| /linux/kernel/bpf/ |
| H A D | reuseport_array.c | 189 const struct sock *nsk, in reuseport_array_update_check() argument 200 if (nsk->sk_protocol != IPPROTO_UDP && nsk->sk_protocol != IPPROTO_TCP) in reuseport_array_update_check() 203 if (nsk->sk_family != AF_INET && nsk->sk_family != AF_INET6) in reuseport_array_update_check() 206 if (nsk->sk_type != SOCK_STREAM && nsk->sk_type != SOCK_DGRAM) in reuseport_array_update_check() 217 if (!sock_flag(nsk, SOCK_RCU_FREE) || !sk_hashed(nsk) || !nsk_reuse) in reuseport_array_update_check() 221 if (READ_ONCE(nsk->sk_user_data)) in reuseport_array_update_check() 236 struct sock *free_osk = NULL, *osk, *nsk; in bpf_fd_reuseport_array_update_elem() local 263 nsk = socket->sk; in bpf_fd_reuseport_array_update_elem() 264 if (!nsk) { in bpf_fd_reuseport_array_update_elem() 270 err = reuseport_array_update_check(array, nsk, in bpf_fd_reuseport_array_update_elem() [all …]
|
| /linux/net/core/ |
| H A D | sock_reuseport.c | 625 struct sock *nsk = NULL; in reuseport_migrate_sock() local 659 nsk = bpf_run_sk_reuseport(reuse, sk, prog, skb, migrating_sk, hash); in reuseport_migrate_sock() 665 if (!nsk) in reuseport_migrate_sock() 666 nsk = reuseport_select_sock_by_hash(reuse, hash, socks); in reuseport_migrate_sock() 668 if (IS_ERR_OR_NULL(nsk) || unlikely(!refcount_inc_not_zero(&nsk->sk_refcnt))) { in reuseport_migrate_sock() 669 nsk = NULL; in reuseport_migrate_sock() 675 return nsk; in reuseport_migrate_sock()
|
| /linux/net/ipv4/ |
| H A D | inet_connection_sock.c | 1035 struct sock *nsk; in reqsk_timer_handler() local 1037 nsk = reuseport_migrate_sock(sk_listener, req_to_sk(req), NULL); in reqsk_timer_handler() 1038 if (!nsk) in reqsk_timer_handler() 1041 nreq = inet_reqsk_clone(req, nsk); in reqsk_timer_handler() 1052 reqsk_queue_migrated(&inet_csk(nsk)->icsk_accept_queue, req); in reqsk_timer_handler() 1055 sk_listener = nsk; in reqsk_timer_handler() 1468 struct sock *child = req->sk, *nsk; in inet_csk_listen_stop() local 1476 nsk = reuseport_migrate_sock(sk, child, NULL); in inet_csk_listen_stop() 1477 if (nsk) { in inet_csk_listen_stop() 1478 nreq = inet_reqsk_clone(req, nsk); in inet_csk_listen_stop() [all …]
|
| H A D | tcp_ipv4.c | 1860 struct sock *nsk = tcp_v4_cookie_check(sk, skb); local 1862 if (!nsk) 1864 if (nsk != sk) { 1865 reason = tcp_child_process(sk, nsk, skb); 1867 rsk = nsk; 2127 struct sock *nsk; local 2146 nsk = reuseport_migrate_sock(sk, req_to_sk(req), skb); 2147 if (!nsk) { 2151 sk = nsk; 2162 nsk = NULL; [all …]
|
| /linux/net/smc/ |
| H A D | af_smc.c | 499 static void smc_adjust_sock_bufsizes(struct sock *nsk, struct sock *osk, in smc_adjust_sock_bufsizes() argument 502 nsk->sk_userlocks = osk->sk_userlocks; in smc_adjust_sock_bufsizes() 504 nsk->sk_sndbuf = osk->sk_sndbuf; in smc_adjust_sock_bufsizes() 506 nsk->sk_rcvbuf = osk->sk_rcvbuf; in smc_adjust_sock_bufsizes() 509 static void smc_copy_sock_settings(struct sock *nsk, struct sock *osk, in smc_copy_sock_settings() argument 513 nsk->sk_type = osk->sk_type; in smc_copy_sock_settings() 514 nsk->sk_sndtimeo = READ_ONCE(osk->sk_sndtimeo); in smc_copy_sock_settings() 515 nsk->sk_rcvtimeo = READ_ONCE(osk->sk_rcvtimeo); in smc_copy_sock_settings() 516 nsk->sk_mark = READ_ONCE(osk->sk_mark); in smc_copy_sock_settings() 517 nsk->sk_priority = READ_ONCE(osk->sk_priority); in smc_copy_sock_settings() [all …]
|
| /linux/net/ipv6/ |
| H A D | tcp_ipv6.c | 1618 struct sock *nsk = tcp_v6_cookie_check(sk, skb); local 1620 if (nsk != sk) { 1621 if (nsk) { 1622 reason = tcp_child_process(sk, nsk, skb); 1764 struct sock *nsk; local 1783 nsk = reuseport_migrate_sock(sk, req_to_sk(req), skb); 1784 if (!nsk) { 1788 sk = nsk; 1796 nsk = NULL; 1802 nsk = tcp_check_req(sk, skb, req, false, &req_stolen, [all …]
|
| /linux/net/dccp/ |
| H A D | ipv4.c | |
| H A D | ipv6.c | |
| /linux/net/bluetooth/rfcomm/ |
| H A D | sock.c | 476 struct sock *sk = sock->sk, *nsk; in rfcomm_sock_accept() 499 nsk = bt_accept_dequeue(sk, newsock); in rfcomm_sock_accept() 500 if (nsk) in rfcomm_sock_accept() 526 BT_DBG("new socket %p", nsk); in rfcomm_sock_accept() 475 struct sock *sk = sock->sk, *nsk; rfcomm_sock_accept() local
|
| /linux/net/mptcp/ |
| H A D | protocol.c | 3536 struct sock *nsk = sk_clone_lock(sk, GFP_ATOMIC); in mptcp_sk_clone_init() 3540 if (!nsk) in mptcp_sk_clone_init() 3544 if (nsk->sk_family == AF_INET6) in mptcp_sk_clone_init() 3545 inet_sk(nsk)->pinet6 = mptcp_inet6_sk(nsk); in mptcp_sk_clone_init() 3548 __mptcp_init_sock(nsk); in mptcp_sk_clone_init() 3551 if (nsk->sk_family == AF_INET6) in mptcp_sk_clone_init() 3552 mptcp_copy_ip6_options(nsk, sk); in mptcp_sk_clone_init() 3555 mptcp_copy_ip_options(nsk, sk); in mptcp_sk_clone_init() 3557 msk = mptcp_sk(nsk); in mptcp_sk_clone_init() 3535 struct sock *nsk = sk_clone_lock(sk, GFP_ATOMIC); mptcp_sk_clone_init() local [all...] |
| /linux/net/bluetooth/ |
| H A D | l2cap_sock.c | 333 struct sock *sk = sock->sk, *nsk; in l2cap_sock_accept() local 351 nsk = bt_accept_dequeue(sk, newsock); in l2cap_sock_accept() 352 if (nsk) in l2cap_sock_accept() 378 BT_DBG("new socket %p", nsk); in l2cap_sock_accept()
|
| /linux/include/net/ |
| H A D | sock.h | 1035 static inline void sock_copy_flags(struct sock *nsk, const struct sock *osk) in sock_copy_flags() argument 1037 nsk->sk_flags = osk->sk_flags; in sock_copy_flags()
|