/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | select_reuseport.c | 49 sa_family_t family; member in union:sa46 140 static void sa46_init_loopback(union sa46 *sa, sa_family_t family) argument 143 sa->family = family; 144 if (sa->family == AF_INET6) 150 static void sa46_init_inany(union sa46 *sa, sa_family_t family) argument 153 sa->family = family; 154 if (sa->family == AF_INET6) 237 static void check_data(int type, sa_family_t family, cons argument 374 send_data(int type, sa_family_t family, void *data, size_t len, enum result expected) argument 396 do_test(int type, sa_family_t family, struct cmd *cmd, enum result expected) argument 454 test_err_inner_map(int type, sa_family_t family) argument 465 test_err_skb_data(int type, sa_family_t family) argument 471 test_err_sk_select_port(int type, sa_family_t family) argument 482 test_pass(int type, sa_family_t family) argument 495 test_syncookie(int type, sa_family_t family) argument 530 test_pass_on_err(int type, sa_family_t family) argument 541 test_detach_bpf(int type, sa_family_t family) argument 594 prepare_sk_fds(int type, sa_family_t family, bool inany) argument 668 setup_per_test(int type, sa_family_t family, bool inany, bool no_inner_map) argument 752 family_str(sa_family_t family) argument 778 test_config(int sotype, sa_family_t family, bool inany) argument 823 sa_family_t family; member in struct:config [all...] |
H A D | sockmap_helpers.h | 115 #define xsocket(family, sotype, flags) \ 117 int __ret = socket(family, sotype, flags); \ 275 static inline void init_addr_loopback(int family, struct sockaddr_storage *ss, argument 278 switch (family) { 289 FAIL("unsupported address family %d", family); 315 static inline int create_pair(int s, int family, int sotype, int *c, int *p) argument 326 *c = xsocket(family, sotype, 0); 346 static inline int create_socket_pairs(int s, int family, int sotype, argument 351 err = create_pair(s, family, sotyp 378 socket_loopback_reuseport(int family, int sotype, int progfd) argument 410 socket_loopback(int family, int sotype) argument [all...] |
H A D | connect_ping.c | 21 int family, int do_bind) 36 switch (family) { 52 sock_fd = socket(family, SOCK_DGRAM, protocol); 59 if (!ASSERT_EQ(skel->bss->invocations_v4, family == AF_INET ? 1 : 0, 62 if (!ASSERT_EQ(skel->bss->invocations_v6, family == AF_INET6 ? 1 : 0, 72 switch (family) { 74 if (!ASSERT_EQ(sa4.sin_family, family, "sin_family")) 20 subtest(int cgroup_fd, struct connect_ping *skel, int family, int do_bind) argument
|
/linux-master/tools/testing/selftests/net/ |
H A D | bind_wildcard.c | 43 sa_family_t family[2]; local 63 .family = {AF_INET, AF_INET}, 77 .family = {AF_INET, AF_INET}, 92 .family = {AF_INET, AF_INET6}, 106 .family = {AF_INET, AF_INET6}, 121 .family = {AF_INET, AF_INET6}, 135 .family = {AF_INET, AF_INET6}, 149 .family = {AF_INET, AF_INET6}, 163 .family = {AF_INET, AF_INET6}, 177 .family [all...] |
H A D | reuseport_bpf_numa.c | 30 static void build_rcv_group(int *rcv_fd, size_t len, int family, int proto) argument 38 switch (family) { 52 error(1, 0, "Unsupported family %d", family); 56 rcv_fd[i] = socket(family, proto, 0); 107 static void send_from_node(int node_id, int family, int proto) argument 114 switch (family) { 138 error(1, 0, "Unsupported family %d", family); 144 fd = socket(family, prot 194 test(int *rcv_fd, int len, int family, int proto) argument [all...] |
/linux-master/include/net/ |
H A D | af_ieee802154.h | 41 sa_family_t family; /* AF_IEEE802154 */ member in struct:sockaddr_ieee802154
|
H A D | xfrm.h | 45 #define MODULE_ALIAS_XFRM_MODE(family, encap) \ 46 MODULE_ALIAS("xfrm-mode-" __stringify(family) "-" __stringify(encap)) 47 #define MODULE_ALIAS_XFRM_TYPE(family, proto) \ 48 MODULE_ALIAS("xfrm-type-" __stringify(family) "-" __stringify(proto)) 49 #define MODULE_ALIAS_XFRM_OFFLOAD_TYPE(family, proto) \ 50 MODULE_ALIAS("xfrm-offload-" __stringify(family) "-" __stringify(proto)) 159 u8 family; member in struct:xfrm_mode 206 u16 family; member in struct:xfrm_state::__anon2568 337 unsigned short family, 364 int xfrm_policy_register_afinfo(const struct xfrm_policy_afinfo *afinfo, int family); 377 u8 family; member in struct:xfrm_state_afinfo 402 u8 family; member in struct:xfrm_input_afinfo 446 xfrm_af2proto(unsigned int family) argument 547 u16 family; member in struct:xfrm_policy 565 u16 family; member in struct:xfrm_kmaddress 690 unsigned int family; member in struct:xfrm_spi_skb_cb 770 xfrm_audit_state_notfound_simple(struct sk_buff *skb, u16 family) argument 775 xfrm_audit_state_notfound(struct sk_buff *skb, u16 family, __be32 net_spi, __be32 net_seq) argument 1076 xfrm_addr_any(const xfrm_address_t *addr, unsigned short family) argument 1102 xfrm_state_addr_cmp(const struct xfrm_tmpl *tmpl, const struct xfrm_state *x, unsigned short family) argument 1149 __xfrm_check_dev_nopolicy(struct sk_buff *skb, int dir, unsigned short family) argument 1161 __xfrm_policy_check2(struct sock *sk, int dir, struct sk_buff *skb, unsigned int family, int reverse) argument 1185 xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, unsigned short family) argument 1215 xfrm_decode_session(struct net *net, struct sk_buff *skb, struct flowi *fl, unsigned int family) argument 1221 xfrm_decode_session_reverse(struct net *net, struct sk_buff *skb, struct flowi *fl, unsigned int family) argument 1230 xfrm_route_forward(struct sk_buff *skb, unsigned short family) argument 1297 xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, unsigned short family) argument 1301 xfrm_decode_session_reverse(struct net *net, struct sk_buff *skb, struct flowi *fl, unsigned int family) argument 1320 xfrm_flowi_daddr(const struct flowi *fl, unsigned short family) argument 1332 xfrm_flowi_saddr(const struct flowi *fl, unsigned short family) argument 1344 xfrm_flowi_addr_get(const struct flowi *fl, xfrm_address_t *saddr, xfrm_address_t *daddr, unsigned short family) argument 1383 xfrm_state_addr_check(const struct xfrm_state *x, const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family) argument 1397 xfrm_state_addr_flow_check(const struct xfrm_state *x, const struct flowi *fl, unsigned short family) argument 1614 xfrm_tmpl_sort(struct xfrm_tmpl **d, struct xfrm_tmpl **s, int n, unsigned short family) argument 1619 xfrm_state_sort(struct xfrm_state **d, struct xfrm_state **s, int n, unsigned short family) argument 1809 xfrm_addr_equal(const xfrm_address_t *a, const xfrm_address_t *b, sa_family_t family) argument 2107 xfrm_tunnel_check(struct sk_buff *skb, struct xfrm_state *x, unsigned int family) argument [all...] |
/linux-master/net/netfilter/ |
H A D | xt_helper.c | 59 ret = nf_ct_netns_get(par->net, par->family); 62 par->family); 71 nf_ct_netns_put(par->net, par->family); 77 .family = NFPROTO_UNSPEC,
|
H A D | xt_CONNSECMARK.c | 105 ret = nf_ct_netns_get(par->net, par->family); 108 par->family); 114 nf_ct_netns_put(par->net, par->family); 120 .family = NFPROTO_UNSPEC,
|
H A D | xt_NFLOG.c | 52 ret = nf_logger_find_get(par->family, NF_LOG_TYPE_ULOG); 56 ret = nf_logger_find_get(par->family, NF_LOG_TYPE_ULOG); 64 nf_logger_put(par->family, NF_LOG_TYPE_ULOG); 70 .family = NFPROTO_UNSPEC,
|
H A D | xt_MASQUERADE.c | 31 return nf_ct_netns_get(par->net, par->family); 51 nf_ct_netns_put(par->net, par->family); 68 return nf_ct_netns_get(par->net, par->family); 76 .family = NFPROTO_IPV6, 87 .family = NFPROTO_IPV4,
|
H A D | xt_REDIRECT.c | 41 return nf_ct_netns_get(par->net, par->family); 46 nf_ct_netns_put(par->net, par->family); 61 return nf_ct_netns_get(par->net, par->family); 80 .family = NFPROTO_IPV6, 93 .family = NFPROTO_IPV4,
|
H A D | xt_conntrack.c | 42 u_int8_t family) 45 &info->origsrc_addr, &info->origsrc_mask, family); 51 u_int8_t family) 54 &info->origdst_addr, &info->origdst_mask, family); 60 u_int8_t family) 63 &info->replsrc_addr, &info->replsrc_mask, family); 69 u_int8_t family) 72 &info->repldst_addr, &info->repldst_mask, family); 270 ret = nf_ct_netns_get(par->net, par->family); 273 par->family); 40 conntrack_mt_origsrc(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument 49 conntrack_mt_origdst(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument 58 conntrack_mt_replsrc(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument 67 conntrack_mt_repldst(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument [all...] |
/linux-master/include/linux/ |
H A D | sys_soc.h | 13 const char *family; member in struct:soc_device_attribute
|
/linux-master/arch/x86/kernel/ |
H A D | verify_cpu.S | 76 # family > 6 || (family == 6 && model >= 0xd) 77 movl $0x1, %eax # check CPU family and model 81 andl $0x0ff00f00, %eax # mask family and extended family 84 ja .Lverify_cpu_clear_xd # family > 6, ok 85 jb .Lverify_cpu_check # family < 6, skip 90 jb .Lverify_cpu_check # family == 6, model < 0xd, skip
|
/linux-master/arch/x86/boot/ |
H A D | cpuflags.h | 10 int family; /* Family, always */ member in struct:cpu_features
|
/linux-master/net/netlabel/ |
H A D | netlabel_domainhash.h | 61 u16 family; member in struct:netlbl_dom_map 86 int netlbl_domhsh_remove(const char *domain, u16 family, 88 int netlbl_domhsh_remove_default(u16 family, struct netlbl_audit *audit_info); 89 struct netlbl_dom_map *netlbl_domhsh_getentry(const char *domain, u16 family);
|
H A D | netlabel_domainhash.c | 127 * @family: the address family 131 * entry if found, otherwise NULL is returned. @family may be %AF_UNSPEC 132 * which matches any address family entries. The caller is responsible for 138 u16 family) 150 netlbl_family_match(iter->family, family) && 161 * @family: the address family 167 * returned. @family ma 137 netlbl_domhsh_search(const char *domain, u16 family) argument 172 netlbl_domhsh_search_def(const char *domain, u16 family) argument 794 netlbl_domhsh_remove(const char *domain, u16 family, struct netlbl_audit *audit_info) argument 840 netlbl_domhsh_remove_default(u16 family, struct netlbl_audit *audit_info) argument 857 netlbl_domhsh_getentry(const char *domain, u16 family) argument [all...] |
/linux-master/net/ipv6/ |
H A D | fib6_notifier.c | 14 info->family = AF_INET6; 21 info->family = AF_INET6; 43 .family = AF_INET6,
|
/linux-master/arch/x86/kernel/cpu/ |
H A D | match.c | 15 * contains vendor (X86_VENDOR_*), family, model and feature bits or 43 m->vendor | m->family | m->model | m->steppings | m->feature; 47 if (m->family != X86_FAMILY_ANY && c->x86 != m->family)
|
/linux-master/net/ipv4/ |
H A D | fib_notifier.c | 15 info->family = AF_INET; 24 info->family = AF_INET; 49 .family = AF_INET,
|
/linux-master/tools/testing/selftests/netfilter/ |
H A D | nft_nat.sh | 176 local family=$1 180 if [ $family = "inet" ];then 185 table $family nat { 193 echo "SKIP: Could not add add $family dnat hook" 243 test $lret -eq 0 && echo "PASS: ipv6 ping to $ns1 was $family NATted to $ns2" 251 local family=$1 255 if [ $family = "inet" ];then 260 table $family nat { 268 if [ $family = "inet" ];then 273 echo "SKIP: Could not add add $family dna [all...] |
/linux-master/tools/testing/selftests/net/af_unix/ |
H A D | unix_connect.c | 18 int family; local 104 self->family = AF_UNIX; 120 .sun_family = self->family, 124 self->server = socket(self->family, variant->type, 0); 141 self->client = socket(self->family, variant->type, 0);
|
/linux-master/samples/bpf/ |
H A D | xdp_tx_iptunnel_user.c | 168 tnl.family = AF_UNSPEC; 176 unsigned short family; local 186 vip.family = parse_ipstr(optarg, vip.daddr.v6); 187 if (vip.family == AF_UNSPEC) 204 family = parse_ipstr(optarg, v6); 205 if (family == AF_UNSPEC) 207 if (tnl.family == AF_UNSPEC) { 208 tnl.family = family; 209 } else if (tnl.family ! [all...] |
/linux-master/tools/power/cpupower/utils/helpers/ |
H A D | cpuid.c | 40 * Extract CPU vendor, family, model, stepping info from /proc/cpuinfo 57 cpu_info->family = unknown; 83 /* Get CPU family, etc. */ 84 } else if (!strncmp(value, "cpu family\t: ", 13)) { 85 sscanf(value, "cpu family\t: %u", 86 &cpu_info->family); 96 cpu_info->family == unknown || 135 if (cpu_info->family >= 0x17) 140 cpu_info->family != 0x14) { 141 /* HW pstate was not implemented in family [all...] |