Home
last modified time | relevance | path

Searched refs:bpf_tcp_sock (Results 1 – 10 of 10) sorted by relevance

/linux/tools/testing/selftests/bpf/progs/
H A Dtest_sock_fields.c48 struct bpf_tcp_sock listen_tp = {};
50 struct bpf_tcp_sock cli_tp = {};
51 struct bpf_tcp_sock srv_tp = {};
88 static void tpcpy(struct bpf_tcp_sock *dst, in tpcpy()
89 const struct bpf_tcp_sock *src) in tpcpy()
129 struct bpf_tcp_sock *tp, *tp_ret; in egress_read_sock_fields()
169 tp = bpf_tcp_sock(sk); in egress_read_sock_fields()
223 struct bpf_tcp_sock *tp; in ingress_read_sock_fields()
247 tp = bpf_tcp_sock(sk); in ingress_read_sock_fields()
H A Dverifier_sock.c483 : __imm(bpf_tcp_sock), in sk_no_skb_sk_check_2()
504 : __imm(bpf_tcp_sock), in no_null_check_on_ret_2()
506 __imm_const(bpf_tcp_sock_snd_cwnd, offsetof(struct bpf_tcp_sock, snd_cwnd)) in no_null_check_on_ret_2()
527 : __imm(bpf_tcp_sock), in skb_sk_tp_snd_cwnd_1()
529 __imm_const(bpf_tcp_sock_snd_cwnd, offsetof(struct bpf_tcp_sock, snd_cwnd)) in skb_sk_tp_snd_cwnd_1()
550 : __imm(bpf_tcp_sock), in skb_sk_tp_bytes_acked()
552 __imm_const(bpf_tcp_sock_bytes_acked, offsetof(struct bpf_tcp_sock, bytes_acked)) in skb_sk_tp_bytes_acked()
574 : __imm(bpf_tcp_sock), in skb_sk_beyond_last_field_2()
576 __imm_const(bpf_tcp_sock_bytes_acked__end, offsetofend(struct bpf_tcp_sock, bytes_acked)) in skb_sk_beyond_last_field_2()
602 __imm(bpf_tcp_sock), in skb_sk_tp_snd_cwnd_2()
[all …]
H A Dtcp_rtt.c29 struct bpf_tcp_sock *tcp_sk; in _sockops()
50 tcp_sk = bpf_tcp_sock(sk); in _sockops()
H A Dverifier_ref_tracking.c1132 __description("reference tracking: use ptr from bpf_tcp_sock() after release")
1143 call %[bpf_tcp_sock]; \ in __flag()
1156 __imm(bpf_tcp_sock), in __flag()
1157 __imm_const(bpf_tcp_sock_snd_cwnd, offsetof(struct bpf_tcp_sock, snd_cwnd)), in __flag()
1205 call %[bpf_tcp_sock]; \ in __flag()
1223 __imm(bpf_tcp_sock), in __flag()
1241 call %[bpf_tcp_sock]; \ in __flag()
1253 __imm(bpf_tcp_sock), in __flag()
1320 /* !bpf_sk_fullsock(sk) is checked but !bpf_tcp_sock(sk) is not checked */
1322 __description("reference tracking: tp->snd_cwnd after bpf_sk_fullsock(sk) and bpf_tcp_sock(s
[all...]
/linux/samples/bpf/
H A Dtcp_dumpstats_kern.c28 struct bpf_tcp_sock *tcp_sk; in _sockops()
56 tcp_sk = bpf_tcp_sock(sk); in _sockops()
H A Dhbm_kern.h85 struct bpf_tcp_sock *tp; in get_tcp_info()
92 tp = bpf_tcp_sock(sk); in get_tcp_info()
/linux/tools/testing/selftests/bpf/prog_tests/
H A Dsock_fields.c83 static void print_tp(const struct bpf_tcp_sock *tp, const char *prefix) in print_tp()
103 struct bpf_tcp_sock srv_tp, cli_tp, listen_tp; in check_result()
/linux/net/core/
H A Dfilter.c7124 if (off < 0 || off >= offsetofend(struct bpf_tcp_sock, in bpf_tcp_sock_is_valid_access()
7132 case offsetof(struct bpf_tcp_sock, bytes_received): in bpf_tcp_sock_is_valid_access()
7133 case offsetof(struct bpf_tcp_sock, bytes_acked): in bpf_tcp_sock_is_valid_access()
7150 sizeof_field(struct bpf_tcp_sock, FIELD)); \ in bpf_tcp_sock_convert_ctx_access()
7160 sizeof_field(struct bpf_tcp_sock, FIELD)); \ in bpf_tcp_sock_convert_ctx_access()
7170 BTF_TYPE_EMIT(struct bpf_tcp_sock); in bpf_tcp_sock_convert_ctx_access()
7173 case offsetof(struct bpf_tcp_sock, rtt_min): in bpf_tcp_sock_convert_ctx_access()
7183 case offsetof(struct bpf_tcp_sock, snd_cwnd): in bpf_tcp_sock_convert_ctx_access()
7186 case offsetof(struct bpf_tcp_sock, srtt_us): in bpf_tcp_sock_convert_ctx_access()
7189 case offsetof(struct bpf_tcp_sock, snd_ssthresh): in bpf_tcp_sock_convert_ctx_access()
[all …]
/linux/include/uapi/linux/
H A Dbpf.h6352 struct bpf_tcp_sock { struct
/linux/tools/include/uapi/linux/
H A Dbpf.h6352 struct bpf_tcp_sock { struct