/linux-master/tools/testing/selftests/net/ |
H A D | tcp_fastopen_backup_key.c | 89 static void build_rcv_fd(int family, int proto, int *rcv_fds) argument 98 switch (family) { 100 addr4.sin_family = family; 114 error(1, 0, "Unsupported family %d", family); 124 rcv_fds[i] = socket(family, proto, 0); 141 static int connect_and_send(int family, int proto) argument 151 switch (family) { 158 if (!inet_pton(family, IP4_ADDR, &daddr4.sin_addr.s_addr)) 171 if (!inet_pton(family, IP6_ADD 240 run_one_test(int family) argument [all...] |
/linux-master/include/linux/ |
H A D | mroute_base.h | 52 unsigned short family, 61 .family = family, 74 unsigned short family, 83 .family = family, 180 unsigned short family, 187 .family = family, 198 unsigned short family, 51 mr_call_vif_notifier(struct notifier_block *nb, unsigned short family, enum fib_event_type event_type, struct vif_device *vif, struct net_device *vif_dev, unsigned short vif_index, u32 tb_id, struct netlink_ext_ack *extack) argument 73 mr_call_vif_notifiers(struct net *net, unsigned short family, enum fib_event_type event_type, struct vif_device *vif, struct net_device *vif_dev, unsigned short vif_index, u32 tb_id, unsigned int *ipmr_seq) argument 179 mr_call_mfc_notifier(struct notifier_block *nb, unsigned short family, enum fib_event_type event_type, struct mr_mfc *mfc, u32 tb_id, struct netlink_ext_ack *extack) argument 197 mr_call_mfc_notifiers(struct net *net, unsigned short family, enum fib_event_type event_type, struct mr_mfc *mfc, u32 tb_id, unsigned int *ipmr_seq) argument 359 mr_dump(struct net *net, struct notifier_block *nb, unsigned short family, int (*rules_dump)(struct net *net, struct notifier_block *nb, struct netlink_ext_ack *extack), struct mr_table *(*mr_iter)(struct net *net, struct mr_table *mrt), struct netlink_ext_ack *extack) argument [all...] |
/linux-master/net/netfilter/ |
H A D | nft_tproxy.c | 18 u8 family; member in struct:nft_tproxy 165 switch (priv->family) { 174 switch (priv->family) { 203 priv->family = ntohl(nla_get_be32(tb[NFTA_TPROXY_FAMILY])); 205 switch (ctx->family) { 207 if (priv->family != NFPROTO_IPV4) 212 if (priv->family != NFPROTO_IPV6) 222 /* Address is specified but the rule family is not set accordingly */ 223 if (priv->family == NFPROTO_UNSPEC && tb[NFTA_TPROXY_REG_ADDR]) 226 switch (priv->family) { [all...] |
H A D | nft_nat.c | 29 u8 family; member in struct:nft_nat 37 switch (priv->family) { 146 if (ctx->family != NFPROTO_IPV4 && 147 ctx->family != NFPROTO_IPV6 && 148 ctx->family != NFPROTO_INET) 176 u32 family; local 198 family = ntohl(nla_get_be32(tb[NFTA_NAT_FAMILY])); 199 if (ctx->family != NFPROTO_INET && ctx->family != family) [all...] |
H A D | xt_policy.c | 23 const union nf_inet_addr *a2, unsigned short family) 25 switch (family) { 36 unsigned short family) 39 (xt_addr_cmp(&e->x, &e->y, (const union nf_inet_addr *)(z), family) \ 53 unsigned short family) 71 if (match_xfrm_state(sp->xvec[i], e, family)) { 83 unsigned short family) 100 if (match_xfrm_state(dst->xfrm, e, family)) { 160 .family = NFPROTO_IPV4, 168 .family 22 xt_addr_cmp(const union nf_inet_addr *a1, const union nf_inet_addr *m, const union nf_inet_addr *a2, unsigned short family) argument 35 match_xfrm_state(const struct xfrm_state *x, const struct xt_policy_elem *e, unsigned short family) argument 52 match_policy_in(const struct sk_buff *skb, const struct xt_policy_info *info, unsigned short family) argument 82 match_policy_out(const struct sk_buff *skb, const struct xt_policy_info *info, unsigned short family) argument [all...] |
H A D | xt_cluster.c | 60 xt_cluster_is_multicast_addr(const struct sk_buff *skb, u_int8_t family) argument 64 switch(family) { 137 ret = nf_ct_netns_get(par->net, par->family); 140 par->family); 146 nf_ct_netns_put(par->net, par->family); 151 .family = NFPROTO_UNSPEC,
|
H A D | nft_compat.c | 44 if (ctx->family != NFPROTO_BRIDGE) 150 switch (ctx->family) { 181 par->family = ctx->family; 309 par.family = ctx->family; 360 if (ctx->family != NFPROTO_IPV4 && 361 ctx->family != NFPROTO_IPV6 && 362 ctx->family != NFPROTO_INET && 363 ctx->family ! 654 nfnl_compat_fill_info(struct sk_buff *skb, u32 portid, u32 seq, u32 type, int event, u16 family, const char *name, int rev, int target) argument 685 u8 family = info->nfmsg->nfgen_family; local 792 u32 rev, family; local 872 u32 rev, family; local [all...] |
H A D | xt_comment.c | 29 .family = NFPROTO_UNSPEC,
|
H A D | xt_dscp.c | 67 .family = NFPROTO_IPV4, 75 .family = NFPROTO_IPV6, 84 .family = NFPROTO_IPV4, 92 .family = NFPROTO_IPV6,
|
H A D | xt_connmark.c | 108 ret = nf_ct_netns_get(par->net, par->family); 111 par->family); 117 nf_ct_netns_put(par->net, par->family); 138 ret = nf_ct_netns_get(par->net, par->family); 141 par->family); 147 nf_ct_netns_put(par->net, par->family); 154 .family = NFPROTO_UNSPEC, 164 .family = NFPROTO_UNSPEC, 176 .family = NFPROTO_UNSPEC,
|
/linux-master/net/xfrm/ |
H A D | xfrm_state.c | 43 2. Hash table by (daddr,family,reqid) to find what SAs exist for given 62 unsigned short family) 64 return __xfrm_dst_hash(daddr, saddr, reqid, family, net->xfrm.state_hmask); 70 unsigned short family) 72 return __xfrm_src_hash(daddr, saddr, family, net->xfrm.state_hmask); 77 __be32 spi, u8 proto, unsigned short family) 79 return __xfrm_spi_hash(daddr, spi, proto, family, net->xfrm.state_hmask); 120 x->props.reqid, x->props.family, 125 x->props.family, 131 x->id.proto, x->props.family, 58 xfrm_dst_hash(struct net *net, const xfrm_address_t *daddr, const xfrm_address_t *saddr, u32 reqid, unsigned short family) argument 67 xfrm_src_hash(struct net *net, const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family) argument 76 xfrm_spi_hash(struct net *net, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family) argument 224 xfrm_register_type(const struct xfrm_type *type, unsigned short family) argument 270 xfrm_unregister_type(const struct xfrm_type *type, unsigned short family) argument 313 xfrm_get_type(u8 proto, unsigned short family) argument 369 xfrm_register_type_offload(const struct xfrm_type_offload *type, unsigned short family) argument 394 xfrm_unregister_type_offload(const struct xfrm_type_offload *type, unsigned short family) argument 416 xfrm_get_type_offload(u8 proto, unsigned short family, bool try_load) argument 491 xfrm_get_mode(unsigned int encap, int family) argument 939 xfrm_init_tempstate(struct xfrm_state *x, const struct flowi *fl, const struct xfrm_tmpl *tmpl, const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family) argument 977 __xfrm_state_lookup_all(struct net *net, u32 mark, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family, struct xfrm_dev_offload *xdo) argument 1020 __xfrm_state_lookup(struct net *net, u32 mark, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family) argument 1045 __xfrm_state_lookup_byaddr(struct net *net, u32 mark, const xfrm_address_t *daddr, const xfrm_address_t *saddr, u8 proto, unsigned short family) argument 1071 __xfrm_state_locate(struct xfrm_state *x, int use_spi, int family) argument 1094 xfrm_state_look_at(struct xfrm_policy *pol, struct xfrm_state *x, const struct flowi *fl, unsigned short family, struct xfrm_state **best, int *acq_in_progress, int *error) argument 1137 xfrm_state_find(const xfrm_address_t *daddr, const xfrm_address_t *saddr, const struct flowi *fl, struct xfrm_tmpl *tmpl, struct xfrm_policy *pol, int *err, unsigned short family, u32 if_id) argument 1362 xfrm_stateonly_find(struct net *net, u32 mark, u32 if_id, xfrm_address_t *daddr, xfrm_address_t *saddr, unsigned short family, u8 mode, u8 proto, u32 reqid) argument 1395 xfrm_state_lookup_byspi(struct net *net, __be32 spi, unsigned short family) argument 1461 unsigned short family = xnew->props.family; local 1492 __find_acq_core(struct net *net, const struct xfrm_mark *m, unsigned short family, u8 mode, u32 reqid, u32 if_id, u8 proto, const xfrm_address_t *daddr, const xfrm_address_t *saddr, int create) argument 1579 int family; local 1974 xfrm_state_lookup(struct net *net, u32 mark, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family) argument 1987 xfrm_state_lookup_byaddr(struct net *net, u32 mark, const xfrm_address_t *daddr, const xfrm_address_t *saddr, u8 proto, unsigned short family) argument 2001 xfrm_find_acq(struct net *net, const struct xfrm_mark *mark, u8 mode, u32 reqid, u32 if_id, u8 proto, const xfrm_address_t *daddr, const xfrm_address_t *saddr, int create, unsigned short family) argument 2113 xfrm_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n, unsigned short family) argument 2127 xfrm_state_sort(struct xfrm_state **dst, struct xfrm_state **src, int n, unsigned short family) argument 2697 int err = 0, family = afinfo->family; local 2715 xfrm_state_afinfo_get_rcu(unsigned int family) argument 2724 xfrm_state_get_afinfo(unsigned int family) argument 2795 int family = x->props.family; local 2974 xfrm_audit_helper_pktinfo(struct sk_buff *skb, u16 family, struct audit_buffer *audit_buf) argument 3061 xfrm_audit_state_notfound_simple(struct sk_buff *skb, u16 family) argument 3073 xfrm_audit_state_notfound(struct sk_buff *skb, u16 family, __be32 net_spi, __be32 net_seq) argument [all...] |
H A D | xfrm_policy.c | 79 * xfrm_pol_inexact_bin = hash(dir,type,family,if_id); 118 u16 family; member in struct:xfrm_pol_inexact_key 190 xfrm_policy_inexact_lookup(struct net *net, u8 type, u16 family, u8 dir, 195 u8 type, u16 family, u8 dir, u32 if_id); 240 unsigned short family) 242 switch (family) { 251 static const struct xfrm_policy_afinfo *xfrm_policy_get_afinfo(unsigned short family) argument 255 if (unlikely(family >= ARRAY_SIZE(xfrm_policy_afinfo))) 258 afinfo = rcu_dereference(xfrm_policy_afinfo[family]); 273 int family, u3 239 xfrm_selector_match(const struct xfrm_selector *sel, const struct flowi *fl, unsigned short family) argument 270 __xfrm_dst_lookup(struct net *net, int tos, int oif, const xfrm_address_t *saddr, const xfrm_address_t *daddr, int family, u32 mark) argument 290 xfrm_dst_lookup(struct xfrm_state *x, int tos, int oif, xfrm_address_t *prev_saddr, xfrm_address_t *prev_daddr, int family, u32 mark) argument 479 __get_hash_thresh(struct net *net, unsigned short family, int dir, u8 *dbits, u8 *sbits) argument 500 policy_hash_bysel(struct net *net, const struct xfrm_selector *sel, unsigned short family, int dir) argument 519 policy_hash_direct(struct net *net, const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family, int dir) argument 755 xfrm_pol_inexact_addr_use_any_list(const xfrm_address_t *addr, int family, u8 prefixlen) argument 810 xfrm_policy_addr_delta(const xfrm_address_t *a, const xfrm_address_t *b, u8 prefixlen, u16 family) argument 856 xfrm_policy_inexact_list_reinsert(struct net *net, struct xfrm_pol_inexact_node *n, u16 family) argument 919 xfrm_policy_inexact_node_reinsert(struct net *net, struct xfrm_pol_inexact_node *n, struct rb_root *new, u16 family) argument 977 xfrm_policy_inexact_node_merge(struct net *net, struct xfrm_pol_inexact_node *v, struct xfrm_pol_inexact_node *n, u16 family) argument 1006 xfrm_policy_inexact_insert_node(struct net *net, struct rb_root *root, xfrm_address_t *addr, u16 family, u8 prefixlen, u8 dir) argument 1984 xfrm_policy_match(const struct xfrm_policy *pol, const struct flowi *fl, u8 type, u16 family, u32 if_id) argument 2005 xfrm_policy_lookup_inexact_addr(const struct rb_root *r, seqcount_spinlock_t *count, const xfrm_address_t *addr, u16 family) argument 2048 u16 family; local 2076 xfrm_policy_inexact_lookup_rcu(struct net *net, u8 type, u16 family, u8 dir, u32 if_id) argument 2093 xfrm_policy_inexact_lookup(struct net *net, u8 type, u16 family, u8 dir, u32 if_id) argument 2108 __xfrm_policy_eval_candidates(struct hlist_head *chain, struct xfrm_policy *prefer, const struct flowi *fl, u8 type, u16 family, u32 if_id) argument 2147 xfrm_policy_eval_candidates(struct xfrm_pol_inexact_candidates *cand, struct xfrm_policy *prefer, const struct flowi *fl, u8 type, u16 family, u32 if_id) argument 2170 xfrm_policy_lookup_bytype(struct net *net, u8 type, const struct flowi *fl, u16 family, u8 dir, u32 if_id) argument 2238 xfrm_policy_lookup(struct net *net, const struct flowi *fl, u16 family, u8 dir, u32 if_id) argument 2254 xfrm_sk_policy_lookup(const struct sock *sk, int dir, const struct flowi *fl, u16 family, u32 if_id) argument 2444 xfrm_get_saddr(struct net *net, int oif, xfrm_address_t *local, xfrm_address_t *remote, unsigned short family, u32 mark) argument 2460 xfrm_tmpl_resolve_one(struct xfrm_policy *policy, const struct flowi *fl, struct xfrm_state **xfrm, unsigned short family) argument 2519 xfrm_tmpl_resolve(struct xfrm_policy **pols, int npols, const struct flowi *fl, struct xfrm_state **xfrm, unsigned short family) argument 2556 xfrm_get_tos(const struct flowi *fl, int family) argument 2564 xfrm_alloc_dst(struct net *net, int family) argument 2649 int family = policy->selector.family; local 2769 xfrm_expand_policies(const struct flowi *fl, u16 family, struct xfrm_policy **pols, int *num_pols, int *num_xfrms) argument 2818 xfrm_resolve_and_create_bundle(struct xfrm_policy **pols, int num_pols, const struct flowi *fl, u16 family, struct dst_entry *dst_orig) argument 2984 xfrm_create_dummy_bundle(struct net *net, struct xfrm_flo *xflo, const struct flowi *fl, int num_xfrms, u16 family) argument 3043 xfrm_bundle_lookup(struct net *net, const struct flowi *fl, u16 family, u8 dir, struct xfrm_flo *xflo, u32 if_id) argument 3106 make_blackhole(struct net *net, u16 family, struct dst_entry *dst_orig) argument 3140 u16 family = dst_orig->ops->family; local 3339 xfrm_state_ok(const struct xfrm_tmpl *tmpl, const struct xfrm_state *x, unsigned short family, u32 if_id) argument 3363 xfrm_policy_ok(const struct xfrm_tmpl *tmpl, const struct sec_path *sp, int start, unsigned short family, u32 if_id) argument 3459 __xfrm_decode_session(struct net *net, struct sk_buff *skb, struct flowi *fl, unsigned int family, int reverse) argument 3509 icmp_err_packet(const struct flowi *fl, unsigned short family) argument 3533 xfrm_icmp_flow_decode(struct sk_buff *skb, unsigned short family, const struct flowi *fl, struct flowi *fl1) argument 3563 xfrm_selector_inner_icmp_match(struct sk_buff *skb, unsigned short family, const struct xfrm_selector *sel, const struct flowi *fl) argument 3582 xfrm_in_fwd_icmp(struct sk_buff *skb, const struct flowi *fl, unsigned short family, u32 if_id) argument 3602 xfrm_out_fwd_icmp(struct sk_buff *skb, struct flowi *fl, unsigned short family, struct dst_entry *dst) argument 3631 __xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, unsigned short family) argument 3823 __xfrm_route_forward(struct sk_buff *skb, unsigned short family) argument 4061 xfrm_policy_register_afinfo(const struct xfrm_policy_afinfo *afinfo, int family) argument [all...] |
/linux-master/drivers/pinctrl/intel/ |
H A D | pinctrl-tangier.c | 71 const struct tng_family *family; local 75 family = &tp->families[i]; 76 if (pin >= family->pin_base && 77 pin < family->pin_base + family->npins) 78 return family; 81 dev_warn(tp->dev, "failed to find family for pin %u\n", pin); 87 const struct tng_family *family; local 89 family = tng_get_family(tp, pin); 90 if (!family) 98 const struct tng_family *family; local 553 struct tng_family *family = &families[i]; local [all...] |
/linux-master/include/net/ |
H A D | netlabel.h | 403 u16 family, 408 u16 family, 416 u16 family, 423 u16 family, 472 u16 family, 484 u16 family, 487 u16 family, 489 void netlbl_skbuff_err(struct sk_buff *skb, u16 family, int error, int gateway); 495 int netlbl_cache_add(const struct sk_buff *skb, u16 family, 505 u16 family, 504 netlbl_cfg_map_del(const char *domain, u16 family, const void *addr, const void *mask, struct netlbl_audit *audit_info) argument 512 netlbl_cfg_unlbl_map_add(const char *domain, u16 family, void *addr, void *mask, struct netlbl_audit *audit_info) argument 520 netlbl_cfg_unlbl_static_add(struct net *net, const char *dev_name, const void *addr, const void *mask, u16 family, u32 secid, struct netlbl_audit *audit_info) argument 530 netlbl_cfg_unlbl_static_del(struct net *net, const char *dev_name, const void *addr, const void *mask, u16 family, struct netlbl_audit *audit_info) argument 615 netlbl_sock_setattr(struct sock *sk, u16 family, const struct netlbl_lsm_secattr *secattr) argument 644 netlbl_skbuff_setattr(struct sk_buff *skb, u16 family, const struct netlbl_lsm_secattr *secattr) argument 650 netlbl_skbuff_getattr(const struct sk_buff *skb, u16 family, struct netlbl_lsm_secattr *secattr) argument 666 netlbl_cache_add(const struct sk_buff *skb, u16 family, const struct netlbl_lsm_secattr *secattr) argument [all...] |
H A D | ping.h | 41 sa_family_t family; member in struct:ping_iter_state 52 sa_family_t family; member in struct:pingfakehdr 69 int ping_common_sendmsg(int family, struct msghdr *msg, size_t len, 75 void *ping_seq_start(struct seq_file *seq, loff_t *pos, sa_family_t family);
|
/linux-master/tools/net/ynl/ |
H A D | ynl-gen-c.py | 45 def __init__(self, family, attr_set, attr, value): 46 super().__init__(family, attr_set, attr, value) 61 if self.nested_attrs == family.name: 62 self.nested_render_name = c_lower(f"{family.name}") 64 self.nested_render_name = c_lower(f"{family.name}_{self.nested_attrs}") 66 if self.nested_attrs in self.family.consts: 83 elif value in self.family.consts: 84 return c_upper(f"{self.family['name']}-{value}") 297 def __init__(self, family, attr_set, attr, value): 298 super().__init__(family, attr_se [all...] |
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | connect_force_port.c | 7 static int verify_ports(int family, int fd, argument 19 if (family == AF_INET) 35 if (family == AF_INET) 49 static int run_test(int cgroup_fd, int server_fd, int family, int type) argument 51 bool v4 = family == AF_INET; 124 err = verify_ports(family, fd, expected_local_port,
|
H A D | tcp_custom_syncookie.c | 15 int family, type; member in struct:test_tcp_custom_syncookie_case 21 .family = AF_INET, 27 .family = AF_INET6, 96 server = start_server(test_case->family, test_case->type, test_case->addr, 0, 0);
|
/linux-master/net/tipc/ |
H A D | addr.h | 51 unsigned short family; member in struct:tipc_uaddr 67 ua->family = AF_TIPC; 82 if (ua->family != AF_TIPC)
|
/linux-master/include/linux/netfilter/ |
H A D | nfnetlink_osf.h | 29 bool nf_osf_match(const struct sk_buff *skb, u_int8_t family,
|
H A D | nfnetlink.h | 67 static inline void nfnl_fill_hdr(struct nlmsghdr *nlh, u8 family, u8 version, argument 73 nfmsg->nfgen_family = family; 80 u8 family, u8 version, 89 nfnl_fill_hdr(nlh, family, version, res_id); 78 nfnl_msg_put(struct sk_buff *skb, u32 portid, u32 seq, int type, int flags, u8 family, u8 version, __be16 res_id) argument
|
/linux-master/drivers/pci/ |
H A D | pci-mid.c | 14 #include <asm/intel-family.h>
|
/linux-master/tools/perf/trace/beauty/ |
H A D | sockaddr.c | 51 char family[32]; local 54 strarray__scnprintf(&strarray__socket_families, family, sizeof(family), "%d", arg->show_string_prefix, sa->sa_family); 55 printed = scnprintf(bf, size, "{ .family: %s", family);
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | recvmsg4_prog.c | 25 if (sk->family != AF_INET)
|
/linux-master/security/apparmor/ |
H A D | net.c | 76 if (address_family_names[sa->u.net->family]) 77 audit_log_format(ab, " family=\"%s\"", 78 address_family_names[sa->u.net->family]); 80 audit_log_format(ab, " family=\"unknown(%d)\"", 81 sa->u.net->family); 110 struct apparmor_audit_data *ad, u32 request, u16 family, 119 AA_BUG(family >= AF_MAX); 128 buffer[0] = cpu_to_be16(family); 139 const char *op, u32 request, u16 family, int type, int protocol) 142 DEFINE_AUDIT_NET(ad, op, NULL, family, typ 109 aa_profile_af_perm(struct aa_profile *profile, struct apparmor_audit_data *ad, u32 request, u16 family, int type) argument 138 aa_af_perm(const struct cred *subj_cred, struct aa_label *label, const char *op, u32 request, u16 family, int type, int protocol) argument [all...] |