Searched refs:bpf_sk_fullsock (Results 1 – 8 of 8) sorted by relevance
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | verifier_sock.c | 120 : __imm(bpf_sk_fullsock), in sk_no_skb_sk_check_1() 141 : __imm(bpf_sk_fullsock), in no_null_check_on_ret_1() 165 : __imm(bpf_sk_fullsock), in sk_sk_type_fullsock_field_2() 188 : __imm(bpf_sk_fullsock), in sk_family_non_fullsock_field_2() 212 : __imm(bpf_sk_fullsock), in sk_sk_state_narrow_load() 236 : __imm(bpf_sk_fullsock), in port_word_load_backward_compatibility() 260 : __imm(bpf_sk_fullsock), in sk_dst_port_half_load() 285 : __imm(bpf_sk_fullsock), in dst_port_half_load_invalid_1() 310 : __imm(bpf_sk_fullsock), in sk_dst_port_byte_load() 336 : __imm(bpf_sk_fullsock), in dst_port_byte_load_invalid() [all …]
|
H A D | verifier_jeq_infer_not_null.c | 55 : __imm(bpf_sk_fullsock), in socket_for_jne_false_branch() 93 : __imm(bpf_sk_fullsock), in unchanged_for_jne_true_branch() 129 : __imm(bpf_sk_fullsock), in socket_for_jeq_true_branch() 165 : __imm(bpf_sk_fullsock), in unchanged_for_jeq_false_branch()
|
H A D | kfunc_call_test.c | 16 sk = bpf_sk_fullsock(sk); in kfunc_call_test4() 32 sk = bpf_sk_fullsock(sk); in kfunc_call_test2() 49 sk = bpf_sk_fullsock(sk); in kfunc_call_test1()
|
H A D | kfunc_call_test_subprog.c | 17 sk = bpf_sk_fullsock(sk); in f1()
|
H A D | test_sock_fields.c | 158 sk = bpf_sk_fullsock(sk); in egress_read_sock_fields() 240 sk = bpf_sk_fullsock(sk); in ingress_read_sock_fields()
|
H A D | verifier_ref_tracking.c | 1185 : __imm(bpf_sk_fullsock), in __flag() 1220 : __imm(bpf_sk_fullsock), in __flag() 1346 : __imm(bpf_sk_fullsock), in and_bpf_tcp_sock_sk()
|
/openbmc/linux/samples/bpf/ |
H A D | hbm_kern.h | 89 sk = bpf_sk_fullsock(sk); in get_tcp_info()
|
/openbmc/linux/net/core/ |
H A D | filter.c | 1873 BPF_CALL_1(bpf_sk_fullsock, struct sock *, sk) in BPF_CALL_1() argument 1879 .func = bpf_sk_fullsock,
|