/linux/include/linux/ |
H A D | skmsg.h | 43 struct sk_msg { struct 90 struct sk_msg *cork; 124 int sk_msg_alloc(struct sock *sk, struct sk_msg *msg, int len, 126 int sk_msg_clone(struct sock *sk, struct sk_msg *dst, struct sk_msg *src, 128 void sk_msg_trim(struct sock *sk, struct sk_msg *msg, int len); 129 int sk_msg_free(struct sock *sk, struct sk_msg *msg); 130 int sk_msg_free_nocharge(struct sock *sk, struct sk_msg *msg); 131 void sk_msg_free_partial(struct sock *sk, struct sk_msg *msg, u32 bytes); 132 void sk_msg_free_partial_nocharge(struct sock *sk, struct sk_msg *msg, 135 void sk_msg_return(struct sock *sk, struct sk_msg *msg, int bytes); [all …]
|
H A D | bpf_types.h | 33 BPF_PROG_TYPE(BPF_PROG_TYPE_SK_MSG, sk_msg, 34 struct sk_msg_md, struct sk_msg)
|
/linux/net/core/ |
H A D | skmsg.c | 13 static bool sk_msg_try_coalesce_ok(struct sk_msg *msg, int elem_first_coalesce) in sk_msg_try_coalesce_ok() 27 int sk_msg_alloc(struct sock *sk, struct sk_msg *msg, int len, in sk_msg_alloc() 87 int sk_msg_clone(struct sock *sk, struct sk_msg *dst, struct sk_msg *src, in sk_msg_clone() 138 void sk_msg_return_zero(struct sock *sk, struct sk_msg *msg, int bytes) in sk_msg_return_zero() 162 void sk_msg_return(struct sock *sk, struct sk_msg *msg, int bytes) in sk_msg_return() 177 static int sk_msg_free_elem(struct sock *sk, struct sk_msg *msg, u32 i, in sk_msg_free_elem() 193 static int __sk_msg_free(struct sock *sk, struct sk_msg *msg, u32 i, in __sk_msg_free() 211 int sk_msg_free_nocharge(struct sock *sk, struct sk_msg *msg) in sk_msg_free_nocharge() 217 int sk_msg_free(struct sock *sk, struct sk_msg *msg) in sk_msg_free() 223 static void __sk_msg_free_partial(struct sock *sk, struct sk_msg *msg, in __sk_msg_free_partial() [all …]
|
H A D | filter.c | 2585 BPF_CALL_2(bpf_msg_apply_bytes, struct sk_msg *, msg, u32, bytes) in BPF_CALL_2() argument 2599 BPF_CALL_2(bpf_msg_cork_bytes, struct sk_msg *, msg, u32, bytes) in BPF_CALL_2() argument 2605 static void sk_msg_reset_curr(struct sk_msg *msg) in sk_msg_reset_curr() 2627 BPF_CALL_4(bpf_msg_pull_data, struct sk_msg *, msg, u32, start, in BPF_CALL_4() argument 2754 BPF_CALL_4(bpf_msg_push_data, struct sk_msg *, msg, u32, start, in BPF_CALL_4() argument 2903 static void sk_msg_shift_left(struct sk_msg *msg, int i) in sk_msg_shift_left() 2918 static void sk_msg_shift_right(struct sk_msg *msg, int i) in sk_msg_shift_right() 2935 BPF_CALL_4(bpf_msg_pop_data, struct sk_msg *, msg, u32, start, in BPF_CALL_4() argument 5195 BPF_CALL_1(bpf_get_netns_cookie_sk_msg, struct sk_msg *, ctx) in BPF_CALL_1() argument 10877 BUILD_BUG_ON(offsetof(struct sk_msg, sg) != 0); in sk_msg_convert_ctx_access() [all …]
|
H A D | sock_map.c | 673 BPF_CALL_4(bpf_msg_redirect_map, struct sk_msg *, msg, in BPF_CALL_4() argument 1279 BPF_CALL_4(bpf_msg_redirect_hash, struct sk_msg *, msg, in BPF_CALL_4() argument
|
/linux/net/ipv4/ |
H A D | tcp_bpf.c | 33 struct sk_msg *msg, u32 apply_bytes) in bpf_tcp_ingress() 38 struct sk_msg *tmp; in bpf_tcp_ingress() 90 static int tcp_bpf_push(struct sock *sk, struct sk_msg *msg, u32 apply_bytes, in tcp_bpf_push() 152 static int tcp_bpf_push_locked(struct sock *sk, struct sk_msg *msg, in tcp_bpf_push_locked() 164 struct sk_msg *msg, u32 bytes, int flags) in tcp_bpf_sendmsg_redir() 205 struct sk_msg *msg_rx; in is_next_msg_fin() 385 struct sk_msg *msg, int *copied, int flags) in tcp_bpf_send_verdict() 497 struct sk_msg tmp, *msg_tx = NULL; in tcp_bpf_sendmsg()
|
/linux/net/tls/ |
H A D | tls_sw.c | 325 struct sk_msg *msg_en = &rec->msg_encrypted; in tls_alloc_encrypted_msg() 336 struct sk_msg *msg_pl = &rec->msg_plaintext; in tls_clone_plaintext_msg() 337 struct sk_msg *msg_en = &rec->msg_encrypted; in tls_clone_plaintext_msg() 359 struct sk_msg *msg_pl, *msg_en; in tls_get_rec() 412 struct sk_msg *msg_en; in tls_tx_records() 473 struct sk_msg *msg_en; in tls_encrypt_done() 541 struct sk_msg *msg_en = &rec->msg_encrypted; in tls_do_encryption() 607 struct tls_rec **to, struct sk_msg *msg_opl, in tls_split_open_record() 608 struct sk_msg *msg_oen, u32 split_point, in tls_split_open_record() 615 struct sk_msg *msg_npl; in tls_split_open_record() [all …]
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | ns_current_pid_tgid.c | 135 bpf_program__set_autoload(skel->progs.sk_msg, true); in test_current_pid_tgid_sk_msg() 145 verdict = bpf_program__fd(skel->progs.sk_msg); in test_current_pid_tgid_sk_msg()
|
/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_ns_current_pid_tgid.c | 46 int sk_msg(struct sk_msg_md *msg) in sk_msg() function
|
/linux/include/net/ |
H A D | espintcp.h | 16 struct sk_msg skmsg;
|
H A D | tcp.h | 2613 struct sk_msg; 2635 struct sk_msg *msg, u32 bytes, int flags);
|
/linux/Documentation/bpf/libbpf/ |
H A D | program_types.rst | 156 | ``BPF_PROG_TYPE_SK_MSG`` | ``BPF_SK_MSG_VERDICT`` | ``sk_msg`` …
|
/linux/net/xfrm/ |
H A D | espintcp.c | 213 struct sk_msg *skmsg = &emsg->skmsg; in espintcp_sendskmsg_locked()
|
/linux/tools/bpf/bpftool/Documentation/ |
H A D | bpftool-prog.rst | 48 | **lwt_seg6local** | **sockops** | **sk_skb** | **sk_msg** | **lirc_mode2** |
|
/linux/tools/bpf/bpftool/bash-completion/ |
H A D | bpftool | 486 lwt_seg6local sockops sk_skb sk_msg lirc_mode2 \
|