Searched refs:family (Results 51 - 75 of 975) sorted by relevance

1234567891011>>

/linux-master/tools/testing/selftests/bpf/prog_tests/
H A Dselect_reuseport.c49 sa_family_t family; member in union:sa46
140 static void sa46_init_loopback(union sa46 *sa, sa_family_t family) argument
143 sa->family = family;
144 if (sa->family == AF_INET6)
150 static void sa46_init_inany(union sa46 *sa, sa_family_t family) argument
153 sa->family = family;
154 if (sa->family == AF_INET6)
237 static void check_data(int type, sa_family_t family, cons argument
374 send_data(int type, sa_family_t family, void *data, size_t len, enum result expected) argument
396 do_test(int type, sa_family_t family, struct cmd *cmd, enum result expected) argument
454 test_err_inner_map(int type, sa_family_t family) argument
465 test_err_skb_data(int type, sa_family_t family) argument
471 test_err_sk_select_port(int type, sa_family_t family) argument
482 test_pass(int type, sa_family_t family) argument
495 test_syncookie(int type, sa_family_t family) argument
530 test_pass_on_err(int type, sa_family_t family) argument
541 test_detach_bpf(int type, sa_family_t family) argument
594 prepare_sk_fds(int type, sa_family_t family, bool inany) argument
668 setup_per_test(int type, sa_family_t family, bool inany, bool no_inner_map) argument
752 family_str(sa_family_t family) argument
778 test_config(int sotype, sa_family_t family, bool inany) argument
823 sa_family_t family; member in struct:config
[all...]
H A Dsockmap_helpers.h115 #define xsocket(family, sotype, flags) \
117 int __ret = socket(family, sotype, flags); \
275 static inline void init_addr_loopback(int family, struct sockaddr_storage *ss, argument
278 switch (family) {
289 FAIL("unsupported address family %d", family);
315 static inline int create_pair(int s, int family, int sotype, int *c, int *p) argument
326 *c = xsocket(family, sotype, 0);
346 static inline int create_socket_pairs(int s, int family, int sotype, argument
351 err = create_pair(s, family, sotyp
378 socket_loopback_reuseport(int family, int sotype, int progfd) argument
410 socket_loopback(int family, int sotype) argument
[all...]
H A Dconnect_ping.c21 int family, int do_bind)
36 switch (family) {
52 sock_fd = socket(family, SOCK_DGRAM, protocol);
59 if (!ASSERT_EQ(skel->bss->invocations_v4, family == AF_INET ? 1 : 0,
62 if (!ASSERT_EQ(skel->bss->invocations_v6, family == AF_INET6 ? 1 : 0,
72 switch (family) {
74 if (!ASSERT_EQ(sa4.sin_family, family, "sin_family"))
20 subtest(int cgroup_fd, struct connect_ping *skel, int family, int do_bind) argument
/linux-master/tools/testing/selftests/net/
H A Dbind_wildcard.c43 sa_family_t family[2]; local
63 .family = {AF_INET, AF_INET},
77 .family = {AF_INET, AF_INET},
92 .family = {AF_INET, AF_INET6},
106 .family = {AF_INET, AF_INET6},
121 .family = {AF_INET, AF_INET6},
135 .family = {AF_INET, AF_INET6},
149 .family = {AF_INET, AF_INET6},
163 .family = {AF_INET, AF_INET6},
177 .family
[all...]
H A Dreuseport_bpf_numa.c30 static void build_rcv_group(int *rcv_fd, size_t len, int family, int proto) argument
38 switch (family) {
52 error(1, 0, "Unsupported family %d", family);
56 rcv_fd[i] = socket(family, proto, 0);
107 static void send_from_node(int node_id, int family, int proto) argument
114 switch (family) {
138 error(1, 0, "Unsupported family %d", family);
144 fd = socket(family, prot
194 test(int *rcv_fd, int len, int family, int proto) argument
[all...]
/linux-master/include/net/
H A Daf_ieee802154.h41 sa_family_t family; /* AF_IEEE802154 */ member in struct:sockaddr_ieee802154
H A Dxfrm.h45 #define MODULE_ALIAS_XFRM_MODE(family, encap) \
46 MODULE_ALIAS("xfrm-mode-" __stringify(family) "-" __stringify(encap))
47 #define MODULE_ALIAS_XFRM_TYPE(family, proto) \
48 MODULE_ALIAS("xfrm-type-" __stringify(family) "-" __stringify(proto))
49 #define MODULE_ALIAS_XFRM_OFFLOAD_TYPE(family, proto) \
50 MODULE_ALIAS("xfrm-offload-" __stringify(family) "-" __stringify(proto))
159 u8 family; member in struct:xfrm_mode
206 u16 family; member in struct:xfrm_state::__anon2568
337 unsigned short family,
364 int xfrm_policy_register_afinfo(const struct xfrm_policy_afinfo *afinfo, int family);
377 u8 family; member in struct:xfrm_state_afinfo
402 u8 family; member in struct:xfrm_input_afinfo
446 xfrm_af2proto(unsigned int family) argument
547 u16 family; member in struct:xfrm_policy
565 u16 family; member in struct:xfrm_kmaddress
690 unsigned int family; member in struct:xfrm_spi_skb_cb
770 xfrm_audit_state_notfound_simple(struct sk_buff *skb, u16 family) argument
775 xfrm_audit_state_notfound(struct sk_buff *skb, u16 family, __be32 net_spi, __be32 net_seq) argument
1076 xfrm_addr_any(const xfrm_address_t *addr, unsigned short family) argument
1102 xfrm_state_addr_cmp(const struct xfrm_tmpl *tmpl, const struct xfrm_state *x, unsigned short family) argument
1149 __xfrm_check_dev_nopolicy(struct sk_buff *skb, int dir, unsigned short family) argument
1161 __xfrm_policy_check2(struct sock *sk, int dir, struct sk_buff *skb, unsigned int family, int reverse) argument
1185 xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, unsigned short family) argument
1215 xfrm_decode_session(struct net *net, struct sk_buff *skb, struct flowi *fl, unsigned int family) argument
1221 xfrm_decode_session_reverse(struct net *net, struct sk_buff *skb, struct flowi *fl, unsigned int family) argument
1230 xfrm_route_forward(struct sk_buff *skb, unsigned short family) argument
1297 xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, unsigned short family) argument
1301 xfrm_decode_session_reverse(struct net *net, struct sk_buff *skb, struct flowi *fl, unsigned int family) argument
1320 xfrm_flowi_daddr(const struct flowi *fl, unsigned short family) argument
1332 xfrm_flowi_saddr(const struct flowi *fl, unsigned short family) argument
1344 xfrm_flowi_addr_get(const struct flowi *fl, xfrm_address_t *saddr, xfrm_address_t *daddr, unsigned short family) argument
1383 xfrm_state_addr_check(const struct xfrm_state *x, const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family) argument
1397 xfrm_state_addr_flow_check(const struct xfrm_state *x, const struct flowi *fl, unsigned short family) argument
1614 xfrm_tmpl_sort(struct xfrm_tmpl **d, struct xfrm_tmpl **s, int n, unsigned short family) argument
1619 xfrm_state_sort(struct xfrm_state **d, struct xfrm_state **s, int n, unsigned short family) argument
1809 xfrm_addr_equal(const xfrm_address_t *a, const xfrm_address_t *b, sa_family_t family) argument
2107 xfrm_tunnel_check(struct sk_buff *skb, struct xfrm_state *x, unsigned int family) argument
[all...]
/linux-master/net/netfilter/
H A Dxt_helper.c59 ret = nf_ct_netns_get(par->net, par->family);
62 par->family);
71 nf_ct_netns_put(par->net, par->family);
77 .family = NFPROTO_UNSPEC,
H A Dxt_CONNSECMARK.c105 ret = nf_ct_netns_get(par->net, par->family);
108 par->family);
114 nf_ct_netns_put(par->net, par->family);
120 .family = NFPROTO_UNSPEC,
H A Dxt_NFLOG.c52 ret = nf_logger_find_get(par->family, NF_LOG_TYPE_ULOG);
56 ret = nf_logger_find_get(par->family, NF_LOG_TYPE_ULOG);
64 nf_logger_put(par->family, NF_LOG_TYPE_ULOG);
70 .family = NFPROTO_UNSPEC,
H A Dxt_MASQUERADE.c31 return nf_ct_netns_get(par->net, par->family);
51 nf_ct_netns_put(par->net, par->family);
68 return nf_ct_netns_get(par->net, par->family);
76 .family = NFPROTO_IPV6,
87 .family = NFPROTO_IPV4,
H A Dxt_REDIRECT.c41 return nf_ct_netns_get(par->net, par->family);
46 nf_ct_netns_put(par->net, par->family);
61 return nf_ct_netns_get(par->net, par->family);
80 .family = NFPROTO_IPV6,
93 .family = NFPROTO_IPV4,
H A Dxt_conntrack.c42 u_int8_t family)
45 &info->origsrc_addr, &info->origsrc_mask, family);
51 u_int8_t family)
54 &info->origdst_addr, &info->origdst_mask, family);
60 u_int8_t family)
63 &info->replsrc_addr, &info->replsrc_mask, family);
69 u_int8_t family)
72 &info->repldst_addr, &info->repldst_mask, family);
270 ret = nf_ct_netns_get(par->net, par->family);
273 par->family);
40 conntrack_mt_origsrc(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument
49 conntrack_mt_origdst(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument
58 conntrack_mt_replsrc(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument
67 conntrack_mt_repldst(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument
[all...]
/linux-master/include/linux/
H A Dsys_soc.h13 const char *family; member in struct:soc_device_attribute
/linux-master/arch/x86/kernel/
H A Dverify_cpu.S76 # family > 6 || (family == 6 && model >= 0xd)
77 movl $0x1, %eax # check CPU family and model
81 andl $0x0ff00f00, %eax # mask family and extended family
84 ja .Lverify_cpu_clear_xd # family > 6, ok
85 jb .Lverify_cpu_check # family < 6, skip
90 jb .Lverify_cpu_check # family == 6, model < 0xd, skip
/linux-master/arch/x86/boot/
H A Dcpuflags.h10 int family; /* Family, always */ member in struct:cpu_features
/linux-master/net/netlabel/
H A Dnetlabel_domainhash.h61 u16 family; member in struct:netlbl_dom_map
86 int netlbl_domhsh_remove(const char *domain, u16 family,
88 int netlbl_domhsh_remove_default(u16 family, struct netlbl_audit *audit_info);
89 struct netlbl_dom_map *netlbl_domhsh_getentry(const char *domain, u16 family);
H A Dnetlabel_domainhash.c127 * @family: the address family
131 * entry if found, otherwise NULL is returned. @family may be %AF_UNSPEC
132 * which matches any address family entries. The caller is responsible for
138 u16 family)
150 netlbl_family_match(iter->family, family) &&
161 * @family: the address family
167 * returned. @family ma
137 netlbl_domhsh_search(const char *domain, u16 family) argument
172 netlbl_domhsh_search_def(const char *domain, u16 family) argument
794 netlbl_domhsh_remove(const char *domain, u16 family, struct netlbl_audit *audit_info) argument
840 netlbl_domhsh_remove_default(u16 family, struct netlbl_audit *audit_info) argument
857 netlbl_domhsh_getentry(const char *domain, u16 family) argument
[all...]
/linux-master/net/ipv6/
H A Dfib6_notifier.c14 info->family = AF_INET6;
21 info->family = AF_INET6;
43 .family = AF_INET6,
/linux-master/arch/x86/kernel/cpu/
H A Dmatch.c15 * contains vendor (X86_VENDOR_*), family, model and feature bits or
43 m->vendor | m->family | m->model | m->steppings | m->feature;
47 if (m->family != X86_FAMILY_ANY && c->x86 != m->family)
/linux-master/net/ipv4/
H A Dfib_notifier.c15 info->family = AF_INET;
24 info->family = AF_INET;
49 .family = AF_INET,
/linux-master/tools/testing/selftests/netfilter/
H A Dnft_nat.sh176 local family=$1
180 if [ $family = "inet" ];then
185 table $family nat {
193 echo "SKIP: Could not add add $family dnat hook"
243 test $lret -eq 0 && echo "PASS: ipv6 ping to $ns1 was $family NATted to $ns2"
251 local family=$1
255 if [ $family = "inet" ];then
260 table $family nat {
268 if [ $family = "inet" ];then
273 echo "SKIP: Could not add add $family dna
[all...]
/linux-master/tools/testing/selftests/net/af_unix/
H A Dunix_connect.c18 int family; local
104 self->family = AF_UNIX;
120 .sun_family = self->family,
124 self->server = socket(self->family, variant->type, 0);
141 self->client = socket(self->family, variant->type, 0);
/linux-master/samples/bpf/
H A Dxdp_tx_iptunnel_user.c168 tnl.family = AF_UNSPEC;
176 unsigned short family; local
186 vip.family = parse_ipstr(optarg, vip.daddr.v6);
187 if (vip.family == AF_UNSPEC)
204 family = parse_ipstr(optarg, v6);
205 if (family == AF_UNSPEC)
207 if (tnl.family == AF_UNSPEC) {
208 tnl.family = family;
209 } else if (tnl.family !
[all...]
/linux-master/tools/power/cpupower/utils/helpers/
H A Dcpuid.c40 * Extract CPU vendor, family, model, stepping info from /proc/cpuinfo
57 cpu_info->family = unknown;
83 /* Get CPU family, etc. */
84 } else if (!strncmp(value, "cpu family\t: ", 13)) {
85 sscanf(value, "cpu family\t: %u",
86 &cpu_info->family);
96 cpu_info->family == unknown ||
135 if (cpu_info->family >= 0x17)
140 cpu_info->family != 0x14) {
141 /* HW pstate was not implemented in family
[all...]

Completed in 270 milliseconds

1234567891011>>