/linux-master/kernel/bpf/ |
H A D | reuseport_array.c | 189 const struct sock *nsk, 200 if (nsk->sk_protocol != IPPROTO_UDP && nsk->sk_protocol != IPPROTO_TCP) 203 if (nsk->sk_family != AF_INET && nsk->sk_family != AF_INET6) 206 if (nsk->sk_type != SOCK_STREAM && nsk->sk_type != SOCK_DGRAM) 217 if (!sock_flag(nsk, SOCK_RCU_FREE) || !sk_hashed(nsk) || !nsk_reuse) 221 if (READ_ONCE(nsk 188 reuseport_array_update_check(const struct reuseport_array *array, const struct sock *nsk, const struct sock *osk, const struct sock_reuseport *nsk_reuse, u32 map_flags) argument 236 struct sock *free_osk = NULL, *osk, *nsk; local [all...] |
/linux-master/net/core/ |
H A D | sock_reuseport.c | 626 struct sock *nsk = NULL; local 660 nsk = bpf_run_sk_reuseport(reuse, sk, prog, skb, migrating_sk, hash); 666 if (!nsk) 667 nsk = reuseport_select_sock_by_hash(reuse, hash, socks); 669 if (IS_ERR_OR_NULL(nsk) || unlikely(!refcount_inc_not_zero(&nsk->sk_refcnt))) { 670 nsk = NULL; 676 return nsk;
|
H A D | sock.c | 2034 * Copy all fields from osk to nsk but nsk->sk_refcnt must not change yet, 2038 static void sock_copy(struct sock *nsk, const struct sock *osk) argument 2042 void *sptr = nsk->sk_security; 2054 memcpy(nsk, osk, offsetof(struct sock, sk_dontcopy_begin)); 2056 unsafe_memcpy(&nsk->sk_dontcopy_end, &osk->sk_dontcopy_end, 2061 nsk->sk_security = sptr; 2062 security_sk_clone(osk, nsk);
|
/linux-master/net/ipv4/ |
H A D | inet_connection_sock.c | 1024 struct sock *nsk; local 1026 nsk = reuseport_migrate_sock(sk_listener, req_to_sk(req), NULL); 1027 if (!nsk) 1030 nreq = inet_reqsk_clone(req, nsk); 1041 reqsk_queue_migrated(&inet_csk(nsk)->icsk_accept_queue, req); 1044 sk_listener = nsk; 1412 struct sock *child = req->sk, *nsk; local 1420 nsk = reuseport_migrate_sock(sk, child, NULL); 1421 if (nsk) { 1422 nreq = inet_reqsk_clone(req, nsk); [all...] |
H A D | esp4.c | 141 struct sock *nsk; local 151 nsk = rcu_dereference_protected(x->encap_sk, 153 if (sk && sk == nsk) { 176 nsk = rcu_dereference_protected(x->encap_sk, 181 sk = nsk ?: ERR_PTR(-EREMCHG); 182 } else if (sk == nsk) {
|
H A D | tcp_ipv4.c | 1922 struct sock *nsk = tcp_v4_cookie_check(sk, skb); local 1924 if (!nsk) 1926 if (nsk != sk) { 1927 reason = tcp_child_process(sk, nsk, skb); 1929 rsk = nsk; 2231 struct sock *nsk; local 2250 nsk = reuseport_migrate_sock(sk, req_to_sk(req), skb); 2251 if (!nsk) { 2255 sk = nsk; 2266 nsk [all...] |
/linux-master/net/iucv/ |
H A D | af_iucv.c | 801 struct sock *sk = sock->sk, *nsk; local 816 while (!(nsk = iucv_accept_dequeue(sk, newsock))) { 1582 struct sock *sk, *nsk; local 1627 nsk = iucv_sock_alloc(NULL, sk->sk_protocol, GFP_ATOMIC, 0); 1628 if (!nsk) { 1634 niucv = iucv_sk(nsk); 1635 iucv_sock_init(nsk, sk); 1637 nsk->sk_allocation |= GFP_DMA; 1655 err = pr_iucv->path_accept(path, &af_iucv_handler, nuser_data, nsk); 1657 iucv_sever_path(nsk, 1836 struct sock *nsk; local [all...] |
/linux-master/net/smc/ |
H A D | af_smc.c | 459 static void smc_adjust_sock_bufsizes(struct sock *nsk, struct sock *osk, argument 462 struct net *nnet = sock_net(nsk); 464 nsk->sk_userlocks = osk->sk_userlocks; 466 nsk->sk_sndbuf = osk->sk_sndbuf; 469 WRITE_ONCE(nsk->sk_sndbuf, 472 WRITE_ONCE(nsk->sk_sndbuf, 476 nsk->sk_rcvbuf = osk->sk_rcvbuf; 479 WRITE_ONCE(nsk->sk_rcvbuf, 482 WRITE_ONCE(nsk->sk_rcvbuf, 487 static void smc_copy_sock_settings(struct sock *nsk, struc argument 2694 struct sock *sk = sock->sk, *nsk; local [all...] |
/linux-master/net/ipv6/ |
H A D | tcp_ipv6.c | 1658 struct sock *nsk = tcp_v6_cookie_check(sk, skb); local 1660 if (nsk != sk) { 1661 if (nsk) { 1662 reason = tcp_child_process(sk, nsk, skb); 1804 struct sock *nsk; local 1823 nsk = reuseport_migrate_sock(sk, req_to_sk(req), skb); 1824 if (!nsk) { 1828 sk = nsk; 1836 nsk = NULL; 1841 nsk [all...] |
H A D | esp6.c | 158 struct sock *nsk; local 168 nsk = rcu_dereference_protected(x->encap_sk, 170 if (sk && sk == nsk) { 193 nsk = rcu_dereference_protected(x->encap_sk, 198 sk = nsk ?: ERR_PTR(-EREMCHG); 199 } else if (sk == nsk) {
|
/linux-master/net/dccp/ |
H A D | ipv4.c | 857 struct sock *nsk; local 866 nsk = dccp_check_req(sk, skb, req); 867 if (!nsk) { 871 if (nsk == sk) { 873 } else if (dccp_child_process(sk, nsk, skb)) {
|
H A D | ipv6.c | 750 struct sock *nsk; local 759 nsk = dccp_check_req(sk, skb, req); 760 if (!nsk) { 764 if (nsk == sk) { 766 } else if (dccp_child_process(sk, nsk, skb)) {
|
/linux-master/net/mptcp/ |
H A D | protocol.c | 3263 struct sock *nsk = sk_clone_lock(sk, GFP_ATOMIC); local 3267 if (!nsk) 3271 if (nsk->sk_family == AF_INET6) 3272 inet_sk(nsk)->pinet6 = mptcp_inet6_sk(nsk); 3275 __mptcp_init_sock(nsk); 3278 if (nsk->sk_family == AF_INET6) 3279 mptcp_copy_ip6_options(nsk, sk); 3282 mptcp_copy_ip_options(nsk, sk); 3284 msk = mptcp_sk(nsk); [all...] |
/linux-master/net/bluetooth/rfcomm/ |
H A D | sock.c | 475 struct sock *sk = sock->sk, *nsk; local 498 nsk = bt_accept_dequeue(sk, newsock); 499 if (nsk) 525 BT_DBG("new socket %p", nsk);
|
/linux-master/arch/arm64/kvm/ |
H A D | pmu-emul.c | 604 bool p, u, nsk, nsu; local 633 nsk = data & ARMV8_PMU_EXCLUDE_NS_EL1; 642 attr.exclude_kernel = (p != nsk);
|
/linux-master/net/bluetooth/ |
H A D | l2cap_sock.c | 333 struct sock *sk = sock->sk, *nsk; local 351 nsk = bt_accept_dequeue(sk, newsock); 352 if (nsk) 378 BT_DBG("new socket %p", nsk);
|
/linux-master/include/net/ |
H A D | sock.h | 951 static inline void sock_copy_flags(struct sock *nsk, const struct sock *osk) argument 953 nsk->sk_flags = osk->sk_flags;
|