Home
last modified time | relevance | path

Searched refs:skb_verdict (Results 1 – 6 of 6) sorted by relevance

/linux-6.3-rc2/net/core/
A Dsock_map.c252 skb_verdict = READ_ONCE(progs->skb_verdict); in sock_map_link()
253 if (skb_verdict) { in sock_map_link()
254 skb_verdict = bpf_prog_inc_not_zero(skb_verdict); in sock_map_link()
255 if (IS_ERR(skb_verdict)) { in sock_map_link()
256 ret = PTR_ERR(skb_verdict); in sock_map_link()
270 (skb_verdict && READ_ONCE(psock->progs.skb_verdict)) || in sock_map_link()
292 if (skb_verdict) in sock_map_link()
293 psock_set_prog(&psock->progs.skb_verdict, skb_verdict); in sock_map_link()
321 if (skb_verdict) in sock_map_link()
322 bpf_prog_put(skb_verdict); in sock_map_link()
[all …]
A Dskmsg.c847 else if (psock->progs.stream_verdict || psock->progs.skb_verdict) in sk_psock_drop()
1197 prog = READ_ONCE(psock->progs.skb_verdict); in sk_psock_verdict_recv()
1236 psock_set_prog(&psock->progs.skb_verdict, NULL); in sk_psock_stop_verdict()
/linux-6.3-rc2/include/linux/
A Dskmsg.h60 struct bpf_prog *skb_verdict; member
490 psock_set_prog(&progs->skb_verdict, NULL); in psock_progs_drop()
/linux-6.3-rc2/Documentation/bpf/
A Dmap_sockmap.rst50 struct bpf_prog *skb_verdict;
54 Users are not allowed to attach ``stream_verdict`` and ``skb_verdict``
62 - ``skb_verdict`` program - ``BPF_SK_SKB_VERDICT``.
/linux-6.3-rc2/net/ipv4/
A Dtcp_bpf.c608 if (psock->progs.stream_verdict || psock->progs.skb_verdict) { in tcp_bpf_update_proto()
/linux-6.3-rc2/tools/testing/selftests/bpf/prog_tests/
A Dsockmap_listen.c601 int skb_verdict = bpf_program__fd(skel->progs.prog_skb_verdict); in test_destroy_orphan_child() local
608 { skb_verdict, BPF_SK_SKB_VERDICT }, in test_destroy_orphan_child()

Completed in 22 milliseconds