Searched refs:sock_ops (Results 1 – 6 of 6) sorted by relevance
/Linux-v4.19/include/linux/ |
D | bpf-cgroup.h | 98 struct bpf_sock_ops_kern *sock_ops, 213 #define BPF_CGROUP_RUN_PROG_SOCK_OPS(sock_ops) \ argument 216 if (cgroup_bpf_enabled && (sock_ops)->sk) { \ 217 typeof(sk) __sk = sk_to_full_sk((sock_ops)->sk); \ 220 sock_ops, \ 293 #define BPF_CGROUP_RUN_PROG_SOCK_OPS(sock_ops) ({ 0; }) argument
|
D | bpf_types.h | 16 BPF_PROG_TYPE(BPF_PROG_TYPE_SOCK_OPS, sock_ops)
|
/Linux-v4.19/tools/bpf/bpftool/Documentation/ |
D | bpftool-cgroup.rst | 30 | *ATTACH_TYPE* := { **ingress** | **egress** | **sock_create** | **sock_ops** | **device** | 77 **sock_ops** various socket operations (since 4.12);
|
/Linux-v4.19/include/net/ |
D | tcp.h | 2080 struct bpf_sock_ops_kern sock_ops; in tcp_call_bpf() local 2083 memset(&sock_ops, 0, offsetof(struct bpf_sock_ops_kern, temp)); in tcp_call_bpf() 2085 sock_ops.is_fullsock = 1; in tcp_call_bpf() 2089 sock_ops.sk = sk; in tcp_call_bpf() 2090 sock_ops.op = op; in tcp_call_bpf() 2092 memcpy(sock_ops.args, args, nargs * sizeof(*args)); in tcp_call_bpf() 2094 ret = BPF_CGROUP_RUN_PROG_SOCK_OPS(&sock_ops); in tcp_call_bpf() 2096 ret = sock_ops.reply; in tcp_call_bpf()
|
/Linux-v4.19/kernel/bpf/ |
D | cgroup.c | 633 struct bpf_sock_ops_kern *sock_ops, in __cgroup_bpf_run_filter_sock_ops() argument 639 ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], sock_ops, in __cgroup_bpf_run_filter_sock_ops()
|
/Linux-v4.19/tools/bpf/bpftool/bash-completion/ |
D | bpftool | 502 local ATTACH_TYPES='ingress egress sock_create sock_ops \ 512 ingress|egress|sock_create|sock_ops|device|bind4|bind6|\
|