| /linux/drivers/isdn/mISDN/ |
| H A D | dsp_dtmf.c | 123 s32 sk, sk1, sk2; in dsp_dtmf_goertzel_decode() local 159 sk2 = (*hfccoeff++) >> 4; in dsp_dtmf_goertzel_decode() 161 if (sk > 32767 || sk < -32767 || sk2 > 32767 in dsp_dtmf_goertzel_decode() 162 || sk2 < -32767) in dsp_dtmf_goertzel_decode() 168 (((cos2pik[k] * sk) >> 15) * sk2) + in dsp_dtmf_goertzel_decode() 169 (sk2 * sk2); in dsp_dtmf_goertzel_decode() 187 sk2 = 0; in dsp_dtmf_goertzel_decode() 191 sk = ((cos2pik_ * sk1) >> 15) - sk2 + (*buf++); in dsp_dtmf_goertzel_decode() 192 sk2 = sk1; in dsp_dtmf_goertzel_decode() 196 sk2 >>= 8; in dsp_dtmf_goertzel_decode() [all …]
|
| /linux/net/ipv4/ |
| H A D | inet_hashtables.c | 593 struct sock *sk2; in __inet_check_established() local 597 sk_nulls_for_each(sk2, node, &head->chain) { in __inet_check_established() 598 if (sk2->sk_hash != hash || in __inet_check_established() 599 !inet_match(net, sk2, acookie, ports, dif, sdif)) in __inet_check_established() 601 if (sk2->sk_state == TCP_TIME_WAIT) in __inet_check_established() 611 sk_nulls_for_each(sk2, node, &head->chain) { in __inet_check_established() 612 if (sk2->sk_hash != hash) in __inet_check_established() 615 if (likely(inet_match(net, sk2, acookie, ports, dif, sdif))) { in __inet_check_established() 616 if (sk2->sk_state == TCP_TIME_WAIT) { in __inet_check_established() 617 tw = inet_twsk(sk2); in __inet_check_established() [all …]
|
| H A D | udp.c | 147 struct sock *sk2; in udp_lib_lport_inuse() local 149 sk_for_each(sk2, &hslot->head) { in udp_lib_lport_inuse() 150 if (net_eq(sock_net(sk2), net) && in udp_lib_lport_inuse() 151 sk2 != sk && in udp_lib_lport_inuse() 152 (bitmap || udp_sk(sk2)->udp_port_hash == num) && in udp_lib_lport_inuse() 153 (!sk2->sk_reuse || !sk->sk_reuse) && in udp_lib_lport_inuse() 154 (!sk2->sk_bound_dev_if || !sk->sk_bound_dev_if || in udp_lib_lport_inuse() 155 sk2->sk_bound_dev_if == sk->sk_bound_dev_if) && in udp_lib_lport_inuse() 156 inet_rcv_saddr_equal(sk, sk2, true)) { in udp_lib_lport_inuse() 157 if (sk2->sk_reuseport && sk->sk_reuseport && in udp_lib_lport_inuse() [all …]
|
| H A D | ping.c | 80 struct sock *sk2 = NULL; in ping_get_port() local 92 sk_for_each(sk2, hlist) { in ping_get_port() 93 if (!net_eq(sock_net(sk2), net)) in ping_get_port() 95 isk2 = inet_sk(sk2); in ping_get_port() 111 sk_for_each(sk2, hlist) { in ping_get_port() 112 if (!net_eq(sock_net(sk2), net)) in ping_get_port() 114 isk2 = inet_sk(sk2); in ping_get_port() 121 (sk2 != sk) && in ping_get_port() 122 (!sk2->sk_reuse || !sk->sk_reuse)) in ping_get_port()
|
| H A D | af_inet.c | 785 struct sock *sk1 = sock->sk, *sk2; in inet_accept() local 789 sk2 = READ_ONCE(sk1->sk_prot)->accept(sk1, arg); in inet_accept() 790 if (!sk2) in inet_accept() 793 lock_sock(sk2); in inet_accept() 794 __inet_accept(sock, newsock, sk2); in inet_accept() 795 release_sock(sk2); in inet_accept()
|
| H A D | tcp_ipv4.c | 2376 struct sock *sk2 = inet_lookup_listener(net, skb, __tcp_hdrlen(th), local 2381 if (sk2) { 2383 sk = sk2;
|
| /linux/net/core/ |
| H A D | sock_reuseport.c | 320 int reuseport_add_sock(struct sock *sk, struct sock *sk2, bool bind_inany) in reuseport_add_sock() argument 324 if (!rcu_access_pointer(sk2->sk_reuseport_cb)) { in reuseport_add_sock() 325 int err = reuseport_alloc(sk2, bind_inany); in reuseport_add_sock() 332 reuse = rcu_dereference_protected(sk2->sk_reuseport_cb, in reuseport_add_sock() 575 struct sock *sk2 = NULL; in reuseport_select_sock() local 595 sk2 = bpf_run_sk_reuseport(reuse, sk, prog, skb, NULL, hash); in reuseport_select_sock() 597 sk2 = run_bpf_filter(reuse, socks, prog, skb, hdr_len); in reuseport_select_sock() 601 if (!sk2) in reuseport_select_sock() 602 sk2 = reuseport_select_sock_by_hash(reuse, hash, socks); in reuseport_select_sock() 607 return sk2; in reuseport_select_sock()
|
| H A D | filter.c | 6964 struct sock *sk2 = sk_to_full_sk(sk); in __bpf_sk_lookup() local 6969 if (sk2 != sk) { in __bpf_sk_lookup() 6972 if (unlikely(sk2 && !sock_flag(sk2, SOCK_RCU_FREE))) { in __bpf_sk_lookup() 6976 sk = sk2; in __bpf_sk_lookup() 7010 struct sock *sk2 = sk_to_full_sk(sk); in bpf_sk_lookup() local 7015 if (sk2 != sk) { in bpf_sk_lookup() 7018 if (unlikely(sk2 && !sock_flag(sk2, SOCK_RCU_FREE))) { in bpf_sk_lookup() 7022 sk = sk2; in bpf_sk_lookup()
|
| /linux/crypto/ |
| H A D | af_alg.c | 415 struct sock *sk2; in af_alg_accept() local 426 sk2 = sk_alloc(sock_net(sk), PF_ALG, GFP_KERNEL, &alg_proto, arg->kern); in af_alg_accept() 428 if (!sk2) in af_alg_accept() 431 sock_init_data(newsock, sk2); in af_alg_accept() 432 security_sock_graft(sk2, newsock); in af_alg_accept() 433 security_sk_clone(sk, sk2); in af_alg_accept() 440 err = type->accept(ask->private, sk2); in af_alg_accept() 444 err = type->accept_nokey(ask->private, sk2); in af_alg_accept() 453 atomic_set(&alg_sk(sk2)->nokey_refcnt, 1); in af_alg_accept() 455 alg_sk(sk2)->parent = sk; in af_alg_accept() [all …]
|
| H A D | algif_hash.c | 234 struct sock *sk2; in hash_accept() local 259 sk2 = newsock->sk; in hash_accept() 260 ask2 = alg_sk(sk2); in hash_accept()
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | test_sk_lookup.c | 327 struct bpf_sock *sk1 = NULL, *sk2 = NULL; in access_ctx_sk() local 360 sk2 = bpf_map_lookup_elem(&redir_map, &KEY_SERVER_B); in access_ctx_sk() 361 if (!sk2) in access_ctx_sk() 363 err = bpf_sk_assign(ctx, sk2, BPF_SK_LOOKUP_F_REPLACE); in access_ctx_sk() 366 if (ctx->sk != sk2) in access_ctx_sk() 379 if (sk2) in access_ctx_sk() 380 bpf_sk_release(sk2); in access_ctx_sk()
|
| /linux/net/sctp/ |
| H A D | input.c | 756 struct sock *sk2 = ep2->base.sk; in __sctp_hash_endpoint() local 758 if (!net_eq(sock_net(sk2), net) || sk2 == sk || in __sctp_hash_endpoint() 759 !uid_eq(sk_uid(sk2), sk_uid(sk)) || in __sctp_hash_endpoint() 760 !sk2->sk_reuseport) in __sctp_hash_endpoint() 763 err = sctp_bind_addrs_check(sctp_sk(sk2), in __sctp_hash_endpoint() 766 err = reuseport_add_sock(sk, sk2, any); in __sctp_hash_endpoint()
|
| H A D | socket.c | 8458 struct sock *sk2; in sctp_get_port_local() local 8478 sk_for_each_bound(sk2, &pp->owner) { in sctp_get_port_local() 8479 int bound_dev_if2 = READ_ONCE(sk2->sk_bound_dev_if); in sctp_get_port_local() 8480 struct sctp_sock *sp2 = sctp_sk(sk2); in sctp_get_port_local() 8483 if (sk == sk2 || in sctp_get_port_local() 8484 (reuse && (sk2->sk_reuse || sp2->reuse) && in sctp_get_port_local() 8485 sk2->sk_state != SCTP_SS_LISTENING) || in sctp_get_port_local() 8486 (sk->sk_reuseport && sk2->sk_reuseport && in sctp_get_port_local() 8487 uid_eq(uid, sk_uid(sk2)))) in sctp_get_port_local()
|
| /linux/include/net/ |
| H A D | sock_reuseport.h | 33 extern int reuseport_add_sock(struct sock *sk, struct sock *sk2,
|
| H A D | addrconf.h | 147 bool inet_rcv_saddr_equal(const struct sock *sk, const struct sock *sk2,
|
| /linux/net/unix/ |
| H A D | af_unix.c | 1481 static void unix_state_double_lock(struct sock *sk1, struct sock *sk2) in unix_state_double_lock() argument 1483 if (unlikely(sk1 == sk2) || !sk2) { in unix_state_double_lock() 1488 if (sk1 > sk2) in unix_state_double_lock() 1489 swap(sk1, sk2); in unix_state_double_lock() 1492 unix_state_lock(sk2); in unix_state_double_lock() 1495 static void unix_state_double_unlock(struct sock *sk1, struct sock *sk2) in unix_state_double_unlock() argument 1497 if (unlikely(sk1 == sk2) || !sk2) { in unix_state_double_unlock() 1502 unix_state_unlock(sk2); in unix_state_double_unlock()
|
| /linux/net/ipv6/ |
| H A D | tcp_ipv6.c | 1938 struct sock *sk2; 1940 sk2 = inet6_lookup_listener(net, skb, __tcp_hdrlen(th), 1946 if (sk2) { 1949 sk = sk2; 1981 struct sock *sk2; global() local
|