Home
last modified time | relevance | path

Searched refs:skb_verdict (Results 1 – 6 of 6) sorted by relevance

/linux-6.6.21/net/core/
Dsock_map.c155 if (psock->saved_data_ready && progs->skb_verdict) in sock_map_del_link()
218 struct bpf_prog *skb_verdict = NULL; in sock_map_link() local
248 skb_verdict = READ_ONCE(progs->skb_verdict); in sock_map_link()
249 if (skb_verdict) { in sock_map_link()
250 skb_verdict = bpf_prog_inc_not_zero(skb_verdict); in sock_map_link()
251 if (IS_ERR(skb_verdict)) { in sock_map_link()
252 ret = PTR_ERR(skb_verdict); in sock_map_link()
266 (skb_verdict && READ_ONCE(psock->progs.skb_verdict)) || in sock_map_link()
267 (skb_verdict && READ_ONCE(psock->progs.stream_verdict)) || in sock_map_link()
268 (stream_verdict && READ_ONCE(psock->progs.skb_verdict)) || in sock_map_link()
[all …]
Dskmsg.c842 else if (psock->progs.stream_verdict || psock->progs.skb_verdict) in sk_psock_drop()
1195 prog = READ_ONCE(psock->progs.skb_verdict); in sk_psock_verdict_recv()
1251 psock_set_prog(&psock->progs.skb_verdict, NULL); in sk_psock_stop_verdict()
/linux-6.6.21/include/linux/
Dskmsg.h60 struct bpf_prog *skb_verdict; member
491 psock_set_prog(&progs->skb_verdict, NULL); in psock_progs_drop()
/linux-6.6.21/Documentation/bpf/
Dmap_sockmap.rst50 struct bpf_prog *skb_verdict;
54 Users are not allowed to attach ``stream_verdict`` and ``skb_verdict``
62 - ``skb_verdict`` program - ``BPF_SK_SKB_VERDICT``.
/linux-6.6.21/net/ipv4/
Dtcp_bpf.c654 if (psock->progs.stream_verdict || psock->progs.skb_verdict) { in tcp_bpf_update_proto()
/linux-6.6.21/tools/testing/selftests/bpf/prog_tests/
Dsockmap_listen.c307 int skb_verdict = bpf_program__fd(skel->progs.prog_skb_verdict); in test_destroy_orphan_child() local
314 { skb_verdict, BPF_SK_SKB_VERDICT }, in test_destroy_orphan_child()