| /OK3568_Linux_fs/kernel/include/net/ |
| H A D | request_sock.h | 86 reqsk_alloc(const struct request_sock_ops *ops, struct sock *sk_listener, in reqsk_alloc() argument 96 if (unlikely(!refcount_inc_not_zero(&sk_listener->sk_refcnt))) { in reqsk_alloc() 100 req->rsk_listener = sk_listener; in reqsk_alloc() 103 req_to_sk(req)->sk_prot = sk_listener->sk_prot; in reqsk_alloc()
|
| H A D | mptcp.h | 134 const struct sock *sk_listener, 206 const struct sock *sk_listener, in mptcp_subflow_init_cookie_req() argument
|
| H A D | inet_sock.h | 353 struct sock *sk_listener,
|
| H A D | tcp.h | 1448 const struct sock *sk_listener, 2037 const struct sock *sk_listener,
|
| H A D | sock.h | 2688 static inline bool sk_listener(const struct sock *sk) in sk_listener() function
|
| /OK3568_Linux_fs/kernel/net/mptcp/ |
| H A D | subflow.c | 95 static int __subflow_init_req(struct request_sock *req, const struct sock *sk_listener) in __subflow_init_req() argument 108 if (rcu_access_pointer(tcp_sk(sk_listener)->md5sig_info)) in __subflow_init_req() 116 const struct sock *sk_listener, in subflow_init_req() argument 119 struct mptcp_subflow_context *listener = mptcp_subflow_ctx(sk_listener); in subflow_init_req() 126 ret = __subflow_init_req(req, sk_listener); in subflow_init_req() 189 const struct sock *sk_listener, in mptcp_subflow_init_cookie_req() argument 192 struct mptcp_subflow_context *listener = mptcp_subflow_ctx(sk_listener); in mptcp_subflow_init_cookie_req() 197 err = __subflow_init_req(req, sk_listener); in mptcp_subflow_init_cookie_req() 232 const struct sock *sk_listener, in subflow_v4_init_req() argument 237 tcp_request_sock_ipv4_ops.init_req(req, sk_listener, skb); in subflow_v4_init_req() [all …]
|
| /OK3568_Linux_fs/kernel/net/ipv4/ |
| H A D | tcp_minisocks.c | 361 const struct sock *sk_listener, in tcp_openreq_init_rwin() argument 365 const struct tcp_sock *tp = tcp_sk(sk_listener); in tcp_openreq_init_rwin() 366 int full_space = tcp_full_space(sk_listener); in tcp_openreq_init_rwin() 378 if (sk_listener->sk_userlocks & SOCK_RCVBUF_LOCK && in tcp_openreq_init_rwin() 389 tcp_select_initial_window(sk_listener, full_space, in tcp_openreq_init_rwin()
|
| H A D | inet_connection_sock.c | 730 struct sock *sk_listener = req->rsk_listener; in reqsk_timer_handler() local 731 struct net *net = sock_net(sk_listener); in reqsk_timer_handler() 732 struct inet_connection_sock *icsk = inet_csk(sk_listener); in reqsk_timer_handler() 736 if (inet_sk_state_load(sk_listener) != TCP_LISTEN) in reqsk_timer_handler() 758 if ((qlen << 1) > max(8U, READ_ONCE(sk_listener->sk_max_ack_backlog))) { in reqsk_timer_handler() 773 !inet_rtx_syn_ack(sk_listener, req) || in reqsk_timer_handler() 784 inet_csk_reqsk_queue_drop_and_put(sk_listener, req); in reqsk_timer_handler()
|
| H A D | tcp_input.c | 6700 struct sock *sk_listener, in inet_reqsk_alloc() argument 6703 struct request_sock *req = reqsk_alloc(ops, sk_listener, in inet_reqsk_alloc() 6715 write_pnet(&ireq->ireq_net, sock_net(sk_listener)); in inet_reqsk_alloc() 6716 ireq->ireq_family = sk_listener->sk_family; in inet_reqsk_alloc()
|
| H A D | tcp_ipv4.c | 1451 const struct sock *sk_listener, in tcp_v4_init_req() argument 1455 struct net *net = sock_net(sk_listener); in tcp_v4_init_req()
|
| /OK3568_Linux_fs/kernel/net/ipv6/ |
| H A D | tcp_ipv6.c | 823 const struct sock *sk_listener, in tcp_v6_init_req() argument 828 const struct ipv6_pinfo *np = tcp_inet6_sk(sk_listener); in tcp_v6_init_req() 834 if ((!sk_listener->sk_bound_dev_if || l3_slave) && in tcp_v6_init_req() 839 (ipv6_opt_accepted(sk_listener, skb, &TCP_SKB_CB(skb)->header.h6) || in tcp_v6_init_req()
|
| /OK3568_Linux_fs/kernel/net/sched/ |
| H A D | sch_fq.c | 281 if (!sk || sk_listener(sk)) { in fq_classify()
|
| /OK3568_Linux_fs/kernel/security/selinux/ |
| H A D | hooks.c | 5689 if (sk_listener(sk)) in selinux_ip_output() 5806 !(sk && sk_listener(sk))) in selinux_ip_postroute() 5823 } else if (sk_listener(sk)) { in selinux_ip_postroute()
|