| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | verifier_sock.c | 87 __imm_const(bpf_sock_family, offsetof(struct bpf_sock, family)) in sk_family_non_fullsock_field_1() 107 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in sk_sk_type_fullsock_field_1() 146 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in no_null_check_on_ret_1() 170 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in sk_sk_type_fullsock_field_2() 193 __imm_const(bpf_sock_family, offsetof(struct bpf_sock, family)) in sk_family_non_fullsock_field_2() 217 __imm_const(bpf_sock_state, offsetof(struct bpf_sock, state)) in sk_sk_state_narrow_load() 241 __imm_const(bpf_sock_dst_port, offsetof(struct bpf_sock, dst_port)) in port_word_load_backward_compatibility() 265 __imm_const(bpf_sock_dst_port, offsetof(struct bpf_sock, dst_port)) in sk_dst_port_half_load() 289 __imm_const(__imm_0, offsetof(struct bpf_sock, dst_port) + 2), in dst_port_half_load_invalid_1() 314 __imm_const(__imm_0, offsetof(struct bpf_sock, dst_por in sk_dst_port_byte_load() [all...] |
| H A D | test_sock_fields.c | 52 struct bpf_sock listen_sk = {}; 53 struct bpf_sock srv_sk = {}; 54 struct bpf_sock cli_sk = {}; 64 static void skcpy(struct bpf_sock *dst, in skcpy() 65 const struct bpf_sock *src) in skcpy() 130 struct bpf_sock *sk, *sk_ret; in egress_read_sock_fields() 225 struct bpf_sock *sk; in ingress_read_sock_fields() 263 static __noinline bool sk_dst_port__load_word(struct bpf_sock *sk) in sk_dst_port__load_word() 269 static __noinline bool sk_dst_port__load_half(struct bpf_sock *sk) in sk_dst_port__load_half() 278 static __noinline bool sk_dst_port__load_byte(struct bpf_sock *sk) in sk_dst_port__load_byte() [all …]
|
| H A D | test_sk_lookup_kern.c | 62 struct bpf_sock *sk; in sk_lookup_success() 85 struct bpf_sock *sk; in sk_lookup_success_simple() 97 struct bpf_sock *sk; in err_use_after_free() 112 struct bpf_sock *sk; in err_modify_sk_pointer() 126 struct bpf_sock *sk; in err_modify_sk_or_null_pointer() 148 struct bpf_sock *sk; in err_release_twice() 160 struct bpf_sock *sk; in err_release_unchecked()
|
| H A D | verifier_jeq_infer_not_null.c | 57 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in socket_for_jne_false_branch() 95 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in unchanged_for_jne_true_branch() 131 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in socket_for_jeq_true_branch() 167 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in unchanged_for_jeq_false_branch()
|
| H A D | test_sk_lookup.c | 111 struct bpf_sock *sk; in redir_port() 130 struct bpf_sock *sk; in redir_ip4() 153 struct bpf_sock *sk; in redir_ip6() 178 struct bpf_sock *sk; in select_sock_a() 193 struct bpf_sock *sk; in select_sock_a_no_reuseport() 219 struct bpf_sock *sk; in sk_assign_eexist() 252 struct bpf_sock *sk; in sk_assign_replace_flag() 284 struct bpf_sock *sk = NULL; in sk_assign_null() 327 struct bpf_sock *sk1 = NULL, *sk2 = NULL; in access_ctx_sk() 393 struct bpf_sock *sk; in ctx_narrow_access() [all …]
|
| H A D | udp_limit.c | 17 int sock(struct bpf_sock *ctx) in sock() 45 int sock_release(struct bpf_sock *ctx) in sock_release()
|
| H A D | kfunc_call_test.c | 10 struct bpf_sock *sk = skb->sk; in kfunc_call_test4() 27 struct bpf_sock *sk = skb->sk; in kfunc_call_test2() 42 struct bpf_sock *sk = skb->sk; in kfunc_call_test1()
|
| H A D | cgrp_ls_attach_cgroup.c | 28 struct bpf_sock *sk; in set_cookie() 57 struct bpf_sock *sk; in update_cookie_sockops()
|
| H A D | verifier_ref_tracking.c | 1055 __imm_const(bpf_sock_mark, offsetof(struct bpf_sock, mark)), in reference_tracking_write_to_member() 1188 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)), in __flag() 1224 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)), in __flag() 1254 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)), in __flag() 1284 __imm_const(bpf_sock_src_port, offsetof(struct bpf_sock, src_port)), in after_bpf_sk_release_sk() 1315 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)), in bpf_sk_release_listen_sk()
|
| H A D | sockopt_sk.c | 35 struct bpf_sock *sk; in _getsockopt() 145 struct bpf_sock *sk; in _setsockopt()
|
| H A D | exceptions_assert.c | 65 struct bpf_sock *sk = ctx->sk; in check_assert_range_s64() 92 struct bpf_sock *sk = ctx->sk; in check_assert_single_range_s64()
|
| H A D | test_sk_assign.c | 104 struct bpf_sock *sk; in handle_udp() 135 struct bpf_sock *sk; in handle_tcp()
|
| H A D | recvmsg4_prog.c | 19 struct bpf_sock *sk; in recvmsg4_prog()
|
| H A D | bind_perm.c | 12 struct bpf_sock *sk; in bind_prog()
|
| H A D | freplace_cls_redirect.c | 22 struct bpf_sock *sk; in freplace_cls_redirect_test()
|
| H A D | kfunc_call_test_subprog.c | 11 struct bpf_sock *sk = skb->sk; in f1()
|
| H A D | recvmsg6_prog.c | 22 struct bpf_sock *sk; in recvmsg6_prog()
|
| H A D | mptcp_sockmap.c | 21 struct bpf_sock *sk; in mptcp_sockmap_inject()
|
| H A D | test_sockmap_update.c | 30 struct bpf_sock *sk; in copy_sock_map()
|
| H A D | tcp_rtt.c | 31 struct bpf_sock *sk; in _sockops()
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | cgroup_getset_retval_hooks.h | 5 BPF_RETVAL_HOOK(sock_create, "cgroup/sock_create", bpf_sock, 0) 25 BPF_RETVAL_HOOK(sock_release, "cgroup/sock_release", bpf_sock, 0)
|
| /linux/samples/bpf/ |
| H A D | tcp_dumpstats_kern.c | 29 struct bpf_sock *sk; in _sockops()
|
| /linux/net/core/ |
| H A D | filter.c | 5596 static bool is_locked_tcp_sock_ops(struct bpf_sock_ops_kern *bpf_sock) in is_locked_tcp_sock_ops() argument 5598 return bpf_sock->op <= BPF_SOCK_OPS_WRITE_HDR_OPT_CB; in is_locked_tcp_sock_ops() 5819 BPF_CALL_5(bpf_sock_ops_setsockopt, struct bpf_sock_ops_kern *, bpf_sock, in BPF_CALL_5() argument 5822 if (!is_locked_tcp_sock_ops(bpf_sock)) in BPF_CALL_5() 5825 return _bpf_setsockopt(bpf_sock->sk, level, optname, optval, optlen); in BPF_CALL_5() 5839 static int bpf_sock_ops_get_syn(struct bpf_sock_ops_kern *bpf_sock, in bpf_sock_ops_get_syn() argument 5842 struct sk_buff *syn_skb = bpf_sock->syn_skb; in bpf_sock_ops_get_syn() 5864 struct sock *sk = bpf_sock->sk; in bpf_sock_ops_get_syn() 5907 BPF_CALL_5(bpf_sock_ops_getsockopt, struct bpf_sock_ops_kern *, bpf_sock, in BPF_CALL_5() argument 5910 if (!is_locked_tcp_sock_ops(bpf_sock)) in BPF_CALL_5() [all …]
|
| /linux/include/uapi/linux/ |
| H A D | bpf.h | 3185 * long bpf_sock_ops_cb_flags_set(struct bpf_sock_ops *bpf_sock, int argval) 3212 * **bpf_sock_ops_cb_flags_set(bpf_sock,** 3213 * **bpf_sock->bpf_sock_ops_cb_flags & ~BPF_SOCK_OPS_RTO_CB_FLAG)** 3749 * struct bpf_sock *bpf_sk_lookup_tcp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags) 3781 * Pointer to **struct bpf_sock**, or **NULL** in case of failure. 3782 * For sockets with reuseport option, the **struct bpf_sock** 3786 * struct bpf_sock *bpf_sk_lookup_udp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags) 3818 * Pointer to **struct bpf_sock**, or **NULL** in case of failure. 3819 * For sockets with reuseport option, the **struct bpf_sock** 3950 * struct bpf_sock *bpf_sk_fullsoc 6408 struct bpf_sock { global() struct 6409 bound_dev_ifbpf_sock global() argument 6410 familybpf_sock global() argument 6411 typebpf_sock global() argument 6412 protocolbpf_sock global() argument 6413 markbpf_sock global() argument 6414 prioritybpf_sock global() argument 6416 src_ip4bpf_sock global() argument 6417 src_ip6bpf_sock global() argument 6418 src_portbpf_sock global() argument 6419 dst_portbpf_sock global() argument 6421 dst_ip4bpf_sock global() argument 6422 dst_ip6bpf_sock global() argument 6423 statebpf_sock global() argument 6424 rx_queue_mappingbpf_sock global() argument [all...] |
| /linux/tools/include/uapi/linux/ |
| H A D | bpf.h | 3185 * long bpf_sock_ops_cb_flags_set(struct bpf_sock_ops *bpf_sock, int argval) 3212 * **bpf_sock_ops_cb_flags_set(bpf_sock,** 3213 * **bpf_sock->bpf_sock_ops_cb_flags & ~BPF_SOCK_OPS_RTO_CB_FLAG)** 3749 * struct bpf_sock *bpf_sk_lookup_tcp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags) 3781 * Pointer to **struct bpf_sock**, or **NULL** in case of failure. 3782 * For sockets with reuseport option, the **struct bpf_sock** 3786 * struct bpf_sock *bpf_sk_lookup_udp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags) 3818 * Pointer to **struct bpf_sock**, or **NULL** in case of failure. 3819 * For sockets with reuseport option, the **struct bpf_sock** 3950 * struct bpf_sock *bpf_sk_fullsoc 6408 struct bpf_sock { global() struct 6409 bound_dev_ifbpf_sock global() argument 6410 familybpf_sock global() argument 6411 typebpf_sock global() argument 6412 protocolbpf_sock global() argument 6413 markbpf_sock global() argument 6414 prioritybpf_sock global() argument 6416 src_ip4bpf_sock global() argument 6417 src_ip6bpf_sock global() argument 6418 src_portbpf_sock global() argument 6419 dst_portbpf_sock global() argument 6421 dst_ip4bpf_sock global() argument 6422 dst_ip6bpf_sock global() argument 6423 statebpf_sock global() argument 6424 rx_queue_mappingbpf_sock global() argument [all...] |