/linux-6.3-rc2/drivers/isdn/mISDN/ |
A D | dsp_dtmf.c | 123 s32 sk, sk1, sk2; in dsp_dtmf_goertzel_decode() local 159 sk2 = (*hfccoeff++) >> 4; in dsp_dtmf_goertzel_decode() 162 || sk2 < -32767) in dsp_dtmf_goertzel_decode() 168 (((cos2pik[k] * sk) >> 15) * sk2) + in dsp_dtmf_goertzel_decode() 169 (sk2 * sk2); in dsp_dtmf_goertzel_decode() 187 sk2 = 0; in dsp_dtmf_goertzel_decode() 192 sk2 = sk1; in dsp_dtmf_goertzel_decode() 196 sk2 >>= 8; in dsp_dtmf_goertzel_decode() 197 if (sk > 32767 || sk < -32767 || sk2 > 32767 || sk2 < -32767) in dsp_dtmf_goertzel_decode() 202 (((cos2pik[k] * sk) >> 15) * sk2) + in dsp_dtmf_goertzel_decode() [all …]
|
/linux-6.3-rc2/net/ipv4/ |
A D | inet_connection_sock.c | 97 inet6_rcv_saddr(sk2), in inet_rcv_saddr_equal() 99 sk2->sk_rcv_saddr, in inet_rcv_saddr_equal() 101 ipv6_only_sock(sk2), in inet_rcv_saddr_equal() 173 if (sk == sk2) in inet_bind_conflict() 180 if (sk->sk_reuse && sk2->sk_reuse && in inet_bind_conflict() 181 sk2->sk_state != TCP_LISTEN) { in inet_bind_conflict() 185 uid_eq(sk_uid, sock_i_uid(sk2))))) in inet_bind_conflict() 215 struct sock *sk2; in inet_bhash2_conflict() local 224 sk2 = (struct sock *)tw2; in inet_bhash2_conflict() 258 struct sock *sk2; in inet_csk_bind_conflict() local [all …]
|
A D | inet_hashtables.c | 535 struct sock *sk2; in __inet_check_established() local 542 if (sk2->sk_hash != hash) in __inet_check_established() 546 if (sk2->sk_state == TCP_TIME_WAIT) { in __inet_check_established() 547 tw = inet_twsk(sk2); in __inet_check_established() 548 if (twsk_unique(sk, sk2, twp)) in __inet_check_established() 702 struct sock *sk2; in inet_reuseport_add_sock() local 706 if (sk2 != sk && in inet_reuseport_add_sock() 707 sk2->sk_family == sk->sk_family && in inet_reuseport_add_sock() 711 sk2->sk_reuseport && uid_eq(uid, sock_i_uid(sk2)) && in inet_reuseport_add_sock() 712 inet_rcv_saddr_equal(sk, sk2, false)) in inet_reuseport_add_sock() [all …]
|
A D | udp.c | 144 struct sock *sk2; in udp_lib_lport_inuse() local 147 sk_for_each(sk2, &hslot->head) { in udp_lib_lport_inuse() 148 if (net_eq(sock_net(sk2), net) && in udp_lib_lport_inuse() 149 sk2 != sk && in udp_lib_lport_inuse() 179 struct sock *sk2; in udp_lib_lport_inuse2() local 185 if (net_eq(sock_net(sk2), net) && in udp_lib_lport_inuse2() 186 sk2 != sk && in udp_lib_lport_inuse2() 210 struct sock *sk2; in udp_reuseport_add_sock() local 212 sk_for_each(sk2, &hslot->head) { in udp_reuseport_add_sock() 214 sk2 != sk && in udp_reuseport_add_sock() [all …]
|
A D | ping.c | 88 struct sock *sk2 = NULL; in ping_get_port() local 101 ping_portaddr_for_each_entry(sk2, node, hlist) { in ping_get_port() 102 isk2 = inet_sk(sk2); in ping_get_port() 118 ping_portaddr_for_each_entry(sk2, node, hlist) { in ping_get_port() 119 isk2 = inet_sk(sk2); in ping_get_port() 126 (sk2 != sk) && in ping_get_port() 127 (!sk2->sk_reuse || !sk->sk_reuse)) in ping_get_port()
|
A D | af_inet.c | 740 struct sock *sk1 = sock->sk, *sk2; in inet_accept() local 744 sk2 = READ_ONCE(sk1->sk_prot)->accept(sk1, flags, &err, kern); in inet_accept() 745 if (!sk2) in inet_accept() 748 lock_sock(sk2); in inet_accept() 750 sock_rps_record_flow(sk2); in inet_accept() 751 WARN_ON(!((1 << sk2->sk_state) & in inet_accept() 757 sock_graft(sk2, newsock); in inet_accept() 761 release_sock(sk2); in inet_accept()
|
A D | tcp_ipv4.c | 2201 struct sock *sk2 = inet_lookup_listener(net, in tcp_v4_rcv() local 2208 if (sk2) { in tcp_v4_rcv() 2210 sk = sk2; in tcp_v4_rcv()
|
/linux-6.3-rc2/net/ipv4/netfilter/ |
A D | nf_tproxy_ipv4.c | 34 struct sock *sk2; in nf_tproxy_handle_time_wait4() local 36 sk2 = nf_tproxy_get_sock_v4(net, skb, iph->protocol, in nf_tproxy_handle_time_wait4() 40 if (sk2) { in nf_tproxy_handle_time_wait4() 42 sk = sk2; in nf_tproxy_handle_time_wait4()
|
/linux-6.3-rc2/net/ipv6/ |
A D | inet6_hashtables.c | 259 struct sock *sk2; in __inet6_check_established() local 265 sk_nulls_for_each(sk2, node, &head->chain) { in __inet6_check_established() 266 if (sk2->sk_hash != hash) in __inet6_check_established() 269 if (likely(inet6_match(net, sk2, saddr, daddr, ports, in __inet6_check_established() 271 if (sk2->sk_state == TCP_TIME_WAIT) { in __inet6_check_established() 272 tw = inet_twsk(sk2); in __inet6_check_established() 273 if (twsk_unique(sk, sk2, twp)) in __inet6_check_established()
|
A D | tcp_ipv6.c | 1803 struct sock *sk2; in tcp_v6_rcv() local 1805 sk2 = inet6_lookup_listener(net, net->ipv4.tcp_death_row.hashinfo, in tcp_v6_rcv() 1812 if (sk2) { in tcp_v6_rcv() 1815 sk = sk2; in tcp_v6_rcv()
|
/linux-6.3-rc2/net/ipv6/netfilter/ |
A D | nf_tproxy_ipv6.c | 57 struct sock *sk2; in nf_tproxy_handle_time_wait6() local 59 sk2 = nf_tproxy_get_sock_v6(net, skb, thoff, tproto, in nf_tproxy_handle_time_wait6() 65 if (sk2) { in nf_tproxy_handle_time_wait6() 67 sk = sk2; in nf_tproxy_handle_time_wait6()
|
/linux-6.3-rc2/net/core/ |
A D | sock_reuseport.c | 321 int reuseport_add_sock(struct sock *sk, struct sock *sk2, bool bind_inany) in reuseport_add_sock() argument 325 if (!rcu_access_pointer(sk2->sk_reuseport_cb)) { in reuseport_add_sock() 326 int err = reuseport_alloc(sk2, bind_inany); in reuseport_add_sock() 333 reuse = rcu_dereference_protected(sk2->sk_reuseport_cb, in reuseport_add_sock() 576 struct sock *sk2 = NULL; in reuseport_select_sock() local 596 sk2 = bpf_run_sk_reuseport(reuse, sk, prog, skb, NULL, hash); in reuseport_select_sock() 598 sk2 = run_bpf_filter(reuse, socks, prog, skb, hdr_len); in reuseport_select_sock() 602 if (!sk2) in reuseport_select_sock() 603 sk2 = reuseport_select_sock_by_hash(reuse, hash, socks); in reuseport_select_sock() 608 return sk2; in reuseport_select_sock()
|
A D | filter.c | 6578 struct sock *sk2 = sk_to_full_sk(sk); in __bpf_sk_lookup() local 6583 if (!sk_fullsock(sk2)) in __bpf_sk_lookup() 6584 sk2 = NULL; in __bpf_sk_lookup() 6585 if (sk2 != sk) { in __bpf_sk_lookup() 6588 if (unlikely(sk2 && !sock_flag(sk2, SOCK_RCU_FREE))) { in __bpf_sk_lookup() 6592 sk = sk2; in __bpf_sk_lookup() 6631 if (!sk_fullsock(sk2)) in bpf_sk_lookup() 6632 sk2 = NULL; in bpf_sk_lookup() 6633 if (sk2 != sk) { in bpf_sk_lookup() 6636 if (unlikely(sk2 && !sock_flag(sk2, SOCK_RCU_FREE))) { in bpf_sk_lookup() [all …]
|
/linux-6.3-rc2/crypto/ |
A D | af_alg.c | 411 struct sock *sk2; in af_alg_accept() local 422 sk2 = sk_alloc(sock_net(sk), PF_ALG, GFP_KERNEL, &alg_proto, kern); in af_alg_accept() 424 if (!sk2) in af_alg_accept() 427 sock_init_data(newsock, sk2); in af_alg_accept() 428 security_sock_graft(sk2, newsock); in af_alg_accept() 429 security_sk_clone(sk, sk2); in af_alg_accept() 436 err = type->accept(ask->private, sk2); in af_alg_accept() 440 err = type->accept_nokey(ask->private, sk2); in af_alg_accept() 449 atomic_set(&alg_sk(sk2)->nokey_refcnt, 1); in af_alg_accept() 451 alg_sk(sk2)->parent = sk; in af_alg_accept() [all …]
|
A D | algif_hash.c | 239 struct sock *sk2; in hash_accept() local 257 sk2 = newsock->sk; in hash_accept() 258 ask2 = alg_sk(sk2); in hash_accept() 267 sock_orphan(sk2); in hash_accept() 268 sock_put(sk2); in hash_accept()
|
/linux-6.3-rc2/tools/testing/selftests/bpf/progs/ |
A D | test_sk_lookup.c | 327 struct bpf_sock *sk1 = NULL, *sk2 = NULL; in access_ctx_sk() local 360 sk2 = bpf_map_lookup_elem(&redir_map, &KEY_SERVER_B); in access_ctx_sk() 361 if (!sk2) in access_ctx_sk() 363 err = bpf_sk_assign(ctx, sk2, BPF_SK_LOOKUP_F_REPLACE); in access_ctx_sk() 366 if (ctx->sk != sk2) in access_ctx_sk() 379 if (sk2) in access_ctx_sk() 380 bpf_sk_release(sk2); in access_ctx_sk()
|
/linux-6.3-rc2/net/sctp/ |
A D | input.c | 752 struct sock *sk2 = ep2->base.sk; in __sctp_hash_endpoint() local 754 if (!net_eq(sock_net(sk2), net) || sk2 == sk || in __sctp_hash_endpoint() 755 !uid_eq(sock_i_uid(sk2), sock_i_uid(sk)) || in __sctp_hash_endpoint() 756 !sk2->sk_reuseport) in __sctp_hash_endpoint() 759 err = sctp_bind_addrs_check(sctp_sk(sk2), in __sctp_hash_endpoint() 762 err = reuseport_add_sock(sk, sk2, any); in __sctp_hash_endpoint()
|
A D | socket.c | 8381 struct sock *sk2; in sctp_get_port_local() local 8401 sk_for_each_bound(sk2, &pp->owner) { in sctp_get_port_local() 8402 int bound_dev_if2 = READ_ONCE(sk2->sk_bound_dev_if); in sctp_get_port_local() 8403 struct sctp_sock *sp2 = sctp_sk(sk2); in sctp_get_port_local() 8406 if (sk == sk2 || in sctp_get_port_local() 8407 (reuse && (sk2->sk_reuse || sp2->reuse) && in sctp_get_port_local() 8408 sk2->sk_state != SCTP_SS_LISTENING) || in sctp_get_port_local() 8409 (sk->sk_reuseport && sk2->sk_reuseport && in sctp_get_port_local() 8410 uid_eq(uid, sock_i_uid(sk2)))) in sctp_get_port_local()
|
/linux-6.3-rc2/include/net/ |
A D | sock_reuseport.h | 33 extern int reuseport_add_sock(struct sock *sk, struct sock *sk2,
|
A D | addrconf.h | 116 bool inet_rcv_saddr_equal(const struct sock *sk, const struct sock *sk2,
|
/linux-6.3-rc2/net/unix/ |
A D | af_unix.c | 1322 static void unix_state_double_lock(struct sock *sk1, struct sock *sk2) in unix_state_double_lock() argument 1324 if (unlikely(sk1 == sk2) || !sk2) { in unix_state_double_lock() 1328 if (sk1 < sk2) { in unix_state_double_lock() 1330 unix_state_lock_nested(sk2); in unix_state_double_lock() 1332 unix_state_lock(sk2); in unix_state_double_lock() 1337 static void unix_state_double_unlock(struct sock *sk1, struct sock *sk2) in unix_state_double_unlock() argument 1339 if (unlikely(sk1 == sk2) || !sk2) { in unix_state_double_unlock() 1344 unix_state_unlock(sk2); in unix_state_double_unlock()
|