/linux-6.12.1/drivers/isdn/mISDN/ |
D | dsp_dtmf.c | 123 s32 sk, sk1, sk2; in dsp_dtmf_goertzel_decode() local 159 sk2 = (*hfccoeff++) >> 4; in dsp_dtmf_goertzel_decode() 161 if (sk > 32767 || sk < -32767 || sk2 > 32767 in dsp_dtmf_goertzel_decode() 162 || sk2 < -32767) in dsp_dtmf_goertzel_decode() 168 (((cos2pik[k] * sk) >> 15) * sk2) + in dsp_dtmf_goertzel_decode() 169 (sk2 * sk2); in dsp_dtmf_goertzel_decode() 187 sk2 = 0; in dsp_dtmf_goertzel_decode() 191 sk = ((cos2pik_ * sk1) >> 15) - sk2 + (*buf++); in dsp_dtmf_goertzel_decode() 192 sk2 = sk1; in dsp_dtmf_goertzel_decode() 196 sk2 >>= 8; in dsp_dtmf_goertzel_decode() [all …]
|
/linux-6.12.1/net/ipv4/ |
D | inet_connection_sock.c | 91 bool inet_rcv_saddr_equal(const struct sock *sk, const struct sock *sk2, in inet_rcv_saddr_equal() argument 97 inet6_rcv_saddr(sk2), in inet_rcv_saddr_equal() 99 sk2->sk_rcv_saddr, in inet_rcv_saddr_equal() 101 ipv6_only_sock(sk2), in inet_rcv_saddr_equal() 105 return ipv4_rcv_saddr_equal(sk->sk_rcv_saddr, sk2->sk_rcv_saddr, in inet_rcv_saddr_equal() 106 ipv6_only_sock(sk2), match_wildcard, in inet_rcv_saddr_equal() 172 static bool inet_bind_conflict(const struct sock *sk, struct sock *sk2, in inet_bind_conflict() argument 178 if (sk == sk2) in inet_bind_conflict() 181 bound_dev_if2 = READ_ONCE(sk2->sk_bound_dev_if); in inet_bind_conflict() 185 if (sk->sk_reuse && sk2->sk_reuse && in inet_bind_conflict() [all …]
|
D | inet_hashtables.c | 555 struct sock *sk2; in __inet_check_established() local 561 sk_nulls_for_each(sk2, node, &head->chain) { in __inet_check_established() 562 if (sk2->sk_hash != hash) in __inet_check_established() 565 if (likely(inet_match(net, sk2, acookie, ports, dif, sdif))) { in __inet_check_established() 566 if (sk2->sk_state == TCP_TIME_WAIT) { in __inet_check_established() 567 tw = inet_twsk(sk2); in __inet_check_established() 569 tcp_twsk_unique(sk, sk2, twp)) in __inet_check_established() 710 struct sock *sk2; in inet_reuseport_add_sock() local 713 sk_nulls_for_each_rcu(sk2, node, &ilb->nulls_head) { in inet_reuseport_add_sock() 714 if (sk2 != sk && in inet_reuseport_add_sock() [all …]
|
D | udp.c | 147 struct sock *sk2; in udp_lib_lport_inuse() local 150 sk_for_each(sk2, &hslot->head) { in udp_lib_lport_inuse() 151 if (net_eq(sock_net(sk2), net) && in udp_lib_lport_inuse() 152 sk2 != sk && in udp_lib_lport_inuse() 153 (bitmap || udp_sk(sk2)->udp_port_hash == num) && in udp_lib_lport_inuse() 154 (!sk2->sk_reuse || !sk->sk_reuse) && in udp_lib_lport_inuse() 155 (!sk2->sk_bound_dev_if || !sk->sk_bound_dev_if || in udp_lib_lport_inuse() 156 sk2->sk_bound_dev_if == sk->sk_bound_dev_if) && in udp_lib_lport_inuse() 157 inet_rcv_saddr_equal(sk, sk2, true)) { in udp_lib_lport_inuse() 158 if (sk2->sk_reuseport && sk->sk_reuseport && in udp_lib_lport_inuse() [all …]
|
D | ping.c | 82 struct sock *sk2 = NULL; in ping_get_port() local 95 sk_for_each(sk2, hlist) { in ping_get_port() 96 isk2 = inet_sk(sk2); in ping_get_port() 112 sk_for_each(sk2, hlist) { in ping_get_port() 113 isk2 = inet_sk(sk2); in ping_get_port() 120 (sk2 != sk) && in ping_get_port() 121 (!sk2->sk_reuse || !sk->sk_reuse)) in ping_get_port()
|
D | af_inet.c | 779 struct sock *sk1 = sock->sk, *sk2; in inet_accept() local 783 sk2 = READ_ONCE(sk1->sk_prot)->accept(sk1, arg); in inet_accept() 784 if (!sk2) in inet_accept() 787 lock_sock(sk2); in inet_accept() 788 __inet_accept(sock, newsock, sk2); in inet_accept() 789 release_sock(sk2); in inet_accept()
|
D | tcp_ipv4.c | 2408 struct sock *sk2 = inet_lookup_listener(net, local 2415 if (sk2) { 2417 sk = sk2;
|
/linux-6.12.1/net/ipv4/netfilter/ |
D | nf_tproxy_ipv4.c | 34 struct sock *sk2; in nf_tproxy_handle_time_wait4() local 36 sk2 = nf_tproxy_get_sock_v4(net, skb, iph->protocol, in nf_tproxy_handle_time_wait4() 40 if (sk2) { in nf_tproxy_handle_time_wait4() 42 sk = sk2; in nf_tproxy_handle_time_wait4()
|
/linux-6.12.1/net/ipv6/ |
D | inet6_hashtables.c | 280 struct sock *sk2; in __inet6_check_established() local 286 sk_nulls_for_each(sk2, node, &head->chain) { in __inet6_check_established() 287 if (sk2->sk_hash != hash) in __inet6_check_established() 290 if (likely(inet6_match(net, sk2, saddr, daddr, ports, in __inet6_check_established() 292 if (sk2->sk_state == TCP_TIME_WAIT) { in __inet6_check_established() 293 tw = inet_twsk(sk2); in __inet6_check_established() 295 tcp_twsk_unique(sk, sk2, twp)) in __inet6_check_established()
|
D | tcp_ipv6.c | 1968 struct sock *sk2; local 1970 sk2 = inet6_lookup_listener(net, net->ipv4.tcp_death_row.hashinfo, 1977 if (sk2) { 1980 sk = sk2;
|
/linux-6.12.1/net/ipv6/netfilter/ |
D | nf_tproxy_ipv6.c | 57 struct sock *sk2; in nf_tproxy_handle_time_wait6() local 59 sk2 = nf_tproxy_get_sock_v6(net, skb, thoff, tproto, in nf_tproxy_handle_time_wait6() 65 if (sk2) { in nf_tproxy_handle_time_wait6() 67 sk = sk2; in nf_tproxy_handle_time_wait6()
|
/linux-6.12.1/net/core/ |
D | sock_reuseport.c | 320 int reuseport_add_sock(struct sock *sk, struct sock *sk2, bool bind_inany) in reuseport_add_sock() argument 324 if (!rcu_access_pointer(sk2->sk_reuseport_cb)) { in reuseport_add_sock() 325 int err = reuseport_alloc(sk2, bind_inany); in reuseport_add_sock() 332 reuse = rcu_dereference_protected(sk2->sk_reuseport_cb, in reuseport_add_sock() 575 struct sock *sk2 = NULL; in reuseport_select_sock() local 595 sk2 = bpf_run_sk_reuseport(reuse, sk, prog, skb, NULL, hash); in reuseport_select_sock() 597 sk2 = run_bpf_filter(reuse, socks, prog, skb, hdr_len); in reuseport_select_sock() 601 if (!sk2) in reuseport_select_sock() 602 sk2 = reuseport_select_sock_by_hash(reuse, hash, socks); in reuseport_select_sock() 607 return sk2; in reuseport_select_sock()
|
D | filter.c | 6766 struct sock *sk2 = sk_to_full_sk(sk); in __bpf_sk_lookup() local 6771 if (!sk_fullsock(sk2)) in __bpf_sk_lookup() 6772 sk2 = NULL; in __bpf_sk_lookup() 6773 if (sk2 != sk) { in __bpf_sk_lookup() 6776 if (unlikely(sk2 && !sock_flag(sk2, SOCK_RCU_FREE))) { in __bpf_sk_lookup() 6780 sk = sk2; in __bpf_sk_lookup() 6814 struct sock *sk2 = sk_to_full_sk(sk); in bpf_sk_lookup() local 6819 if (!sk_fullsock(sk2)) in bpf_sk_lookup() 6820 sk2 = NULL; in bpf_sk_lookup() 6821 if (sk2 != sk) { in bpf_sk_lookup() [all …]
|
/linux-6.12.1/crypto/ |
D | algif_hash.c | 234 struct sock *sk2; in hash_accept() local 259 sk2 = newsock->sk; in hash_accept() 260 ask2 = alg_sk(sk2); in hash_accept() 269 sock_orphan(sk2); in hash_accept() 270 sock_put(sk2); in hash_accept()
|
D | af_alg.c | 415 struct sock *sk2; in af_alg_accept() local 426 sk2 = sk_alloc(sock_net(sk), PF_ALG, GFP_KERNEL, &alg_proto, arg->kern); in af_alg_accept() 428 if (!sk2) in af_alg_accept() 431 sock_init_data(newsock, sk2); in af_alg_accept() 432 security_sock_graft(sk2, newsock); in af_alg_accept() 433 security_sk_clone(sk, sk2); in af_alg_accept() 440 err = type->accept(ask->private, sk2); in af_alg_accept() 444 err = type->accept_nokey(ask->private, sk2); in af_alg_accept() 453 atomic_set(&alg_sk(sk2)->nokey_refcnt, 1); in af_alg_accept() 455 alg_sk(sk2)->parent = sk; in af_alg_accept() [all …]
|
/linux-6.12.1/tools/testing/selftests/bpf/progs/ |
D | test_sk_lookup.c | 327 struct bpf_sock *sk1 = NULL, *sk2 = NULL; in access_ctx_sk() local 360 sk2 = bpf_map_lookup_elem(&redir_map, &KEY_SERVER_B); in access_ctx_sk() 361 if (!sk2) in access_ctx_sk() 363 err = bpf_sk_assign(ctx, sk2, BPF_SK_LOOKUP_F_REPLACE); in access_ctx_sk() 366 if (ctx->sk != sk2) in access_ctx_sk() 379 if (sk2) in access_ctx_sk() 380 bpf_sk_release(sk2); in access_ctx_sk()
|
/linux-6.12.1/net/sctp/ |
D | input.c | 756 struct sock *sk2 = ep2->base.sk; in __sctp_hash_endpoint() local 758 if (!net_eq(sock_net(sk2), net) || sk2 == sk || in __sctp_hash_endpoint() 759 !uid_eq(sock_i_uid(sk2), sock_i_uid(sk)) || in __sctp_hash_endpoint() 760 !sk2->sk_reuseport) in __sctp_hash_endpoint() 763 err = sctp_bind_addrs_check(sctp_sk(sk2), in __sctp_hash_endpoint() 766 err = reuseport_add_sock(sk, sk2, any); in __sctp_hash_endpoint()
|
D | socket.c | 8417 struct sock *sk2; in sctp_get_port_local() local 8437 sk_for_each_bound(sk2, &pp->owner) { in sctp_get_port_local() 8438 int bound_dev_if2 = READ_ONCE(sk2->sk_bound_dev_if); in sctp_get_port_local() 8439 struct sctp_sock *sp2 = sctp_sk(sk2); in sctp_get_port_local() 8442 if (sk == sk2 || in sctp_get_port_local() 8443 (reuse && (sk2->sk_reuse || sp2->reuse) && in sctp_get_port_local() 8444 sk2->sk_state != SCTP_SS_LISTENING) || in sctp_get_port_local() 8445 (sk->sk_reuseport && sk2->sk_reuseport && in sctp_get_port_local() 8446 uid_eq(uid, sock_i_uid(sk2)))) in sctp_get_port_local()
|
/linux-6.12.1/include/net/ |
D | sock_reuseport.h | 33 extern int reuseport_add_sock(struct sock *sk, struct sock *sk2,
|
D | addrconf.h | 129 bool inet_rcv_saddr_equal(const struct sock *sk, const struct sock *sk2,
|
/linux-6.12.1/net/unix/ |
D | af_unix.c | 1389 static void unix_state_double_lock(struct sock *sk1, struct sock *sk2) in unix_state_double_lock() argument 1391 if (unlikely(sk1 == sk2) || !sk2) { in unix_state_double_lock() 1396 if (sk1 > sk2) in unix_state_double_lock() 1397 swap(sk1, sk2); in unix_state_double_lock() 1400 unix_state_lock(sk2); in unix_state_double_lock() 1403 static void unix_state_double_unlock(struct sock *sk1, struct sock *sk2) in unix_state_double_unlock() argument 1405 if (unlikely(sk1 == sk2) || !sk2) { in unix_state_double_unlock() 1410 unix_state_unlock(sk2); in unix_state_double_unlock()
|