/linux-master/net/ipv4/ |
H A D | xfrm4_state.c | 14 .family = AF_INET,
|
H A D | xfrm4_tunnel.c | 81 if (xfrm_register_type(&ipip_type, AF_INET) < 0) { 86 if (xfrm4_tunnel_register(&xfrm_tunnel_handler, AF_INET)) { 87 pr_info("%s: can't add xfrm handler for AF_INET\n", __func__); 88 xfrm_unregister_type(&ipip_type, AF_INET); 94 xfrm4_tunnel_deregister(&xfrm_tunnel_handler, AF_INET); 95 xfrm_unregister_type(&ipip_type, AF_INET); 109 if (xfrm4_tunnel_deregister(&xfrm_tunnel_handler, AF_INET)) 110 pr_info("%s: can't remove xfrm handler for AF_INET\n", 112 xfrm_unregister_type(&ipip_type, AF_INET); 119 MODULE_ALIAS_XFRM_TYPE(AF_INET, XFRM_PROTO_IPI [all...] |
H A D | fib_notifier.c | 15 info->family = AF_INET; 24 info->family = AF_INET; 49 .family = AF_INET,
|
H A D | netlink.c | 20 if (family != AF_INET)
|
/linux-master/tools/testing/selftests/netfilter/ |
H A D | connect_close.c | 42 int s = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); 53 int c, one = 1, s = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); 75 .sin_family = AF_INET, 79 inet_pton(AF_INET, "127.0.0.1", &src.sin_addr); 92 .sin_family = AF_INET, 96 inet_pton(AF_INET, "127.0.0.1", &dst.sin_addr);
|
/linux-master/tools/testing/selftests/net/ |
H A D | socket.c | 30 { AF_INET, SOCK_STREAM, IPPROTO_TCP, 0, 1 }, 31 { AF_INET, SOCK_DGRAM, IPPROTO_TCP, -EPROTONOSUPPORT, 1 }, 32 { AF_INET, SOCK_DGRAM, IPPROTO_UDP, 0, 1 }, 33 { AF_INET, SOCK_STREAM, IPPROTO_UDP, -EPROTONOSUPPORT, 1 },
|
H A D | bind_timewait.c | 32 self->addr.sin_family = AF_INET; 49 server_fd = socket(AF_INET, SOCK_STREAM, 0); 61 client_fd = socket(AF_INET, SOCK_STREAM, 0); 82 fd = socket(AF_INET, SOCK_STREAM, 0);
|
H A D | reuseport_dualstack.c | 4 * equivalent local addresses using AF_INET and AF_INET6 at the same time. If 7 * packets should prefer the AF_INET socket(s). This behavior was defined with 10 * This test creates these mixed AF_INET/AF_INET6 sockets and asserts the 11 * AF_INET preference for v4 packets. 39 case AF_INET: 41 addr4->sin_family = AF_INET; 78 saddr.sin_family = AF_INET; 82 daddr.sin_family = AF_INET; 86 fd = socket(AF_INET, proto, 0); 152 if (test_family != AF_INET) [all...] |
H A D | reuseport_bpf.c | 53 case AF_INET: 55 addr4->sin_family = AF_INET; 78 case AF_INET: 393 fd1 = socket(AF_INET, SOCK_DGRAM, 0); 396 fd2 = socket(AF_INET, SOCK_DGRAM, 0); 465 .recv_family = AF_INET, 466 .send_family = AF_INET, 472 .recv_family = AF_INET, 473 .send_family = AF_INET, 479 .recv_family = AF_INET, [all...] |
H A D | reuseport_addr_any.c | 45 case AF_INET: 111 case AF_INET: 112 saddr4.sin_family = AF_INET; 116 daddr4.sin_family = AF_INET; 233 build_rcv_fd(AF_INET, proto, rcv_fds, 2, NULL); 236 build_rcv_fd(AF_INET, proto, rcv_fds + 5, 2, NULL); 249 test_fd = socket(AF_INET, proto, 0); 261 run_one_test(AF_INET, AF_INET, proto, IP4_ADDR); 267 run_one_test(AF_INET, AF_INET [all...] |
H A D | so_netns_cookie.c | 30 sock1 = socket(AF_INET, SOCK_STREAM, 0); 44 sock2 = socket(AF_INET, SOCK_STREAM, 0);
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | mptcpify.c | 13 if ((family == AF_INET || family == AF_INET6) &&
|
H A D | bind_perm.c | 36 return bind_prog(ctx, AF_INET);
|
H A D | recvmsg4_prog.c | 25 if (sk->family != AF_INET)
|
/linux-master/tools/testing/selftests/net/tcp_ao/lib/ |
H A D | utils.c | 29 .sin_family = AF_INET,
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | udp_limit.c | 32 fd1 = socket(AF_INET, SOCK_DGRAM, 0); 36 fd2 = socket(AF_INET, SOCK_DGRAM, 0); 44 fd1 = socket(AF_INET, SOCK_DGRAM, 0);
|
H A D | connect_force_port.c | 19 if (family == AF_INET) 35 if (family == AF_INET) 51 bool v4 = family == AF_INET; 141 server_fd = start_server(AF_INET, SOCK_STREAM, NULL, 60123, 0); 144 CHECK_FAIL(run_test(cgroup_fd, server_fd, AF_INET, SOCK_STREAM)); 153 server_fd = start_server(AF_INET, SOCK_DGRAM, NULL, 60123, 0); 156 CHECK_FAIL(run_test(cgroup_fd, server_fd, AF_INET, SOCK_DGRAM));
|
H A D | connect_ping.c | 24 .sin_family = AF_INET, 37 case AF_INET: 59 if (!ASSERT_EQ(skel->bss->invocations_v4, family == AF_INET ? 1 : 0, 73 case AF_INET: 147 subtest(cgroup_fd, skel, AF_INET, 0); 154 subtest(cgroup_fd, skel, AF_INET, 1);
|
H A D | bind_perm.c | 31 if (family == AF_INET) { 79 try_bind(AF_INET, 110, EACCES); 82 try_bind(AF_INET, 111, 0);
|
H A D | xdp.c | 7 struct vip key4 = {.protocol = 6, .family = AF_INET}; 9 struct iptnl_info value4 = {.family = AF_INET};
|
/linux-master/samples/bpf/ |
H A D | test_probe_write_user_user.c | 59 assert((serverfd = socket(AF_INET, SOCK_STREAM, 0)) > 0); 60 assert((clientfd = socket(AF_INET, SOCK_STREAM, 0)) > 0); 64 serv_addr_in->sin_family = AF_INET; 76 mapped_addr_in->sin_family = AF_INET;
|
H A D | net_shared.h | 5 #define AF_INET 2 macro
|
H A D | tcp_tos_reflect_kern.c | 46 if (skops->family == AF_INET) 53 if (skops->family == AF_INET) {
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_lpm_map.c | 360 inet_pton(AF_INET, "192.168.0.0", key_ipv4->data); 365 inet_pton(AF_INET, "192.168.0.0", key_ipv4->data); 370 inet_pton(AF_INET, "192.168.128.0", key_ipv4->data); 375 inet_pton(AF_INET, "192.168.1.0", key_ipv4->data); 380 inet_pton(AF_INET, "192.168.0.0", key_ipv4->data); 393 inet_pton(AF_INET, "192.168.128.23", key_ipv4->data); 397 inet_pton(AF_INET, "192.168.0.1", key_ipv4->data); 410 inet_pton(AF_INET, "10.0.0.1", key_ipv4->data); 413 inet_pton(AF_INET, "11.11.11.11", key_ipv4->data); 453 inet_pton(AF_INET, "192.16 [all...] |
/linux-master/include/trace/events/ |
H A D | net_probe_common.h | 10 v4->sin_family = AF_INET; \ 14 v4->sin_family = AF_INET; \
|