Searched refs:bpf_tcp_sock (Results  1 – 11 of 11) sorted by relevance
| /Linux-v5.4/tools/testing/selftests/bpf/progs/ | 
| D | test_sock_fields_kern.c | 48 	__type(value, struct bpf_tcp_sock);106 static void tpcpy(struct bpf_tcp_sock *dst,  in tpcpy()
 107 		  const struct bpf_tcp_sock *src)  in tpcpy()
 146 	struct bpf_tcp_sock *tp, *tp_ret;  in egress_read_sock_fields()
 161 	tp = bpf_tcp_sock(sk);  in egress_read_sock_fields()
 218 	struct bpf_tcp_sock *tp, *tp_ret;  in ingress_read_sock_fields()
 240 	tp = bpf_tcp_sock(sk);  in ingress_read_sock_fields()
 
 | 
| D | tcp_rtt.c | 28 	struct bpf_tcp_sock *tcp_sk;  in _sockops()49 	tcp_sk = bpf_tcp_sock(sk);  in _sockops()
 
 | 
| /Linux-v5.4/samples/bpf/ | 
| D | tcp_dumpstats_kern.c | 28 	struct bpf_tcp_sock *tcp_sk;  in _sockops()56 	tcp_sk = bpf_tcp_sock(sk);  in _sockops()
 
 | 
| D | hbm_kern.h | 90 	struct bpf_tcp_sock *tp;  in get_tcp_info()97 				tp = bpf_tcp_sock(sk);  in get_tcp_info()
 
 | 
| /Linux-v5.4/tools/testing/selftests/bpf/verifier/ | 
| D | sock.c | 253 	BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_0, offsetof(struct bpf_tcp_sock, snd_cwnd)),271 	BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_0, offsetof(struct bpf_tcp_sock, snd_cwnd)),
 288 	BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_0, offsetof(struct bpf_tcp_sock, bytes_acked)),
 305 	BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_0, offsetofend(struct bpf_tcp_sock, bytes_acked)),
 327 	BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_0, offsetof(struct bpf_tcp_sock, snd_cwnd)),
 
 | 
| D | ref_tracking.c | 672 	BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_7, offsetof(struct bpf_tcp_sock, snd_cwnd)),815 	BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_8, offsetof(struct bpf_tcp_sock, snd_cwnd)),
 
 | 
| /Linux-v5.4/net/core/ | 
| D | filter.c | 5554 	if (off < 0 || off >= offsetofend(struct bpf_tcp_sock,  in bpf_tcp_sock_is_valid_access()5562 	case offsetof(struct bpf_tcp_sock, bytes_received):  in bpf_tcp_sock_is_valid_access()
 5563 	case offsetof(struct bpf_tcp_sock, bytes_acked):  in bpf_tcp_sock_is_valid_access()
 5580 			     FIELD_SIZEOF(struct bpf_tcp_sock, FIELD));	\  in bpf_tcp_sock_convert_ctx_access()
 5590 			     FIELD_SIZEOF(struct bpf_tcp_sock, FIELD));	\  in bpf_tcp_sock_convert_ctx_access()
 5604 	case offsetof(struct bpf_tcp_sock, rtt_min):  in bpf_tcp_sock_convert_ctx_access()
 5614 	case offsetof(struct bpf_tcp_sock, snd_cwnd):  in bpf_tcp_sock_convert_ctx_access()
 5617 	case offsetof(struct bpf_tcp_sock, srtt_us):  in bpf_tcp_sock_convert_ctx_access()
 5620 	case offsetof(struct bpf_tcp_sock, snd_ssthresh):  in bpf_tcp_sock_convert_ctx_access()
 5623 	case offsetof(struct bpf_tcp_sock, rcv_nxt):  in bpf_tcp_sock_convert_ctx_access()
 [all …]
 
 | 
| /Linux-v5.4/tools/testing/selftests/bpf/ | 
| D | test_sock_fields.c | 105 static void print_tp(const struct bpf_tcp_sock *tp)  in print_tp()124 	struct bpf_tcp_sock srv_tp, cli_tp, listen_tp;  in check_result()
 
 | 
| D | bpf_helpers.h | 199 static struct bpf_tcp_sock *(*bpf_tcp_sock)(struct bpf_sock *sk) =  variable
 | 
| /Linux-v5.4/include/uapi/linux/ | 
| D | bpf.h | 3077 struct bpf_tcp_sock {  struct
 | 
| /Linux-v5.4/tools/include/uapi/linux/ | 
| D | bpf.h | 3077 struct bpf_tcp_sock {  struct
 |