/kernel/linux/linux-5.10/include/net/ |
H A D | tcp_states.h | 24 TCP_NEW_SYN_RECV, enumerator 45 TCPF_NEW_SYN_RECV = (1 << TCP_NEW_SYN_RECV),
|
H A D | inet_sock.h | 279 if (sk && sk->sk_state == TCP_NEW_SYN_RECV) in sk_to_full_sk() 289 if (sk && sk->sk_state == TCP_NEW_SYN_RECV) in sk_const_to_full_sk()
|
H A D | tcp.h | 1947 case TCP_NEW_SYN_RECV: in inet_sk_transparent()
|
/kernel/linux/linux-6.6/include/net/ |
H A D | tcp_states.h | 24 TCP_NEW_SYN_RECV, enumerator 45 TCPF_NEW_SYN_RECV = (1 << TCP_NEW_SYN_RECV),
|
H A D | inet_sock.h | 314 if (sk && sk->sk_state == TCP_NEW_SYN_RECV) in sk_to_full_sk() 324 if (sk && sk->sk_state == TCP_NEW_SYN_RECV) in sk_const_to_full_sk()
|
H A D | tcp.h | 2042 case TCP_NEW_SYN_RECV: in inet_sk_transparent()
|
/kernel/linux/linux-5.10/include/trace/events/ |
H A D | sock.h | 37 EMe(TCP_NEW_SYN_RECV)
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | dccp.h | 47 DCCP_NEW_SYN_RECV = TCP_NEW_SYN_RECV,
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | dccp.h | 47 DCCP_NEW_SYN_RECV = TCP_NEW_SYN_RECV,
|
/kernel/linux/linux-6.6/include/trace/events/ |
H A D | sock.h | 37 EMe(TCP_NEW_SYN_RECV)
|
/kernel/linux/linux-5.10/net/ipv4/ |
H A D | tcp_ipv4.c | 392 /* handle ICMP messages on TCP_NEW_SYN_RECV request sockets */ 499 if (sk->sk_state == TCP_NEW_SYN_RECV) { in tcp_v4_err() 1999 if (sk->sk_state == TCP_NEW_SYN_RECV) { in tcp_v4_rcv() 2684 else if (sk->sk_state == TCP_NEW_SYN_RECV) in tcp4_seq_show() 2724 } else if (sk->sk_state == TCP_NEW_SYN_RECV) { in bpf_iter_tcp_seq_show()
|
H A D | inet_diag.c | 497 if (sk->sk_state == TCP_NEW_SYN_RECV) in sk_diag_fill() 800 else if (sk->sk_state == TCP_NEW_SYN_RECV) in inet_diag_bc_sk()
|
H A D | inet_hashtables.c | 388 else if (sk->sk_state == TCP_NEW_SYN_RECV) in sock_gen_put()
|
H A D | tcp.c | 2429 BUILD_BUG_ON((int)BPF_TCP_NEW_SYN_RECV != (int)TCP_NEW_SYN_RECV); in tcp_set_state() 2483 [TCP_NEW_SYN_RECV] = TCP_CLOSE, /* should not happen ! */ 4278 if (sk->sk_state == TCP_NEW_SYN_RECV) { in tcp_abort()
|
/kernel/linux/linux-5.10/net/ipv6/ |
H A D | tcp_ipv6.c | 410 if (sk->sk_state == TCP_NEW_SYN_RECV) { in tcp_v6_err() 1652 if (sk->sk_state == TCP_NEW_SYN_RECV) { in tcp_v6_rcv() 2093 else if (sk->sk_state == TCP_NEW_SYN_RECV) in tcp6_seq_show()
|
/kernel/linux/linux-6.6/net/ipv6/ |
H A D | tcp_ipv6.c | 410 if (sk->sk_state == TCP_NEW_SYN_RECV) { in tcp_v6_err() 1637 if (sk->sk_state == TCP_NEW_SYN_RECV) { in tcp_v6_rcv() 2107 else if (sk->sk_state == TCP_NEW_SYN_RECV) in tcp6_seq_show()
|
/kernel/linux/linux-6.6/net/ipv4/ |
H A D | tcp_ipv4.c | 394 /* handle ICMP messages on TCP_NEW_SYN_RECV request sockets */ 500 if (sk->sk_state == TCP_NEW_SYN_RECV) { in tcp_v4_err() 2035 if (sk->sk_state == TCP_NEW_SYN_RECV) { in tcp_v4_rcv() 2753 else if (sk->sk_state == TCP_NEW_SYN_RECV) in tcp4_seq_show() 2991 } else if (sk->sk_state == TCP_NEW_SYN_RECV) { in bpf_iter_tcp_seq_show()
|
H A D | inet_diag.c | 503 if (sk->sk_state == TCP_NEW_SYN_RECV) in sk_diag_fill() 803 else if (sk->sk_state == TCP_NEW_SYN_RECV) in inet_diag_bc_sk()
|
H A D | inet_hashtables.c | 484 else if (sk->sk_state == TCP_NEW_SYN_RECV) in sock_gen_put()
|
H A D | tcp.c | 2618 BUILD_BUG_ON((int)BPF_TCP_NEW_SYN_RECV != (int)TCP_NEW_SYN_RECV); in tcp_set_state() 2683 [TCP_NEW_SYN_RECV] = TCP_CLOSE, /* should not happen ! */ 4563 if (state == TCP_NEW_SYN_RECV) { in tcp_abort()
|
/kernel/linux/common_modules/newip/third_party/linux-5.10/net/newip/ |
H A D | tcp_nip.c | 434 [TCP_NEW_SYN_RECV] = TCP_CLOSE, /* should not happen ! */ 1991 if (sk->sk_state == TCP_NEW_SYN_RECV) { in tcp_nip_rcv()
|
H A D | tcp_nip_input.c | 836 * Set the socket state to TCP_NEW_SYN_RECV 854 ireq->ireq_state = TCP_NEW_SYN_RECV; in ninet_reqsk_alloc() 2194 * This is different from the TCP_NEW_SYN_RECV control block created when syn was received.
|
/kernel/linux/linux-5.10/net/mptcp/ |
H A D | protocol.c | 1942 [TCP_NEW_SYN_RECV] = TCP_CLOSE, /* should not happen ! */
|
/kernel/linux/linux-5.10/net/core/ |
H A D | filter.c | 5170 if (sk->sk_state == TCP_NEW_SYN_RECV) in bpf_sock_ops_get_syn() 6602 /* sk_listener() allows TCP_NEW_SYN_RECV, which makes no sense here. */ in BPF_CALL_5() 10534 if (sk && sk->sk_prot == &tcp_prot && sk->sk_state == TCP_NEW_SYN_RECV) in BPF_CALL_1() 10539 if (sk && sk->sk_prot == &tcpv6_prot && sk->sk_state == TCP_NEW_SYN_RECV) in BPF_CALL_1()
|
/kernel/linux/linux-6.6/net/core/ |
H A D | filter.c | 5591 if (sk->sk_state == TCP_NEW_SYN_RECV) in bpf_sock_ops_get_syn() 7274 /* sk_listener() allows TCP_NEW_SYN_RECV, which makes no sense here. */ in BPF_CALL_5() 11664 if (sk && sk->sk_prot == &tcp_prot && sk->sk_state == TCP_NEW_SYN_RECV) in BPF_CALL_1() 11669 if (sk && sk->sk_prot == &tcpv6_prot && sk->sk_state == TCP_NEW_SYN_RECV) in BPF_CALL_1()
|