr.expected_attach_type = OPTS_GET(opts, expected_attach_type, 0); in bpf_prog_load()
H A Dlibbpf.h304 enum bpf_attach_type *expected_attach_type);
/linux/kernel/bpf/
H A Dverifier.c10459 env->prog->expected_attach_type == BPF_LSM_CGROUP) { in check_helper_call()
11717 if (env->prog->expected_attach_type == BPF_TRACE_ITER) in check_css_task_iter_allowlist()
15553 if (prog->expected_attach_type == BPF_LSM_CGROUP) in check_return_code()
15633 switch (env->prog->expected_attach_type) { in check_return_code()
15691 prog->expected_attach_type == BPF_LSM_CGROUP && in check_return_code()
21005 member_idx = prog->expected_attach_type; in check_struct_ops_btf_id()
21197 switch (prog->expected_attach_type) { in bpf_check_attach_target()
21380 switch (prog->expected_attach_type) { in BTF_SET_START()
21436 prog->expected_attach_type = tgt_prog->expected_attach_type; in check_attach_btf_id()
21449 if (prog->expected_attach_type == BPF_TRACE_RAW_TP) { in check_attach_btf_id()
[all …]
H A Dcpumap.c378 if (prog->expected_attach_type != BPF_XDP_CPUMAP || in __cpu_map_load_bpf_program()
H A Dbpf_struct_ops.c701 prog->expected_attach_type != i) { in bpf_struct_ops_map_update_elem()
H A Ddevmap.c878 if (prog->expected_attach_type != BPF_XDP_DEVMAP || in __dev_map_alloc_node()
H A Dbtf.c6178 enum bpf_attach_type atype = prog->expected_attach_type; in prog_args_trusted()
6250 switch (prog->expected_attach_type) { in btf_ctx_access()
7276 prog->expected_attach_type)) in btf_prepare_func_args()
/linux/tools/testing/selftests/bpf/prog_tests/
H A Dfexit_bpf2bpf.c462 .expected_attach_type = BPF_TRACE_FENTRY, in load_fentry()
H A Dtoken.c665 prog_opts.expected_attach_type = BPF_XDP; in userns_prog_load()
/linux/net/bpf/
H A Dtest_run.c683 switch (prog->expected_attach_type) { in bpf_prog_test_run_tracing()
1181 if (prog->expected_attach_type == BPF_XDP_DEVMAP || in bpf_prog_test_run_xdp()
1182 prog->expected_attach_type == BPF_XDP_CPUMAP) in bpf_prog_test_run_xdp()
/linux/include/linux/
H A Dbpf_verifier.h855 return prog->expected_attach_type != BPF_TRACE_ITER; in bpf_prog_check_recur()
H A Dbpf.h1556 enum bpf_attach_type expected_attach_type; /* For some prog types */ member
/linux/net/core/
H A Dbpf_sk_storage.c367 switch (prog->expected_attach_type) { in bpf_sk_storage_tracing_allowed()
H A Dsock_map.c1761 link->prog->expected_attach_type != prog->expected_attach_type) { in sock_map_link_update_prog()
H A Dfilter.c7948 switch (prog->expected_attach_type) { in sock_addr_func_proto()
7976 switch (prog->expected_attach_type) { in sock_addr_func_proto()
7999 switch (prog->expected_attach_type) { in sock_addr_func_proto()
8817 prog->expected_attach_type); in sock_filter_is_valid_access()
8994 if (prog->expected_attach_type != BPF_XDP_DEVMAP) { in xdp_is_valid_access()
9067 switch (prog->expected_attach_type) { in sock_addr_is_valid_access()
9080 switch (prog->expected_attach_type) { in sock_addr_is_valid_access()
9093 switch (prog->expected_attach_type) { in sock_addr_is_valid_access()
9102 switch (prog->expected_attach_type) { in sock_addr_is_valid_access()
12115 prog->expected_attach_type != BPF_TRACE_ITER) in BTF_ID_FLAGS()
H A Ddev.c9491 if (new_prog->expected_attach_type == BPF_XDP_DEVMAP) { in dev_xdp_attach()
9495 if (new_prog->expected_attach_type == BPF_XDP_CPUMAP) { in dev_xdp_attach()
9631 old_prog->expected_attach_type != new_prog->expected_attach_type) { in bpf_xdp_link_update()
/linux/include/uapi/linux/
H A Dbpf.h1542 __u32 expected_attach_type; member
/linux/tools/include/uapi/linux/
H A Dbpf.h1542 __u32 expected_attach_type; member

12