Home
last modified time | relevance | path

Searched full:mark (Results 1 – 25 of 5165) sorted by relevance

12345678910>>...207

/kernel/linux/linux-6.6/fs/notify/
Dmark.c7 * fsnotify inode mark locking/lifetime/and refcnting
10 * The group->recnt and mark->refcnt tell how many "things" in the kernel
13 * the reference a group and a mark hold to each other.
22 * mark->lock
23 * mark->connector->lock
26 * each mark is hooked via the g_list. It also protects the groups private
29 * mark->lock protects the marks attributes like its masks and flags.
30 * Furthermore it protects the access to a reference of the group that the mark
32 * that is being watched by the mark.
34 * mark->connector->lock protects the list of marks anchored inside an
[all …]
Dfdinfo.c27 struct fsnotify_mark *mark)) in show_fdinfo() argument
30 struct fsnotify_mark *mark; in show_fdinfo() local
33 list_for_each_entry(mark, &group->marks_list, g_list) { in show_fdinfo()
34 show(m, mark); in show_fdinfo()
74 static void inotify_fdinfo(struct seq_file *m, struct fsnotify_mark *mark) in inotify_fdinfo() argument
79 if (mark->connector->type != FSNOTIFY_OBJ_TYPE_INODE) in inotify_fdinfo()
82 inode_mark = container_of(mark, struct inotify_inode_mark, fsn_mark); in inotify_fdinfo()
83 inode = igrab(fsnotify_conn_inode(mark->connector)); in inotify_fdinfo()
87 inotify_mark_user_mask(mark)); in inotify_fdinfo()
103 static void fanotify_fdinfo(struct seq_file *m, struct fsnotify_mark *mark) in fanotify_fdinfo() argument
[all …]
/kernel/linux/linux-5.10/fs/notify/
Dmark.c7 * fsnotify inode mark locking/lifetime/and refcnting
10 * The group->recnt and mark->refcnt tell how many "things" in the kernel
13 * the reference a group and a mark hold to each other.
22 * mark->lock
23 * mark->connector->lock
26 * each mark is hooked via the g_list. It also protects the groups private
29 * mark->lock protects the marks attributes like its masks and flags.
30 * Furthermore it protects the access to a reference of the group that the mark
32 * that is being watched by the mark.
34 * mark->connector->lock protects the list of marks anchored inside an
[all …]
Dfdinfo.c26 struct fsnotify_mark *mark)) in show_fdinfo() argument
29 struct fsnotify_mark *mark; in show_fdinfo() local
32 list_for_each_entry(mark, &group->marks_list, g_list) { in show_fdinfo()
33 show(m, mark); in show_fdinfo()
73 static void inotify_fdinfo(struct seq_file *m, struct fsnotify_mark *mark) in inotify_fdinfo() argument
78 if (mark->connector->type != FSNOTIFY_OBJ_TYPE_INODE) in inotify_fdinfo()
81 inode_mark = container_of(mark, struct inotify_inode_mark, fsn_mark); in inotify_fdinfo()
82 inode = igrab(fsnotify_conn_inode(mark->connector)); in inotify_fdinfo()
86 inotify_mark_user_mask(mark)); in inotify_fdinfo()
102 static void fanotify_fdinfo(struct seq_file *m, struct fsnotify_mark *mark) in fanotify_fdinfo() argument
[all …]
/kernel/linux/linux-5.10/net/netfilter/ipvs/
Dip_vs_wrr.c108 struct ip_vs_wrr_mark *mark; in ip_vs_wrr_init_svc() local
111 * Allocate the mark variable for WRR scheduling in ip_vs_wrr_init_svc()
113 mark = kmalloc(sizeof(struct ip_vs_wrr_mark), GFP_KERNEL); in ip_vs_wrr_init_svc()
114 if (mark == NULL) in ip_vs_wrr_init_svc()
117 mark->cl = list_entry(&svc->destinations, struct ip_vs_dest, n_list); in ip_vs_wrr_init_svc()
118 mark->di = ip_vs_wrr_gcd_weight(svc); in ip_vs_wrr_init_svc()
119 mark->mw = ip_vs_wrr_max_weight(svc) - (mark->di - 1); in ip_vs_wrr_init_svc()
120 mark->cw = mark->mw; in ip_vs_wrr_init_svc()
121 svc->sched_data = mark; in ip_vs_wrr_init_svc()
129 struct ip_vs_wrr_mark *mark = svc->sched_data; in ip_vs_wrr_done_svc() local
[all …]
/kernel/linux/linux-6.6/net/netfilter/ipvs/
Dip_vs_wrr.c108 struct ip_vs_wrr_mark *mark; in ip_vs_wrr_init_svc() local
111 * Allocate the mark variable for WRR scheduling in ip_vs_wrr_init_svc()
113 mark = kmalloc(sizeof(struct ip_vs_wrr_mark), GFP_KERNEL); in ip_vs_wrr_init_svc()
114 if (mark == NULL) in ip_vs_wrr_init_svc()
117 mark->cl = list_entry(&svc->destinations, struct ip_vs_dest, n_list); in ip_vs_wrr_init_svc()
118 mark->di = ip_vs_wrr_gcd_weight(svc); in ip_vs_wrr_init_svc()
119 mark->mw = ip_vs_wrr_max_weight(svc) - (mark->di - 1); in ip_vs_wrr_init_svc()
120 mark->cw = mark->mw; in ip_vs_wrr_init_svc()
121 svc->sched_data = mark; in ip_vs_wrr_init_svc()
129 struct ip_vs_wrr_mark *mark = svc->sched_data; in ip_vs_wrr_done_svc() local
[all …]
/kernel/linux/linux-6.6/kernel/
Daudit_fsnotify.c23 * this mark lives on the parent directory of the inode in question.
30 struct fsnotify_mark mark; /* fsnotify mark on the inode */ member
47 static void audit_fsnotify_free_mark(struct fsnotify_mark *mark) in audit_fsnotify_free_mark() argument
51 audit_mark = container_of(mark, struct audit_fsnotify_mark, mark); in audit_fsnotify_free_mark()
55 char *audit_mark_path(struct audit_fsnotify_mark *mark) in audit_mark_path() argument
57 return mark->path; in audit_mark_path()
60 int audit_mark_compare(struct audit_fsnotify_mark *mark, unsigned long ino, dev_t dev) in audit_mark_compare() argument
62 if (mark->ino == AUDIT_INO_UNSET) in audit_mark_compare()
64 return (mark->ino == ino) && (mark->dev == dev); in audit_mark_compare()
97 fsnotify_init_mark(&audit_mark->mark, audit_fsnotify_group); in audit_alloc_mark()
[all …]
Daudit_tree.c28 struct fsnotify_mark *mark; member
41 struct fsnotify_mark mark; member
51 * audit_tree_mark (fsnotify mark). We replace struct chunk on tagging /
52 * untagging, the mark is stable as long as there is chunk attached. The
53 * association between mark and chunk is protected by hash_lock and
55 * audit_tree_group->mark_mutex and check that the mark is alive by
56 * FSNOTIFY_MARK_FLAG_ATTACHED flag check, we are sure the mark points to
77 * chunk is refcounted by embedded .refs. Mark associated with the chunk holds
78 * one chunk reference. This reference is dropped either when a mark is going
80 * mark gets replaced. This reference must be dropped using
[all …]
/kernel/linux/linux-5.10/kernel/
Daudit_fsnotify.c23 * this mark lives on the parent directory of the inode in question.
30 struct fsnotify_mark mark; /* fsnotify mark on the inode */ member
47 static void audit_fsnotify_free_mark(struct fsnotify_mark *mark) in audit_fsnotify_free_mark() argument
51 audit_mark = container_of(mark, struct audit_fsnotify_mark, mark); in audit_fsnotify_free_mark()
55 char *audit_mark_path(struct audit_fsnotify_mark *mark) in audit_mark_path() argument
57 return mark->path; in audit_mark_path()
60 int audit_mark_compare(struct audit_fsnotify_mark *mark, unsigned long ino, dev_t dev) in audit_mark_compare() argument
62 if (mark->ino == AUDIT_INO_UNSET) in audit_mark_compare()
64 return (mark->ino == ino) && (mark->dev == dev); in audit_mark_compare()
97 fsnotify_init_mark(&audit_mark->mark, audit_fsnotify_group); in audit_alloc_mark()
[all …]
Daudit_tree.c28 struct fsnotify_mark *mark; member
41 struct fsnotify_mark mark; member
51 * audit_tree_mark (fsnotify mark). We replace struct chunk on tagging /
52 * untagging, the mark is stable as long as there is chunk attached. The
53 * association between mark and chunk is protected by hash_lock and
55 * audit_tree_group->mark_mutex and check that the mark is alive by
56 * FSNOTIFY_MARK_FLAG_ATTACHED flag check, we are sure the mark points to
77 * chunk is refcounted by embedded .refs. Mark associated with the chunk holds
78 * one chunk reference. This reference is dropped either when a mark is going
80 * mark gets replaced. This reference must be dropped using
[all …]
/kernel/linux/linux-5.10/net/bridge/netfilter/
Debt_mark.c12 /* The mark target can be used in any chain,
29 skb->mark = info->mark; in ebt_mark_tg()
31 skb->mark |= info->mark; in ebt_mark_tg()
33 skb->mark &= info->mark; in ebt_mark_tg()
35 skb->mark ^= info->mark; in ebt_mark_tg()
58 compat_ulong_t mark; member
67 kern->mark = user->mark; in mark_tg_compat_from_user()
76 if (put_user(kern->mark, &user->mark) || in mark_tg_compat_to_user()
84 .name = "mark",
110 MODULE_DESCRIPTION("Ebtables: Packet mark modification");
/kernel/linux/linux-6.6/net/bridge/netfilter/
Debt_mark.c12 /* The mark target can be used in any chain,
29 skb->mark = info->mark; in ebt_mark_tg()
31 skb->mark |= info->mark; in ebt_mark_tg()
33 skb->mark &= info->mark; in ebt_mark_tg()
35 skb->mark ^= info->mark; in ebt_mark_tg()
58 compat_ulong_t mark; member
67 kern->mark = user->mark; in mark_tg_compat_from_user()
76 if (put_user(kern->mark, &user->mark) || in mark_tg_compat_to_user()
84 .name = "mark",
110 MODULE_DESCRIPTION("Ebtables: Packet mark modification");
/kernel/linux/linux-6.6/tools/testing/selftests/tc-testing/tc-tests/actions/
Dskbedit.json4 "name": "Add skbedit action with valid mark",
17 "cmdUnderTest": "$TC actions add action skbedit mark 1",
20 "matchPattern": "action order [0-9]*: skbedit mark 1",
28 "name": "Add skbedit action with 32-bit maximum mark",
41 "cmdUnderTest": "$TC actions add action skbedit mark 4294967295 pipe index 1",
44 "matchPattern": "action order [0-9]*: skbedit mark 4294967295.*pipe.*index 1",
52 "name": "Add skbedit action with mark exceeding 32-bit maximum",
65 "cmdUnderTest": "$TC actions add action skbedit mark 666777888999",
68 "matchPattern": "action order [0-9]*: skbedit mark",
74 "name": "Add skbedit action with valid mark and mask",
[all …]
Dife.json4 "name": "Create valid ife encode action with mark and pass control",
17 "cmdUnderTest": "$TC actions add action ife encode allow mark pass index 2",
20 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow mark.*index 2",
28 "name": "Create valid ife encode action with mark and pipe control",
41 "cmdUnderTest": "$TC actions add action ife encode use mark 10 pipe index 2",
44 … "matchPattern": "action order [0-9]*: ife encode action pipe.*type 0[xX]ED3E.*use mark.*index 2",
52 "name": "Create valid ife encode action with mark and continue control",
65 "cmdUnderTest": "$TC actions add action ife encode allow mark continue index 2",
68 …chPattern": "action order [0-9]*: ife encode action continue.*type 0[xX]ED3E.*allow mark.*index 2",
76 "name": "Create valid ife encode action with mark and drop control",
[all …]
/kernel/linux/linux-5.10/tools/testing/selftests/tc-testing/tc-tests/actions/
Dskbedit.json4 "name": "Add skbedit action with valid mark",
17 "cmdUnderTest": "$TC actions add action skbedit mark 1",
20 "matchPattern": "action order [0-9]*: skbedit mark 1",
28 "name": "Add skbedit action with 32-bit maximum mark",
41 "cmdUnderTest": "$TC actions add action skbedit mark 4294967295 pipe index 1",
44 "matchPattern": "action order [0-9]*: skbedit mark 4294967295.*pipe.*index 1",
52 "name": "Add skbedit action with mark exceeding 32-bit maximum",
65 "cmdUnderTest": "$TC actions add action skbedit mark 666777888999",
68 "matchPattern": "action order [0-9]*: skbedit mark",
74 "name": "Add skbedit action with valid mark and mask",
[all …]
/kernel/linux/linux-6.6/samples/bpf/
Dtest_cgrp2_sock.c30 static int prog_load(__u32 idx, __u32 mark, __u32 prio) in prog_load() argument
48 /* set mark on socket */ in prog_load()
55 /* if uid is 0, use given mark, else use the uid as the mark */ in prog_load()
58 BPF_MOV64_IMM(BPF_REG_3, mark), in prog_load()
60 /* set the mark on the new socket */ in prog_load()
62 BPF_MOV64_IMM(BPF_REG_2, offsetof(struct bpf_sock, mark)), in prog_load()
63 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, offsetof(struct bpf_sock, mark)), in prog_load()
87 if (mark) in prog_load()
107 if (mark) { in prog_load()
145 unsigned int mark = 0; in get_somark() local
[all …]
Dtest_cgrp2_sock.sh98 check_sock "dev , mark 0, priority 0" "No programs attached"
99 check_sock6 "dev , mark 0, priority 0" "No programs attached"
107 check_sock "dev cgrp2_sock, mark 0, priority 0" "Device set"
108 check_sock6 "dev cgrp2_sock, mark 0, priority 0" "Device set"
110 # verify mark is set
114 cleanup_and_exit 1 "Failed to install program to set mark"
116 check_sock "dev , mark 666, priority 0" "Mark set"
117 check_sock6 "dev , mark 666, priority 0" "Mark set"
125 check_sock "dev , mark 0, priority 123" "Priority set"
126 check_sock6 "dev , mark 0, priority 123" "Priority set"
[all …]
Dxdp2skb_meta_kern.c4 * Example howto transfer info from XDP to SKB, e.g. skb->mark
28 __u32 mark; member
57 meta->mark = 42; in _xdp_mark()
72 ctx->mark = 41; in _tc_mark()
78 ctx->mark = meta->mark; /* Transfer XDP-mark to SKB-mark */ in _tc_mark()
98 iptables -I INPUT -p icmp -m mark --mark 41 # == 0x29
99 iptables -I INPUT -p icmp -m mark --mark 42 # == 0x2a
/kernel/linux/linux-5.10/samples/bpf/
Dtest_cgrp2_sock.c30 static int prog_load(__u32 idx, __u32 mark, __u32 prio) in prog_load() argument
48 /* set mark on socket */ in prog_load()
55 /* if uid is 0, use given mark, else use the uid as the mark */ in prog_load()
58 BPF_MOV64_IMM(BPF_REG_3, mark), in prog_load()
60 /* set the mark on the new socket */ in prog_load()
62 BPF_MOV64_IMM(BPF_REG_2, offsetof(struct bpf_sock, mark)), in prog_load()
63 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3, offsetof(struct bpf_sock, mark)), in prog_load()
83 if (mark) in prog_load()
103 if (mark) { in prog_load()
141 unsigned int mark = 0; in get_somark() local
[all …]
Dtest_cgrp2_sock.sh96 check_sock "dev , mark 0, priority 0" "No programs attached"
97 check_sock6 "dev , mark 0, priority 0" "No programs attached"
105 check_sock "dev cgrp2_sock, mark 0, priority 0" "Device set"
106 check_sock6 "dev cgrp2_sock, mark 0, priority 0" "Device set"
108 # verify mark is set
112 cleanup_and_exit 1 "Failed to install program to set mark"
114 check_sock "dev , mark 666, priority 0" "Mark set"
115 check_sock6 "dev , mark 666, priority 0" "Mark set"
123 check_sock "dev , mark 0, priority 123" "Priority set"
124 check_sock6 "dev , mark 0, priority 123" "Priority set"
[all …]
/kernel/linux/linux-6.6/include/linux/
Dfsnotify_backend.h60 * Set on inode mark that cares about things that happen to its children.
95 * It may include events that can be sent to an inode/sb/mount mark, but cannot
139 * @mark: mark to notify
150 * freeing_mark - called when a mark is being destroyed for some reason. The group
151 * MUST be holding a reference on each mark and that reference must be
160 int (*handle_inode_event)(struct fsnotify_mark *mark, u32 mask,
164 void (*freeing_mark)(struct fsnotify_mark *mark, struct fsnotify_group *group);
167 void (*free_mark)(struct fsnotify_mark *mark);
262 * evictable marks of the same group that is allocating a new mark.
385 /* The type of object that a mark is attached to */
[all …]
/kernel/linux/linux-5.10/include/linux/
Dfsnotify_backend.h53 * Set on inode mark that cares about things that happen to its children.
89 * It may include events that can be sent to an inode/sb/mount mark, but cannot
133 * @mark: mark to notify
143 * freeing_mark - called when a mark is being destroyed for some reason. The group
144 * MUST be holding a reference on each mark and that reference must be
153 int (*handle_inode_event)(struct fsnotify_mark *mark, u32 mask,
157 void (*freeing_mark)(struct fsnotify_mark *mark, struct fsnotify_group *group);
160 void (*free_mark)(struct fsnotify_mark *mark);
210 atomic_t num_marks; /* 1 for each mark and 1 for not being
319 struct fsnotify_mark *mark) in fsnotify_iter_set_report_type_mark() argument
[all …]
/kernel/linux/linux-5.10/net/netfilter/ipset/
Dip_set_hash_ipmark.c4 /* Kernel module implementing an IP set type: the hash:ip,mark type */
28 IP_SET_MODULE_DESC("hash:ip,mark", IPSET_TYPE_REV_MIN, IPSET_TYPE_REV_MAX);
29 MODULE_ALIAS("ip_set_hash:ip,mark");
40 __u32 mark; member
51 ip1->mark == ip2->mark; in hash_ipmark4_data_equal()
59 nla_put_net32(skb, IPSET_ATTR_MARK, htonl(data->mark))) in hash_ipmark4_data_list()
88 e.mark = skb->mark; in hash_ipmark4_kadt()
89 e.mark &= h->markmask; in hash_ipmark4_kadt()
121 e.mark = ntohl(nla_get_be32(tb[IPSET_ATTR_MARK])); in hash_ipmark4_uadt()
122 e.mark &= h->markmask; in hash_ipmark4_uadt()
[all …]
/kernel/linux/linux-6.6/net/netfilter/ipset/
Dip_set_hash_ipmark.c4 /* Kernel module implementing an IP set type: the hash:ip,mark type */
29 IP_SET_MODULE_DESC("hash:ip,mark", IPSET_TYPE_REV_MIN, IPSET_TYPE_REV_MAX);
30 MODULE_ALIAS("ip_set_hash:ip,mark");
41 __u32 mark; member
52 ip1->mark == ip2->mark; in hash_ipmark4_data_equal()
60 nla_put_net32(skb, IPSET_ATTR_MARK, htonl(data->mark))) in hash_ipmark4_data_list()
89 e.mark = skb->mark; in hash_ipmark4_kadt()
90 e.mark &= h->markmask; in hash_ipmark4_kadt()
122 e.mark = ntohl(nla_get_be32(tb[IPSET_ATTR_MARK])); in hash_ipmark4_uadt()
123 e.mark &= h->markmask; in hash_ipmark4_uadt()
[all …]
/kernel/linux/linux-5.10/lib/
Dxarray.c23 * @mark is an xa_mark_t; a small number indicating one of the mark bits.
66 static inline void xa_mark_set(struct xarray *xa, xa_mark_t mark) in xa_mark_set() argument
68 if (!(xa->xa_flags & XA_FLAGS_MARK(mark))) in xa_mark_set()
69 xa->xa_flags |= XA_FLAGS_MARK(mark); in xa_mark_set()
72 static inline void xa_mark_clear(struct xarray *xa, xa_mark_t mark) in xa_mark_clear() argument
74 if (xa->xa_flags & XA_FLAGS_MARK(mark)) in xa_mark_clear()
75 xa->xa_flags &= ~(XA_FLAGS_MARK(mark)); in xa_mark_clear()
78 static inline unsigned long *node_marks(struct xa_node *node, xa_mark_t mark) in node_marks() argument
80 return node->marks[(__force unsigned)mark]; in node_marks()
84 unsigned int offset, xa_mark_t mark) in node_get_mark() argument
[all …]

12345678910>>...207