Home
last modified time | relevance | path

Searched refs:sk2 (Results 1 – 21 of 21) sorted by relevance

/linux-6.3-rc2/drivers/isdn/mISDN/
A Ddsp_dtmf.c123 s32 sk, sk1, sk2; in dsp_dtmf_goertzel_decode() local
159 sk2 = (*hfccoeff++) >> 4; in dsp_dtmf_goertzel_decode()
162 || sk2 < -32767) in dsp_dtmf_goertzel_decode()
168 (((cos2pik[k] * sk) >> 15) * sk2) + in dsp_dtmf_goertzel_decode()
169 (sk2 * sk2); in dsp_dtmf_goertzel_decode()
187 sk2 = 0; in dsp_dtmf_goertzel_decode()
192 sk2 = sk1; in dsp_dtmf_goertzel_decode()
196 sk2 >>= 8; in dsp_dtmf_goertzel_decode()
197 if (sk > 32767 || sk < -32767 || sk2 > 32767 || sk2 < -32767) in dsp_dtmf_goertzel_decode()
202 (((cos2pik[k] * sk) >> 15) * sk2) + in dsp_dtmf_goertzel_decode()
[all …]
/linux-6.3-rc2/net/ipv4/
A Dinet_connection_sock.c97 inet6_rcv_saddr(sk2), in inet_rcv_saddr_equal()
99 sk2->sk_rcv_saddr, in inet_rcv_saddr_equal()
101 ipv6_only_sock(sk2), in inet_rcv_saddr_equal()
173 if (sk == sk2) in inet_bind_conflict()
180 if (sk->sk_reuse && sk2->sk_reuse && in inet_bind_conflict()
181 sk2->sk_state != TCP_LISTEN) { in inet_bind_conflict()
185 uid_eq(sk_uid, sock_i_uid(sk2))))) in inet_bind_conflict()
215 struct sock *sk2; in inet_bhash2_conflict() local
224 sk2 = (struct sock *)tw2; in inet_bhash2_conflict()
258 struct sock *sk2; in inet_csk_bind_conflict() local
[all …]
A Dinet_hashtables.c535 struct sock *sk2; in __inet_check_established() local
542 if (sk2->sk_hash != hash) in __inet_check_established()
546 if (sk2->sk_state == TCP_TIME_WAIT) { in __inet_check_established()
547 tw = inet_twsk(sk2); in __inet_check_established()
548 if (twsk_unique(sk, sk2, twp)) in __inet_check_established()
702 struct sock *sk2; in inet_reuseport_add_sock() local
706 if (sk2 != sk && in inet_reuseport_add_sock()
707 sk2->sk_family == sk->sk_family && in inet_reuseport_add_sock()
711 sk2->sk_reuseport && uid_eq(uid, sock_i_uid(sk2)) && in inet_reuseport_add_sock()
712 inet_rcv_saddr_equal(sk, sk2, false)) in inet_reuseport_add_sock()
[all …]
A Dudp.c144 struct sock *sk2; in udp_lib_lport_inuse() local
147 sk_for_each(sk2, &hslot->head) { in udp_lib_lport_inuse()
148 if (net_eq(sock_net(sk2), net) && in udp_lib_lport_inuse()
149 sk2 != sk && in udp_lib_lport_inuse()
179 struct sock *sk2; in udp_lib_lport_inuse2() local
185 if (net_eq(sock_net(sk2), net) && in udp_lib_lport_inuse2()
186 sk2 != sk && in udp_lib_lport_inuse2()
210 struct sock *sk2; in udp_reuseport_add_sock() local
212 sk_for_each(sk2, &hslot->head) { in udp_reuseport_add_sock()
214 sk2 != sk && in udp_reuseport_add_sock()
[all …]
A Dping.c88 struct sock *sk2 = NULL; in ping_get_port() local
101 ping_portaddr_for_each_entry(sk2, node, hlist) { in ping_get_port()
102 isk2 = inet_sk(sk2); in ping_get_port()
118 ping_portaddr_for_each_entry(sk2, node, hlist) { in ping_get_port()
119 isk2 = inet_sk(sk2); in ping_get_port()
126 (sk2 != sk) && in ping_get_port()
127 (!sk2->sk_reuse || !sk->sk_reuse)) in ping_get_port()
A Daf_inet.c740 struct sock *sk1 = sock->sk, *sk2; in inet_accept() local
744 sk2 = READ_ONCE(sk1->sk_prot)->accept(sk1, flags, &err, kern); in inet_accept()
745 if (!sk2) in inet_accept()
748 lock_sock(sk2); in inet_accept()
750 sock_rps_record_flow(sk2); in inet_accept()
751 WARN_ON(!((1 << sk2->sk_state) & in inet_accept()
757 sock_graft(sk2, newsock); in inet_accept()
761 release_sock(sk2); in inet_accept()
A Dtcp_ipv4.c2201 struct sock *sk2 = inet_lookup_listener(net, in tcp_v4_rcv() local
2208 if (sk2) { in tcp_v4_rcv()
2210 sk = sk2; in tcp_v4_rcv()
/linux-6.3-rc2/net/ipv4/netfilter/
A Dnf_tproxy_ipv4.c34 struct sock *sk2; in nf_tproxy_handle_time_wait4() local
36 sk2 = nf_tproxy_get_sock_v4(net, skb, iph->protocol, in nf_tproxy_handle_time_wait4()
40 if (sk2) { in nf_tproxy_handle_time_wait4()
42 sk = sk2; in nf_tproxy_handle_time_wait4()
/linux-6.3-rc2/net/ipv6/
A Dinet6_hashtables.c259 struct sock *sk2; in __inet6_check_established() local
265 sk_nulls_for_each(sk2, node, &head->chain) { in __inet6_check_established()
266 if (sk2->sk_hash != hash) in __inet6_check_established()
269 if (likely(inet6_match(net, sk2, saddr, daddr, ports, in __inet6_check_established()
271 if (sk2->sk_state == TCP_TIME_WAIT) { in __inet6_check_established()
272 tw = inet_twsk(sk2); in __inet6_check_established()
273 if (twsk_unique(sk, sk2, twp)) in __inet6_check_established()
A Dtcp_ipv6.c1803 struct sock *sk2; in tcp_v6_rcv() local
1805 sk2 = inet6_lookup_listener(net, net->ipv4.tcp_death_row.hashinfo, in tcp_v6_rcv()
1812 if (sk2) { in tcp_v6_rcv()
1815 sk = sk2; in tcp_v6_rcv()
/linux-6.3-rc2/net/ipv6/netfilter/
A Dnf_tproxy_ipv6.c57 struct sock *sk2; in nf_tproxy_handle_time_wait6() local
59 sk2 = nf_tproxy_get_sock_v6(net, skb, thoff, tproto, in nf_tproxy_handle_time_wait6()
65 if (sk2) { in nf_tproxy_handle_time_wait6()
67 sk = sk2; in nf_tproxy_handle_time_wait6()
/linux-6.3-rc2/net/core/
A Dsock_reuseport.c321 int reuseport_add_sock(struct sock *sk, struct sock *sk2, bool bind_inany) in reuseport_add_sock() argument
325 if (!rcu_access_pointer(sk2->sk_reuseport_cb)) { in reuseport_add_sock()
326 int err = reuseport_alloc(sk2, bind_inany); in reuseport_add_sock()
333 reuse = rcu_dereference_protected(sk2->sk_reuseport_cb, in reuseport_add_sock()
576 struct sock *sk2 = NULL; in reuseport_select_sock() local
596 sk2 = bpf_run_sk_reuseport(reuse, sk, prog, skb, NULL, hash); in reuseport_select_sock()
598 sk2 = run_bpf_filter(reuse, socks, prog, skb, hdr_len); in reuseport_select_sock()
602 if (!sk2) in reuseport_select_sock()
603 sk2 = reuseport_select_sock_by_hash(reuse, hash, socks); in reuseport_select_sock()
608 return sk2; in reuseport_select_sock()
A Dfilter.c6578 struct sock *sk2 = sk_to_full_sk(sk); in __bpf_sk_lookup() local
6583 if (!sk_fullsock(sk2)) in __bpf_sk_lookup()
6584 sk2 = NULL; in __bpf_sk_lookup()
6585 if (sk2 != sk) { in __bpf_sk_lookup()
6588 if (unlikely(sk2 && !sock_flag(sk2, SOCK_RCU_FREE))) { in __bpf_sk_lookup()
6592 sk = sk2; in __bpf_sk_lookup()
6631 if (!sk_fullsock(sk2)) in bpf_sk_lookup()
6632 sk2 = NULL; in bpf_sk_lookup()
6633 if (sk2 != sk) { in bpf_sk_lookup()
6636 if (unlikely(sk2 && !sock_flag(sk2, SOCK_RCU_FREE))) { in bpf_sk_lookup()
[all …]
/linux-6.3-rc2/crypto/
A Daf_alg.c411 struct sock *sk2; in af_alg_accept() local
422 sk2 = sk_alloc(sock_net(sk), PF_ALG, GFP_KERNEL, &alg_proto, kern); in af_alg_accept()
424 if (!sk2) in af_alg_accept()
427 sock_init_data(newsock, sk2); in af_alg_accept()
428 security_sock_graft(sk2, newsock); in af_alg_accept()
429 security_sk_clone(sk, sk2); in af_alg_accept()
436 err = type->accept(ask->private, sk2); in af_alg_accept()
440 err = type->accept_nokey(ask->private, sk2); in af_alg_accept()
449 atomic_set(&alg_sk(sk2)->nokey_refcnt, 1); in af_alg_accept()
451 alg_sk(sk2)->parent = sk; in af_alg_accept()
[all …]
A Dalgif_hash.c239 struct sock *sk2; in hash_accept() local
257 sk2 = newsock->sk; in hash_accept()
258 ask2 = alg_sk(sk2); in hash_accept()
267 sock_orphan(sk2); in hash_accept()
268 sock_put(sk2); in hash_accept()
/linux-6.3-rc2/tools/testing/selftests/bpf/progs/
A Dtest_sk_lookup.c327 struct bpf_sock *sk1 = NULL, *sk2 = NULL; in access_ctx_sk() local
360 sk2 = bpf_map_lookup_elem(&redir_map, &KEY_SERVER_B); in access_ctx_sk()
361 if (!sk2) in access_ctx_sk()
363 err = bpf_sk_assign(ctx, sk2, BPF_SK_LOOKUP_F_REPLACE); in access_ctx_sk()
366 if (ctx->sk != sk2) in access_ctx_sk()
379 if (sk2) in access_ctx_sk()
380 bpf_sk_release(sk2); in access_ctx_sk()
/linux-6.3-rc2/net/sctp/
A Dinput.c752 struct sock *sk2 = ep2->base.sk; in __sctp_hash_endpoint() local
754 if (!net_eq(sock_net(sk2), net) || sk2 == sk || in __sctp_hash_endpoint()
755 !uid_eq(sock_i_uid(sk2), sock_i_uid(sk)) || in __sctp_hash_endpoint()
756 !sk2->sk_reuseport) in __sctp_hash_endpoint()
759 err = sctp_bind_addrs_check(sctp_sk(sk2), in __sctp_hash_endpoint()
762 err = reuseport_add_sock(sk, sk2, any); in __sctp_hash_endpoint()
A Dsocket.c8381 struct sock *sk2; in sctp_get_port_local() local
8401 sk_for_each_bound(sk2, &pp->owner) { in sctp_get_port_local()
8402 int bound_dev_if2 = READ_ONCE(sk2->sk_bound_dev_if); in sctp_get_port_local()
8403 struct sctp_sock *sp2 = sctp_sk(sk2); in sctp_get_port_local()
8406 if (sk == sk2 || in sctp_get_port_local()
8407 (reuse && (sk2->sk_reuse || sp2->reuse) && in sctp_get_port_local()
8408 sk2->sk_state != SCTP_SS_LISTENING) || in sctp_get_port_local()
8409 (sk->sk_reuseport && sk2->sk_reuseport && in sctp_get_port_local()
8410 uid_eq(uid, sock_i_uid(sk2)))) in sctp_get_port_local()
/linux-6.3-rc2/include/net/
A Dsock_reuseport.h33 extern int reuseport_add_sock(struct sock *sk, struct sock *sk2,
A Daddrconf.h116 bool inet_rcv_saddr_equal(const struct sock *sk, const struct sock *sk2,
/linux-6.3-rc2/net/unix/
A Daf_unix.c1322 static void unix_state_double_lock(struct sock *sk1, struct sock *sk2) in unix_state_double_lock() argument
1324 if (unlikely(sk1 == sk2) || !sk2) { in unix_state_double_lock()
1328 if (sk1 < sk2) { in unix_state_double_lock()
1330 unix_state_lock_nested(sk2); in unix_state_double_lock()
1332 unix_state_lock(sk2); in unix_state_double_lock()
1337 static void unix_state_double_unlock(struct sock *sk1, struct sock *sk2) in unix_state_double_unlock() argument
1339 if (unlikely(sk1 == sk2) || !sk2) { in unix_state_double_unlock()
1344 unix_state_unlock(sk2); in unix_state_double_unlock()

Completed in 102 milliseconds