| /linux/drivers/net/ovpn/ |
| H A D | socket.c | 27 if (sock->sk->sk_protocol == IPPROTO_UDP) in ovpn_socket_release_kref() 29 else if (sock->sk->sk_protocol == IPPROTO_TCP) in ovpn_socket_release_kref() 94 if (sock->sk->sk_protocol == IPPROTO_UDP) { in ovpn_socket_release() 96 } else if (sock->sk->sk_protocol == IPPROTO_TCP) { in ovpn_socket_release() 119 if (sock->sk->sk_protocol == IPPROTO_UDP) in ovpn_socket_attach() 121 else if (sock->sk->sk_protocol == IPPROTO_TCP) in ovpn_socket_attach() 145 if (sk->sk_protocol == IPPROTO_TCP && sk->sk_user_data) { in ovpn_socket_new() 153 if (sk->sk_protocol == IPPROTO_UDP) { in ovpn_socket_new() 206 if (sk->sk_protocol == IPPROTO_TCP) { in ovpn_socket_new() 210 } else if (sk->sk_protocol == IPPROTO_UDP) { in ovpn_socket_new() [all …]
|
| H A D | udp.c | 155 .flowi4_proto = sk->sk_protocol, in ovpn_udp4_output() 232 .flowi6_proto = sk->sk_protocol, in ovpn_udp6_output()
|
| H A D | io.c | 144 if (sock && sock->sk->sk_protocol == IPPROTO_UDP) in ovpn_decrypt_post() 280 switch (sock->sk->sk_protocol) { in ovpn_encrypt_post()
|
| /linux/drivers/isdn/mISDN/ |
| H A D | socket.c | 117 sk->sk_protocol); in mISDN_sock_recvmsg() 133 if ((sk->sk_protocol == ISDN_P_LAPD_TE) || in mISDN_sock_recvmsg() 134 (sk->sk_protocol == ISDN_P_LAPD_NT)) { in mISDN_sock_recvmsg() 176 sk->sk_protocol); in mISDN_sock_sendmsg() 209 if ((sk->sk_protocol == ISDN_P_LAPD_TE) || in mISDN_sock_sendmsg() 210 (sk->sk_protocol == ISDN_P_LAPD_NT)) in mISDN_sock_sendmsg() 244 switch (sk->sk_protocol) { in data_sock_release() 296 if ((sk->sk_protocol & ~ISDN_P_B_MASK) == ISDN_P_B_START) { in data_sock_ioctl_bound() 314 if (sk->sk_protocol != ISDN_P_LAPD_NT) { in data_sock_ioctl_bound() 327 if (sk->sk_protocol != ISDN_P_LAPD_NT in data_sock_ioctl_bound() [all …]
|
| /linux/net/netlink/ |
| H A D | af_netlink.c | 270 switch (sk->sk_protocol) { in netlink_filter_tap() 303 nskb->protocol = htons((u16) sk->sk_protocol); in __netlink_deliver_tap_skb() 531 struct netlink_table *tbl = &nl_table[sk->sk_protocol]; in netlink_update_listeners() 554 struct netlink_table *table = &nl_table[sk->sk_protocol]; in netlink_insert() 597 table = &nl_table[sk->sk_protocol]; in netlink_remove() 607 if (sk->sk_protocol == NETLINK_GENERIC) in netlink_remove() 640 sk->sk_protocol = protocol; in __netlink_create() 746 if (sk->sk_protocol == NETLINK_GENERIC && in netlink_release() 758 .protocol = sk->sk_protocol, in netlink_release() 778 BUG_ON(nl_table[sk->sk_protocol].registered == 0); in netlink_release() [all …]
|
| /linux/include/linux/ |
| H A D | sock_diag.h | 62 switch (sk->sk_protocol) { in sock_diag_destroy_group() 74 switch (sk->sk_protocol) { in sock_diag_destroy_group()
|
| /linux/include/trace/events/ |
| H A D | sock.h | 169 __entry->protocol = sk->sk_protocol; 217 __entry->protocol = sk->sk_protocol; 256 __entry->protocol = sk->sk_protocol; 284 __entry->protocol = sk->sk_protocol;
|
| /linux/drivers/net/ppp/ |
| H A D | pppox.c | 92 rc = pppox_protos[sk->sk_protocol]->ioctl ? in pppox_ioctl() 93 pppox_protos[sk->sk_protocol]->ioctl(sock, cmd, arg) : -ENOTTY; in pppox_ioctl()
|
| /linux/security/apparmor/include/ |
| H A D | net.h | 75 (SK)->sk_protocol) 108 sk->sk_type, sk->sk_protocol); in aa_profile_af_sk_perm()
|
| /linux/net/ipv6/ |
| H A D | ipv6_sockglue.c | 566 if (sk->sk_protocol == IPPROTO_UDP || in do_ipv6_setsockopt() 567 sk->sk_protocol == IPPROTO_UDPLITE) { in do_ipv6_setsockopt() 573 } else if (sk->sk_protocol == IPPROTO_TCP) { in do_ipv6_setsockopt() 596 if (sk->sk_protocol == IPPROTO_TCP) { in do_ipv6_setsockopt() 612 if (sk->sk_protocol == IPPROTO_UDPLITE) in do_ipv6_setsockopt() 1100 if (sk->sk_protocol != IPPROTO_UDP && in do_ipv6_getsockopt() 1101 sk->sk_protocol != IPPROTO_UDPLITE && in do_ipv6_getsockopt() 1102 sk->sk_protocol != IPPROTO_TCP) in do_ipv6_getsockopt()
|
| H A D | inet6_connection_sock.c | 68 fl6->flowi6_proto = sk->sk_protocol; in inet6_csk_route_socket()
|
| /linux/include/net/ |
| H A D | inet6_hashtables.h | 119 if (sk->sk_protocol == IPPROTO_TCP) { in inet6_steal_sock() 122 } else if (sk->sk_protocol == IPPROTO_UDP) { in inet6_steal_sock()
|
| H A D | inet_hashtables.h | 462 if (sk->sk_protocol == IPPROTO_TCP) { in inet_steal_sock() 465 } else if (sk->sk_protocol == IPPROTO_UDP) { in inet_steal_sock()
|
| /linux/net/mptcp/ |
| H A D | bpf.c | 17 if (sk && sk_fullsock(sk) && sk->sk_protocol == IPPROTO_TCP && sk_is_mptcp(sk)) in bpf_mptcp_sock_from_subflow()
|
| H A D | token_test.c | 66 sk->sk_protocol = IPPROTO_MPTCP; in build_msk()
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | cgroup_ancestor.c | 30 if (sk->sk_protocol == IPPROTO_UDP && sk->sk_dport == dport) { in log_cgroup_id()
|
| H A D | bpf_iter_netlink.c | 33 BPF_SEQ_PRINTF(seq, "%pK %-3d ", s, s->sk_protocol); in dump_netlink()
|
| H A D | setget_sockopt.c | 91 sk->sk_protocol == IPPROTO_TCP; in sk_is_tcp() 264 proto = sk->sk_protocol; in bpf_test_sockopt()
|
| /linux/kernel/bpf/ |
| H A D | reuseport_array.c | 200 if (nsk->sk_protocol != IPPROTO_UDP && nsk->sk_protocol != IPPROTO_TCP) in reuseport_array_update_check()
|
| /linux/net/smc/ |
| H A D | smc_diag.c | 47 if (sk->sk_protocol == SMCPROTO_SMC) { in smc_diag_msg_common_fill() 51 } else if (sk->sk_protocol == SMCPROTO_SMC6) { in smc_diag_msg_common_fill()
|
| /linux/security/tomoyo/ |
| H A D | network.c | 713 return tomoyo_check_inet_address(addr, addr_len, sock->sk->sk_protocol, 748 return tomoyo_check_inet_address(addr, addr_len, sock->sk->sk_protocol, 779 sock->sk->sk_protocol, &address);
|
| /linux/drivers/infiniband/hw/usnic/ |
| H A D | usnic_transport.c | 189 *proto = sock->sk->sk_protocol; in usnic_transport_sock_get_addr()
|
| /linux/net/ipv4/ |
| H A D | datagram.c | 50 sk->sk_protocol, inet->inet_sport, in __ip4_datagram_connect()
|
| H A D | inet_connection_sock.c | 684 if (sk->sk_protocol == IPPROTO_TCP && in inet_csk_accept() 774 sk->sk_protocol, inet_sk_flowi_flags(sk), in inet_csk_route_req() 811 sk->sk_protocol, inet_sk_flowi_flags(sk), in inet_csk_route_child_sock() 954 if (sk->sk_protocol == IPPROTO_TCP && tcp_rsk(nreq)->tfo_listener) in inet_reqsk_clone() 1367 if (sk->sk_protocol == IPPROTO_TCP && tcp_rsk(req)->tfo_listener) { in inet_child_forget()
|
| /linux/net/bluetooth/cmtp/ |
| H A D | sock.c | 222 sk->sk_protocol = protocol; in cmtp_sock_create()
|