| /kernel/linux/linux-6.6/fs/hmdfs/comm/ |
| D | transport.c | 15 #include <linux/tcp.h> 83 struct tcp_handle *tcp = NULL; in hmdfs_tcpi_rtt() local 88 tcp = (struct tcp_handle *)(conn_impl->connect_handle); in hmdfs_tcpi_rtt() 89 if (tcp->sock) in hmdfs_tcpi_rtt() 90 rtt_us = tcp_sk(tcp->sock->sk)->srtt_us >> 3; in hmdfs_tcpi_rtt() 117 hmdfs_err("tcp recv error %d", rc); in tcp_read_head_from_socket() 153 hmdfs_err("tcp recv error %d", rc); in tcp_read_buffer_from_socket() 219 struct tcp_handle *tcp = NULL; in tcp_recvpage_tls() local 226 hmdfs_err("tcp connect == NULL"); in tcp_recvpage_tls() 230 tcp = (struct tcp_handle *)(connect->connect_handle); in tcp_recvpage_tls() [all …]
|
| D | crypto.c | 12 #include <linux/tcp.h> 22 struct tcp_handle *tcp = conn_impl->connect_handle; in tls_crypto_set_key() local 30 lock_sock(tcp->sock->sk); in tls_crypto_set_key() 31 ctx = tls_get_ctx(tcp->sock->sk); in tls_crypto_set_key() 53 release_sock(tcp->sock->sk); in tls_crypto_set_key() 60 struct tcp_handle *tcp = in tls_crypto_info_init() local 62 if (!tcp) in tls_crypto_info_init() 66 ret = tcp->sock->ops->setsockopt(tcp->sock, SOL_TCP, TCP_ULP, in tls_crypto_info_init() 70 tcp->connect->send_crypto_info.info.version = TLS_1_2_VERSION; in tls_crypto_info_init() 71 tcp->connect->send_crypto_info.info.cipher_type = in tls_crypto_info_init() [all …]
|
| /kernel/linux/linux-5.10/fs/hmdfs/comm/ |
| D | transport.c | 15 #include <linux/tcp.h> 83 struct tcp_handle *tcp = NULL; in hmdfs_tcpi_rtt() local 88 tcp = (struct tcp_handle *)(conn_impl->connect_handle); in hmdfs_tcpi_rtt() 89 if (tcp->sock) in hmdfs_tcpi_rtt() 90 rtt_us = tcp_sk(tcp->sock->sk)->srtt_us >> 3; in hmdfs_tcpi_rtt() 117 hmdfs_err("tcp recv error %d", rc); in tcp_read_head_from_socket() 153 hmdfs_err("tcp recv error %d", rc); in tcp_read_buffer_from_socket() 219 struct tcp_handle *tcp = NULL; in tcp_recvpage_tls() local 226 hmdfs_err("tcp connect == NULL"); in tcp_recvpage_tls() 230 tcp = (struct tcp_handle *)(connect->connect_handle); in tcp_recvpage_tls() [all …]
|
| D | crypto.c | 12 #include <linux/tcp.h> 22 struct tcp_handle *tcp = conn_impl->connect_handle; in tls_crypto_set_key() local 30 lock_sock(tcp->sock->sk); in tls_crypto_set_key() 31 ctx = tls_get_ctx(tcp->sock->sk); in tls_crypto_set_key() 53 release_sock(tcp->sock->sk); in tls_crypto_set_key() 60 struct tcp_handle *tcp = in tls_crypto_info_init() local 62 if (!tcp) in tls_crypto_info_init() 66 ret = tcp->sock->ops->setsockopt(tcp->sock, SOL_TCP, TCP_ULP, in tls_crypto_info_init() 70 tcp->connect->send_crypto_info.info.version = TLS_1_2_VERSION; in tls_crypto_info_init() 71 tcp->connect->send_crypto_info.info.cipher_type = in tls_crypto_info_init() [all …]
|
| /kernel/linux/linux-6.6/net/ipv4/ |
| D | Kconfig | 269 bool "IP: TCP syncookie support" 271 Normal TCP/IP networking is open to an attack known as "SYN 278 say Y here, the TCP/IP stack will use a cryptographic challenge 281 is no need for the legitimate users to change their TCP/IP software; 384 bool "IP: ESP in TCP encapsulation (RFC 8229)" 391 TCP/IPv4 sockets. 428 Support for INET (TCP, DCCP, etc) socket monitoring interface used by 470 bool "TCP: advanced congestion control" 472 Support for selection of various TCP congestion control 486 BIC-TCP is a sender-side only change that ensures a linear RTT [all …]
|
| D | tcp_lp.c | 3 * TCP Low Priority (TCP-LP) 5 * TCP Low Priority is a distributed algorithm whose goal is to utilize only 7 * bandwidth as targeted by TCP. 11 * the original TCP-LP implementation: 26 * http://www.ece.rice.edu/~akuzma/Doc/akuzma/TCP-LP.pdf 28 * http://www-ece.rice.edu/networks/TCP-LP/ 34 * http://tcp-lp-mod.sourceforge.net/ 38 #include <net/tcp.h> 50 * TCP-LP's state flags. 62 * @flag: TCP-LP state flag [all …]
|
| /kernel/linux/linux-5.10/net/ipv4/ |
| D | Kconfig | 269 bool "IP: TCP syncookie support" 271 Normal TCP/IP networking is open to an attack known as "SYN 278 say Y here, the TCP/IP stack will use a cryptographic challenge 281 is no need for the legitimate users to change their TCP/IP software; 385 bool "IP: ESP in TCP encapsulation (RFC 8229)" 392 TCP/IPv4 sockets. 429 Support for INET (TCP, DCCP, etc) socket monitoring interface used by 471 bool "TCP: advanced congestion control" 473 Support for selection of various TCP congestion control 487 BIC-TCP is a sender-side only change that ensures a linear RTT [all …]
|
| D | tcp_lp.c | 3 * TCP Low Priority (TCP-LP) 5 * TCP Low Priority is a distributed algorithm whose goal is to utilize only 7 * bandwidth as targeted by TCP. 11 * the original TCP-LP implementation: 26 * http://www.ece.rice.edu/~akuzma/Doc/akuzma/TCP-LP.pdf 28 * http://www-ece.rice.edu/networks/TCP-LP/ 34 * http://tcp-lp-mod.sourceforge.net/ 38 #include <net/tcp.h> 50 * TCP-LP's state flags. 62 * @flag: TCP-LP state flag [all …]
|
| /kernel/linux/linux-6.6/Documentation/networking/ |
| D | kcm.rst | 8 interface over TCP for generic application protocols. With KCM an application 9 can efficiently send and receive application protocol messages over TCP using 31 | TCP sock | | TCP sock | | TCP sock | | TCP sock | | TCP sock | 46 written on a KCM socket are sent atomically on an appropriate TCP socket. 47 Similarly, in the receive path, messages are constructed on each TCP socket 50 TCP sockets & Psocks 53 TCP sockets may be bound to a KCM multiplexor. A Psock structure is allocated 54 for each bound TCP socket, this structure holds the state for constructing 60 Each multiplexor assumes that all attached TCP connections are to the same 73 Messages are sent over a TCP stream with some application protocol message [all …]
|
| D | snmp_counter.rst | 32 The number of packets delivers to the upper layer protocols. E.g. TCP, UDP, 249 General TCP counters 257 The number of packets received by the TCP layer. As mentioned in 259 error, invalid TCP header and so on. Only one error won't be included: 263 packets would be delivered to the TCP layer, but the TCP layer will discard 274 The number of packets sent by the TCP layer. As mentioned in RFC1213, 286 It means the TCP layer sends a SYN, and come into the SYN-SENT 296 It means the TCP layer receives a SYN, replies a SYN+ACK, come into 301 When packets are received by the TCP layer and are not be read by the 302 application, the TCP layer will try to merge them. This counter [all …]
|
| /kernel/linux/linux-5.10/Documentation/networking/ |
| D | kcm.rst | 8 interface over TCP for generic application protocols. With KCM an application 9 can efficiently send and receive application protocol messages over TCP using 31 | TCP sock | | TCP sock | | TCP sock | | TCP sock | | TCP sock | 46 written on a KCM socket are sent atomically on an appropriate TCP socket. 47 Similarly, in the receive path, messages are constructed on each TCP socket 50 TCP sockets & Psocks 53 TCP sockets may be bound to a KCM multiplexor. A Psock structure is allocated 54 for each bound TCP socket, this structure holds the state for constructing 60 Each multiplexor assumes that all attached TCP connections are to the same 73 Messages are sent over a TCP stream with some application protocol message [all …]
|
| D | snmp_counter.rst | 32 The number of packets delivers to the upper layer protocols. E.g. TCP, UDP, 249 General TCP counters 257 The number of packets received by the TCP layer. As mentioned in 259 error, invalid TCP header and so on. Only one error won't be included: 263 packets would be delivered to the TCP layer, but the TCP layer will discard 274 The number of packets sent by the TCP layer. As mentioned in RFC1213, 286 It means the TCP layer sends a SYN, and come into the SYN-SENT 296 It means the TCP layer receives a SYN, replies a SYN+ACK, come into 301 When packets are received by the TCP layer and are not be read by the 302 application, the TCP layer will try to merge them. This counter [all …]
|
| /kernel/linux/linux-6.6/net/netfilter/ |
| D | nf_conntrack_proto_tcp.c | 12 #include <linux/tcp.h> 19 #include <net/tcp.h> 91 /* What TCP flags are set from RST/SYN/FIN/ACK. */ 102 * The TCP state transition table needs a few words... 271 seq_printf(s, "%s ", tcp_conntrack_names[ct->proto.tcp.state]); in tcp_print_conntrack() 284 /* TCP connection tracking based on 'Real Stateful TCP Packet Filtering 515 struct ip_ct_tcp *state = &ct->proto.tcp; in tcp_in_window() 581 * RFC 793: "if a TCP is reinitialized ... then it need in tcp_in_window() 586 * syn(-ack) reply, it might differ in seq, ack or tcp options. in tcp_in_window() 605 * Broken TCP stacks, that set ACK in RST packets as well in tcp_in_window() [all …]
|
| D | nft_synproxy.c | 4 #include <net/tcp.h> 24 const struct tcphdr *tcp, in nft_synproxy_tcp_options() argument 30 if (tcp->ece && tcp->cwr) in nft_synproxy_tcp_options() 47 const struct tcphdr *tcp, in nft_synproxy_eval_v4() argument 56 if (tcp->syn) { in nft_synproxy_eval_v4() 58 nft_synproxy_tcp_options(opts, tcp, snet, &info, priv); in nft_synproxy_eval_v4() 59 synproxy_send_client_synack(net, skb, tcp, opts); in nft_synproxy_eval_v4() 62 } else if (tcp->ack) { in nft_synproxy_eval_v4() 64 if (synproxy_recv_client_ack(net, skb, tcp, opts, in nft_synproxy_eval_v4() 65 ntohl(tcp->seq))) { in nft_synproxy_eval_v4() [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/ |
| D | flow_dissector.c | 47 struct tcphdr tcp; member 54 struct tcphdr tcp; member 62 struct tcphdr tcp; member 68 struct tcphdr tcp; member 80 struct tcphdr tcp; member 90 struct tcphdr tcp; member 119 .tcp.doff = 5, 120 .tcp.source = 80, 121 .tcp.dest = 8080, 140 .tcp.doff = 5, [all …]
|
| /kernel/linux/linux-5.10/net/netfilter/ |
| D | nf_conntrack_proto_tcp.c | 12 #include <linux/tcp.h> 19 #include <net/tcp.h> 99 /* What TCP flags are set from RST/SYN/FIN/ACK. */ 110 * The TCP state transition table needs a few words... 279 seq_printf(s, "%s ", tcp_conntrack_names[ct->proto.tcp.state]); in tcp_print_conntrack() 292 /* TCP connection tracking based on 'Real Stateful TCP Packet Filtering 565 * RFC 793: "if a TCP is reinitialized ... then it need in tcp_in_window() 585 * Broken TCP stacks, that set ACK in RST packets as well in tcp_in_window() 737 /* Not whole TCP header or malformed packet */ in tcp_error() 755 /* Check TCP flags. */ in tcp_error() [all …]
|
| D | nft_synproxy.c | 4 #include <net/tcp.h> 24 const struct tcphdr *tcp, in nft_synproxy_tcp_options() argument 30 if (tcp->ece && tcp->cwr) in nft_synproxy_tcp_options() 47 const struct tcphdr *tcp, in nft_synproxy_eval_v4() argument 56 if (tcp->syn) { in nft_synproxy_eval_v4() 58 nft_synproxy_tcp_options(opts, tcp, snet, &info, priv); in nft_synproxy_eval_v4() 59 synproxy_send_client_synack(net, skb, tcp, opts); in nft_synproxy_eval_v4() 62 } else if (tcp->ack) { in nft_synproxy_eval_v4() 64 if (synproxy_recv_client_ack(net, skb, tcp, opts, in nft_synproxy_eval_v4() 65 ntohl(tcp->seq))) { in nft_synproxy_eval_v4() [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/bpf/prog_tests/ |
| D | flow_dissector.c | 44 struct tcphdr tcp; member 51 struct tcphdr tcp; member 59 struct tcphdr tcp; member 65 struct tcphdr tcp; member 77 struct tcphdr tcp; member 87 struct tcphdr tcp; member 115 .tcp.doff = 5, 116 .tcp.source = 80, 117 .tcp.dest = 8080, 135 .tcp.doff = 5, [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
| D | xdp_synproxy_kern.c | 369 struct tcphdr *tcp; member 395 hdr->tcp = (void *)hdr->ipv4 + hdr->ipv4->ihl * 4; in tcp_dissect() 412 hdr->tcp = (void *)hdr->ipv6 + sizeof(*hdr->ipv6); in tcp_dissect() 419 if (hdr->tcp + 1 > data_end) in tcp_dissect() 421 hdr->tcp_len = hdr->tcp->doff * 4; in tcp_dissect() 422 if (hdr->tcp_len < sizeof(*hdr->tcp)) in tcp_dissect() 439 /* TCP doesn't normally use fragments, and XDP can't reassemble in tcp_lookup() 447 tup.ipv4.sport = hdr->tcp->source; in tcp_lookup() 448 tup.ipv4.dport = hdr->tcp->dest; in tcp_lookup() 453 tup.ipv6.sport = hdr->tcp->source; in tcp_lookup() [all …]
|
| D | test_pkt_access.c | 12 #include <linux/tcp.h> 89 struct tcphdr *tcp = NULL; in test_pkt_write_access_subprog() local 94 tcp = data + off; in test_pkt_write_access_subprog() 95 if (tcp + 1 > data_end) in test_pkt_write_access_subprog() 98 tcp->check++; in test_pkt_write_access_subprog() 108 struct tcphdr *tcp = NULL; in test_pkt_access() local 122 tcp = (struct tcphdr *)((void *)(iph) + ihl_len); in test_pkt_access() 130 tcp = (struct tcphdr *)((void *)(ip6h) + ihl_len); in test_pkt_access() 139 if (tcp) { in test_pkt_access() 140 if (test_pkt_write_access_subprog(skb, (void *)tcp - data)) in test_pkt_access() [all …]
|
| /kernel/linux/linux-6.6/include/net/ |
| D | slhc_vj.h | 4 * Definitions for tcp compression routines. 43 * The first octet contains the packet type (top 3 bits), TCP 44 * 'push' bit, and flags that indicate which of the 4 TCP sequence 46 * conversation number that associates a saved IP/TCP header with 47 * the compressed packet. The next two octets are the TCP checksum 54 * in the following order): TCP urgent pointer, window, 69 * three possible types: IP (not proto TCP or tcp with one of the 70 * control flags set); uncompressed TCP (a normal IP/TCP packet but 73 * TCP (described above). 75 * LSB of 4-bit field is TCP "PUSH" bit (a worthless anachronism) and [all …]
|
| /kernel/linux/linux-5.10/include/net/ |
| D | slhc_vj.h | 4 * Definitions for tcp compression routines. 43 * The first octet contains the packet type (top 3 bits), TCP 44 * 'push' bit, and flags that indicate which of the 4 TCP sequence 46 * conversation number that associates a saved IP/TCP header with 47 * the compressed packet. The next two octets are the TCP checksum 54 * in the following order): TCP urgent pointer, window, 69 * three possible types: IP (not proto TCP or tcp with one of the 70 * control flags set); uncompressed TCP (a normal IP/TCP packet but 73 * TCP (described above). 75 * LSB of 4-bit field is TCP "PUSH" bit (a worthless anachronism) and [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/ |
| D | test_pkt_access.c | 12 #include <linux/tcp.h> 87 struct tcphdr *tcp = NULL; in test_pkt_write_access_subprog() local 92 tcp = data + off; in test_pkt_write_access_subprog() 93 if (tcp + 1 > data_end) in test_pkt_write_access_subprog() 96 tcp->check++; in test_pkt_write_access_subprog() 106 struct tcphdr *tcp = NULL; in test_pkt_access() local 120 tcp = (struct tcphdr *)((void *)(iph) + ihl_len); in test_pkt_access() 128 tcp = (struct tcphdr *)((void *)(ip6h) + ihl_len); in test_pkt_access() 137 if (tcp) { in test_pkt_access() 138 if (test_pkt_write_access_subprog(skb, (void *)tcp - data)) in test_pkt_access() [all …]
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | nvme-tcp.h | 3 * NVMe over Fabrics TCP protocol header. 55 * struct nvme_tcp_hdr - nvme tcp pdu common header 72 * struct nvme_tcp_icreq_pdu - nvme tcp initialize connection request pdu 90 * struct nvme_tcp_icresp_pdu - nvme tcp initialize connection response pdu 108 * struct nvme_tcp_term_pdu - nvme tcp terminate connection pdu 123 * struct nvme_tcp_cmd_pdu - nvme tcp command capsule pdu 134 * struct nvme_tcp_rsp_pdu - nvme tcp response capsule pdu 137 * @hdr: nvme-tcp generic header 146 * struct nvme_tcp_r2t_pdu - nvme tcp ready-to-transfer pdu 164 * struct nvme_tcp_data_pdu - nvme tcp data pdu
|
| /kernel/linux/linux-6.6/drivers/net/ethernet/mellanox/mlx5/core/en/tc/ |
| D | ct_fs_smfs.c | 47 mlx5_ct_fs_smfs_fill_mask(struct mlx5_ct_fs *fs, struct mlx5_flow_spec *spec, bool ipv4, bool tcp, in mlx5_ct_fs_smfs_fill_mask() argument 76 if (likely(tcp)) { in mlx5_ct_fs_smfs_fill_mask() 91 bool tcp, bool gre, u32 priority) in mlx5_ct_fs_smfs_matcher_create() argument 100 mlx5_ct_fs_smfs_fill_mask(fs, spec, ipv4, tcp, gre); in mlx5_ct_fs_smfs_matcher_create() 112 mlx5_ct_fs_smfs_matcher_get(struct mlx5_ct_fs *fs, bool nat, bool ipv4, bool tcp, bool gre) in mlx5_ct_fs_smfs_matcher_get() argument 123 smfs_matcher = &matchers->smfs_matchers[ipv4 * 3 + tcp * 2 + gre]; in mlx5_ct_fs_smfs_matcher_get() 149 dr_matcher = mlx5_ct_fs_smfs_matcher_create(fs, tbl, ipv4, tcp, gre, prio); in mlx5_ct_fs_smfs_matcher_get() 152 "ct_fs_smfs: failed to create matcher (nat %d, ipv4 %d, tcp %d, gre %d), err: %ld\n", in mlx5_ct_fs_smfs_matcher_get() 153 nat, ipv4, tcp, gre, PTR_ERR(dr_matcher)); in mlx5_ct_fs_smfs_matcher_get() 230 DISS_BIT(PORTS) | DISS_BIT(TCP); in mlx5_tc_ct_valid_used_dissector_keys() [all …]
|