Searched refs:BPF_CGROUP_INET4_BIND (Results 1 – 12 of 12) sorted by relevance
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | section_names.c | 108 {0, BPF_PROG_TYPE_CGROUP_SOCK_ADDR, BPF_CGROUP_INET4_BIND}, 109 {0, BPF_CGROUP_INET4_BIND},
|
H A D | sock_addr.c | 493 BPF_CGROUP_INET4_BIND, 509 BPF_CGROUP_INET4_BIND, 525 BPF_CGROUP_INET4_BIND, 541 BPF_CGROUP_INET4_BIND, 653 BPF_CGROUP_INET4_BIND, 669 BPF_CGROUP_INET4_BIND, 687 BPF_CGROUP_INET4_BIND, 703 BPF_CGROUP_INET4_BIND, 719 BPF_CGROUP_INET4_BIND, 735 BPF_CGROUP_INET4_BIND,
|
/linux/Documentation/bpf/libbpf/ |
H A D | program_types.rst | 36 | ``BPF_PROG_TYPE_CGROUP_SOCK_ADDR`` | ``BPF_CGROUP_INET4_BIND`` | ``cgroup/bin…
|
/linux/tools/bpf/bpftool/ |
H A D | cgroup.c | 27 BPF_CGROUP_INET4_BIND,
|
H A D | common.c | 1143 case BPF_CGROUP_INET4_BIND: return "bind4"; in bpf_attach_type_input_str()
|
/linux/include/uapi/linux/ |
H A D | bpf.h | 1070 BPF_CGROUP_INET4_BIND, enumerator
|
/linux/tools/include/uapi/linux/ |
H A D | bpf.h | 1070 BPF_CGROUP_INET4_BIND, enumerator
|
/linux/kernel/bpf/ |
H A D | syscall.c | 2625 case BPF_CGROUP_INET4_BIND: in bpf_prog_load_check_attach() 4035 case BPF_CGROUP_INET4_BIND: in attach_type_to_prog_type() 4336 case BPF_CGROUP_INET4_BIND: in bpf_prog_query()
|
H A D | verifier.c | 16472 if (env->prog->expected_attach_type == BPF_CGROUP_INET4_BIND || in check_return_code()
|
/linux/tools/testing/selftests/bpf/ |
H A D | veristat.c | 1031 { "bpf_sock_addr", "bpf_sock_addr_kern", BPF_PROG_TYPE_CGROUP_SOCK_ADDR, BPF_CGROUP_INET4_BIND }, in guess_prog_type_by_ctx_name()
|
/linux/net/core/ |
H A D | filter.c | 8019 case BPF_CGROUP_INET4_BIND: in sock_addr_func_proto() 8042 case BPF_CGROUP_INET4_BIND: in sock_addr_func_proto() 9124 case BPF_CGROUP_INET4_BIND: in sock_addr_is_valid_access()
|
/linux/tools/lib/bpf/ |
H A D | libbpf.c | 85 [BPF_CGROUP_INET4_BIND] = "cgroup_inet4_bind", 9494 SEC_DEF("cgroup/bind4", CGROUP_SOCK_ADDR, BPF_CGROUP_INET4_BIND, SEC_ATTACHABLE),
|