| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | verifier_sock.c | 87 __imm_const(bpf_sock_family, offsetof(struct bpf_sock, family)) in sk_family_non_fullsock_field_1() 107 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in sk_sk_type_fullsock_field_1() 146 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in no_null_check_on_ret_1() 170 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in sk_sk_type_fullsock_field_2() 193 __imm_const(bpf_sock_family, offsetof(struct bpf_sock, family)) in sk_family_non_fullsock_field_2() 217 __imm_const(bpf_sock_state, offsetof(struct bpf_sock, state)) in sk_sk_state_narrow_load() 241 __imm_const(bpf_sock_dst_port, offsetof(struct bpf_sock, dst_port)) in port_word_load_backward_compatibility() 265 __imm_const(bpf_sock_dst_port, offsetof(struct bpf_sock, dst_port)) in sk_dst_port_half_load() 289 __imm_const(__imm_0, offsetof(struct bpf_sock, dst_port) + 2), in dst_port_half_load_invalid_1() 314 __imm_const(__imm_0, offsetof(struct bpf_sock, dst_port) + 1), in sk_dst_port_byte_load() [all …]
|
| H A D | test_sock_fields.c | 52 struct bpf_sock listen_sk = {}; 53 struct bpf_sock srv_sk = {}; 54 struct bpf_sock cli_sk = {}; 64 static void skcpy(struct bpf_sock *dst, in skcpy() 65 const struct bpf_sock *src) in skcpy() 130 struct bpf_sock *sk, *sk_ret; in egress_read_sock_fields() 225 struct bpf_sock *sk; in ingress_read_sock_fields() 263 static __noinline bool sk_dst_port__load_word(struct bpf_sock *sk) in sk_dst_port__load_word() 269 static __noinline bool sk_dst_port__load_half(struct bpf_sock *sk) in sk_dst_port__load_half() 278 static __noinline bool sk_dst_port__load_byte(struct bpf_sock *sk) in sk_dst_port__load_byte() [all …]
|
| H A D | test_sk_lookup_kern.c | 62 struct bpf_sock *sk; in sk_lookup_success() 85 struct bpf_sock *sk; in sk_lookup_success_simple() 97 struct bpf_sock *sk; in err_use_after_free() 112 struct bpf_sock *sk; in err_modify_sk_pointer() 126 struct bpf_sock *sk; in err_modify_sk_or_null_pointer() 148 struct bpf_sock *sk; in err_release_twice() 160 struct bpf_sock *sk; in err_release_unchecked()
|
| H A D | verifier_jeq_infer_not_null.c | 57 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in socket_for_jne_false_branch() 95 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in unchanged_for_jne_true_branch() 131 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in socket_for_jeq_true_branch() 167 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)) in unchanged_for_jeq_false_branch()
|
| H A D | test_sk_lookup.c | 111 struct bpf_sock *sk; in redir_port() 130 struct bpf_sock *sk; in redir_ip4() 153 struct bpf_sock *sk; in redir_ip6() 178 struct bpf_sock *sk; in select_sock_a() 193 struct bpf_sock *sk; in select_sock_a_no_reuseport() 219 struct bpf_sock *sk; in sk_assign_eexist() 252 struct bpf_sock *sk; in sk_assign_replace_flag() 284 struct bpf_sock *sk = NULL; in sk_assign_null() 327 struct bpf_sock *sk1 = NULL, *sk2 = NULL; in access_ctx_sk() 393 struct bpf_sock *sk; in ctx_narrow_access() [all …]
|
| H A D | udp_limit.c | 17 int sock(struct bpf_sock *ctx) in sock() 45 int sock_release(struct bpf_sock *ctx) in sock_release()
|
| H A D | kfunc_call_test.c | 10 struct bpf_sock *sk = skb->sk; in kfunc_call_test4() 27 struct bpf_sock *sk = skb->sk; in kfunc_call_test2() 42 struct bpf_sock *sk = skb->sk; in kfunc_call_test1()
|
| H A D | netns_cookie_prog.c | 36 struct bpf_sock *sk = ctx->sk; in get_netns_cookie_sockops() 68 struct bpf_sock *sk = msg->sk; in get_netns_cookie_sk_msg()
|
| H A D | cgrp_ls_attach_cgroup.c | 28 struct bpf_sock *sk; in set_cookie() 57 struct bpf_sock *sk; in update_cookie_sockops()
|
| H A D | verifier_ref_tracking.c | 1055 __imm_const(bpf_sock_mark, offsetof(struct bpf_sock, mark)), in reference_tracking_write_to_member() 1188 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)), in __flag() 1224 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)), in __flag() 1254 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)), in __flag() 1284 __imm_const(bpf_sock_src_port, offsetof(struct bpf_sock, src_port)), in after_bpf_sk_release_sk() 1315 __imm_const(bpf_sock_type, offsetof(struct bpf_sock, type)), in bpf_sk_release_listen_sk()
|
| H A D | mptcp_subflow.c | 27 struct bpf_sock *sk; in mptcp_subflow() 108 struct bpf_sock *sk = ctx->sk; in _getsockopt_subflow()
|
| H A D | sockopt_sk.c | 35 struct bpf_sock *sk; in _getsockopt() 145 struct bpf_sock *sk; in _setsockopt()
|
| H A D | exceptions_assert.c | 65 struct bpf_sock *sk = ctx->sk; in check_assert_range_s64() 92 struct bpf_sock *sk = ctx->sk; in check_assert_single_range_s64()
|
| H A D | test_sk_assign.c | 104 struct bpf_sock *sk; in handle_udp() 135 struct bpf_sock *sk; in handle_tcp()
|
| H A D | recvmsg4_prog.c | 19 struct bpf_sock *sk; in recvmsg4_prog()
|
| H A D | bind_perm.c | 12 struct bpf_sock *sk; in bind_prog()
|
| H A D | freplace_cls_redirect.c | 22 struct bpf_sock *sk; in freplace_cls_redirect_test()
|
| H A D | kfunc_call_test_subprog.c | 11 struct bpf_sock *sk = skb->sk; in f1()
|
| H A D | recvmsg6_prog.c | 22 struct bpf_sock *sk; in recvmsg6_prog()
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | sock_create.c | 34 offsetof(struct bpf_sock, priority)), 55 offsetof(struct bpf_sock, priority)), 86 offsetof(struct bpf_sock, mark)), 117 offsetof(struct bpf_sock, mark)), 138 offsetof(struct bpf_sock, bound_dev_if)), 159 offsetof(struct bpf_sock, bound_dev_if)), 181 offsetof(struct bpf_sock, family)), 186 offsetof(struct bpf_sock, type)), 191 offsetof(struct bpf_sock, protocol)), 214 offsetof(struct bpf_sock, family)), [all …]
|
| H A D | sock_post_bind.c | 106 offsetof(struct bpf_sock, src_ip6[3])), 110 offsetof(struct bpf_sock, src_port)), 136 offsetof(struct bpf_sock, src_ip4)), 140 offsetof(struct bpf_sock, src_port)), 166 offsetof(struct bpf_sock, src_ip4)), 170 offsetof(struct bpf_sock, src_port)), 197 offsetof(struct bpf_sock, src_ip4)), 201 offsetof(struct bpf_sock, src_port)), 228 offsetof(struct bpf_sock, src_ip6[3])), 232 offsetof(struct bpf_sock, src_port)),
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | cgroup_getset_retval_hooks.h | 5 BPF_RETVAL_HOOK(sock_create, "cgroup/sock_create", bpf_sock, 0) 25 BPF_RETVAL_HOOK(sock_release, "cgroup/sock_release", bpf_sock, 0)
|
| /linux/net/core/ |
| H A D | filter.c | 5606 static bool is_locked_tcp_sock_ops(struct bpf_sock_ops_kern *bpf_sock) in is_locked_tcp_sock_ops() argument 5608 return bpf_sock->op <= BPF_SOCK_OPS_WRITE_HDR_OPT_CB; in is_locked_tcp_sock_ops() 5829 BPF_CALL_5(bpf_sock_ops_setsockopt, struct bpf_sock_ops_kern *, bpf_sock, in BPF_CALL_5() argument 5832 if (!is_locked_tcp_sock_ops(bpf_sock)) in BPF_CALL_5() 5835 return _bpf_setsockopt(bpf_sock->sk, level, optname, optval, optlen); in BPF_CALL_5() 5849 static int bpf_sock_ops_get_syn(struct bpf_sock_ops_kern *bpf_sock, in bpf_sock_ops_get_syn() argument 5852 struct sk_buff *syn_skb = bpf_sock->syn_skb; in bpf_sock_ops_get_syn() 5874 struct sock *sk = bpf_sock->sk; in bpf_sock_ops_get_syn() 5917 BPF_CALL_5(bpf_sock_ops_getsockopt, struct bpf_sock_ops_kern *, bpf_sock, in BPF_CALL_5() argument 5920 if (!is_locked_tcp_sock_ops(bpf_sock)) in BPF_CALL_5() [all …]
|
| /linux/include/uapi/linux/ |
| H A D | bpf.h | 3213 * long bpf_sock_ops_cb_flags_set(struct bpf_sock_ops *bpf_sock, int argval) 3240 * **bpf_sock_ops_cb_flags_set(bpf_sock,** 3241 * **bpf_sock->bpf_sock_ops_cb_flags & ~BPF_SOCK_OPS_RTO_CB_FLAG)** 3777 * struct bpf_sock *bpf_sk_lookup_tcp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags) 3809 * Pointer to **struct bpf_sock**, or **NULL** in case of failure. 3810 * For sockets with reuseport option, the **struct bpf_sock** 3814 * struct bpf_sock *bpf_sk_lookup_udp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags) 3846 * Pointer to **struct bpf_sock**, or **NULL** in case of failure. 3847 * For sockets with reuseport option, the **struct bpf_sock** 3978 * struct bpf_sock *bpf_sk_fullsoc 6413 struct bpf_sock { global() struct 6414 bound_dev_ifbpf_sock global() argument 6415 familybpf_sock global() argument 6416 typebpf_sock global() argument 6417 protocolbpf_sock global() argument 6418 markbpf_sock global() argument 6419 prioritybpf_sock global() argument 6421 src_ip4bpf_sock global() argument 6422 src_ip6bpf_sock global() argument 6423 src_portbpf_sock global() argument 6424 dst_portbpf_sock global() argument 6426 dst_ip4bpf_sock global() argument 6427 dst_ip6bpf_sock global() argument 6428 statebpf_sock global() argument 6429 rx_queue_mappingbpf_sock global() argument [all...] |
| /linux/tools/include/uapi/linux/ |
| H A D | bpf.h | 3213 * long bpf_sock_ops_cb_flags_set(struct bpf_sock_ops *bpf_sock, int argval) 3240 * **bpf_sock_ops_cb_flags_set(bpf_sock,** 3241 * **bpf_sock->bpf_sock_ops_cb_flags & ~BPF_SOCK_OPS_RTO_CB_FLAG)** 3777 * struct bpf_sock *bpf_sk_lookup_tcp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags) 3809 * Pointer to **struct bpf_sock**, or **NULL** in case of failure. 3810 * For sockets with reuseport option, the **struct bpf_sock** 3814 * struct bpf_sock *bpf_sk_lookup_udp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags) 3846 * Pointer to **struct bpf_sock**, or **NULL** in case of failure. 3847 * For sockets with reuseport option, the **struct bpf_sock** 3978 * struct bpf_sock *bpf_sk_fullsoc 6413 struct bpf_sock { global() struct 6414 bound_dev_ifbpf_sock global() argument 6415 familybpf_sock global() argument 6416 typebpf_sock global() argument 6417 protocolbpf_sock global() argument 6418 markbpf_sock global() argument 6419 prioritybpf_sock global() argument 6421 src_ip4bpf_sock global() argument 6422 src_ip6bpf_sock global() argument 6423 src_portbpf_sock global() argument 6424 dst_portbpf_sock global() argument 6426 dst_ip4bpf_sock global() argument 6427 dst_ip6bpf_sock global() argument 6428 statebpf_sock global() argument 6429 rx_queue_mappingbpf_sock global() argument [all...] |