/linux-6.12.1/include/linux/ |
D | skmsg.h | 43 struct sk_msg { struct 90 struct sk_msg *cork; 122 int sk_msg_alloc(struct sock *sk, struct sk_msg *msg, int len, 124 int sk_msg_clone(struct sock *sk, struct sk_msg *dst, struct sk_msg *src, 126 void sk_msg_trim(struct sock *sk, struct sk_msg *msg, int len); 127 int sk_msg_free(struct sock *sk, struct sk_msg *msg); 128 int sk_msg_free_nocharge(struct sock *sk, struct sk_msg *msg); 129 void sk_msg_free_partial(struct sock *sk, struct sk_msg *msg, u32 bytes); 130 void sk_msg_free_partial_nocharge(struct sock *sk, struct sk_msg *msg, 133 void sk_msg_return(struct sock *sk, struct sk_msg *msg, int bytes); [all …]
|
D | bpf_types.h | 33 BPF_PROG_TYPE(BPF_PROG_TYPE_SK_MSG, sk_msg, 34 struct sk_msg_md, struct sk_msg)
|
/linux-6.12.1/net/core/ |
D | skmsg.c | 13 static bool sk_msg_try_coalesce_ok(struct sk_msg *msg, int elem_first_coalesce) in sk_msg_try_coalesce_ok() 27 int sk_msg_alloc(struct sock *sk, struct sk_msg *msg, int len, in sk_msg_alloc() 87 int sk_msg_clone(struct sock *sk, struct sk_msg *dst, struct sk_msg *src, in sk_msg_clone() 138 void sk_msg_return_zero(struct sock *sk, struct sk_msg *msg, int bytes) in sk_msg_return_zero() 162 void sk_msg_return(struct sock *sk, struct sk_msg *msg, int bytes) in sk_msg_return() 177 static int sk_msg_free_elem(struct sock *sk, struct sk_msg *msg, u32 i, in sk_msg_free_elem() 193 static int __sk_msg_free(struct sock *sk, struct sk_msg *msg, u32 i, in __sk_msg_free() 211 int sk_msg_free_nocharge(struct sock *sk, struct sk_msg *msg) in sk_msg_free_nocharge() 217 int sk_msg_free(struct sock *sk, struct sk_msg *msg) in sk_msg_free() 223 static void __sk_msg_free_partial(struct sock *sk, struct sk_msg *msg, in __sk_msg_free_partial() [all …]
|
D | filter.c | 2602 BPF_CALL_2(bpf_msg_apply_bytes, struct sk_msg *, msg, u32, bytes) in BPF_CALL_2() argument 2616 BPF_CALL_2(bpf_msg_cork_bytes, struct sk_msg *, msg, u32, bytes) in BPF_CALL_2() argument 2622 static void sk_msg_reset_curr(struct sk_msg *msg) in sk_msg_reset_curr() 2646 BPF_CALL_4(bpf_msg_pull_data, struct sk_msg *, msg, u32, start, in BPF_CALL_4() argument 2773 BPF_CALL_4(bpf_msg_push_data, struct sk_msg *, msg, u32, start, in BPF_CALL_4() argument 2909 static void sk_msg_shift_left(struct sk_msg *msg, int i) in sk_msg_shift_left() 2922 static void sk_msg_shift_right(struct sk_msg *msg, int i) in sk_msg_shift_right() 2939 BPF_CALL_4(bpf_msg_pop_data, struct sk_msg *, msg, u32, start, in BPF_CALL_4() argument 5179 BPF_CALL_1(bpf_get_netns_cookie_sk_msg, struct sk_msg *, ctx) in BPF_CALL_1() argument 10871 BUILD_BUG_ON(offsetof(struct sk_msg, sg) != 0); in sk_msg_convert_ctx_access() [all …]
|
D | sock_map.c | 667 BPF_CALL_4(bpf_msg_redirect_map, struct sk_msg *, msg, in BPF_CALL_4() argument 1273 BPF_CALL_4(bpf_msg_redirect_hash, struct sk_msg *, msg, in BPF_CALL_4() argument
|
/linux-6.12.1/net/ipv4/ |
D | tcp_bpf.c | 33 struct sk_msg *msg, u32 apply_bytes) in bpf_tcp_ingress() 38 struct sk_msg *tmp; in bpf_tcp_ingress() 88 static int tcp_bpf_push(struct sock *sk, struct sk_msg *msg, u32 apply_bytes, in tcp_bpf_push() 150 static int tcp_bpf_push_locked(struct sock *sk, struct sk_msg *msg, in tcp_bpf_push_locked() 162 struct sk_msg *msg, u32 bytes, int flags) in tcp_bpf_sendmsg_redir() 203 struct sk_msg *msg_rx; in is_next_msg_fin() 383 struct sk_msg *msg, int *copied, int flags) in tcp_bpf_send_verdict() 498 struct sk_msg tmp, *msg_tx = NULL; in tcp_bpf_sendmsg()
|
/linux-6.12.1/net/tls/ |
D | tls_sw.c | 325 struct sk_msg *msg_en = &rec->msg_encrypted; in tls_alloc_encrypted_msg() 336 struct sk_msg *msg_pl = &rec->msg_plaintext; in tls_clone_plaintext_msg() 337 struct sk_msg *msg_en = &rec->msg_encrypted; in tls_clone_plaintext_msg() 359 struct sk_msg *msg_pl, *msg_en; in tls_get_rec() 412 struct sk_msg *msg_en; in tls_tx_records() 473 struct sk_msg *msg_en; in tls_encrypt_done() 541 struct sk_msg *msg_en = &rec->msg_encrypted; in tls_do_encryption() 607 struct tls_rec **to, struct sk_msg *msg_opl, in tls_split_open_record() 608 struct sk_msg *msg_oen, u32 split_point, in tls_split_open_record() 615 struct sk_msg *msg_npl; in tls_split_open_record() [all …]
|
D | tls.h | 116 struct sk_msg msg_plaintext; 117 struct sk_msg msg_encrypted;
|
/linux-6.12.1/tools/testing/selftests/bpf/progs/ |
D | test_ns_current_pid_tgid.c | 46 int sk_msg(struct sk_msg_md *msg) in sk_msg() function
|
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/ |
D | ns_current_pid_tgid.c | 135 bpf_program__set_autoload(skel->progs.sk_msg, true); in test_current_pid_tgid_sk_msg() 145 verdict = bpf_program__fd(skel->progs.sk_msg); in test_current_pid_tgid_sk_msg()
|
/linux-6.12.1/include/net/ |
D | espintcp.h | 16 struct sk_msg skmsg;
|
D | tcp.h | 2592 struct sk_msg; 2609 struct sk_msg *msg, u32 bytes, int flags);
|
/linux-6.12.1/Documentation/bpf/libbpf/ |
D | program_types.rst | 156 | ``BPF_PROG_TYPE_SK_MSG`` | ``BPF_SK_MSG_VERDICT`` | ``sk_msg`` …
|
/linux-6.12.1/net/xfrm/ |
D | espintcp.c | 213 struct sk_msg *skmsg = &emsg->skmsg; in espintcp_sendskmsg_locked()
|
/linux-6.12.1/tools/bpf/bpftool/Documentation/ |
D | bpftool-prog.rst | 48 | **lwt_seg6local** | **sockops** | **sk_skb** | **sk_msg** | **lirc_mode2** |
|
/linux-6.12.1/tools/bpf/bpftool/bash-completion/ |
D | bpftool | 486 lwt_seg6local sockops sk_skb sk_msg lirc_mode2 \
|