Searched refs:family (Results 76 - 100 of 975) sorted by relevance

1234567891011>>

/linux-master/tools/testing/selftests/net/
H A Dtcp_fastopen_backup_key.c89 static void build_rcv_fd(int family, int proto, int *rcv_fds) argument
98 switch (family) {
100 addr4.sin_family = family;
114 error(1, 0, "Unsupported family %d", family);
124 rcv_fds[i] = socket(family, proto, 0);
141 static int connect_and_send(int family, int proto) argument
151 switch (family) {
158 if (!inet_pton(family, IP4_ADDR, &daddr4.sin_addr.s_addr))
171 if (!inet_pton(family, IP6_ADD
240 run_one_test(int family) argument
[all...]
/linux-master/include/linux/
H A Dmroute_base.h52 unsigned short family,
61 .family = family,
74 unsigned short family,
83 .family = family,
180 unsigned short family,
187 .family = family,
198 unsigned short family,
51 mr_call_vif_notifier(struct notifier_block *nb, unsigned short family, enum fib_event_type event_type, struct vif_device *vif, struct net_device *vif_dev, unsigned short vif_index, u32 tb_id, struct netlink_ext_ack *extack) argument
73 mr_call_vif_notifiers(struct net *net, unsigned short family, enum fib_event_type event_type, struct vif_device *vif, struct net_device *vif_dev, unsigned short vif_index, u32 tb_id, unsigned int *ipmr_seq) argument
179 mr_call_mfc_notifier(struct notifier_block *nb, unsigned short family, enum fib_event_type event_type, struct mr_mfc *mfc, u32 tb_id, struct netlink_ext_ack *extack) argument
197 mr_call_mfc_notifiers(struct net *net, unsigned short family, enum fib_event_type event_type, struct mr_mfc *mfc, u32 tb_id, unsigned int *ipmr_seq) argument
359 mr_dump(struct net *net, struct notifier_block *nb, unsigned short family, int (*rules_dump)(struct net *net, struct notifier_block *nb, struct netlink_ext_ack *extack), struct mr_table *(*mr_iter)(struct net *net, struct mr_table *mrt), struct netlink_ext_ack *extack) argument
[all...]
/linux-master/net/netfilter/
H A Dnft_tproxy.c18 u8 family; member in struct:nft_tproxy
165 switch (priv->family) {
174 switch (priv->family) {
203 priv->family = ntohl(nla_get_be32(tb[NFTA_TPROXY_FAMILY]));
205 switch (ctx->family) {
207 if (priv->family != NFPROTO_IPV4)
212 if (priv->family != NFPROTO_IPV6)
222 /* Address is specified but the rule family is not set accordingly */
223 if (priv->family == NFPROTO_UNSPEC && tb[NFTA_TPROXY_REG_ADDR])
226 switch (priv->family) {
[all...]
H A Dnft_nat.c29 u8 family; member in struct:nft_nat
37 switch (priv->family) {
146 if (ctx->family != NFPROTO_IPV4 &&
147 ctx->family != NFPROTO_IPV6 &&
148 ctx->family != NFPROTO_INET)
176 u32 family; local
198 family = ntohl(nla_get_be32(tb[NFTA_NAT_FAMILY]));
199 if (ctx->family != NFPROTO_INET && ctx->family != family)
[all...]
H A Dxt_policy.c23 const union nf_inet_addr *a2, unsigned short family)
25 switch (family) {
36 unsigned short family)
39 (xt_addr_cmp(&e->x, &e->y, (const union nf_inet_addr *)(z), family) \
53 unsigned short family)
71 if (match_xfrm_state(sp->xvec[i], e, family)) {
83 unsigned short family)
100 if (match_xfrm_state(dst->xfrm, e, family)) {
160 .family = NFPROTO_IPV4,
168 .family
22 xt_addr_cmp(const union nf_inet_addr *a1, const union nf_inet_addr *m, const union nf_inet_addr *a2, unsigned short family) argument
35 match_xfrm_state(const struct xfrm_state *x, const struct xt_policy_elem *e, unsigned short family) argument
52 match_policy_in(const struct sk_buff *skb, const struct xt_policy_info *info, unsigned short family) argument
82 match_policy_out(const struct sk_buff *skb, const struct xt_policy_info *info, unsigned short family) argument
[all...]
H A Dxt_cluster.c60 xt_cluster_is_multicast_addr(const struct sk_buff *skb, u_int8_t family) argument
64 switch(family) {
137 ret = nf_ct_netns_get(par->net, par->family);
140 par->family);
146 nf_ct_netns_put(par->net, par->family);
151 .family = NFPROTO_UNSPEC,
H A Dnft_compat.c44 if (ctx->family != NFPROTO_BRIDGE)
150 switch (ctx->family) {
181 par->family = ctx->family;
309 par.family = ctx->family;
360 if (ctx->family != NFPROTO_IPV4 &&
361 ctx->family != NFPROTO_IPV6 &&
362 ctx->family != NFPROTO_INET &&
363 ctx->family !
654 nfnl_compat_fill_info(struct sk_buff *skb, u32 portid, u32 seq, u32 type, int event, u16 family, const char *name, int rev, int target) argument
685 u8 family = info->nfmsg->nfgen_family; local
792 u32 rev, family; local
872 u32 rev, family; local
[all...]
H A Dxt_comment.c29 .family = NFPROTO_UNSPEC,
H A Dxt_dscp.c67 .family = NFPROTO_IPV4,
75 .family = NFPROTO_IPV6,
84 .family = NFPROTO_IPV4,
92 .family = NFPROTO_IPV6,
H A Dxt_connmark.c108 ret = nf_ct_netns_get(par->net, par->family);
111 par->family);
117 nf_ct_netns_put(par->net, par->family);
138 ret = nf_ct_netns_get(par->net, par->family);
141 par->family);
147 nf_ct_netns_put(par->net, par->family);
154 .family = NFPROTO_UNSPEC,
164 .family = NFPROTO_UNSPEC,
176 .family = NFPROTO_UNSPEC,
/linux-master/net/xfrm/
H A Dxfrm_state.c43 2. Hash table by (daddr,family,reqid) to find what SAs exist for given
62 unsigned short family)
64 return __xfrm_dst_hash(daddr, saddr, reqid, family, net->xfrm.state_hmask);
70 unsigned short family)
72 return __xfrm_src_hash(daddr, saddr, family, net->xfrm.state_hmask);
77 __be32 spi, u8 proto, unsigned short family)
79 return __xfrm_spi_hash(daddr, spi, proto, family, net->xfrm.state_hmask);
120 x->props.reqid, x->props.family,
125 x->props.family,
131 x->id.proto, x->props.family,
58 xfrm_dst_hash(struct net *net, const xfrm_address_t *daddr, const xfrm_address_t *saddr, u32 reqid, unsigned short family) argument
67 xfrm_src_hash(struct net *net, const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family) argument
76 xfrm_spi_hash(struct net *net, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family) argument
224 xfrm_register_type(const struct xfrm_type *type, unsigned short family) argument
270 xfrm_unregister_type(const struct xfrm_type *type, unsigned short family) argument
313 xfrm_get_type(u8 proto, unsigned short family) argument
369 xfrm_register_type_offload(const struct xfrm_type_offload *type, unsigned short family) argument
394 xfrm_unregister_type_offload(const struct xfrm_type_offload *type, unsigned short family) argument
416 xfrm_get_type_offload(u8 proto, unsigned short family, bool try_load) argument
491 xfrm_get_mode(unsigned int encap, int family) argument
939 xfrm_init_tempstate(struct xfrm_state *x, const struct flowi *fl, const struct xfrm_tmpl *tmpl, const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family) argument
977 __xfrm_state_lookup_all(struct net *net, u32 mark, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family, struct xfrm_dev_offload *xdo) argument
1020 __xfrm_state_lookup(struct net *net, u32 mark, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family) argument
1045 __xfrm_state_lookup_byaddr(struct net *net, u32 mark, const xfrm_address_t *daddr, const xfrm_address_t *saddr, u8 proto, unsigned short family) argument
1071 __xfrm_state_locate(struct xfrm_state *x, int use_spi, int family) argument
1094 xfrm_state_look_at(struct xfrm_policy *pol, struct xfrm_state *x, const struct flowi *fl, unsigned short family, struct xfrm_state **best, int *acq_in_progress, int *error) argument
1137 xfrm_state_find(const xfrm_address_t *daddr, const xfrm_address_t *saddr, const struct flowi *fl, struct xfrm_tmpl *tmpl, struct xfrm_policy *pol, int *err, unsigned short family, u32 if_id) argument
1362 xfrm_stateonly_find(struct net *net, u32 mark, u32 if_id, xfrm_address_t *daddr, xfrm_address_t *saddr, unsigned short family, u8 mode, u8 proto, u32 reqid) argument
1395 xfrm_state_lookup_byspi(struct net *net, __be32 spi, unsigned short family) argument
1461 unsigned short family = xnew->props.family; local
1492 __find_acq_core(struct net *net, const struct xfrm_mark *m, unsigned short family, u8 mode, u32 reqid, u32 if_id, u8 proto, const xfrm_address_t *daddr, const xfrm_address_t *saddr, int create) argument
1579 int family; local
1974 xfrm_state_lookup(struct net *net, u32 mark, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family) argument
1987 xfrm_state_lookup_byaddr(struct net *net, u32 mark, const xfrm_address_t *daddr, const xfrm_address_t *saddr, u8 proto, unsigned short family) argument
2001 xfrm_find_acq(struct net *net, const struct xfrm_mark *mark, u8 mode, u32 reqid, u32 if_id, u8 proto, const xfrm_address_t *daddr, const xfrm_address_t *saddr, int create, unsigned short family) argument
2113 xfrm_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n, unsigned short family) argument
2127 xfrm_state_sort(struct xfrm_state **dst, struct xfrm_state **src, int n, unsigned short family) argument
2697 int err = 0, family = afinfo->family; local
2715 xfrm_state_afinfo_get_rcu(unsigned int family) argument
2724 xfrm_state_get_afinfo(unsigned int family) argument
2795 int family = x->props.family; local
2974 xfrm_audit_helper_pktinfo(struct sk_buff *skb, u16 family, struct audit_buffer *audit_buf) argument
3061 xfrm_audit_state_notfound_simple(struct sk_buff *skb, u16 family) argument
3073 xfrm_audit_state_notfound(struct sk_buff *skb, u16 family, __be32 net_spi, __be32 net_seq) argument
[all...]
H A Dxfrm_policy.c79 * xfrm_pol_inexact_bin = hash(dir,type,family,if_id);
118 u16 family; member in struct:xfrm_pol_inexact_key
190 xfrm_policy_inexact_lookup(struct net *net, u8 type, u16 family, u8 dir,
195 u8 type, u16 family, u8 dir, u32 if_id);
240 unsigned short family)
242 switch (family) {
251 static const struct xfrm_policy_afinfo *xfrm_policy_get_afinfo(unsigned short family) argument
255 if (unlikely(family >= ARRAY_SIZE(xfrm_policy_afinfo)))
258 afinfo = rcu_dereference(xfrm_policy_afinfo[family]);
273 int family, u3
239 xfrm_selector_match(const struct xfrm_selector *sel, const struct flowi *fl, unsigned short family) argument
270 __xfrm_dst_lookup(struct net *net, int tos, int oif, const xfrm_address_t *saddr, const xfrm_address_t *daddr, int family, u32 mark) argument
290 xfrm_dst_lookup(struct xfrm_state *x, int tos, int oif, xfrm_address_t *prev_saddr, xfrm_address_t *prev_daddr, int family, u32 mark) argument
479 __get_hash_thresh(struct net *net, unsigned short family, int dir, u8 *dbits, u8 *sbits) argument
500 policy_hash_bysel(struct net *net, const struct xfrm_selector *sel, unsigned short family, int dir) argument
519 policy_hash_direct(struct net *net, const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family, int dir) argument
755 xfrm_pol_inexact_addr_use_any_list(const xfrm_address_t *addr, int family, u8 prefixlen) argument
810 xfrm_policy_addr_delta(const xfrm_address_t *a, const xfrm_address_t *b, u8 prefixlen, u16 family) argument
856 xfrm_policy_inexact_list_reinsert(struct net *net, struct xfrm_pol_inexact_node *n, u16 family) argument
919 xfrm_policy_inexact_node_reinsert(struct net *net, struct xfrm_pol_inexact_node *n, struct rb_root *new, u16 family) argument
977 xfrm_policy_inexact_node_merge(struct net *net, struct xfrm_pol_inexact_node *v, struct xfrm_pol_inexact_node *n, u16 family) argument
1006 xfrm_policy_inexact_insert_node(struct net *net, struct rb_root *root, xfrm_address_t *addr, u16 family, u8 prefixlen, u8 dir) argument
1984 xfrm_policy_match(const struct xfrm_policy *pol, const struct flowi *fl, u8 type, u16 family, u32 if_id) argument
2005 xfrm_policy_lookup_inexact_addr(const struct rb_root *r, seqcount_spinlock_t *count, const xfrm_address_t *addr, u16 family) argument
2048 u16 family; local
2076 xfrm_policy_inexact_lookup_rcu(struct net *net, u8 type, u16 family, u8 dir, u32 if_id) argument
2093 xfrm_policy_inexact_lookup(struct net *net, u8 type, u16 family, u8 dir, u32 if_id) argument
2108 __xfrm_policy_eval_candidates(struct hlist_head *chain, struct xfrm_policy *prefer, const struct flowi *fl, u8 type, u16 family, u32 if_id) argument
2147 xfrm_policy_eval_candidates(struct xfrm_pol_inexact_candidates *cand, struct xfrm_policy *prefer, const struct flowi *fl, u8 type, u16 family, u32 if_id) argument
2170 xfrm_policy_lookup_bytype(struct net *net, u8 type, const struct flowi *fl, u16 family, u8 dir, u32 if_id) argument
2238 xfrm_policy_lookup(struct net *net, const struct flowi *fl, u16 family, u8 dir, u32 if_id) argument
2254 xfrm_sk_policy_lookup(const struct sock *sk, int dir, const struct flowi *fl, u16 family, u32 if_id) argument
2444 xfrm_get_saddr(struct net *net, int oif, xfrm_address_t *local, xfrm_address_t *remote, unsigned short family, u32 mark) argument
2460 xfrm_tmpl_resolve_one(struct xfrm_policy *policy, const struct flowi *fl, struct xfrm_state **xfrm, unsigned short family) argument
2519 xfrm_tmpl_resolve(struct xfrm_policy **pols, int npols, const struct flowi *fl, struct xfrm_state **xfrm, unsigned short family) argument
2556 xfrm_get_tos(const struct flowi *fl, int family) argument
2564 xfrm_alloc_dst(struct net *net, int family) argument
2649 int family = policy->selector.family; local
2769 xfrm_expand_policies(const struct flowi *fl, u16 family, struct xfrm_policy **pols, int *num_pols, int *num_xfrms) argument
2818 xfrm_resolve_and_create_bundle(struct xfrm_policy **pols, int num_pols, const struct flowi *fl, u16 family, struct dst_entry *dst_orig) argument
2984 xfrm_create_dummy_bundle(struct net *net, struct xfrm_flo *xflo, const struct flowi *fl, int num_xfrms, u16 family) argument
3043 xfrm_bundle_lookup(struct net *net, const struct flowi *fl, u16 family, u8 dir, struct xfrm_flo *xflo, u32 if_id) argument
3106 make_blackhole(struct net *net, u16 family, struct dst_entry *dst_orig) argument
3140 u16 family = dst_orig->ops->family; local
3339 xfrm_state_ok(const struct xfrm_tmpl *tmpl, const struct xfrm_state *x, unsigned short family, u32 if_id) argument
3363 xfrm_policy_ok(const struct xfrm_tmpl *tmpl, const struct sec_path *sp, int start, unsigned short family, u32 if_id) argument
3459 __xfrm_decode_session(struct net *net, struct sk_buff *skb, struct flowi *fl, unsigned int family, int reverse) argument
3509 icmp_err_packet(const struct flowi *fl, unsigned short family) argument
3533 xfrm_icmp_flow_decode(struct sk_buff *skb, unsigned short family, const struct flowi *fl, struct flowi *fl1) argument
3563 xfrm_selector_inner_icmp_match(struct sk_buff *skb, unsigned short family, const struct xfrm_selector *sel, const struct flowi *fl) argument
3582 xfrm_in_fwd_icmp(struct sk_buff *skb, const struct flowi *fl, unsigned short family, u32 if_id) argument
3602 xfrm_out_fwd_icmp(struct sk_buff *skb, struct flowi *fl, unsigned short family, struct dst_entry *dst) argument
3631 __xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, unsigned short family) argument
3823 __xfrm_route_forward(struct sk_buff *skb, unsigned short family) argument
4061 xfrm_policy_register_afinfo(const struct xfrm_policy_afinfo *afinfo, int family) argument
[all...]
/linux-master/drivers/pinctrl/intel/
H A Dpinctrl-tangier.c71 const struct tng_family *family; local
75 family = &tp->families[i];
76 if (pin >= family->pin_base &&
77 pin < family->pin_base + family->npins)
78 return family;
81 dev_warn(tp->dev, "failed to find family for pin %u\n", pin);
87 const struct tng_family *family; local
89 family = tng_get_family(tp, pin);
90 if (!family)
98 const struct tng_family *family; local
553 struct tng_family *family = &families[i]; local
[all...]
/linux-master/include/net/
H A Dnetlabel.h403 u16 family,
408 u16 family,
416 u16 family,
423 u16 family,
472 u16 family,
484 u16 family,
487 u16 family,
489 void netlbl_skbuff_err(struct sk_buff *skb, u16 family, int error, int gateway);
495 int netlbl_cache_add(const struct sk_buff *skb, u16 family,
505 u16 family,
504 netlbl_cfg_map_del(const char *domain, u16 family, const void *addr, const void *mask, struct netlbl_audit *audit_info) argument
512 netlbl_cfg_unlbl_map_add(const char *domain, u16 family, void *addr, void *mask, struct netlbl_audit *audit_info) argument
520 netlbl_cfg_unlbl_static_add(struct net *net, const char *dev_name, const void *addr, const void *mask, u16 family, u32 secid, struct netlbl_audit *audit_info) argument
530 netlbl_cfg_unlbl_static_del(struct net *net, const char *dev_name, const void *addr, const void *mask, u16 family, struct netlbl_audit *audit_info) argument
615 netlbl_sock_setattr(struct sock *sk, u16 family, const struct netlbl_lsm_secattr *secattr) argument
644 netlbl_skbuff_setattr(struct sk_buff *skb, u16 family, const struct netlbl_lsm_secattr *secattr) argument
650 netlbl_skbuff_getattr(const struct sk_buff *skb, u16 family, struct netlbl_lsm_secattr *secattr) argument
666 netlbl_cache_add(const struct sk_buff *skb, u16 family, const struct netlbl_lsm_secattr *secattr) argument
[all...]
H A Dping.h41 sa_family_t family; member in struct:ping_iter_state
52 sa_family_t family; member in struct:pingfakehdr
69 int ping_common_sendmsg(int family, struct msghdr *msg, size_t len,
75 void *ping_seq_start(struct seq_file *seq, loff_t *pos, sa_family_t family);
/linux-master/tools/net/ynl/
H A Dynl-gen-c.py45 def __init__(self, family, attr_set, attr, value):
46 super().__init__(family, attr_set, attr, value)
61 if self.nested_attrs == family.name:
62 self.nested_render_name = c_lower(f"{family.name}")
64 self.nested_render_name = c_lower(f"{family.name}_{self.nested_attrs}")
66 if self.nested_attrs in self.family.consts:
83 elif value in self.family.consts:
84 return c_upper(f"{self.family['name']}-{value}")
297 def __init__(self, family, attr_set, attr, value):
298 super().__init__(family, attr_se
[all...]
/linux-master/tools/testing/selftests/bpf/prog_tests/
H A Dconnect_force_port.c7 static int verify_ports(int family, int fd, argument
19 if (family == AF_INET)
35 if (family == AF_INET)
49 static int run_test(int cgroup_fd, int server_fd, int family, int type) argument
51 bool v4 = family == AF_INET;
124 err = verify_ports(family, fd, expected_local_port,
H A Dtcp_custom_syncookie.c15 int family, type; member in struct:test_tcp_custom_syncookie_case
21 .family = AF_INET,
27 .family = AF_INET6,
96 server = start_server(test_case->family, test_case->type, test_case->addr, 0, 0);
/linux-master/net/tipc/
H A Daddr.h51 unsigned short family; member in struct:tipc_uaddr
67 ua->family = AF_TIPC;
82 if (ua->family != AF_TIPC)
/linux-master/include/linux/netfilter/
H A Dnfnetlink_osf.h29 bool nf_osf_match(const struct sk_buff *skb, u_int8_t family,
H A Dnfnetlink.h67 static inline void nfnl_fill_hdr(struct nlmsghdr *nlh, u8 family, u8 version, argument
73 nfmsg->nfgen_family = family;
80 u8 family, u8 version,
89 nfnl_fill_hdr(nlh, family, version, res_id);
78 nfnl_msg_put(struct sk_buff *skb, u32 portid, u32 seq, int type, int flags, u8 family, u8 version, __be16 res_id) argument
/linux-master/drivers/pci/
H A Dpci-mid.c14 #include <asm/intel-family.h>
/linux-master/tools/perf/trace/beauty/
H A Dsockaddr.c51 char family[32]; local
54 strarray__scnprintf(&strarray__socket_families, family, sizeof(family), "%d", arg->show_string_prefix, sa->sa_family);
55 printed = scnprintf(bf, size, "{ .family: %s", family);
/linux-master/tools/testing/selftests/bpf/progs/
H A Drecvmsg4_prog.c25 if (sk->family != AF_INET)
/linux-master/security/apparmor/
H A Dnet.c76 if (address_family_names[sa->u.net->family])
77 audit_log_format(ab, " family=\"%s\"",
78 address_family_names[sa->u.net->family]);
80 audit_log_format(ab, " family=\"unknown(%d)\"",
81 sa->u.net->family);
110 struct apparmor_audit_data *ad, u32 request, u16 family,
119 AA_BUG(family >= AF_MAX);
128 buffer[0] = cpu_to_be16(family);
139 const char *op, u32 request, u16 family, int type, int protocol)
142 DEFINE_AUDIT_NET(ad, op, NULL, family, typ
109 aa_profile_af_perm(struct aa_profile *profile, struct apparmor_audit_data *ad, u32 request, u16 family, int type) argument
138 aa_af_perm(const struct cred *subj_cred, struct aa_label *label, const char *op, u32 request, u16 family, int type, int protocol) argument
[all...]

Completed in 261 milliseconds

1234567891011>>