/kernel/linux/linux-5.10/net/core/ |
D | skmsg.c | 422 struct sk_psock *psock, in sk_psock_skb_ingress_enqueue() argument 445 sk_psock_queue_msg(psock, msg); in sk_psock_skb_ingress_enqueue() 446 sk_psock_data_ready(sk, psock); in sk_psock_skb_ingress_enqueue() 450 static int sk_psock_skb_ingress_self(struct sk_psock *psock, struct sk_buff *skb); 452 static int sk_psock_skb_ingress(struct sk_psock *psock, struct sk_buff *skb) in sk_psock_skb_ingress() argument 454 struct sock *sk = psock->sk; in sk_psock_skb_ingress() 463 return sk_psock_skb_ingress_self(psock, skb); in sk_psock_skb_ingress() 475 err = sk_psock_skb_ingress_enqueue(skb, psock, sk, msg); in sk_psock_skb_ingress() 485 static int sk_psock_skb_ingress_self(struct sk_psock *psock, struct sk_buff *skb) in sk_psock_skb_ingress_self() argument 488 struct sock *sk = psock->sk; in sk_psock_skb_ingress_self() [all …]
|
D | sock_map.c | 137 static void sock_map_add_link(struct sk_psock *psock, in sock_map_add_link() argument 143 spin_lock_bh(&psock->link_lock); in sock_map_add_link() 144 list_add_tail(&link->list, &psock->link); in sock_map_add_link() 145 spin_unlock_bh(&psock->link_lock); in sock_map_add_link() 149 struct sk_psock *psock, void *link_raw) in sock_map_del_link() argument 154 spin_lock_bh(&psock->link_lock); in sock_map_del_link() 155 list_for_each_entry_safe(link, tmp, &psock->link, list) { in sock_map_del_link() 160 if (psock->parser.enabled && stab->progs.skb_parser) in sock_map_del_link() 162 if (psock->parser.enabled && stab->progs.skb_verdict) in sock_map_del_link() 168 spin_unlock_bh(&psock->link_lock); in sock_map_del_link() [all …]
|
/kernel/linux/linux-5.10/net/ipv4/ |
D | tcp_bpf.c | 13 int __tcp_bpf_recvmsg(struct sock *sk, struct sk_psock *psock, in __tcp_bpf_recvmsg() argument 21 msg_rx = list_first_entry_or_null(&psock->ingress_msg, in __tcp_bpf_recvmsg() 71 if (msg_rx == list_last_entry(&psock->ingress_msg, in __tcp_bpf_recvmsg() 85 msg_rx = list_first_entry_or_null(&psock->ingress_msg, in __tcp_bpf_recvmsg() 93 static int bpf_tcp_ingress(struct sock *sk, struct sk_psock *psock, in bpf_tcp_ingress() argument 135 sk_psock_queue_msg(psock, tmp); in bpf_tcp_ingress() 136 sk_psock_data_ready(sk, psock); in bpf_tcp_ingress() 218 struct sk_psock *psock = sk_psock_get(sk); in tcp_bpf_sendmsg_redir() local 221 if (unlikely(!psock)) { in tcp_bpf_sendmsg_redir() 225 ret = ingress ? bpf_tcp_ingress(sk, psock, msg, bytes, flags) : in tcp_bpf_sendmsg_redir() [all …]
|
D | udp_bpf.c | 44 struct proto *udp_bpf_get_proto(struct sock *sk, struct sk_psock *psock) in udp_bpf_get_proto() argument 49 udp_bpf_check_v6_needs_rebuild(psock->sk_proto); in udp_bpf_get_proto()
|
/kernel/linux/linux-5.10/include/linux/ |
D | skmsg.h | 136 static inline void sk_msg_apply_bytes(struct sk_psock *psock, u32 bytes) in sk_msg_apply_bytes() argument 138 if (psock->apply_bytes) { in sk_msg_apply_bytes() 139 if (psock->apply_bytes < bytes) in sk_msg_apply_bytes() 140 psock->apply_bytes = 0; in sk_msg_apply_bytes() 142 psock->apply_bytes -= bytes; in sk_msg_apply_bytes() 287 static inline void sk_psock_queue_msg(struct sk_psock *psock, in sk_psock_queue_msg() argument 290 list_add_tail(&msg->list, &psock->ingress_msg); in sk_psock_queue_msg() 293 static inline bool sk_psock_queue_empty(const struct sk_psock *psock) in sk_psock_queue_empty() argument 295 return psock ? list_empty(&psock->ingress_msg) : true; in sk_psock_queue_empty() 298 static inline void sk_psock_report_error(struct sk_psock *psock, int err) in sk_psock_report_error() argument [all …]
|
/kernel/linux/linux-5.10/net/kcm/ |
D | kcmsock.c | 53 static void kcm_abort_tx_psock(struct kcm_psock *psock, int err, in kcm_abort_tx_psock() argument 56 struct sock *csk = psock->sk; in kcm_abort_tx_psock() 57 struct kcm_mux *mux = psock->mux; in kcm_abort_tx_psock() 63 if (psock->tx_stopped) { in kcm_abort_tx_psock() 68 psock->tx_stopped = 1; in kcm_abort_tx_psock() 69 KCM_STATS_INCR(psock->stats.tx_aborts); in kcm_abort_tx_psock() 71 if (!psock->tx_kcm) { in kcm_abort_tx_psock() 73 list_del(&psock->psock_avail_list); in kcm_abort_tx_psock() 82 queue_work(kcm_wq, &psock->tx_kcm->tx_work); in kcm_abort_tx_psock() 93 struct kcm_psock *psock) in kcm_update_rx_mux_stats() argument [all …]
|
D | kcmproc.c | 139 static void kcm_format_psock(struct kcm_psock *psock, struct seq_file *seq, in kcm_format_psock() argument 144 psock->index, in kcm_format_psock() 145 psock->strp.stats.msgs, in kcm_format_psock() 146 psock->strp.stats.bytes, in kcm_format_psock() 147 psock->stats.tx_msgs, in kcm_format_psock() 148 psock->stats.tx_bytes, in kcm_format_psock() 149 psock->sk->sk_receive_queue.qlen, in kcm_format_psock() 150 atomic_read(&psock->sk->sk_rmem_alloc), in kcm_format_psock() 151 psock->sk->sk_write_queue.qlen, in kcm_format_psock() 152 refcount_read(&psock->sk->sk_wmem_alloc)); in kcm_format_psock() [all …]
|
/kernel/linux/linux-5.10/drivers/pcmcia/ |
D | tcic.c | 105 u_short psock; member 404 socket_table[sockets].psock = i; in init_tcic() 482 tcic_setw(TCIC_ADDR+2, socket_table[i].psock << TCIC_SS_SHFT); in init_tcic() 533 u_short psock; in tcic_interrupt() local 546 psock = socket_table[i].psock; in tcic_interrupt() 547 tcic_setl(TCIC_ADDR, (psock << TCIC_ADDR_SS_SHFT) in tcic_interrupt() 548 | TCIC_ADDR_INDREG | TCIC_SCF1(psock)); in tcic_interrupt() 550 latch = sstat ^ socket_table[psock].last_sstat; in tcic_interrupt() 595 u_short psock = container_of(sock, struct tcic_socket, socket)->psock; in tcic_get_status() local 598 tcic_setl(TCIC_ADDR, (psock << TCIC_ADDR_SS_SHFT) in tcic_get_status() [all …]
|
D | i82365.c | 149 u_short psock; member 224 reg = I365_REG(socket[sock].psock, reg); in i365_get() 237 u_char val = I365_REG(socket[sock].psock, reg); in i365_set() 579 socket[sockets].psock = sock; in identify() 662 static void __init add_socket(unsigned int port, int psock, int type) in add_socket() argument 665 socket[sockets].psock = psock; in add_socket() 683 t->ioaddr, t->psock*0x40); in add_pcic() 907 if (socket[sock].psock & 1) { in i365_get_status() 1120 pcic[s->type].name, s->psock);
|
/kernel/linux/linux-5.10/net/tls/ |
D | tls_sw.c | 802 struct sk_psock *psock; in bpf_exec_tx_verdict() local 810 psock = sk_psock_get(sk); in bpf_exec_tx_verdict() 811 if (!psock || !policy) { in bpf_exec_tx_verdict() 818 if (psock) in bpf_exec_tx_verdict() 819 sk_psock_put(sk, psock); in bpf_exec_tx_verdict() 824 if (psock->eval == __SK_NONE) { in bpf_exec_tx_verdict() 826 psock->eval = sk_psock_msg_verdict(sk, psock, msg); in bpf_exec_tx_verdict() 839 switch (psock->eval) { in bpf_exec_tx_verdict() 850 sk_redir = psock->sk_redir; in bpf_exec_tx_verdict() 891 psock->eval = __SK_NONE; in bpf_exec_tx_verdict() [all …]
|
/kernel/linux/linux-5.10/include/net/ |
D | udp.h | 517 struct proto *udp_bpf_get_proto(struct sock *sk, struct sk_psock *psock);
|
D | tcp.h | 2219 struct proto *tcp_bpf_get_proto(struct sock *sk, struct sk_psock *psock); 2230 int __tcp_bpf_recvmsg(struct sock *sk, struct sk_psock *psock,
|