/linux-master/kernel/bpf/ |
H A D | reuseport_array.c | 189 const struct sock *nsk, 200 if (nsk->sk_protocol != IPPROTO_UDP && nsk->sk_protocol != IPPROTO_TCP) 203 if (nsk->sk_family != AF_INET && nsk->sk_family != AF_INET6) 206 if (nsk->sk_type != SOCK_STREAM && nsk->sk_type != SOCK_DGRAM) 217 if (!sock_flag(nsk, SOCK_RCU_FREE) || !sk_hashed(nsk) || !nsk_reuse) 221 if (READ_ONCE(nsk 188 reuseport_array_update_check(const struct reuseport_array *array, const struct sock *nsk, const struct sock *osk, const struct sock_reuseport *nsk_reuse, u32 map_flags) argument 236 struct sock *free_osk = NULL, *osk, *nsk; local [all...] |
/linux-master/net/core/ |
H A D | sock_reuseport.c | 626 struct sock *nsk = NULL; local 660 nsk = bpf_run_sk_reuseport(reuse, sk, prog, skb, migrating_sk, hash); 666 if (!nsk) 667 nsk = reuseport_select_sock_by_hash(reuse, hash, socks); 669 if (IS_ERR_OR_NULL(nsk) || unlikely(!refcount_inc_not_zero(&nsk->sk_refcnt))) { 670 nsk = NULL; 676 return nsk;
|
H A D | sock.c | 2034 * Copy all fields from osk to nsk but nsk->sk_refcnt must not change yet, 2038 static void sock_copy(struct sock *nsk, const struct sock *osk) argument 2042 void *sptr = nsk->sk_security; 2054 memcpy(nsk, osk, offsetof(struct sock, sk_dontcopy_begin)); 2056 unsafe_memcpy(&nsk->sk_dontcopy_end, &osk->sk_dontcopy_end, 2061 nsk->sk_security = sptr; 2062 security_sk_clone(osk, nsk);
|
/linux-master/net/ipv4/ |
H A D | inet_connection_sock.c | 1023 struct sock *nsk; local 1025 nsk = reuseport_migrate_sock(sk_listener, req_to_sk(req), NULL); 1026 if (!nsk) 1029 nreq = inet_reqsk_clone(req, nsk); 1040 reqsk_queue_migrated(&inet_csk(nsk)->icsk_accept_queue, req); 1043 sk_listener = nsk; 1411 struct sock *child = req->sk, *nsk; local 1419 nsk = reuseport_migrate_sock(sk, child, NULL); 1420 if (nsk) { 1421 nreq = inet_reqsk_clone(req, nsk); [all...] |
H A D | esp4.c | 140 struct sock *nsk; local 150 nsk = rcu_dereference_protected(x->encap_sk, 152 if (sk && sk == nsk) { 175 nsk = rcu_dereference_protected(x->encap_sk, 180 sk = nsk ?: ERR_PTR(-EREMCHG); 181 } else if (sk == nsk) {
|
H A D | tcp_ipv4.c | 1914 struct sock *nsk = tcp_v4_cookie_check(sk, skb); local 1916 if (!nsk) 1918 if (nsk != sk) { 1919 reason = tcp_child_process(sk, nsk, skb); 1921 rsk = nsk; 2217 struct sock *nsk; local 2236 nsk = reuseport_migrate_sock(sk, req_to_sk(req), skb); 2237 if (!nsk) { 2241 sk = nsk; 2252 nsk [all...] |
/linux-master/net/iucv/ |
H A D | af_iucv.c | 801 struct sock *sk = sock->sk, *nsk; local 816 while (!(nsk = iucv_accept_dequeue(sk, newsock))) { 1582 struct sock *sk, *nsk; local 1627 nsk = iucv_sock_alloc(NULL, sk->sk_protocol, GFP_ATOMIC, 0); 1628 if (!nsk) { 1634 niucv = iucv_sk(nsk); 1635 iucv_sock_init(nsk, sk); 1637 nsk->sk_allocation |= GFP_DMA; 1655 err = pr_iucv->path_accept(path, &af_iucv_handler, nuser_data, nsk); 1657 iucv_sever_path(nsk, 1836 struct sock *nsk; local [all...] |
/linux-master/net/smc/ |
H A D | af_smc.c | 460 static void smc_adjust_sock_bufsizes(struct sock *nsk, struct sock *osk, argument 463 struct net *nnet = sock_net(nsk); 465 nsk->sk_userlocks = osk->sk_userlocks; 467 nsk->sk_sndbuf = osk->sk_sndbuf; 470 WRITE_ONCE(nsk->sk_sndbuf, 473 WRITE_ONCE(nsk->sk_sndbuf, 477 nsk->sk_rcvbuf = osk->sk_rcvbuf; 480 WRITE_ONCE(nsk->sk_rcvbuf, 483 WRITE_ONCE(nsk->sk_rcvbuf, 488 static void smc_copy_sock_settings(struct sock *nsk, struc argument 2679 struct sock *sk = sock->sk, *nsk; local [all...] |
/linux-master/net/ipv6/ |
H A D | tcp_ipv6.c | 1654 struct sock *nsk = tcp_v6_cookie_check(sk, skb); local 1656 if (nsk != sk) { 1657 if (nsk) { 1658 reason = tcp_child_process(sk, nsk, skb); 1801 struct sock *nsk; local 1820 nsk = reuseport_migrate_sock(sk, req_to_sk(req), skb); 1821 if (!nsk) { 1825 sk = nsk; 1833 nsk = NULL; 1838 nsk [all...] |
H A D | esp6.c | 157 struct sock *nsk; local 167 nsk = rcu_dereference_protected(x->encap_sk, 169 if (sk && sk == nsk) { 192 nsk = rcu_dereference_protected(x->encap_sk, 197 sk = nsk ?: ERR_PTR(-EREMCHG); 198 } else if (sk == nsk) {
|
/linux-master/net/dccp/ |
H A D | ipv4.c | 855 struct sock *nsk; local 864 nsk = dccp_check_req(sk, skb, req); 865 if (!nsk) { 869 if (nsk == sk) { 871 } else if (dccp_child_process(sk, nsk, skb)) {
|
H A D | ipv6.c | 748 struct sock *nsk; local 757 nsk = dccp_check_req(sk, skb, req); 758 if (!nsk) { 762 if (nsk == sk) { 764 } else if (dccp_child_process(sk, nsk, skb)) {
|
/linux-master/net/mptcp/ |
H A D | protocol.c | 3254 struct sock *nsk = sk_clone_lock(sk, GFP_ATOMIC); local 3258 if (!nsk) 3262 if (nsk->sk_family == AF_INET6) 3263 inet_sk(nsk)->pinet6 = mptcp_inet6_sk(nsk); 3266 __mptcp_init_sock(nsk); 3269 if (nsk->sk_family == AF_INET6) 3270 mptcp_copy_ip6_options(nsk, sk); 3273 mptcp_copy_ip_options(nsk, sk); 3275 msk = mptcp_sk(nsk); [all...] |
/linux-master/net/bluetooth/rfcomm/ |
H A D | sock.c | 475 struct sock *sk = sock->sk, *nsk; local 498 nsk = bt_accept_dequeue(sk, newsock); 499 if (nsk) 525 BT_DBG("new socket %p", nsk);
|
/linux-master/arch/arm64/kvm/ |
H A D | pmu-emul.c | 604 bool p, u, nsk, nsu; local 633 nsk = data & ARMV8_PMU_EXCLUDE_NS_EL1; 642 attr.exclude_kernel = (p != nsk);
|
/linux-master/net/bluetooth/ |
H A D | l2cap_sock.c | 333 struct sock *sk = sock->sk, *nsk; local 351 nsk = bt_accept_dequeue(sk, newsock); 352 if (nsk) 378 BT_DBG("new socket %p", nsk);
|
/linux-master/include/net/ |
H A D | sock.h | 951 static inline void sock_copy_flags(struct sock *nsk, const struct sock *osk) argument 953 nsk->sk_flags = osk->sk_flags;
|