/net/ipv4/ |
D | tcp_fastopen.c | 112 struct sk_buff *syn, in __tcp_fastopen_cookie_gen_cipher() argument 119 const struct iphdr *iph = ip_hdr(syn); in __tcp_fastopen_cookie_gen_cipher() 130 const struct ipv6hdr *ip6h = ipv6_hdr(syn); in __tcp_fastopen_cookie_gen_cipher() 148 struct sk_buff *syn, in tcp_fastopen_cookie_gen() argument 156 __tcp_fastopen_cookie_gen_cipher(req, syn, &ctx->key[0], foc); in tcp_fastopen_cookie_gen() 206 struct sk_buff *syn, in tcp_fastopen_cookie_gen_check() argument 220 __tcp_fastopen_cookie_gen_cipher(req, syn, &ctx->key[i], foc); in tcp_fastopen_cookie_gen_check()
|
D | tcp_input.c | 324 if (th->ece && !th->syn && (tp->ecn_flags & TCP_ECN_OK)) in tcp_ecn_rcv_ecn_echo() 3387 if (likely(!tcp_hdr(skb)->syn)) in tcp_ack_update_window() 3447 !tcp_hdr(skb)->syn) in tcp_oow_rate_limited() 3761 bool syn, struct tcp_fastopen_cookie *foc, in tcp_parse_fastopen_option() argument 3765 if (!foc || !syn || len < 0 || (len & 1)) in tcp_parse_fastopen_option() 3784 if (th->syn && !(opsize & 1) && in smc_parse_options() 3871 if (opsize == TCPOLEN_MSS && th->syn && !estab) { in tcp_parse_options() 3882 if (opsize == TCPOLEN_WINDOW && th->syn && in tcp_parse_options() 3906 if (opsize == TCPOLEN_SACK_PERM && th->syn && in tcp_parse_options() 3931 ptr, th->syn, foc, false); in tcp_parse_options() [all …]
|
D | tcp_minisocks.c | 126 if (th->syn && !before(TCP_SKB_CB(skb)->seq, tcptw->tw_rcv_nxt)) in tcp_timewait_state_process() 218 if (th->syn && !th->rst && !th->ack && !paws_reject && in tcp_timewait_state_process()
|
D | tcp_output.c | 3328 th->syn = 1; in tcp_make_synack() 3476 static int tcp_send_syn_data(struct sock *sk, struct sk_buff *syn) in tcp_send_syn_data() argument 3505 memcpy(syn_data->cb, syn->cb, sizeof(syn->cb)); in tcp_send_syn_data() 3531 syn->skb_mstamp_ns = syn_data->skb_mstamp_ns; in tcp_send_syn_data() 3555 err = tcp_transmit_skb(sk, syn, 1, sk->sk_allocation); in tcp_send_syn_data()
|
D | tcp_ipv4.c | 693 rep.th.ack_seq = htonl(ntohl(th->seq) + th->syn + th->fin + in tcp_v4_send_reset() 1519 if (!th->syn) in tcp_v4_cookie_check() 1793 TCP_SKB_CB(skb)->end_seq = (TCP_SKB_CB(skb)->seq + th->syn + th->fin + in tcp_v4_fill_cb()
|
/net/ipv6/netfilter/ |
D | ip6t_SYNPROXY.c | 31 if (th->syn && !(th->ack || th->fin || th->rst)) { in synproxy_tg6() 52 } else if (th->ack && !(th->fin || th->rst || th->syn)) { in synproxy_tg6()
|
D | nf_tproxy_ipv6.c | 54 if (hp->syn && !hp->rst && !hp->ack && !hp->fin) { in nf_tproxy_handle_time_wait6()
|
D | nf_reject_ipv6.c | 107 tcph->ack_seq = htonl(ntohl(oth->seq) + oth->syn + oth->fin + in nf_reject_ip6_tcphdr_put()
|
/net/ipv4/netfilter/ |
D | ipt_SYNPROXY.c | 31 if (th->syn && !(th->ack || th->fin || th->rst)) { in synproxy_tg4() 51 } else if (th->ack && !(th->fin || th->rst || th->syn)) { in synproxy_tg4()
|
D | nf_tproxy_ipv4.c | 31 if (hp->syn && !hp->rst && !hp->ack && !hp->fin) { in nf_tproxy_handle_time_wait4()
|
D | nf_reject_ipv4.c | 84 tcph->ack_seq = htonl(ntohl(oth->seq) + oth->syn + oth->fin + in nf_reject_ip_tcphdr_put()
|
/net/netfilter/ |
D | nf_synproxy_core.c | 696 if (!th->syn || th->ack || in ipv4_synproxy_hook() 713 if (!th->syn && th->ack && in ipv4_synproxy_hook() 736 if (!th->syn || !th->ack) in ipv4_synproxy_hook() 1120 if (!th->syn || th->ack || in ipv6_synproxy_hook() 1137 if (!th->syn && th->ack && in ipv6_synproxy_hook() 1160 if (!th->syn || !th->ack) in ipv6_synproxy_hook()
|
D | nft_synproxy.c | 56 if (tcp->syn) { in nft_synproxy_eval_v4() 87 if (tcp->syn) { in nft_synproxy_eval_v6()
|
D | nf_conntrack_proto_tcp.c | 286 else if (tcph->syn) return (tcph->ack ? TCP_SYNACK_SET : TCP_SYN_SET); in get_conntrack_index() 329 + (tcph->syn ? 1 : 0) + (tcph->fin ? 1 : 0)); in segment_seq_plus_len() 512 if (tcph->syn) { in tcp_in_window() 618 if (!tcph->syn) in tcp_in_window() 1104 (th->syn ? 1 : 0), (th->ack ? 1 : 0), in nf_conntrack_tcp_packet()
|
D | nft_osf.c | 37 if (!tcp->syn) { in nft_osf_eval()
|
D | nf_log_common.c | 100 if (th->syn) in nf_log_dump_tcp_header()
|
D | nfnetlink_osf.c | 177 if (!tcp->syn) in nf_osf_hdr_ctx_init()
|
/net/netfilter/ipvs/ |
D | ip_vs_proto_tcp.c | 51 if (th->rst || !(sysctl_sloppy_tcp(ipvs) || th->syn)) in tcp_conn_schedule() 502 if (th->syn) in tcp_state_idx() 547 th->syn ? 'S' : '.', in set_tcp_state()
|
D | ip_vs_core.c | 1103 return th->syn; in is_new_conn()
|
/net/tipc/ |
D | socket.c | 1304 bool syn = !tipc_sk_type_connectionless(sk); in __tipc_sendmsg() local 1337 if (!syn && dest->family != AF_TIPC) in __tipc_sendmsg() 1341 if (unlikely(syn)) { in __tipc_sendmsg() 1399 if (unlikely(syn && !tipc_msg_skb_clone(&pkts, &sk->sk_write_queue))) { in __tipc_sendmsg() 1412 if (unlikely(syn && !rc)) in __tipc_sendmsg()
|
/net/ipv6/ |
D | tcp_ipv6.c | 986 ack_seq = ntohl(th->seq) + th->syn + th->fin + skb->len - in tcp_v6_send_reset() 1067 if (!th->syn) in tcp_v6_cookie_check() 1468 TCP_SKB_CB(skb)->end_seq = (TCP_SKB_CB(skb)->seq + th->syn + th->fin + in tcp_v6_fill_cb()
|
/net/core/ |
D | filter.c | 5811 if (!th->ack || th->rst || th->syn) in BPF_CALL_5() 5877 if (!th->syn || th->ack || th->fin || th->rst) in BPF_CALL_5()
|