Searched refs:bpf_tcp_sock (Results 1 - 10 of 10) sorted by relevance
/linux-master/samples/bpf/ |
H A D | tcp_dumpstats_kern.c | 28 struct bpf_tcp_sock *tcp_sk; 56 tcp_sk = bpf_tcp_sock(sk);
|
H A D | hbm_kern.h | 85 struct bpf_tcp_sock *tp; 92 tp = bpf_tcp_sock(sk);
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | tcp_rtt.c | 26 struct bpf_tcp_sock *tcp_sk; 47 tcp_sk = bpf_tcp_sock(sk);
|
H A D | test_sock_fields.c | 45 struct bpf_tcp_sock listen_tp = {}; 47 struct bpf_tcp_sock cli_tp = {}; 48 struct bpf_tcp_sock srv_tp = {}; 85 static void tpcpy(struct bpf_tcp_sock *dst, 86 const struct bpf_tcp_sock *src) 126 struct bpf_tcp_sock *tp, *tp_ret; 166 tp = bpf_tcp_sock(sk); 220 struct bpf_tcp_sock *tp; 244 tp = bpf_tcp_sock(sk);
|
H A D | verifier_sock.c | 465 __description("bpf_tcp_sock(skb->sk): no !skb->sk check") 472 call %[bpf_tcp_sock]; \ 476 : __imm(bpf_tcp_sock), 482 __description("bpf_tcp_sock(skb->sk): no NULL check on ret") 492 l0_%=: call %[bpf_tcp_sock]; \ 497 : __imm(bpf_tcp_sock), 499 __imm_const(bpf_tcp_sock_snd_cwnd, offsetof(struct bpf_tcp_sock, snd_cwnd)) 504 __description("bpf_tcp_sock(skb->sk): tp->snd_cwnd") 513 l0_%=: call %[bpf_tcp_sock]; \ 520 : __imm(bpf_tcp_sock), [all...] |
H A D | verifier_ref_tracking.c | 1132 __description("reference tracking: use ptr from bpf_tcp_sock() after release") 1143 call %[bpf_tcp_sock]; \ 1156 __imm(bpf_tcp_sock), 1157 __imm_const(bpf_tcp_sock_snd_cwnd, offsetof(struct bpf_tcp_sock, snd_cwnd)), 1205 call %[bpf_tcp_sock]; \ 1223 __imm(bpf_tcp_sock), 1241 call %[bpf_tcp_sock]; \ 1253 __imm(bpf_tcp_sock), 1320 /* !bpf_sk_fullsock(sk) is checked but !bpf_tcp_sock(sk) is not checked */ 1322 __description("reference tracking: tp->snd_cwnd after bpf_sk_fullsock(sk) and bpf_tcp_sock(s [all...] |
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | sock_fields.c | 83 static void print_tp(const struct bpf_tcp_sock *tp, const char *prefix) 103 struct bpf_tcp_sock srv_tp, cli_tp, listen_tp;
|
/linux-master/net/core/ |
H A D | filter.c | 7048 if (off < 0 || off >= offsetofend(struct bpf_tcp_sock, 7056 case offsetof(struct bpf_tcp_sock, bytes_received): 7057 case offsetof(struct bpf_tcp_sock, bytes_acked): 7074 sizeof_field(struct bpf_tcp_sock, FIELD)); \ 7084 sizeof_field(struct bpf_tcp_sock, FIELD)); \ 7094 BTF_TYPE_EMIT(struct bpf_tcp_sock); 7097 case offsetof(struct bpf_tcp_sock, rtt_min): 7107 case offsetof(struct bpf_tcp_sock, snd_cwnd): 7110 case offsetof(struct bpf_tcp_sock, srtt_us): 7113 case offsetof(struct bpf_tcp_sock, snd_ssthres [all...] |
/linux-master/include/uapi/linux/ |
H A D | bpf.h | 3874 * struct bpf_tcp_sock *bpf_tcp_sock(struct bpf_sock *sk) 3876 * This helper gets a **struct bpf_tcp_sock** pointer from a 3879 * A **struct bpf_tcp_sock** pointer on success, or **NULL** in 3908 * **bpf_sk_fullsock**\ () or **bpf_tcp_sock**\ () to access the 6337 struct bpf_tcp_sock { struct
|
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 3874 * struct bpf_tcp_sock *bpf_tcp_sock(struct bpf_sock *sk) 3876 * This helper gets a **struct bpf_tcp_sock** pointer from a 3879 * A **struct bpf_tcp_sock** pointer on success, or **NULL** in 3908 * **bpf_sk_fullsock**\ () or **bpf_tcp_sock**\ () to access the 6337 struct bpf_tcp_sock { struct
|
Completed in 382 milliseconds