| /linux-6.15/net/core/ |
| H A D | skmsg.c | 499 if (likely(psock)) in sk_msg_is_readable() 724 psock = kzalloc_node(sizeof(*psock), GFP_ATOMIC | __GFP_NOWARN, node); in sk_psock_init() 725 if (!psock) { in sk_psock_init() 731 psock->sk = sk; in sk_psock_init() 758 return psock; in sk_psock_init() 836 if (psock->sk_redir) in sk_psock_destroy() 838 if (psock->sk_pair) in sk_psock_destroy() 840 sock_put(psock->sk); in sk_psock_destroy() 841 kfree(psock); in sk_psock_destroy() 851 else if (psock->progs.stream_verdict || psock->progs.skb_verdict) in sk_psock_drop() [all …]
|
| H A D | sock_map.c | 174 psock->psock_update_sk_prot(sk, psock, false); in sock_map_del_link() 183 if (likely(psock)) { in sock_map_unref() 202 psock = sk_psock(sk); in sock_map_psock_get_checked() 203 if (psock) { in sock_map_psock_get_checked() 214 return psock; in sock_map_psock_get_checked() 262 if (IS_ERR(psock)) { in sock_map_link() 267 if (psock) { in sock_map_link() 280 if (IS_ERR(psock)) { in sock_map_link() 493 psock = sk_psock(sk); in sock_map_update_common() 494 WARN_ON_ONCE(!psock); in sock_map_update_common() [all …]
|
| /linux-6.15/net/ipv4/ |
| H A D | tcp_bpf.c | 169 if (unlikely(!psock)) in tcp_bpf_sendmsg_redir() 401 psock->eval = sk_psock_msg_verdict(sk, psock, msg); in tcp_bpf_send_verdict() 408 if (!psock->cork) { in tcp_bpf_send_verdict() 409 psock->cork = kzalloc(sizeof(*psock->cork), in tcp_bpf_send_verdict() 411 if (!psock->cork) in tcp_bpf_send_verdict() 419 if (psock->apply_bytes && psock->apply_bytes < tosend) in tcp_bpf_send_verdict() 442 if (psock->cork) { in tcp_bpf_send_verdict() 525 if (psock->cork) { in tcp_bpf_sendmsg() 676 tp->copied_seq = psock->copied_seq - psock->ingress_bytes; in tcp_bpf_strp_read_sock() 690 if (psock->progs.stream_verdict || psock->progs.skb_verdict) { in tcp_bpf_update_proto() [all …]
|
| H A D | udp_bpf.c | 32 !sk_psock_queue_empty(psock); in psock_has_data() 52 ret = udp_msg_has_data(sk, psock); in udp_msg_wait_data() 55 ret = udp_msg_has_data(sk, psock); in udp_msg_wait_data() 65 struct sk_psock *psock; in udp_bpf_recvmsg() local 74 psock = sk_psock_get(sk); in udp_bpf_recvmsg() 75 if (unlikely(!psock)) in udp_bpf_recvmsg() 78 if (!psock_has_data(psock)) { in udp_bpf_recvmsg() 90 data = udp_msg_wait_data(sk, psock, timeo); in udp_bpf_recvmsg() 92 if (psock_has_data(psock)) in udp_bpf_recvmsg() 101 sk_psock_put(sk, psock); in udp_bpf_recvmsg() [all …]
|
| /linux-6.15/include/linux/ |
| H A D | skmsg.h | 378 return psock ? list_empty(&psock->ingress_msg) : true; in sk_psock_queue_empty() 442 if (psock->cork) { in sk_psock_cork_free() 443 sk_msg_free(psock->sk, psock->cork); in sk_psock_cork_free() 444 kfree(psock->cork); in sk_psock_cork_free() 445 psock->cork = NULL; in sk_psock_cork_free() 453 psock->psock_update_sk_prot(sk, psock, true); in sk_psock_restore_proto() 461 psock = sk_psock(sk); in sk_psock_get() 462 if (psock && !refcount_inc_not_zero(&psock->refcnt)) in sk_psock_get() 463 psock = NULL; in sk_psock_get() 465 return psock; in sk_psock_get() [all …]
|
| /linux-6.15/net/kcm/ |
| H A D | kcmsock.c | 101 psock->strp.stats.msgs - psock->saved_rx_msgs; in kcm_update_rx_mux_stats() 102 psock->saved_rx_msgs = psock->strp.stats.msgs; in kcm_update_rx_mux_stats() 103 psock->saved_rx_bytes = psock->strp.stats.bytes; in kcm_update_rx_mux_stats() 110 psock->stats.tx_bytes - psock->saved_tx_bytes); in kcm_update_tx_mux_stats() 112 psock->stats.tx_msgs - psock->saved_tx_msgs; in kcm_update_tx_mux_stats() 113 psock->saved_tx_msgs = psock->stats.tx_msgs; in kcm_update_tx_mux_stats() 114 psock->saved_tx_bytes = psock->stats.tx_bytes; in kcm_update_tx_mux_stats() 452 if (psock) { in reserve_psock() 592 if (unlikely(psock && psock->tx_stopped)) { in kcm_write_msgs() 701 if (psock) in kcm_write_msgs() [all …]
|
| H A D | kcmproc.c | 144 psock->index, in kcm_format_psock() 147 psock->stats.tx_msgs, in kcm_format_psock() 154 if (psock->done) in kcm_format_psock() 157 if (psock->tx_stopped) in kcm_format_psock() 160 if (psock->strp.stopped) in kcm_format_psock() 163 if (psock->tx_kcm) in kcm_format_psock() 166 if (!psock->strp.paused && !psock->ready_rx_msg) { in kcm_format_psock() 175 if (psock->strp.paused) in kcm_format_psock() 178 if (psock->ready_rx_msg) in kcm_format_psock() 190 struct kcm_psock *psock; in kcm_format_mux() local [all …]
|
| /linux-6.15/net/unix/ |
| H A D | unix_bpf.c | 31 if (!unix_sk_has_data(sk, psock)) { in unix_msg_wait_data() 35 ret = unix_sk_has_data(sk, psock); in unix_msg_wait_data() 55 struct sk_psock *psock; in unix_bpf_recvmsg() local 64 psock = sk_psock_get(sk); in unix_bpf_recvmsg() 65 if (unlikely(!psock)) in unix_bpf_recvmsg() 70 sk_psock_queue_empty(psock)) { in unix_bpf_recvmsg() 72 sk_psock_put(sk, psock); in unix_bpf_recvmsg() 88 sk_psock_put(sk, psock); in unix_bpf_recvmsg() 94 sk_psock_put(sk, psock); in unix_bpf_recvmsg() 186 if (!psock->sk_pair) { in unix_stream_bpf_update_proto() [all …]
|
| H A D | af_unix.h | 63 int unix_dgram_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool restore); 64 int unix_stream_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool restore);
|
| /linux-6.15/net/vmw_vsock/ |
| H A D | vsock_bpf.c | 34 return vsock_sk_has_data(sk, psock); in vsock_has_data() 51 ret = vsock_has_data(sk, psock); in vsock_msg_wait_data() 54 ret = vsock_has_data(sk, psock); in vsock_msg_wait_data() 79 struct sk_psock *psock; in vsock_bpf_recvmsg() local 83 psock = sk_psock_get(sk); in vsock_bpf_recvmsg() 84 if (unlikely(!psock)) in vsock_bpf_recvmsg() 95 if (vsock_has_data(sk, psock) && sk_psock_queue_empty(psock)) { in vsock_bpf_recvmsg() 97 sk_psock_put(sk, psock); in vsock_bpf_recvmsg() 110 if (sk_psock_queue_empty(psock)) { in vsock_bpf_recvmsg() 112 sk_psock_put(sk, psock); in vsock_bpf_recvmsg() [all …]
|
| /linux-6.15/drivers/pcmcia/ |
| H A D | tcic.c | 105 u_short psock; member 404 socket_table[sockets].psock = i; in init_tcic() 533 u_short psock; in tcic_interrupt() local 546 psock = socket_table[i].psock; in tcic_interrupt() 595 u_short psock = container_of(sock, struct tcic_socket, socket)->psock; in tcic_get_status() local 611 if (reg & (TCIC_PWR_VCC(psock)|TCIC_PWR_VPP(psock))) in tcic_get_status() 621 u_short psock = container_of(sock, struct tcic_socket, socket)->psock; in tcic_set_socket() local 631 reg &= ~(TCIC_PWR_VCC(psock) | TCIC_PWR_VPP(psock)); in tcic_set_socket() 635 case 0: reg |= TCIC_PWR_VCC(psock) | TCIC_PWR_VPP(psock); break; in tcic_set_socket() 696 u_short psock = container_of(sock, struct tcic_socket, socket)->psock; in tcic_set_io_map() local [all …]
|
| H A D | i82365.c | 149 u_short psock; member 224 reg = I365_REG(socket[sock].psock, reg); in i365_get() 237 u_char val = I365_REG(socket[sock].psock, reg); in i365_set() 579 socket[sockets].psock = sock; in identify() 662 static void __init add_socket(unsigned int port, int psock, int type) in add_socket() argument 665 socket[sockets].psock = psock; in add_socket() 683 t->ioaddr, t->psock*0x40); in add_pcic() 907 if (socket[sock].psock & 1) { in i365_get_status() 1120 pcic[s->type].name, s->psock);
|
| /linux-6.15/tools/testing/selftests/bpf/prog_tests/ |
| H A D | lwt_redirect.c | 162 int psock = -1; in send_and_capture_test_packets() local 179 psock = new_packet_sock(target_dev); in send_and_capture_test_packets() 182 ret = wait_for_packet(psock, filter, &timeo); in send_and_capture_test_packets() 189 if (psock >= 0) in send_and_capture_test_packets() 190 close(psock); in send_and_capture_test_packets()
|
| /linux-6.15/net/tls/ |
| H A D | tls_sw.c | 849 struct sk_psock *psock; in bpf_exec_tx_verdict() local 865 if (psock) in bpf_exec_tx_verdict() 873 psock->eval = sk_psock_msg_verdict(sk, psock, msg); in bpf_exec_tx_verdict() 886 switch (psock->eval) { in bpf_exec_tx_verdict() 1994 struct sk_psock *psock; in tls_sw_recvmsg() local 2046 if (psock) { in tls_sw_recvmsg() 2203 if (psock) in tls_sw_recvmsg() 2296 if (psock) { in tls_sw_read_sock() 2383 psock = sk_psock(sk); in tls_sw_sock_is_readable() 2384 if (psock) in tls_sw_sock_is_readable() [all …]
|
| H A D | tls_main.c | 410 struct sk_psock *psock; in tls_sk_poll() local 424 psock = sk_psock_get(sk); in tls_sk_poll() 428 sk_psock_queue_empty(psock)) || in tls_sk_poll() 432 if (psock) in tls_sk_poll() 433 sk_psock_put(sk, psock); in tls_sk_poll()
|
| /linux-6.15/include/net/ |
| H A D | af_vsock.h | 247 int vsock_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool restore);
|
| H A D | udp.h | 649 int udp_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool restore);
|
| H A D | sock.h | 1288 struct sk_psock *psock,
|
| H A D | tcp.h | 2672 int tcp_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool restore);
|
| /linux-6.15/Documentation/bpf/ |
| H A D | map_sockmap.rst | 311 retrieve the associated socket and its attached psock.
|