Lines Matching defs:cgroup
87 __u64 cgroup_inode_id; /* cgroup inode id */
107 * both are zero, the walk starts from the default cgroup v2
113 } cgroup;
287 * loaded eBPF program of a cgroup, flow dissector, LIRC, sockmap
928 * to a cgroup. The newer BPF_MAP_TYPE_CGRP_STORAGE is available to
929 * both cgroup-attached and other progs and supports all functionality
937 * attaching to a cgroup. The new mechanism (BPF_MAP_TYPE_CGRP_STORAGE +
1090 /* cgroup-bpf attach flags used in BPF_PROG_ATTACH command
1094 * BPF_F_ALLOW_OVERRIDE: If a sub-cgroup installs some bpf program,
1095 * the program in this cgroup yields to sub-cgroup program.
1097 * BPF_F_ALLOW_MULTI: If a sub-cgroup installs some bpf program,
1098 * that cgroup program gets run in addition to the program in this cgroup.
1100 * Only one program is allowed to be attached to a cgroup with
1105 * Multiple programs are allowed to be attached to a cgroup with
1108 * The programs of sub-cgroup are executed first, then programs of
1109 * this cgroup and then programs of parent cgroup.
1114 * programs for a cgroup. Though it's possible to replace an old program at
1118 * A cgroup with MULTI or OVERRIDE flag allows any attach flags in sub-cgroups.
1119 * A cgroup with NONE doesn't allow any programs in sub-cgroups.
1336 * programs that will be executed for events within a cgroup.
2024 * cgroup to which *skb* belongs.
2028 * The net_cls cgroup provides an interface to tag network packets
2030 * the tasks belonging to the related cgroup. See also the related
2032 * *Documentation/admin-guide/cgroup-v1/net_cls.rst*.
2036 * use a mixture of them, but note that the net_cls cgroup is for
2037 * cgroup v1 only. This makes it incompatible with BPF programs
2038 * run on cgroups, which is a cgroup-v2-only feature (a socket can
2223 * one used with the net_cls cgroup (see description for
3146 * example when all processes inside a cgroup should use one
3493 * Return the cgroup v2 id of the socket associated with the *skb*.
3495 * helper for cgroup v1 by providing a tag resp. identifier that
3497 * policy. The cgroup v2 id of a given path in the hierarchy is
3509 * Get the current cgroup id based on the cgroup within which
3512 * A 64-bit integer containing the current cgroup id based
3513 * on the cgroup within which the current task is running.
3521 * and has to be 0 for cgroup local storage.
3544 * Return id of cgroup v2 that is ancestor of cgroup associated
3545 * with the *skb* at the *ancestor_level*. The root cgroup is at
3547 * increments the level. If *ancestor_level* == level of cgroup
3552 * that are upper in hierarchy than immediate cgroup associated
4215 * Return id of cgroup v2 that is ancestor of the cgroup associated
4216 * with the current task at the *ancestor_level*. The root cgroup
4218 * increments the level. If *ancestor_level* == level of cgroup
4223 * that are upper in hierarchy than immediate cgroup associated
4358 * Return the cgroup v2 id of the socket *sk*.
4372 * Return id of cgroup v2 that is ancestor of cgroup associated
4373 * with the *sk* at the *ancestor_level*. The root cgroup is at
4375 * increments the level. If *ancestor_level* == level of cgroup
4380 * that are upper in hierarchy than immediate cgroup associated
4776 * the cgroup v1 net_cls class is retrieved only from the *skb*'s
5311 * This helper is currently supported by cgroup programs and only by the hooks
5320 * This helper is currently supported by cgroup programs and only by the hooks
5330 * still holds true for cgroup/bind{4,6} which supports extra 'return 3' success case.
5643 * void *bpf_cgrp_storage_get(struct bpf_map *map, struct cgroup *cgroup, void *value, u64 flags)
5645 * Get a bpf_local_storage from the *cgroup*.
5648 * a *map* with *cgroup* as the **key**. From this
5650 * **bpf_map_lookup_elem**\ (*map*, **&**\ *cgroup*) except this
5651 * helper enforces the key must be a cgroup struct and the map must also
5655 * *cgroup* object itself, rather than being located in the
5657 * queried for some *map* on a *cgroup* object, the kernel will perform an
5659 * *cgroup* object until the local-storage value for the *map* is found.
5673 * long bpf_cgrp_storage_delete(struct bpf_map *map, struct cgroup *cgroup)
5675 * Delete a bpf_local_storage from a *cgroup*.
6518 } cgroup;
6536 } cgroup;