/linux-master/security/selinux/ |
H A D | netlabel.c | 323 * the new request_sock here and the stack will ensure the on-the-wire label 328 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) 353 * socket via the request_sock struct in selinux_netlbl_inet_conn_request() but
|
H A D | hooks.c | 5512 struct request_sock *req) 5533 const struct request_sock *req) 5577 static void selinux_req_classify_flow(const struct request_sock *req, 5737 * be labeled based on the connection/request_sock and 5739 * lookup the request_sock yet as it isn't queued on 5853 * to the connection/request_sock but unfortunately we can't 5854 * query the request_sock as it isn't queued on the parent
|
/linux-master/net/ipv4/ |
H A D | tcp_metrics.c | 16 #include <net/request_sock.h> 249 static struct tcp_metrics_block *__tcp_get_metrics_req(struct request_sock *req, 542 bool tcp_peer_is_proven(struct request_sock *req, struct dst_entry *dst)
|
H A D | tcp_ipv4.c | 32 * request_sock handling and moved 405 struct request_sock *req = inet_reqsk(sk); 491 struct request_sock *fastopen; 1082 struct request_sock *req) 1167 * This still operates on a request_sock only, not on a big 1172 struct request_sock *req, 1215 * IPv4 request_sock destructor. 1217 static void tcp_v4_reqsk_destructor(struct request_sock *req) 1662 static void tcp_v4_init_req(struct request_sock *req, 1677 struct request_sock *re [all...] |
H A D | tcp_ao.c | 384 struct request_sock *req) 662 struct request_sock *req, const struct sk_buff *skb, 684 struct request_sock *req, 730 struct request_sock *req = inet_reqsk(sk); 847 struct request_sock *req, unsigned short int family) 926 unsigned short int family, const struct request_sock *req, 1162 struct request_sock *req, struct sk_buff *skb,
|
H A D | tcp_output.c | 367 tcp_ecn_make_synack(const struct request_sock *req, struct tcphdr *th) 484 struct request_sock *req, 547 struct request_sock *req, 591 struct request_sock *req, 600 struct request_sock *req, 795 static void mptcp_set_option_cond(const struct request_sock *req, 898 struct request_sock *req, 3700 * @req: request_sock pointer 3706 struct request_sock *req, 4406 int tcp_rtx_synack(const struct sock *sk, struct request_sock *re [all...] |
H A D | cipso_ipv4.c | 1913 int cipso_v4_req_setattr(struct request_sock *req, 2067 void cipso_v4_req_delattr(struct request_sock *req)
|
H A D | tcp_input.c | 3180 void tcp_synack_rtt_meas(struct sock *sk, struct request_sock *req) 6592 struct request_sock *req; 6636 struct request_sock *req; 6901 static inline void pr_drop_req(struct request_sock *req, __u16 port, int family) 6932 static void tcp_ecn_create_request(struct request_sock *req, 6956 static void tcp_openreq_init(struct request_sock *req, 6984 struct request_sock *inet_reqsk_alloc(const struct request_sock_ops *ops, 6988 struct request_sock *req = reqsk_alloc(ops, sk_listener, 7048 struct request_sock *req, 7117 struct request_sock *re [all...] |
H A D | tcp.c | 2930 struct request_sock *req; 4517 struct request_sock *req; 4547 struct request_sock *req = inet_reqsk(sk);
|
H A D | inet_diag.c | 468 struct request_sock *reqsk = inet_reqsk(sk);
|
/linux-master/include/trace/events/ |
H A D | tcp.h | 218 TP_PROTO(const struct sock *sk, const struct request_sock *req),
|
/linux-master/net/ipv6/ |
H A D | calipso.c | 1186 static int calipso_req_setattr(struct request_sock *req, 1228 static void calipso_req_delattr(struct request_sock *req)
|
/linux-master/net/netlabel/ |
H A D | netlabel_kapi.c | 1210 int netlbl_req_setattr(struct request_sock *req, 1278 void netlbl_req_delattr(struct request_sock *req)
|
/linux-master/net/dccp/ |
H A D | output.c | 400 struct request_sock *req)
|
/linux-master/security/ |
H A D | security.c | 4704 * security_req_classify_flow() - Set a flow's secid based on request_sock 4705 * @req: request_sock 4710 void security_req_classify_flow(const struct request_sock *req, 4732 * security_inet_conn_request() - Set request_sock state using incoming connect 4735 * @req: new request_sock 4742 struct sk_buff *skb, struct request_sock *req) 4749 * security_inet_csk_clone() - Set new sock LSM state based on request_sock 4751 * @req: connection request_sock 4756 const struct request_sock *req)
|
/linux-master/drivers/xen/ |
H A D | pvcalls-back.c | 16 #include <net/request_sock.h>
|
/linux-master/net/smc/ |
H A D | af_smc.c | 120 struct request_sock *req, 122 struct request_sock *req_unhash, 3436 static void smc_ulp_clone(const struct request_sock *req, struct sock *newsk,
|
/linux-master/net/mptcp/ |
H A D | options.c | 896 bool mptcp_synack_options(const struct request_sock *req, unsigned int *size,
|
H A D | protocol.c | 3260 struct request_sock *req)
|
/linux-master/security/apparmor/ |
H A D | lsm.c | 1409 struct request_sock *req)
|
/linux-master/security/smack/ |
H A D | smack_lsm.c | 4361 struct request_sock *req) 4417 * Save the peer's label in the request_sock so we can later setup 4424 * if we do we only need to label the request_sock and the stack will 4444 * @req: the connection's request_sock 4449 const struct request_sock *req)
|
/linux-master/net/core/ |
H A D | sock.c | 128 #include <net/request_sock.h>
|
H A D | filter.c | 5623 /* sk is a request_sock here */ 6738 * sock refcnt is decremented to prevent a request_sock leak. 6786 * sock refcnt is decremented to prevent a request_sock leak. 11910 struct request_sock *req;
|
/linux-master/kernel/bpf/ |
H A D | verifier.c | 6380 BTF_TYPE_SAFE_RCU_OR_NULL(struct request_sock) { 6428 BTF_TYPE_EMIT(BTF_TYPE_SAFE_RCU_OR_NULL(struct request_sock)); 6364 BTF_TYPE_SAFE_RCU_OR_NULL(struct request_sock) argument
|