/Linux-v4.19/tools/testing/selftests/bpf/ |
D | test_verifier.c | 79 enum bpf_prog_type prog_type; member 278 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 290 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 302 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 314 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 328 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 340 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 352 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 364 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 376 .prog_type = BPF_PROG_TYPE_SCHED_CLS, [all …]
|
D | test_align.c | 39 enum bpf_prog_type prog_type; member 59 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 87 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 116 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 138 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 181 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 214 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 254 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 313 .prog_type = BPF_PROG_TYPE_SCHED_CLS, 403 .prog_type = BPF_PROG_TYPE_SCHED_CLS, [all …]
|
D | test_verifier_log.c | 53 attr.prog_type = BPF_PROG_TYPE_SOCKET_FILTER; in load()
|
D | test_socket_cookie.c | 150 attr.prog_type = BPF_PROG_TYPE_UNSPEC; in run_test()
|
D | test_sock.c | 330 attr.prog_type = BPF_PROG_TYPE_CGROUP_SOCK; in load_sock_prog()
|
D | test_select_reuseport.c | 92 .prog_type = BPF_PROG_TYPE_SK_REUSEPORT, in prepare_bpf_obj() 101 bpf_program__set_type(prog, attr.prog_type); in prepare_bpf_obj()
|
D | test_sock_addr.c | 526 load_attr.prog_type = BPF_PROG_TYPE_CGROUP_SOCK_ADDR; in load_insns() 695 attr.prog_type = BPF_PROG_TYPE_CGROUP_SOCK_ADDR; in load_path()
|
D | test_offload.py | 205 def bpftool_prog_load(sample, file_name, maps=[], prog_type="xdp", dev=None, argument 208 if prog_type is not None: 209 args += " type " + prog_type
|
/Linux-v4.19/samples/bpf/ |
D | bpf_load.c | 73 enum bpf_prog_type prog_type; in load_and_attach() local 84 prog_type = BPF_PROG_TYPE_SOCKET_FILTER; in load_and_attach() 86 prog_type = BPF_PROG_TYPE_KPROBE; in load_and_attach() 88 prog_type = BPF_PROG_TYPE_TRACEPOINT; in load_and_attach() 90 prog_type = BPF_PROG_TYPE_RAW_TRACEPOINT; in load_and_attach() 92 prog_type = BPF_PROG_TYPE_XDP; in load_and_attach() 94 prog_type = BPF_PROG_TYPE_PERF_EVENT; in load_and_attach() 96 prog_type = BPF_PROG_TYPE_CGROUP_SKB; in load_and_attach() 98 prog_type = BPF_PROG_TYPE_CGROUP_SOCK; in load_and_attach() 100 prog_type = BPF_PROG_TYPE_SOCK_OPS; in load_and_attach() [all …]
|
D | xdp1_user.c | 75 .prog_type = BPF_PROG_TYPE_XDP, in main()
|
D | xdp_fwd_user.c | 66 .prog_type = BPF_PROG_TYPE_XDP, in main()
|
D | xdp_adjust_tail_user.c | 70 .prog_type = BPF_PROG_TYPE_XDP, in main()
|
D | xdp_sample_pkts_user.c | 103 .prog_type = BPF_PROG_TYPE_XDP, in main()
|
D | xdp_rxq_info_user.c | 447 .prog_type = BPF_PROG_TYPE_XDP, in main()
|
/Linux-v4.19/tools/lib/bpf/ |
D | libbpf.c | 1317 load_attr.prog_type = type; in load_program() 1356 if (load_attr.prog_type != BPF_PROG_TYPE_KPROBE) { in load_program() 1359 load_attr.prog_type = BPF_PROG_TYPE_KPROBE; in load_program() 1564 bpf_prog_type__needs_kver(attr->prog_type)); in bpf_object__open_xattr() 1571 .prog_type = BPF_PROG_TYPE_UNSPEC, in bpf_object__open() 2101 enum bpf_prog_type prog_type; member 2139 int libbpf_prog_type_by_name(const char *name, enum bpf_prog_type *prog_type, in libbpf_prog_type_by_name() argument 2150 *prog_type = section_names[i].prog_type; in libbpf_prog_type_by_name() 2159 enum bpf_prog_type *prog_type, in bpf_program__identify_section() argument 2162 return libbpf_prog_type_by_name(prog->section_name, prog_type, in bpf_program__identify_section() [all …]
|
D | libbpf.h | 71 enum bpf_prog_type prog_type; member 104 int libbpf_prog_type_by_name(const char *name, enum bpf_prog_type *prog_type, 276 enum bpf_prog_type prog_type; member
|
D | bpf.c | 197 attr.prog_type = load_attr->prog_type; in bpf_load_program_xattr() 230 load_attr.prog_type = type; in bpf_load_program() 249 attr.prog_type = type; in bpf_verify_program()
|
D | bpf.h | 62 enum bpf_prog_type prog_type; member
|
/Linux-v4.19/tools/bpf/bpftool/ |
D | prog.c | 703 .prog_type = BPF_PROG_TYPE_UNSPEC, in do_load() 726 if (attr.prog_type != BPF_PROG_TYPE_UNSPEC) { in do_load() 743 err = libbpf_prog_type_by_name(type, &attr.prog_type, in do_load() 832 if (attr.prog_type == BPF_PROG_TYPE_UNSPEC) { in do_load() 835 err = libbpf_prog_type_by_name(sec_name, &attr.prog_type, in do_load() 843 bpf_program__set_type(prog, attr.prog_type); in do_load()
|
/Linux-v4.19/tools/build/feature/ |
D | test-bpf.c | 27 attr.prog_type = BPF_PROG_TYPE_KPROBE; in main()
|
/Linux-v4.19/tools/testing/selftests/net/ |
D | reuseport_bpf_numa.c | 88 attr.prog_type = BPF_PROG_TYPE_SOCKET_FILTER; in attach_bpf()
|
D | reuseport_bpf.c | 113 attr.prog_type = BPF_PROG_TYPE_SOCKET_FILTER; in attach_ebpf() 356 eprog.prog_type = BPF_PROG_TYPE_SOCKET_FILTER; in test_filter_no_reuseport()
|
D | psock_fanout.c | 164 attr.prog_type = BPF_PROG_TYPE_SOCKET_FILTER; in sock_fanout_set_ebpf()
|
/Linux-v4.19/kernel/bpf/ |
D | offload.c | 84 if (attr->prog_type != BPF_PROG_TYPE_SCHED_CLS && in bpf_prog_offload_init() 85 attr->prog_type != BPF_PROG_TYPE_XDP) in bpf_prog_offload_init()
|
D | syscall.c | 1287 switch (attr->prog_type) { in bpf_prog_load_fixup_attach_type() 1300 bpf_prog_load_check_attach_type(enum bpf_prog_type prog_type, in bpf_prog_load_check_attach_type() argument 1303 switch (prog_type) { in bpf_prog_load_check_attach_type() 1335 enum bpf_prog_type type = attr->prog_type; in bpf_prog_load()
|