Home
last modified time | relevance | path

Searched refs:bpf_sock (Results 1 – 25 of 48) sorted by relevance

12

/linux/tools/testing/selftests/bpf/progs/
H A Dverifier_sock.c87 __imm_const(bpf_sock_family, offsetof(struct bpf_sock, family)) in sk_family_non_fullsock_field_1()
107 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in sk_sk_type_fullsock_field_1()
146 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in no_null_check_on_ret_1()
170 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in sk_sk_type_fullsock_field_2()
193 __imm_const(bpf_sock_family, offsetof(struct bpf_sock, family)) in sk_family_non_fullsock_field_2()
217 __imm_const(bpf_sock_state, offsetof(struct bpf_sock, state)) in sk_sk_state_narrow_load()
241 __imm_const(bpf_sock_dst_port, offsetof(struct bpf_sock, dst_port)) in port_word_load_backward_compatibility()
265 __imm_const(bpf_sock_dst_port, offsetof(struct bpf_sock, dst_port)) in sk_dst_port_half_load()
289 __imm_const(__imm_0, offsetof(struct bpf_sock, dst_port) + 2), in dst_port_half_load_invalid_1()
314 __imm_const(__imm_0, offsetof(struct bpf_sock, dst_por in sk_dst_port_byte_load()
[all...]
H A Dtest_sock_fields.c52 struct bpf_sock listen_sk = {};
53 struct bpf_sock srv_sk = {};
54 struct bpf_sock cli_sk = {};
64 static void skcpy(struct bpf_sock *dst, in skcpy()
65 const struct bpf_sock *src) in skcpy()
130 struct bpf_sock *sk, *sk_ret; in egress_read_sock_fields()
225 struct bpf_sock *sk; in ingress_read_sock_fields()
263 static __noinline bool sk_dst_port__load_word(struct bpf_sock *sk) in sk_dst_port__load_word()
269 static __noinline bool sk_dst_port__load_half(struct bpf_sock *sk) in sk_dst_port__load_half()
278 static __noinline bool sk_dst_port__load_byte(struct bpf_sock *sk) in sk_dst_port__load_byte()
[all …]
H A Dtest_sk_lookup_kern.c62 struct bpf_sock *sk; in sk_lookup_success()
85 struct bpf_sock *sk; in sk_lookup_success_simple()
97 struct bpf_sock *sk; in err_use_after_free()
112 struct bpf_sock *sk; in err_modify_sk_pointer()
126 struct bpf_sock *sk; in err_modify_sk_or_null_pointer()
148 struct bpf_sock *sk; in err_release_twice()
160 struct bpf_sock *sk; in err_release_unchecked()
H A Dverifier_jeq_infer_not_null.c57 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in socket_for_jne_false_branch()
95 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in unchanged_for_jne_true_branch()
131 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in socket_for_jeq_true_branch()
167 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in unchanged_for_jeq_false_branch()
H A Dtest_sk_lookup.c111 struct bpf_sock *sk; in redir_port()
130 struct bpf_sock *sk; in redir_ip4()
153 struct bpf_sock *sk; in redir_ip6()
178 struct bpf_sock *sk; in select_sock_a()
193 struct bpf_sock *sk; in select_sock_a_no_reuseport()
219 struct bpf_sock *sk; in sk_assign_eexist()
252 struct bpf_sock *sk; in sk_assign_replace_flag()
284 struct bpf_sock *sk = NULL; in sk_assign_null()
327 struct bpf_sock *sk1 = NULL, *sk2 = NULL; in access_ctx_sk()
393 struct bpf_sock *sk; in ctx_narrow_access()
[all …]
H A Dudp_limit.c17 int sock(struct bpf_sock *ctx) in sock()
45 int sock_release(struct bpf_sock *ctx) in sock_release()
H A Dkfunc_call_test.c10 struct bpf_sock *sk = skb->sk; in kfunc_call_test4()
27 struct bpf_sock *sk = skb->sk; in kfunc_call_test2()
42 struct bpf_sock *sk = skb->sk; in kfunc_call_test1()
H A Dcgrp_ls_attach_cgroup.c28 struct bpf_sock *sk; in set_cookie()
57 struct bpf_sock *sk; in update_cookie_sockops()
H A Dverifier_ref_tracking.c1055 __imm_const(bpf_sock_mark, offsetof(struct bpf_sock, mark)), in reference_tracking_write_to_member()
1188 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)), in __flag()
1224 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)), in __flag()
1254 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)), in __flag()
1284 __imm_const(bpf_sock_src_port, offsetof(struct bpf_sock, src_port)), in after_bpf_sk_release_sk()
1315 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)), in bpf_sk_release_listen_sk()
H A Dsockopt_sk.c35 struct bpf_sock *sk; in _getsockopt()
145 struct bpf_sock *sk; in _setsockopt()
H A Dexceptions_assert.c65 struct bpf_sock *sk = ctx->sk; in check_assert_range_s64()
92 struct bpf_sock *sk = ctx->sk; in check_assert_single_range_s64()
H A Dtest_sk_assign.c104 struct bpf_sock *sk; in handle_udp()
135 struct bpf_sock *sk; in handle_tcp()
H A Drecvmsg4_prog.c19 struct bpf_sock *sk; in recvmsg4_prog()
H A Dbind_perm.c12 struct bpf_sock *sk; in bind_prog()
H A Dfreplace_cls_redirect.c22 struct bpf_sock *sk; in freplace_cls_redirect_test()
H A Dkfunc_call_test_subprog.c11 struct bpf_sock *sk = skb->sk; in f1()
H A Drecvmsg6_prog.c22 struct bpf_sock *sk; in recvmsg6_prog()
H A Dmptcp_sockmap.c21 struct bpf_sock *sk; in mptcp_sockmap_inject()
H A Dtest_sockmap_update.c30 struct bpf_sock *sk; in copy_sock_map()
H A Dtcp_rtt.c31 struct bpf_sock *sk; in _sockops()
/linux/tools/testing/selftests/bpf/
H A Dcgroup_getset_retval_hooks.h5 BPF_RETVAL_HOOK(sock_create, "cgroup/sock_create", bpf_sock, 0)
25 BPF_RETVAL_HOOK(sock_release, "cgroup/sock_release", bpf_sock, 0)
/linux/samples/bpf/
H A Dtcp_dumpstats_kern.c29 struct bpf_sock *sk; in _sockops()
/linux/net/core/
H A Dfilter.c5596 static bool is_locked_tcp_sock_ops(struct bpf_sock_ops_kern *bpf_sock) in is_locked_tcp_sock_ops() argument
5598 return bpf_sock->op <= BPF_SOCK_OPS_WRITE_HDR_OPT_CB; in is_locked_tcp_sock_ops()
5819 BPF_CALL_5(bpf_sock_ops_setsockopt, struct bpf_sock_ops_kern *, bpf_sock, in BPF_CALL_5() argument
5822 if (!is_locked_tcp_sock_ops(bpf_sock)) in BPF_CALL_5()
5825 return _bpf_setsockopt(bpf_sock->sk, level, optname, optval, optlen); in BPF_CALL_5()
5839 static int bpf_sock_ops_get_syn(struct bpf_sock_ops_kern *bpf_sock, in bpf_sock_ops_get_syn() argument
5842 struct sk_buff *syn_skb = bpf_sock->syn_skb; in bpf_sock_ops_get_syn()
5864 struct sock *sk = bpf_sock->sk; in bpf_sock_ops_get_syn()
5907 BPF_CALL_5(bpf_sock_ops_getsockopt, struct bpf_sock_ops_kern *, bpf_sock, in BPF_CALL_5() argument
5910 if (!is_locked_tcp_sock_ops(bpf_sock)) in BPF_CALL_5()
[all …]
/linux/include/uapi/linux/
H A Dbpf.h3185 * long bpf_sock_ops_cb_flags_set(struct bpf_sock_ops *bpf_sock, int argval)
3212 * **bpf_sock_ops_cb_flags_set(bpf_sock,**
3213 * **bpf_sock->bpf_sock_ops_cb_flags & ~BPF_SOCK_OPS_RTO_CB_FLAG)**
3749 * struct bpf_sock *bpf_sk_lookup_tcp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags)
3781 * Pointer to **struct bpf_sock**, or **NULL** in case of failure.
3782 * For sockets with reuseport option, the **struct bpf_sock**
3786 * struct bpf_sock *bpf_sk_lookup_udp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags)
3818 * Pointer to **struct bpf_sock**, or **NULL** in case of failure.
3819 * For sockets with reuseport option, the **struct bpf_sock**
3950 * struct bpf_sock *bpf_sk_fullsoc
6408 struct bpf_sock { global() struct
6409 bound_dev_ifbpf_sock global() argument
6410 familybpf_sock global() argument
6411 typebpf_sock global() argument
6412 protocolbpf_sock global() argument
6413 markbpf_sock global() argument
6414 prioritybpf_sock global() argument
6416 src_ip4bpf_sock global() argument
6417 src_ip6bpf_sock global() argument
6418 src_portbpf_sock global() argument
6419 dst_portbpf_sock global() argument
6421 dst_ip4bpf_sock global() argument
6422 dst_ip6bpf_sock global() argument
6423 statebpf_sock global() argument
6424 rx_queue_mappingbpf_sock global() argument
[all...]
/linux/tools/include/uapi/linux/
H A Dbpf.h3185 * long bpf_sock_ops_cb_flags_set(struct bpf_sock_ops *bpf_sock, int argval)
3212 * **bpf_sock_ops_cb_flags_set(bpf_sock,**
3213 * **bpf_sock->bpf_sock_ops_cb_flags & ~BPF_SOCK_OPS_RTO_CB_FLAG)**
3749 * struct bpf_sock *bpf_sk_lookup_tcp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags)
3781 * Pointer to **struct bpf_sock**, or **NULL** in case of failure.
3782 * For sockets with reuseport option, the **struct bpf_sock**
3786 * struct bpf_sock *bpf_sk_lookup_udp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags)
3818 * Pointer to **struct bpf_sock**, or **NULL** in case of failure.
3819 * For sockets with reuseport option, the **struct bpf_sock**
3950 * struct bpf_sock *bpf_sk_fullsoc
6408 struct bpf_sock { global() struct
6409 bound_dev_ifbpf_sock global() argument
6410 familybpf_sock global() argument
6411 typebpf_sock global() argument
6412 protocolbpf_sock global() argument
6413 markbpf_sock global() argument
6414 prioritybpf_sock global() argument
6416 src_ip4bpf_sock global() argument
6417 src_ip6bpf_sock global() argument
6418 src_portbpf_sock global() argument
6419 dst_portbpf_sock global() argument
6421 dst_ip4bpf_sock global() argument
6422 dst_ip6bpf_sock global() argument
6423 statebpf_sock global() argument
6424 rx_queue_mappingbpf_sock global() argument
[all...]

12