/linux-master/kernel/bpf/ |
H A D | reuseport_array.c | 190 const struct sock *osk, 194 if (osk && map_flags == BPF_NOEXIST) 197 if (!osk && map_flags == BPF_EXIST) 230 * The "osk" and "reuse" are protected by reuseport_lock. 236 struct sock *free_osk = NULL, *osk, *nsk; local 285 osk = rcu_dereference_protected(array->ptrs[index], 289 err = reuseport_array_update_check(array, nsk, osk, reuse, map_flags); 297 free_osk = osk; 188 reuseport_array_update_check(const struct reuseport_array *array, const struct sock *nsk, const struct sock *osk, const struct sock_reuseport *nsk_reuse, u32 map_flags) argument
|
/linux-master/arch/arm/mach-omap1/ |
H A D | Makefile | 32 obj-$(CONFIG_MACH_OMAP_OSK) += board-osk.o
|
/linux-master/net/netrom/ |
H A D | af_netrom.c | 473 static struct sock *nr_make_new(struct sock *osk) argument 478 if (osk->sk_type != SOCK_SEQPACKET) 481 sk = sk_alloc(sock_net(osk), PF_NETROM, GFP_ATOMIC, osk->sk_prot, 0); 489 sk->sk_type = osk->sk_type; 490 sk->sk_priority = READ_ONCE(osk->sk_priority); 491 sk->sk_protocol = osk->sk_protocol; 492 sk->sk_rcvbuf = osk->sk_rcvbuf; 493 sk->sk_sndbuf = osk->sk_sndbuf; 495 sock_copy_flags(sk, osk); [all...] |
/linux-master/include/net/ |
H A D | inet_hashtables.h | 300 bool inet_ehash_insert(struct sock *sk, struct sock *osk, bool *found_dup_sk); 301 bool inet_ehash_nolisten(struct sock *sk, struct sock *osk, 303 int __inet_hash(struct sock *sk, struct sock *osk);
|
H A D | xfrm.h | 1252 int __xfrm_sk_clone_policy(struct sock *sk, const struct sock *osk); 1254 static inline int xfrm_sk_clone_policy(struct sock *sk, const struct sock *osk) argument 1256 if (!sk_fullsock(osk)) 1260 if (unlikely(osk->sk_policy[0] || osk->sk_policy[1])) 1261 return __xfrm_sk_clone_policy(sk, osk); 1286 static inline int xfrm_sk_clone_policy(struct sock *sk, const struct sock *osk) { return 0; } argument
|
H A D | sock.h | 951 static inline void sock_copy_flags(struct sock *nsk, const struct sock *osk) argument 953 nsk->sk_flags = osk->sk_flags;
|
/linux-master/net/ax25/ |
H A D | af_ax25.c | 914 struct sock *ax25_make_new(struct sock *osk, struct ax25_dev *ax25_dev) argument 919 sk = sk_alloc(sock_net(osk), PF_AX25, GFP_ATOMIC, osk->sk_prot, 0); 928 switch (osk->sk_type) { 941 sk->sk_type = osk->sk_type; 942 sk->sk_priority = READ_ONCE(osk->sk_priority); 943 sk->sk_protocol = osk->sk_protocol; 944 sk->sk_rcvbuf = osk->sk_rcvbuf; 945 sk->sk_sndbuf = osk->sk_sndbuf; 947 sock_copy_flags(sk, osk); [all...] |
/linux-master/net/x25/ |
H A D | af_x25.c | 587 static struct sock *x25_make_new(struct sock *osk) argument 592 if (osk->sk_type != SOCK_SEQPACKET) 595 if ((sk = x25_alloc_socket(sock_net(osk), 0)) == NULL) 600 sk->sk_type = osk->sk_type; 601 sk->sk_priority = READ_ONCE(osk->sk_priority); 602 sk->sk_protocol = osk->sk_protocol; 603 sk->sk_rcvbuf = osk->sk_rcvbuf; 604 sk->sk_sndbuf = osk->sk_sndbuf; 606 sk->sk_backlog_rcv = osk->sk_backlog_rcv; 607 sock_copy_flags(sk, osk); [all...] |
/linux-master/net/ipv4/ |
H A D | inet_hashtables.c | 655 bool inet_ehash_insert(struct sock *sk, struct sock *osk, bool *found_dup_sk) argument 671 if (osk) { 672 WARN_ON_ONCE(sk->sk_hash != osk->sk_hash); 673 ret = sk_nulls_del_node_init_rcu(osk); 688 bool inet_ehash_nolisten(struct sock *sk, struct sock *osk, bool *found_dup_sk) argument 690 bool ok = inet_ehash_insert(sk, osk, found_dup_sk); 727 int __inet_hash(struct sock *sk, struct sock *osk) argument 735 inet_ehash_nolisten(sk, osk, NULL);
|
/linux-master/net/rose/ |
H A D | af_rose.c | 589 static struct sock *rose_make_new(struct sock *osk) argument 594 if (osk->sk_type != SOCK_SEQPACKET) 597 sk = sk_alloc(sock_net(osk), PF_ROSE, GFP_ATOMIC, &rose_proto, 0); 611 sk->sk_type = osk->sk_type; 612 sk->sk_priority = READ_ONCE(osk->sk_priority); 613 sk->sk_protocol = osk->sk_protocol; 614 sk->sk_rcvbuf = osk->sk_rcvbuf; 615 sk->sk_sndbuf = osk->sk_sndbuf; 617 sock_copy_flags(sk, osk); 622 orose = rose_sk(osk); [all...] |
/linux-master/net/smc/ |
H A D | af_smc.c | 460 static void smc_adjust_sock_bufsizes(struct sock *nsk, struct sock *osk, argument 465 nsk->sk_userlocks = osk->sk_userlocks; 466 if (osk->sk_userlocks & SOCK_SNDBUF_LOCK) { 467 nsk->sk_sndbuf = osk->sk_sndbuf; 476 if (osk->sk_userlocks & SOCK_RCVBUF_LOCK) { 477 nsk->sk_rcvbuf = osk->sk_rcvbuf; 488 static void smc_copy_sock_settings(struct sock *nsk, struct sock *osk, argument 492 nsk->sk_type = osk->sk_type; 493 nsk->sk_sndtimeo = osk->sk_sndtimeo; 494 nsk->sk_rcvtimeo = osk [all...] |
/linux-master/net/core/ |
H A D | sock_map.c | 473 struct sock *osk; local 494 osk = stab->sks[idx]; 495 if (osk && flags == BPF_NOEXIST) { 498 } else if (!osk && flags == BPF_EXIST) { 505 if (osk) 506 sock_map_unref(osk, &stab->sks[idx]);
|
H A D | sock.c | 2034 * Copy all fields from osk to nsk but nsk->sk_refcnt must not change yet, 2038 static void sock_copy(struct sock *nsk, const struct sock *osk) argument 2040 const struct proto *prot = READ_ONCE(osk->sk_prot); 2054 memcpy(nsk, osk, offsetof(struct sock, sk_dontcopy_begin)); 2056 unsafe_memcpy(&nsk->sk_dontcopy_end, &osk->sk_dontcopy_end, 2062 security_sk_clone(osk, nsk);
|
/linux-master/net/unix/ |
H A D | af_unix.c | 214 static inline int unix_our_peer(struct sock *sk, struct sock *osk) argument 216 return unix_peer(osk) == sk; 219 static inline int unix_may_send(struct sock *sk, struct sock *osk) argument 221 return unix_peer(osk) == NULL || unix_our_peer(sk, osk);
|
/linux-master/net/xfrm/ |
H A D | xfrm_policy.c | 2421 int __xfrm_sk_clone_policy(struct sock *sk, const struct sock *osk) argument 2429 p = rcu_dereference(osk->sk_policy[i]);
|