/linux-6.14.4/tools/lib/bpf/ |
D | features.c | 40 attr.prog_flags |= BPF_F_TOKEN_FD; in probe_kern_prog_name() 62 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_kern_global_data() 229 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_kern_exp_attach_type() 250 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_kern_probe_read_kernel() 278 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_prog_bind_map() 341 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_perf_link() 368 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_uprobe_multi_link() 436 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_kern_bpf_cookie() 490 .prog_flags = token_fd ? BPF_F_TOKEN_FD : 0, in probe_kern_arg_ctx_tag()
|
D | skel_internal.h | 340 attr.prog_flags = BPF_F_SLEEPABLE; in bpf_load_and_run()
|
D | libbpf_probes.c | 156 opts.prog_flags = BPF_F_SLEEPABLE; in probe_prog_load()
|
D | bpf.h | 79 __u32 prog_flags; member
|
D | bpf.c | 125 attr.prog_flags |= BPF_F_TOKEN_FD; in probe_memcg_account() 267 attr.prog_flags = OPTS_GET(opts, prog_flags, 0); in bpf_prog_load()
|
D | gen_loader.c | 1025 attr.prog_flags = tgt_endian(load_attr->prog_flags); in bpf_gen__prog_load()
|
D | libbpf.c | 496 __u32 prog_flags; member 5023 .prog_flags = obj->token_fd ? BPF_F_TOKEN_FD : 0, in bpf_object__probe_loading() 7406 opts->prog_flags |= BPF_F_SLEEPABLE; in libbpf_prepare_prog_load() 7409 opts->prog_flags |= BPF_F_XDP_HAS_FRAGS; in libbpf_prepare_prog_load() 7521 load_attr.prog_flags = prog->prog_flags; in bpf_object_load_prog() 7526 load_attr.prog_flags |= BPF_F_TOKEN_FD; in bpf_object_load_prog() 9347 return prog->prog_flags; in bpf_program__flags() 9355 prog->prog_flags = flags; in bpf_program__set_flags()
|
/linux-6.14.4/tools/testing/selftests/bpf/ |
D | test_lirc_mode2_user.c | 55 u32 prog_ids[10], prog_flags[10], prog_cnt; in main() local 89 ret = bpf_prog_query(lircfd, BPF_LIRC_MODE2, 0, prog_flags, prog_ids, in main() 157 ret = bpf_prog_query(lircfd, BPF_LIRC_MODE2, 0, prog_flags, prog_ids, in main()
|
D | test_loader.c | 87 int prog_flags; member 415 spec->prog_flags = testing_prog_flags(); in parse_test_spec() 539 update_flags(&spec->prog_flags, BPF_F_STRICT_ALIGNMENT, clear); in parse_test_spec() 541 update_flags(&spec->prog_flags, BPF_F_ANY_ALIGNMENT, clear); in parse_test_spec() 543 update_flags(&spec->prog_flags, BPF_F_TEST_RND_HI32, clear); in parse_test_spec() 545 update_flags(&spec->prog_flags, BPF_F_TEST_STATE_FREQ, clear); in parse_test_spec() 547 update_flags(&spec->prog_flags, BPF_F_SLEEPABLE, clear); in parse_test_spec() 549 update_flags(&spec->prog_flags, BPF_F_XDP_HAS_FRAGS, clear); in parse_test_spec() 551 update_flags(&spec->prog_flags, BPF_F_TEST_REG_INVARIANTS, clear); in parse_test_spec() 556 update_flags(&spec->prog_flags, flags, clear); in parse_test_spec() [all …]
|
D | testing_helpers.c | 259 static int prog_flags[] = { BPF_F_TEST_RND_HI32, BPF_F_TEST_REG_INVARIANTS }; in testing_prog_flags() local 270 for (i = 0; i < ARRAY_SIZE(prog_flags); i++) { in testing_prog_flags() 271 opts.prog_flags = prog_flags[i]; in testing_prog_flags() 275 flags |= prog_flags[i]; in testing_prog_flags() 331 .prog_flags = testing_prog_flags(), in bpf_test_load_program()
|
D | test_verifier.c | 1568 opts.prog_flags = pflags; in do_test_single()
|
/linux-6.14.4/tools/build/feature/ |
D | test-bpf.c | 41 attr.prog_flags = 0; in main()
|
/linux-6.14.4/kernel/bpf/ |
D | offload.c | 237 if (attr->prog_flags & ~(BPF_F_XDP_DEV_BOUND_ONLY | BPF_F_XDP_HAS_FRAGS)) in bpf_prog_dev_bound_init() 243 if (attr->prog_flags & BPF_F_XDP_HAS_FRAGS && in bpf_prog_dev_bound_init() 244 !(attr->prog_flags & BPF_F_XDP_DEV_BOUND_ONLY)) in bpf_prog_dev_bound_init() 248 attr->prog_flags & BPF_F_XDP_DEV_BOUND_ONLY) in bpf_prog_dev_bound_init() 259 prog->aux->offload_requested = !(attr->prog_flags & BPF_F_XDP_DEV_BOUND_ONLY); in bpf_prog_dev_bound_init()
|
D | syscall.c | 2753 if (attr->prog_flags & ~(BPF_F_STRICT_ALIGNMENT | in bpf_prog_load() 2766 if (attr->prog_flags & BPF_F_TOKEN_FD) { in bpf_prog_load() 2786 (attr->prog_flags & BPF_F_ANY_ALIGNMENT) && in bpf_prog_load() 2873 prog->sleepable = !!(attr->prog_flags & BPF_F_SLEEPABLE); in bpf_prog_load() 2878 prog->aux->xdp_has_frags = attr->prog_flags & BPF_F_XDP_HAS_FRAGS; in bpf_prog_load()
|
D | verifier.c | 20239 rnd_hi32 = attr->prog_flags & BPF_F_TEST_RND_HI32; in opt_subreg_zext_lo32_rnd_hi32() 23112 env->strict_alignment = !!(attr->prog_flags & BPF_F_STRICT_ALIGNMENT); in bpf_check() 23115 if (attr->prog_flags & BPF_F_ANY_ALIGNMENT) in bpf_check() 23119 env->test_state_freq = attr->prog_flags & BPF_F_TEST_STATE_FREQ; in bpf_check() 23120 env->test_reg_invariants = attr->prog_flags & BPF_F_TEST_REG_INVARIANTS; in bpf_check()
|
/linux-6.14.4/tools/testing/selftests/bpf/prog_tests/ |
D | xdp_dev_bound_only.c | 13 opts.prog_flags = flags; in load_dummy_prog()
|
D | token.c | 663 prog_opts.prog_flags = BPF_F_TOKEN_FD; in userns_prog_load() 674 prog_opts.prog_flags = 0; in userns_prog_load() 688 prog_opts.prog_flags = BPF_F_TOKEN_FD; in userns_prog_load() 698 prog_opts.prog_flags = 0; in userns_prog_load()
|
D | custom_sec_handlers.c | 25 opts->prog_flags |= BPF_F_SLEEPABLE; in custom_prepare_load_prog()
|
D | tc_opts.c | 672 __u32 prog_ids[4], prog_flags[4]; in test_tc_opts_replace_target() local 717 optq.prog_attach_flags = prog_flags; in test_tc_opts_replace_target() 720 memset(prog_flags, 0, sizeof(prog_flags)); in test_tc_opts_replace_target() 1403 __u32 prog_flags[4], link_flags[4]; in test_tc_opts_mixed_target() local 1521 optq.prog_attach_flags = prog_flags; in test_tc_opts_mixed_target() 1526 memset(prog_flags, 0, sizeof(prog_flags)); in test_tc_opts_mixed_target()
|
D | align.c | 608 .prog_flags = BPF_F_STRICT_ALIGNMENT, in do_test_single()
|
D | reg_bounds.c | 856 .prog_flags = testing_prog_flags(), in load_range_cmp_prog()
|
/linux-6.14.4/tools/bpf/bpftool/ |
D | net.c | 461 __u32 prog_flags[64] = {}, link_flags[64] = {}, i, j; in __show_dev_tc_bpf() local 468 optq.prog_attach_flags = prog_flags; in __show_dev_tc_bpf() 486 if (prog_flags[i] || json_output) { in __show_dev_tc_bpf() 488 for (j = 0; prog_flags[i] && j < 32; j++) { in __show_dev_tc_bpf() 489 if (!(prog_flags[i] & (1U << j))) in __show_dev_tc_bpf()
|
/linux-6.14.4/tools/include/uapi/linux/ |
D | bpf.h | 1541 __u32 prog_flags; member
|
/linux-6.14.4/include/uapi/linux/ |
D | bpf.h | 1541 __u32 prog_flags; member
|