/linux/tools/testing/selftests/bpf/progs/ |
H A D | verifier_sock.c | 91 __imm_const(bpf_sock_family, offsetof(struct bpf_sock, family)) in sk_family_non_fullsock_field_1() 111 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in sk_sk_type_fullsock_field_1() 150 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in no_null_check_on_ret_1() 174 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in sk_sk_type_fullsock_field_2() 197 __imm_const(bpf_sock_family, offsetof(struct bpf_sock, family)) in sk_family_non_fullsock_field_2() 221 __imm_const(bpf_sock_state, offsetof(struct bpf_sock, state)) in sk_sk_state_narrow_load() 245 __imm_const(bpf_sock_dst_port, offsetof(struct bpf_sock, dst_port)) in port_word_load_backward_compatibility() 269 __imm_const(bpf_sock_dst_port, offsetof(struct bpf_sock, dst_port)) in sk_dst_port_half_load() 293 __imm_const(__imm_0, offsetof(struct bpf_sock, dst_port) + 2), in dst_port_half_load_invalid_1() 318 __imm_const(__imm_0, offsetof(struct bpf_sock, dst_port) + 1), in sk_dst_port_byte_load() [all …]
|
H A D | test_sock_fields.c | 52 struct bpf_sock listen_sk = {}; 53 struct bpf_sock srv_sk = {}; 54 struct bpf_sock cli_sk = {}; 64 static void skcpy(struct bpf_sock *dst, in skcpy() 65 const struct bpf_sock *src) in skcpy() 130 struct bpf_sock *sk, *sk_ret; in egress_read_sock_fields() 225 struct bpf_sock *sk; in ingress_read_sock_fields() 263 static __noinline bool sk_dst_port__load_word(struct bpf_sock *sk) in sk_dst_port__load_word() 269 static __noinline bool sk_dst_port__load_half(struct bpf_sock *sk) in sk_dst_port__load_half() 278 static __noinline bool sk_dst_port__load_byte(struct bpf_sock *sk) in sk_dst_port__load_byte() [all …]
|
H A D | test_sk_lookup_kern.c | 62 struct bpf_sock *sk; in sk_lookup_success() 85 struct bpf_sock *sk; in sk_lookup_success_simple() 97 struct bpf_sock *sk; in err_use_after_free() 112 struct bpf_sock *sk; in err_modify_sk_pointer() 126 struct bpf_sock *sk; in err_modify_sk_or_null_pointer() 148 struct bpf_sock *sk; in err_release_twice() 160 struct bpf_sock *sk; in err_release_unchecked()
|
H A D | verifier_jeq_infer_not_null.c | 57 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in socket_for_jne_false_branch() 95 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in unchanged_for_jne_true_branch() 131 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in socket_for_jeq_true_branch() 167 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in unchanged_for_jeq_false_branch()
|
H A D | test_sk_lookup.c | 111 struct bpf_sock *sk; in redir_port() 130 struct bpf_sock *sk; in redir_ip4() 153 struct bpf_sock *sk; in redir_ip6() 178 struct bpf_sock *sk; in select_sock_a() 193 struct bpf_sock *sk; in select_sock_a_no_reuseport() 219 struct bpf_sock *sk; in sk_assign_eexist() 252 struct bpf_sock *sk; in sk_assign_replace_flag() 284 struct bpf_sock *sk = NULL; in sk_assign_null() 327 struct bpf_sock *sk1 = NULL, *sk2 = NULL; in access_ctx_sk() 393 struct bpf_sock *sk; in ctx_narrow_access() [all …]
|
H A D | udp_limit.c | 17 int sock(struct bpf_sock *ctx) in sock() 45 int sock_release(struct bpf_sock *ctx) in sock_release()
|
H A D | kfunc_call_test.c | 10 struct bpf_sock *sk = skb->sk; in kfunc_call_test4() 27 struct bpf_sock *sk = skb->sk; in kfunc_call_test2() 42 struct bpf_sock *sk = skb->sk; in kfunc_call_test1()
|
H A D | netns_cookie_prog.c | 35 struct bpf_sock *sk = ctx->sk; in get_netns_cookie_sockops() 67 struct bpf_sock *sk = msg->sk; in get_netns_cookie_sk_msg()
|
H A D | cgrp_ls_attach_cgroup.c | 28 struct bpf_sock *sk; in set_cookie() 57 struct bpf_sock *sk; in update_cookie_sockops()
|
H A D | verifier_ref_tracking.c | 1055 __imm_const(bpf_sock_mark, offsetof(struct bpf_sock, mark)), in reference_tracking_write_to_member() 1188 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)), in __flag() 1224 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)), in __flag() 1254 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)), in __flag() 1284 __imm_const(bpf_sock_src_port, offsetof(struct bpf_sock, src_port)), in after_bpf_sk_release_sk() 1315 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)), in bpf_sk_release_listen_sk()
|
H A D | sockopt_sk.c | 35 struct bpf_sock *sk; in _getsockopt() 145 struct bpf_sock *sk; in _setsockopt()
|
H A D | exceptions_assert.c | 65 struct bpf_sock *sk = ctx->sk; in check_assert_range_s64() 92 struct bpf_sock *sk = ctx->sk; in check_assert_single_range_s64()
|
H A D | test_tcp_check_syncookie_kern.c |
|
H A D | test_sk_assign.c | 104 struct bpf_sock *sk; in handle_udp() 135 struct bpf_sock *sk; in handle_tcp()
|
H A D | recvmsg4_prog.c | 19 struct bpf_sock *sk; in recvmsg4_prog()
|
H A D | bind_perm.c | 12 struct bpf_sock *sk; in bind_prog()
|
H A D | freplace_cls_redirect.c | 22 struct bpf_sock *sk; in freplace_cls_redirect_test()
|
H A D | kfunc_call_test_subprog.c | 11 struct bpf_sock *sk = skb->sk; in f1()
|
H A D | recvmsg6_prog.c | 22 struct bpf_sock *sk; in recvmsg6_prog()
|
H A D | test_sockmap_update.c | 30 struct bpf_sock *sk; in copy_sock_map()
|
/linux/tools/testing/selftests/bpf/ |
H A D | test_sock.c |
|
H A D | cgroup_getset_retval_hooks.h | 5 BPF_RETVAL_HOOK(sock_create, "cgroup/sock_create", bpf_sock, 0) 25 BPF_RETVAL_HOOK(sock_release, "cgroup/sock_release", bpf_sock, 0)
|
/linux/include/uapi/linux/ |
H A D | bpf.h | 6264 __bpf_md_ptr(struct bpf_sock *, sk); 6333 struct bpf_sock { struct 6507 __bpf_md_ptr(struct bpf_sock *, sk); /* current socket */ 6545 __bpf_md_ptr(struct bpf_sock *, sk); 6546 __bpf_md_ptr(struct bpf_sock *, migrating_sk); 6767 __bpf_md_ptr(struct bpf_sock *, sk); 6819 __bpf_md_ptr(struct bpf_sock *, sk); 7358 __bpf_md_ptr(struct bpf_sock *, sk); 7376 __bpf_md_ptr(struct bpf_sock *, sk); /* Selected socket */
|
/linux/tools/include/uapi/linux/ |
H A D | bpf.h | 6264 __bpf_md_ptr(struct bpf_sock *, sk); 6333 struct bpf_sock { struct 6507 __bpf_md_ptr(struct bpf_sock *, sk); /* current socket */ 6545 __bpf_md_ptr(struct bpf_sock *, sk); 6546 __bpf_md_ptr(struct bpf_sock *, migrating_sk); 6767 __bpf_md_ptr(struct bpf_sock *, sk); 6819 __bpf_md_ptr(struct bpf_sock *, sk); 7358 __bpf_md_ptr(struct bpf_sock *, sk); 7376 __bpf_md_ptr(struct bpf_sock *, sk); /* Selected socket */
|
/linux/net/core/ |
H A D | filter.c | 5651 BPF_CALL_5(bpf_sock_ops_setsockopt, struct bpf_sock_ops_kern *, bpf_sock, in BPF_CALL_5() argument 5654 return _bpf_setsockopt(bpf_sock->sk, level, optname, optval, optlen); in BPF_CALL_5() 5668 static int bpf_sock_ops_get_syn(struct bpf_sock_ops_kern *bpf_sock, in bpf_sock_ops_get_syn() argument 5671 struct sk_buff *syn_skb = bpf_sock->syn_skb; in bpf_sock_ops_get_syn() 5693 struct sock *sk = bpf_sock->sk; in bpf_sock_ops_get_syn() 5736 BPF_CALL_5(bpf_sock_ops_getsockopt, struct bpf_sock_ops_kern *, bpf_sock, in BPF_CALL_5() argument 5744 ret = bpf_sock_ops_get_syn(bpf_sock, optname, &start); in BPF_CALL_5() 5761 return _bpf_getsockopt(bpf_sock->sk, level, optname, optval, optlen); in BPF_CALL_5() 5775 BPF_CALL_2(bpf_sock_ops_cb_flags_set, struct bpf_sock_ops_kern *, bpf_sock, in BPF_CALL_2() argument 5778 struct sock *sk = bpf_sock->sk; in BPF_CALL_2() [all …]
|