Searched refs:BPF_CGROUP_GETSOCKOPT (Results 1 – 10 of 10) sorted by relevance
/Linux-v6.1/tools/testing/selftests/bpf/prog_tests/ |
D | sockopt.c | 48 .attach_type = BPF_CGROUP_GETSOCKOPT, 60 .attach_type = BPF_CGROUP_GETSOCKOPT, 71 .attach_type = BPF_CGROUP_GETSOCKOPT, 72 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 92 .attach_type = BPF_CGROUP_GETSOCKOPT, 93 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 116 .attach_type = BPF_CGROUP_GETSOCKOPT, 117 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, 142 .attach_type = BPF_CGROUP_GETSOCKOPT, 143 .expected_attach_type = BPF_CGROUP_GETSOCKOPT, [all …]
|
D | section_names.c | 153 {0, BPF_PROG_TYPE_CGROUP_SOCKOPT, BPF_CGROUP_GETSOCKOPT}, 154 {0, BPF_CGROUP_GETSOCKOPT},
|
/Linux-v6.1/Documentation/bpf/ |
D | prog_cgroup_sockopt.rst | 10 * ``BPF_CGROUP_GETSOCKOPT`` - called every time process executes ``getsockopt`` 40 BPF_CGROUP_GETSOCKOPT chapter 43 ``BPF_CGROUP_GETSOCKOPT`` is triggered *after* the kernel handing of 68 has ``BPF_CGROUP_GETSOCKOPT`` attached at each level with
|
/Linux-v6.1/tools/lib/bpf/ |
D | libbpf_probes.c | 38 opts.expected_attach_type = BPF_CGROUP_GETSOCKOPT; in probe_prog_load()
|
D | libbpf.c | 96 [BPF_CGROUP_GETSOCKOPT] = "cgroup_getsockopt", 8538 SEC_DEF("cgroup/getsockopt", CGROUP_SOCKOPT, BPF_CGROUP_GETSOCKOPT, SEC_ATTACHABLE),
|
/Linux-v6.1/tools/bpf/bpftool/ |
D | common.c | 1077 case BPF_CGROUP_GETSOCKOPT: return "getsockopt"; in bpf_attach_type_input_str()
|
/Linux-v6.1/kernel/bpf/ |
D | cgroup.c | 2336 BPF_CGROUP_GETSOCKOPT; in cg_sockopt_is_valid_access() 2370 return prog->expected_attach_type == BPF_CGROUP_GETSOCKOPT; in cg_sockopt_is_valid_access()
|
D | syscall.c | 2384 case BPF_CGROUP_GETSOCKOPT: in bpf_prog_load_check_attach() 3434 case BPF_CGROUP_GETSOCKOPT: in attach_type_to_prog_type() 3587 case BPF_CGROUP_GETSOCKOPT: in bpf_prog_query()
|
/Linux-v6.1/tools/include/uapi/linux/ |
D | bpf.h | 1005 BPF_CGROUP_GETSOCKOPT, enumerator
|
/Linux-v6.1/include/uapi/linux/ |
D | bpf.h | 1005 BPF_CGROUP_GETSOCKOPT, enumerator
|