/Linux-v4.19/samples/bpf/ |
D | test_cgrp2_attach2.c | 86 if (bpf_prog_attach(drop_prog, foo, BPF_CGROUP_INET_EGRESS, in test_foo_bar() 106 if (bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar() 124 if (bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar() 139 if (bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar() 145 if (!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 0)) { in test_foo_bar() 162 if (bpf_prog_attach(allow_prog, foo, BPF_CGROUP_INET_EGRESS, 0)) { in test_foo_bar() 167 if (!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 0)) { in test_foo_bar() 173 if (!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar() 180 if (!bpf_prog_attach(allow_prog, foo, BPF_CGROUP_INET_EGRESS, in test_foo_bar() 187 if (bpf_prog_attach(drop_prog, foo, BPF_CGROUP_INET_EGRESS, 0)) { in test_foo_bar() [all …]
|
D | test_cgrp2_sock2.c | 59 ret = bpf_prog_attach(prog_fd[filter_id], cg_fd, in main()
|
D | load_sock_ops.c | 87 error = bpf_prog_attach(prog_fd[0], cg_fd, BPF_CGROUP_SOCK_OPS, 0); in main()
|
D | test_cgrp2_attach.c | 108 ret = bpf_prog_attach(prog_fd, cg_fd, type, 0); in attach_filter()
|
D | test_cgrp2_sock.c | 272 ret = bpf_prog_attach(prog_fd, cg_fd, in main()
|
/Linux-v4.19/tools/testing/selftests/bpf/ |
D | test_maps.c | 595 err = bpf_prog_attach(-1, fd, BPF_SK_SKB_STREAM_PARSER, 0); in test_sockmap() 601 err = bpf_prog_attach(-1, fd, BPF_SK_SKB_STREAM_VERDICT, 0); in test_sockmap() 607 err = bpf_prog_attach(-1, fd, BPF_SK_MSG_VERDICT, 0); in test_sockmap() 613 err = bpf_prog_attach(-1, fd, __MAX_BPF_ATTACH_TYPE, 0); in test_sockmap() 713 err = bpf_prog_attach(parse_prog, map_fd_break, in test_sockmap() 720 err = bpf_prog_attach(parse_prog, map_fd_rx, in test_sockmap() 727 err = bpf_prog_attach(verdict_prog, map_fd_rx, in test_sockmap() 734 err = bpf_prog_attach(msg_prog, map_fd_msg, BPF_SK_MSG_VERDICT, 0); in test_sockmap() 740 err = bpf_prog_attach(verdict_prog, map_fd_rx, in test_sockmap() 861 err = bpf_prog_attach(parse_prog, fd, in test_sockmap() [all …]
|
D | test_dev_cgroup.c | 57 if (bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_DEVICE, 0)) { in main()
|
D | test_lirc_mode2_user.c | 98 ret = bpf_prog_attach(progfd, lircfd, BPF_LIRC_MODE2, 0); in main()
|
D | test_cgroup_storage.c | 69 if (bpf_prog_attach(prog_fd, cgroup_fd, BPF_CGROUP_INET_EGRESS, 0)) { in main()
|
D | test_tcpbpf_user.c | 97 rv = bpf_prog_attach(prog_fd, cg_fd, BPF_CGROUP_SOCK_OPS, 0); in main()
|
D | test_socket_cookie.c | 170 err = bpf_prog_attach(bpf_program__fd(prog), cgfd, attach_type, in run_test()
|
D | test_sockmap.c | 629 err = bpf_prog_attach(prog_fd[0], map_fd[0], in run_options() 638 err = bpf_prog_attach(prog_fd[1], map_fd[0], in run_options() 647 err = bpf_prog_attach(prog_fd[2], cg_fd, BPF_CGROUP_SOCK_OPS, 0); in run_options() 683 err = bpf_prog_attach(tx_prog_fd, in run_options()
|
D | test_sock.c | 342 return bpf_prog_attach(progfd, cgfd, attach_type, BPF_F_ALLOW_OVERRIDE); in attach_sock_prog()
|
D | test_sock_addr.c | 1295 err = bpf_prog_attach(progfd, cgfd, test->attach_type, in run_test_case()
|
/Linux-v4.19/tools/lib/bpf/ |
D | bpf.h | 93 int bpf_prog_attach(int prog_fd, int attachable_fd, enum bpf_attach_type type,
|
D | bpf.c | 333 int bpf_prog_attach(int prog_fd, int target_fd, enum bpf_attach_type type, in bpf_prog_attach() function
|
/Linux-v4.19/tools/bpf/bpftool/ |
D | cgroup.c | 375 if (bpf_prog_attach(prog_fd, cgroup_fd, attach_type, attach_flags)) { in do_attach()
|
/Linux-v4.19/kernel/bpf/ |
D | syscall.c | 1570 static int bpf_prog_attach(const union bpf_attr *attr) in bpf_prog_attach() function 2381 err = bpf_prog_attach(&attr); in SYSCALL_DEFINE3()
|