Searched refs:BPF_CGROUP_INET4_BIND (Results 1 – 11 of 11) sorted by relevance
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | section_names.c | 108 {0, BPF_PROG_TYPE_CGROUP_SOCK_ADDR, BPF_CGROUP_INET4_BIND}, 109 {0, BPF_CGROUP_INET4_BIND},
|
/openbmc/linux/tools/testing/selftests/bpf/ |
H A D | test_sock_addr.c | 112 BPF_CGROUP_INET4_BIND, 125 BPF_CGROUP_INET4_BIND, 139 BPF_CGROUP_INET4_BIND, 140 BPF_CGROUP_INET4_BIND, 153 BPF_CGROUP_INET4_BIND, 154 BPF_CGROUP_INET4_BIND, 167 BPF_CGROUP_INET4_BIND, 182 BPF_CGROUP_INET4_BIND, 1343 case BPF_CGROUP_INET4_BIND: in run_test_case()
|
H A D | veristat.c | 843 { "bpf_sock_addr", "bpf_sock_addr_kern", BPF_PROG_TYPE_CGROUP_SOCK_ADDR, BPF_CGROUP_INET4_BIND }, in guess_prog_type_by_ctx_name()
|
/openbmc/linux/Documentation/bpf/libbpf/ |
H A D | program_types.rst | 36 | ``BPF_PROG_TYPE_CGROUP_SOCK_ADDR`` | ``BPF_CGROUP_INET4_BIND`` | ``cgroup/bin…
|
/openbmc/linux/tools/bpf/bpftool/ |
H A D | common.c | 1143 case BPF_CGROUP_INET4_BIND: return "bind4"; in bpf_attach_type_input_str()
|
/openbmc/linux/tools/include/uapi/linux/ |
H A D | bpf.h | 1019 BPF_CGROUP_INET4_BIND, enumerator
|
/openbmc/linux/include/uapi/linux/ |
H A D | bpf.h | 1019 BPF_CGROUP_INET4_BIND, enumerator
|
/openbmc/linux/kernel/bpf/ |
H A D | syscall.c | 2476 case BPF_CGROUP_INET4_BIND: in bpf_prog_load_check_attach() 3770 case BPF_CGROUP_INET4_BIND: in attach_type_to_prog_type() 4046 case BPF_CGROUP_INET4_BIND: in bpf_prog_query()
|
H A D | verifier.c | 15006 if (env->prog->expected_attach_type == BPF_CGROUP_INET4_BIND || in check_return_code()
|
/openbmc/linux/net/core/ |
H A D | filter.c | 7954 case BPF_CGROUP_INET4_BIND: in sock_addr_func_proto() 7972 case BPF_CGROUP_INET4_BIND: in sock_addr_func_proto() 9037 case BPF_CGROUP_INET4_BIND: in sock_addr_is_valid_access()
|
/openbmc/linux/tools/lib/bpf/ |
H A D | libbpf.c | 82 [BPF_CGROUP_INET4_BIND] = "cgroup_inet4_bind", 8847 SEC_DEF("cgroup/bind4", CGROUP_SOCK_ADDR, BPF_CGROUP_INET4_BIND, SEC_ATTACHABLE),
|