Searched refs:BPF_CGROUP_UDP6_SENDMSG (Results 1 – 11 of 11) sorted by relevance
| /Linux-v5.10/tools/testing/selftests/bpf/verifier/ |
| D | ctx.c | 103 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, 116 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, 129 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, 143 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG,
|
| D | wide_access.c | 12 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \ 49 .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \
|
| /Linux-v5.10/tools/testing/selftests/bpf/ |
| D | test_sock_addr.c | 336 BPF_CGROUP_UDP6_SENDMSG, 351 BPF_CGROUP_UDP6_SENDMSG, 407 BPF_CGROUP_UDP6_SENDMSG, 420 BPF_CGROUP_UDP6_SENDMSG, 434 BPF_CGROUP_UDP6_SENDMSG, 435 BPF_CGROUP_UDP6_SENDMSG, 448 BPF_CGROUP_UDP6_SENDMSG, 449 BPF_CGROUP_UDP6_SENDMSG, 462 BPF_CGROUP_UDP6_SENDMSG, 463 BPF_CGROUP_UDP6_SENDMSG, [all …]
|
| /Linux-v5.10/tools/testing/selftests/bpf/prog_tests/ |
| D | section_names.c | 133 {0, BPF_PROG_TYPE_CGROUP_SOCK_ADDR, BPF_CGROUP_UDP6_SENDMSG}, 134 {0, BPF_CGROUP_UDP6_SENDMSG},
|
| /Linux-v5.10/include/linux/ |
| D | bpf-cgroup.h | 274 BPF_CGROUP_RUN_SA_PROG_LOCK(sk, uaddr, BPF_CGROUP_UDP6_SENDMSG, t_ctx)
|
| /Linux-v5.10/tools/bpf/bpftool/ |
| D | common.c | 51 [BPF_CGROUP_UDP6_SENDMSG] = "sendmsg6",
|
| /Linux-v5.10/tools/include/uapi/linux/ |
| D | bpf.h | 220 BPF_CGROUP_UDP6_SENDMSG, enumerator
|
| /Linux-v5.10/include/uapi/linux/ |
| D | bpf.h | 220 BPF_CGROUP_UDP6_SENDMSG, enumerator
|
| /Linux-v5.10/kernel/bpf/ |
| D | syscall.c | 2011 case BPF_CGROUP_UDP6_SENDMSG: in bpf_prog_load_check_attach() 2930 case BPF_CGROUP_UDP6_SENDMSG: in attach_type_to_prog_type() 3082 case BPF_CGROUP_UDP6_SENDMSG: in bpf_prog_query()
|
| /Linux-v5.10/net/core/ |
| D | filter.c | 7963 case BPF_CGROUP_UDP6_SENDMSG: in sock_addr_is_valid_access() 7981 case BPF_CGROUP_UDP6_SENDMSG: in sock_addr_is_valid_access()
|
| /Linux-v5.10/tools/lib/bpf/ |
| D | libbpf.c | 8356 BPF_CGROUP_UDP6_SENDMSG),
|