/linux-master/drivers/net/arcnet/ |
H A D | rfc1051.c | 106 switch (soft->proto) { 172 soft->proto = ARC_P_IP_RFC1051; 175 soft->proto = ARC_P_ARP_RFC1051;
|
/linux-master/net/ipv6/ |
H A D | xfrm6_input.c | 202 NAPI_GRO_CB(skb)->proto = IPPROTO_UDP; 231 xfrm_address_t *saddr, u8 proto) 269 x = xfrm_state_lookup_byaddr(net, skb->mark, dst, src, proto, AF_INET6); 230 xfrm6_input_addr(struct sk_buff *skb, xfrm_address_t *daddr, xfrm_address_t *saddr, u8 proto) argument
|
H A D | ip6_vti.c | 303 if (t->parms.proto != IPPROTO_IPV6 && t->parms.proto != 0) { 562 if ((t->parms.proto != IPPROTO_IPV6 && t->parms.proto != 0) || 715 t->parms.proto = p->proto; 745 p->proto = u->proto; 762 u->proto = p->proto; [all...] |
/linux-master/drivers/net/ethernet/mscc/ |
H A D | ocelot_flower.c | 207 switch (ntohs(a->vlan.proto)) { 468 switch (ntohs(a->vlan.proto)) { 579 u16 proto = ntohs(f->common.protocol); local 682 filter->key.ipv4.proto.value[0] = 684 filter->key.ipv4.proto.mask[0] = 696 filter->key.ipv6.proto.value[0] = 698 filter->key.ipv6.proto.mask[0] = 705 proto == ETH_P_IP) { 738 proto == ETH_P_IPV6) { 760 if (match_protocol && proto ! [all...] |
H A D | ocelot_vcap.c | 491 struct ocelot_vcap_u8 proto, ds; local 499 proto = ipv4->proto; 520 proto = ipv6->proto; 564 val = proto.value[0]; 565 msk = proto.mask[0]; 613 proto.value, proto.mask); 719 struct ocelot_vcap_u8 proto local 1102 u16 proto, mask; local [all...] |
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | test_xdp_noinline.c | 119 __u8 proto; member in struct:flow_key 142 __u8 proto; member in struct:vip_definition 474 pckt->flow.proto = ip6h->nexthdr; 501 pckt->flow.proto = iph->protocol; 565 if (pckt->flow.proto == IPPROTO_UDP) 586 if (pckt->flow.proto == IPPROTO_UDP) { 616 pckt->flow.proto = *protocol; 648 pckt->flow.proto = *protocol; 693 protocol = pckt.flow.proto; 709 vip.proto [all...] |
H A D | test_l4lb.c | 134 __u8 proto; member in struct:packet_description 249 pckt->proto = ip6h->nexthdr; 274 pckt->proto = iph->protocol; 354 pckt.proto = protocol; 376 pckt.proto = protocol; 392 protocol = pckt.proto; 410 vip.protocol = pckt.proto;
|
H A D | test_l4lb_noinline.c | 130 __u8 proto; member in struct:packet_description 248 pckt->proto = ip6h->nexthdr; 273 pckt->proto = iph->protocol; 353 pckt.proto = protocol; 375 pckt.proto = protocol; 391 protocol = pckt.proto; 409 vip.protocol = pckt.proto;
|
H A D | test_l4lb_noinline_dynptr.c | 132 __u8 proto; member in struct:packet_description 252 pckt->proto = ip6h->nexthdr; 277 pckt->proto = iph->protocol; 360 pckt.proto = protocol; 382 pckt.proto = protocol; 398 protocol = pckt.proto; 416 vip.protocol = pckt.proto;
|
/linux-master/tools/testing/selftests/net/hsr/ |
H A D | hsr_ping.sh | 143 ip -net "$ns1" link add name hsr1 type hsr slave1 ns1eth1 slave2 ns1eth2 supervision 45 version $HSRv proto 0 144 ip -net "$ns2" link add name hsr2 type hsr slave1 ns2eth1 slave2 ns2eth2 supervision 45 version $HSRv proto 0 145 ip -net "$ns3" link add name hsr3 type hsr slave1 ns3eth1 slave2 ns3eth2 supervision 45 version $HSRv proto 0
|
/linux-master/include/scsi/ |
H A D | scsi_transport_sas.h | 24 static inline int sas_protocol_ata(enum sas_protocol proto) argument 26 return ((proto & SAS_PROTOCOL_SATA) || 27 (proto & SAS_PROTOCOL_STP))? 1 : 0;
|
/linux-master/tools/testing/selftests/net/ |
H A D | test_vxlan_mdb.sh | 355 run_cmd "bridge -n $ns1 -d -s mdb get dev vx0 $grp_key src_vni 10010 | grep \"proto static\"" 358 run_cmd "bridge -n $ns1 mdb replace dev vx0 port vx0 $grp_key permanent proto 123 dst $vtep_ip src_vni 10010" 359 run_cmd "bridge -n $ns1 -d -s mdb get dev vx0 $grp_key src_vni 10010 | grep \"proto 123\"" 413 run_cmd "bridge -n $ns1 mdb add dev vx0 port vx0 $grp_key permanent proto 3 dst $vtep_ip src_vni 10010" 617 run_cmd "bridge -n $ns1 -d -s mdb get dev vx0 grp $grp src_vni 10010 | grep \"proto static\"" 619 run_cmd "bridge -n $ns1 -d -s mdb get dev vx0 grp $grp src $src1 src_vni 10010 | grep \"proto static\"" 622 run_cmd "bridge -n $ns1 mdb replace dev vx0 port vx0 grp $grp permanent filter_mode exclude source_list $src1 proto bgp dst $vtep_ip src_vni 10010" 623 run_cmd "bridge -n $ns1 -d -s mdb get dev vx0 grp $grp src_vni 10010 | grep \"proto bgp\"" 625 run_cmd "bridge -n $ns1 -d -s mdb get dev vx0 grp $grp src $src1 src_vni 10010 | grep \"proto bgp\"" 988 run_cmd "bridge -n $ns1_v4 mdb add dev vx0 port vx0 grp 239.1.1.3 permanent proto bg [all...] |
H A D | pmtu.sh | 564 proto=${1} 571 [ ${proto} -eq 6 ] && vti_type="vti6" || vti_type="vti" 573 run_cmd ${ns_a} ip link add vti${proto}_a type ${vti_type} local ${veth_a_addr} remote ${veth_b_addr} key 10 || return 1 574 run_cmd ${ns_b} ip link add vti${proto}_b type ${vti_type} local ${veth_b_addr} remote ${veth_a_addr} key 10 576 run_cmd ${ns_a} ip addr add ${vti_a_addr}/${vti_mask} dev vti${proto}_a 577 run_cmd ${ns_b} ip addr add ${vti_b_addr}/${vti_mask} dev vti${proto}_b 579 run_cmd ${ns_a} ip link set vti${proto}_a up 580 run_cmd ${ns_b} ip link set vti${proto}_b up 667 proto=${1} 672 run_cmd ${ns_a} ip -${proto} xfr [all...] |
H A D | xfrm_policy.sh | 38 ip -net $ns xfrm policy add src $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow 40 ip -net $ns xfrm policy add src $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow 52 ip -net $ns xfrm state add src $remote dst $me proto esp spi $spi_in enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $rnet dst $lnet 53 ip -net $ns xfrm state add src $me dst $remote proto esp spi $spi_out enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $lnet dst $rnet 148 ip -net $ns xfrm policy add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow 272 ip -net ${ns[1]} xfrm policy update src e000:0001::0000 dst ff01::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break 275 ip -net ${ns[1]} xfrm policy update src e000:0001::0000 dst ff01::01 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break
|
/linux-master/net/netfilter/ |
H A D | nf_flow_table_offload.c | 82 u16 vlan_id, __be16 proto) 86 key->vlan_tpid = proto; 120 tuple->encap[0].proto == htons(ETH_P_8021Q)) { 124 tuple->encap[0].proto); 129 tuple->encap[1].proto == htons(ETH_P_8021Q)) { 135 tuple->encap[1].proto); 141 tuple->encap[1].proto); 650 if (tuple->encap[i].proto == htons(ETH_P_8021Q)) { 666 switch (other_tuple->encap[i].proto) { 674 entry->vlan.proto 80 nf_flow_rule_vlan_match(struct flow_dissector_key_vlan *key, struct flow_dissector_key_vlan *mask, u16 vlan_id, __be16 proto) argument 822 nf_flow_offload_init(struct flow_cls_offload *cls_flow, __be16 proto, int priority, enum flow_cls_command cmd, const struct flow_offload_tuple *tuple, struct netlink_ext_ack *extack) argument 846 __be16 proto = ETH_P_ALL; local [all...] |
H A D | nf_tables_offload.c | 135 flow->proto = ctx->dep.l3num; 190 __be16 proto, int priority, 193 common->protocol = proto; 249 __be16 proto = ETH_P_ALL; local 254 proto = flow->proto; 256 nft_flow_offload_common_init(&cls_flow->common, proto, 189 nft_flow_offload_common_init(struct flow_cls_common_offload *common, __be16 proto, int priority, struct netlink_ext_ack *extack) argument
|
/linux-master/drivers/net/ethernet/intel/ixgbe/ |
H A D | ixgbe_ipsec.c | 386 * @proto: protocol to match 393 __be32 *daddr, u8 proto, 408 proto == rsa->xs->id.proto) { 574 if (xs->id.proto != IPPROTO_ESP && xs->id.proto != IPPROTO_AH) { 614 if (rsa.xs->id.proto & IPPROTO_ESP) 686 if (rsa.xs->id.proto & IPPROTO_ESP) 724 if (xs->id.proto & IPPROTO_ESP) 931 xs->id.proto 392 ixgbe_ipsec_find_rx_state(struct ixgbe_ipsec *ipsec, __be32 *daddr, u8 proto, __be32 spi, bool ip4) argument 1179 u8 proto; local [all...] |
/linux-master/drivers/hwtracing/stm/ |
H A D | policy.c | 387 char *devname, *proto, *p; local 416 proto = strrchr(devname, ':'); 417 if (proto) 418 *proto++ = '\0'; 426 err = stm_lookup_protocol(proto, &pdrv, &pdrv_node_type);
|
/linux-master/drivers/net/ethernet/qlogic/qed/ |
H A D | qed_ooo.c | 80 enum protocol_type proto; local 87 proto = PROTOCOLID_TCP_ULP; 91 proto = PROTOCOLID_IWARP; 99 max_num_archipelagos = (u16)qed_cxt_get_proto_cid_count(p_hwfn, proto, 102 cid_base = (u16)qed_cxt_get_proto_cid_start(p_hwfn, proto);
|
/linux-master/include/net/bluetooth/ |
H A D | bluetooth.h | 402 int bt_sock_register(int proto, const struct net_proto_family *ops); 403 void bt_sock_unregister(int proto); 407 struct proto *prot, int proto, gfp_t prio, int kern); 661 void bt_sock_reclassify_lock(struct sock *sk, int proto);
|
/linux-master/drivers/gpu/drm/nouveau/nvkm/engine/disp/ |
H A D | uoutp.c | 395 switch (args->v0.proto) { 397 if (ior->arm.proto != TMDS) 401 if (ior->arm.proto != DP) 405 if (ior->arm.proto != LVDS) 409 if (ior->arm.proto != TV) 413 if (ior->arm.proto != CRT) 434 args->v0.proto = ior->arm.proto_evo; 612 args->v0.proto = NVIF_OUTP_V0_PROTO_RGB_CRT; 623 args->v0.proto = NVIF_OUTP_V0_PROTO_TMDS; 627 args->v0.proto [all...] |
/linux-master/drivers/firmware/efi/libstub/ |
H A D | gop.c | 465 find_gop(efi_guid_t *proto, unsigned long size, void **handles) argument 483 status = efi_bs_call(handle_protocol, h, proto, (void **)&gop); 514 static efi_status_t setup_gop(struct screen_info *si, efi_guid_t *proto, argument 521 gop = find_gop(proto, size, handles); 559 efi_status_t efi_setup_gop(struct screen_info *si, efi_guid_t *proto, argument 570 status = efi_bs_call(locate_handle, EFI_LOCATE_BY_PROTOCOL, proto, NULL, 575 status = setup_gop(si, proto, size, gop_handle);
|
/linux-master/tools/testing/selftests/drivers/net/mlxsw/ |
H A D | tc_restrictions.sh | 302 tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \ 318 tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \ 323 tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \ 328 tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \ 335 tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \ 342 tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \ 347 tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \
|
/linux-master/net/ipv4/ |
H A D | tcp_bpf.c | 597 static struct proto *tcpv6_prot_saved __read_mostly; 599 static struct proto tcp_bpf_prots[TCP_BPF_NUM_PROTS][TCP_BPF_NUM_CFGS]; 601 static void tcp_bpf_rebuild_protos(struct proto prot[TCP_BPF_NUM_CFGS], 602 struct proto *base) 620 static void tcp_bpf_check_v6_needs_rebuild(struct proto *ops) 639 static int tcp_bpf_assert_proto_ops(struct proto *ops) 660 /* TLS does not have an unhash proto in SW cases, 695 struct proto *prot = newsk->sk_prot;
|
/linux-master/net/xfrm/ |
H A D | espintcp.c | 399 static struct proto espintcp_prot __ro_after_init; 401 static struct proto espintcp6_prot; 448 static void build_protos(struct proto *espintcp_prot, 450 const struct proto *orig_prot, 566 static void build_protos(struct proto *espintcp_prot, 568 const struct proto *orig_prot, 571 memcpy(espintcp_prot, orig_prot, sizeof(struct proto));
|