Searched refs:bpf_tcp_sock (Results 1 – 10 of 10) sorted by relevance
/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_sock_fields.c | 48 struct bpf_tcp_sock listen_tp = {}; 50 struct bpf_tcp_sock cli_tp = {}; 51 struct bpf_tcp_sock srv_tp = {}; 88 static void tpcpy(struct bpf_tcp_sock *dst, in tpcpy() 89 const struct bpf_tcp_sock *src) in tpcpy() 129 struct bpf_tcp_sock *tp, *tp_ret; in egress_read_sock_fields() 169 tp = bpf_tcp_sock(sk); in egress_read_sock_fields() 223 struct bpf_tcp_sock *tp; in ingress_read_sock_fields() 247 tp = bpf_tcp_sock(sk); in ingress_read_sock_fields()
|
H A D | verifier_sock.c | 483 : __imm(bpf_tcp_sock), in sk_no_skb_sk_check_2() 504 : __imm(bpf_tcp_sock), in no_null_check_on_ret_2() 506 __imm_const(bpf_tcp_sock_snd_cwnd, offsetof(struct bpf_tcp_sock, snd_cwnd)) in no_null_check_on_ret_2() 527 : __imm(bpf_tcp_sock), in skb_sk_tp_snd_cwnd_1() 529 __imm_const(bpf_tcp_sock_snd_cwnd, offsetof(struct bpf_tcp_sock, snd_cwnd)) in skb_sk_tp_snd_cwnd_1() 550 : __imm(bpf_tcp_sock), in skb_sk_tp_bytes_acked() 552 __imm_const(bpf_tcp_sock_bytes_acked, offsetof(struct bpf_tcp_sock, bytes_acked)) in skb_sk_tp_bytes_acked() 574 : __imm(bpf_tcp_sock), in skb_sk_beyond_last_field_2() 576 __imm_const(bpf_tcp_sock_bytes_acked__end, offsetofend(struct bpf_tcp_sock, bytes_acked)) in skb_sk_beyond_last_field_2() 602 __imm(bpf_tcp_sock), in skb_sk_tp_snd_cwnd_2() [all …]
|
H A D | tcp_rtt.c | 29 struct bpf_tcp_sock *tcp_sk; in _sockops() 50 tcp_sk = bpf_tcp_sock(sk); in _sockops()
|
H A D | verifier_ref_tracking.c | 1132 __description("reference tracking: use ptr from bpf_tcp_sock() after release") 1143 call %[bpf_tcp_sock]; \ in __flag() 1156 __imm(bpf_tcp_sock), in __flag() 1157 __imm_const(bpf_tcp_sock_snd_cwnd, offsetof(struct bpf_tcp_sock, snd_cwnd)), in __flag() 1205 call %[bpf_tcp_sock]; \ in __flag() 1223 __imm(bpf_tcp_sock), in __flag() 1241 call %[bpf_tcp_sock]; \ in __flag() 1253 __imm(bpf_tcp_sock), in __flag() 1320 /* !bpf_sk_fullsock(sk) is checked but !bpf_tcp_sock(sk) is not checked */ 1322 __description("reference tracking: tp->snd_cwnd after bpf_sk_fullsock(sk) and bpf_tcp_sock(s [all...] |
/linux/samples/bpf/ |
H A D | tcp_dumpstats_kern.c | 28 struct bpf_tcp_sock *tcp_sk; in _sockops() 56 tcp_sk = bpf_tcp_sock(sk); in _sockops()
|
H A D | hbm_kern.h | 85 struct bpf_tcp_sock *tp; in get_tcp_info() 92 tp = bpf_tcp_sock(sk); in get_tcp_info()
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | sock_fields.c | 83 static void print_tp(const struct bpf_tcp_sock *tp, const char *prefix) in print_tp() 103 struct bpf_tcp_sock srv_tp, cli_tp, listen_tp; in check_result()
|
/linux/net/core/ |
H A D | filter.c | 7124 if (off < 0 || off >= offsetofend(struct bpf_tcp_sock, in bpf_tcp_sock_is_valid_access() 7132 case offsetof(struct bpf_tcp_sock, bytes_received): in bpf_tcp_sock_is_valid_access() 7133 case offsetof(struct bpf_tcp_sock, bytes_acked): in bpf_tcp_sock_is_valid_access() 7150 sizeof_field(struct bpf_tcp_sock, FIELD)); \ in bpf_tcp_sock_convert_ctx_access() 7160 sizeof_field(struct bpf_tcp_sock, FIELD)); \ in bpf_tcp_sock_convert_ctx_access() 7170 BTF_TYPE_EMIT(struct bpf_tcp_sock); in bpf_tcp_sock_convert_ctx_access() 7173 case offsetof(struct bpf_tcp_sock, rtt_min): in bpf_tcp_sock_convert_ctx_access() 7183 case offsetof(struct bpf_tcp_sock, snd_cwnd): in bpf_tcp_sock_convert_ctx_access() 7186 case offsetof(struct bpf_tcp_sock, srtt_us): in bpf_tcp_sock_convert_ctx_access() 7189 case offsetof(struct bpf_tcp_sock, snd_ssthresh): in bpf_tcp_sock_convert_ctx_access() [all …]
|
/linux/include/uapi/linux/ |
H A D | bpf.h | 6352 struct bpf_tcp_sock { struct
|
/linux/tools/include/uapi/linux/ |
H A D | bpf.h | 6352 struct bpf_tcp_sock { struct
|