Searched defs:family (Results 1 - 25 of 50) sorted by relevance

12

/net/ipv4/
H A Dtunnel4.c21 static inline struct xfrm_tunnel __rcu **fam_handlers(unsigned short family) argument
23 return (family == AF_INET) ? &tunnel4_handlers : &tunnel64_handlers;
26 int xfrm4_tunnel_register(struct xfrm_tunnel *handler, unsigned short family) argument
36 for (pprev = fam_handlers(family);
58 int xfrm4_tunnel_deregister(struct xfrm_tunnel *handler, unsigned short family) argument
66 for (pprev = fam_handlers(family);
H A Dinet_timewait_sock.c481 struct inet_timewait_death_row *twdr, int family)
495 if ((tw->tw_family != family) ||
502 if (unlikely((tw->tw_family != family) ||
480 inet_twsk_purge(struct inet_hashinfo *hashinfo, struct inet_timewait_death_row *twdr, int family) argument
H A Dinet_diag.c45 u16 family; member in struct:inet_diag_entry
116 * hence this needs to be included regardless of socket family.
445 if (cond->family != AF_UNSPEC &&
446 cond->family != entry->family) {
447 if (entry->family == AF_INET6 &&
448 cond->family == AF_INET) {
489 entry.family = sk->sk_family;
491 if (entry.family == AF_INET6) {
540 /* Check address family an
[all...]
H A Dinetpeer.c97 static atomic_t *inetpeer_seq_ptr(int family) argument
99 return (family == AF_INET ? &v4_seq : &v6_seq);
102 static inline void flush_check(struct inet_peer_base *base, int family) argument
104 atomic_t *fp = inetpeer_seq_ptr(family);
112 void inetpeer_invalidate_family(int family) argument
114 atomic_t *fp = inetpeer_seq_ptr(family);
203 int i, n = (a->family == AF_INET ? 1 : 4);
468 flush_check(base, daddr->family);
508 (daddr->family == AF_INET) ?
/net/ipv6/
H A Dtunnel6.c39 int xfrm6_tunnel_register(struct xfrm6_tunnel *handler, unsigned short family) argument
48 for (pprev = (family == AF_INET6) ? &tunnel6_handlers : &tunnel46_handlers;
71 int xfrm6_tunnel_deregister(struct xfrm6_tunnel *handler, unsigned short family) argument
79 for (pprev = (family == AF_INET6) ? &tunnel6_handlers : &tunnel46_handlers;
/net/netfilter/
H A Dxt_cluster.c69 xt_cluster_is_multicast_addr(const struct sk_buff *skb, u_int8_t family) argument
73 switch(family) {
114 if (!xt_cluster_is_multicast_addr(skb, par->family) &&
155 .family = NFPROTO_UNSPEC,
H A Dxt_ipvs.c51 /* ipvs_mt_check ensures that family is only NFPROTO_IPV[46]. */
52 const u_int8_t family = par->family; local
70 ip_vs_fill_iph_skb(family, skb, &iph);
88 cp = pp->conn_out_get(family, skb, &iph, 1 /* inverse */);
139 &data->vmask, family) ^
155 if (par->family != NFPROTO_IPV4
157 && par->family != NFPROTO_IPV6
160 pr_info("protocol family %u not supported\n", par->family);
[all...]
H A Dxt_policy.c26 const union nf_inet_addr *a2, unsigned short family)
28 switch (family) {
39 unsigned short family)
42 (xt_addr_cmp(&e->x, &e->y, (const union nf_inet_addr *)(z), family) \
56 unsigned short family)
74 if (match_xfrm_state(sp->xvec[i], e, family)) {
86 unsigned short family)
102 if (match_xfrm_state(dst->xfrm, e, family)) {
119 ret = match_policy_in(skb, info, par->family);
121 ret = match_policy_out(skb, info, par->family);
25 xt_addr_cmp(const union nf_inet_addr *a1, const union nf_inet_addr *m, const union nf_inet_addr *a2, unsigned short family) argument
38 match_xfrm_state(const struct xfrm_state *x, const struct xt_policy_elem *e, unsigned short family) argument
55 match_policy_in(const struct sk_buff *skb, const struct xt_policy_info *info, unsigned short family) argument
85 match_policy_out(const struct sk_buff *skb, const struct xt_policy_info *info, unsigned short family) argument
[all...]
H A Dxt_conntrack.c45 u_int8_t family)
48 &info->origsrc_addr, &info->origsrc_mask, family);
54 u_int8_t family)
57 &info->origdst_addr, &info->origdst_mask, family);
63 u_int8_t family)
66 &info->replsrc_addr, &info->replsrc_mask, family);
72 u_int8_t family)
75 &info->repldst_addr, &info->repldst_mask, family);
203 if (conntrack_mt_origsrc(ct, info, par->family) ^
208 if (conntrack_mt_origdst(ct, info, par->family)
43 conntrack_mt_origsrc(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument
52 conntrack_mt_origdst(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument
61 conntrack_mt_replsrc(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument
70 conntrack_mt_repldst(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument
[all...]
H A Dxt_TCPMSS.c140 if (par->family == NFPROTO_IPV4)
165 unsigned int family)
172 if (family == PF_INET) {
183 ai = nf_get_afinfo(family);
304 .family = NFPROTO_IPV4,
314 .family = NFPROTO_IPV6,
164 tcpmss_reverse_mtu(const struct sk_buff *skb, unsigned int family) argument
H A Dxt_connlimit.c78 const union nf_inet_addr *u3, u_int8_t family)
80 if (family == NFPROTO_IPV4) {
100 u_int8_t family)
110 if (family == NFPROTO_IPV6)
154 if (same_source_net(addr, mask, &conn->addr, family))
192 par->family, &tuple))
195 if (par->family == NFPROTO_IPV6) {
207 &info->mask, par->family);
236 ret = nf_ct_l3proto_try_module_get(par->family);
239 "address family
76 same_source_net(const union nf_inet_addr *addr, const union nf_inet_addr *mask, const union nf_inet_addr *u3, u_int8_t family) argument
95 count_them(struct net *net, struct xt_connlimit_data *data, const struct nf_conntrack_tuple *tuple, const union nf_inet_addr *addr, const union nf_inet_addr *mask, u_int8_t family) argument
[all...]
H A Dnf_conntrack_expect.c247 u_int8_t family,
254 if (family == AF_INET)
263 exp->tuple.src.l3num = family;
246 nf_ct_expect_init(struct nf_conntrack_expect *exp, unsigned int class, u_int8_t family, const union nf_inet_addr *saddr, const union nf_inet_addr *daddr, u_int8_t proto, const __be16 *src, const __be16 *dst) argument
H A Dnf_nat_core.c42 __nf_nat_l3proto_find(u8 family) argument
44 return rcu_dereference(nf_nat_l3protos[family]);
48 __nf_nat_l4proto_find(u8 family, u8 protonum) argument
50 return rcu_dereference(nf_nat_l4protos[family][protonum]);
62 u8 family; local
68 family = ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.l3num;
70 l3proto = __nf_nat_l3proto_find(family);
85 int nf_xfrm_me_harder(struct sk_buff *skb, unsigned int family) argument
92 err = xfrm_decode_session(skb, &fl, family);
H A Dxt_recent.c69 u_int16_t family; member in struct:recent_entry
123 const union nf_inet_addr *addrp, u_int16_t family,
129 if (family == NFPROTO_IPV4)
135 if (e->family == family &&
171 u_int16_t family, u_int8_t ttl)
188 e->family = family;
189 if (family == NFPROTO_IPV4)
240 if (par->family
122 recent_entry_lookup(const struct recent_table *table, const union nf_inet_addr *addrp, u_int16_t family, u_int8_t ttl) argument
170 recent_entry_init(struct recent_table *t, const union nf_inet_addr *addr, u_int16_t family, u_int8_t ttl) argument
546 u_int16_t family; local
[all...]
/net/xfrm/
H A Dxfrm_hash.h33 u32 reqid, unsigned short family,
36 unsigned int h = family ^ reqid;
37 switch (family) {
50 unsigned short family,
53 unsigned int h = family;
54 switch (family) {
67 unsigned short family, unsigned int hmask)
70 switch (family) {
87 unsigned short family, unsigned int hmask)
93 switch (family) {
31 __xfrm_dst_hash(const xfrm_address_t *daddr, const xfrm_address_t *saddr, u32 reqid, unsigned short family, unsigned int hmask) argument
48 __xfrm_src_hash(const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family, unsigned int hmask) argument
66 __xfrm_spi_hash(const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family, unsigned int hmask) argument
86 __sel_hash(const struct xfrm_selector *sel, unsigned short family, unsigned int hmask) argument
114 __addr_hash(const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family, unsigned int hmask) argument
[all...]
H A Dxfrm_input.c94 if (x->sel.family == AF_UNSPEC) {
114 unsigned int family; local
142 family = XFRM_SPI_SKB_CB(skb)->family;
156 x = xfrm_state_lookup(net, skb->mark, daddr, spi, nexthdr, family);
159 xfrm_audit_state_notfound(skb, family, spi, seq);
231 if (x->sel.family == AF_UNSPEC) {
252 family = x->outer_mode->afinfo->family;
/net/core/
H A Ddev_ioctl.c45 * @family: Address family
52 int register_gifconf(unsigned int family, gifconf_func_t *gifconf) argument
54 if (family >= NPROTO)
56 gifconf_list[family] = gifconf;
H A Dsock_diag.c110 if (hndl->family >= AF_MAX)
114 if (sock_diag_handlers[hndl->family])
117 sock_diag_handlers[hndl->family] = hndl;
126 int family = hnld->family; local
128 if (family >= AF_MAX)
132 BUG_ON(sock_diag_handlers[family] != hnld);
133 sock_diag_handlers[family] = NULL;
H A Dfib_rules.c67 static struct fib_rules_ops *lookup_rules_ops(struct net *net, int family) argument
73 if (ops->family == family) {
115 if (ops->family == o->family)
303 ops = lookup_rules_ops(net, frh->family);
465 ops = lookup_rules_ops(net, frh->family);
593 frh->family = ops->family;
672 int idx = 0, family; local
[all...]
H A Dflow.c34 u16 family; member in struct:flow_cache_entry
208 flow_cache_lookup(struct net *net, const struct flowi *key, u16 family, u8 dir, argument
224 keysize = flow_key_size(family);
239 tfle->family == family &&
254 fle->family = family;
280 flo = resolver(net, key, family, dir, flo, ctx);
/net/atm/
H A Dproc.c71 int family; member in struct:vcc_state
74 static inline int compare_family(struct sock *sk, int family) argument
76 return !family || (sk->sk_family == family);
79 static int __vcc_walk(struct sock **sock, int family, int *bucket, loff_t l) argument
95 l -= compare_family(sk, family);
111 return __vcc_walk(&state->sk, state->family, &state->bucket, l) ?
116 int family, const struct seq_operations *ops)
124 state->family = family;
115 __vcc_seq_open(struct inode *inode, struct file *file, int family, const struct seq_operations *ops) argument
[all...]
H A Dcommon.c144 int vcc_create(struct net *net, struct socket *sock, int protocol, int family) argument
152 sk = sk_alloc(net, family, GFP_KERNEL, &vcc_proto);
/net/netlabel/
H A Dnetlabel_kapi.c58 * @family: address family
70 u16 family,
78 switch (family) {
92 * @family: address family
104 u16 family,
133 switch (family) {
206 * @family: address family
69 netlbl_cfg_map_del(const char *domain, u16 family, const void *addr, const void *mask, struct netlbl_audit *audit_info) argument
103 netlbl_cfg_unlbl_map_add(const char *domain, u16 family, const void *addr, const void *mask, struct netlbl_audit *audit_info) argument
216 netlbl_cfg_unlbl_static_add(struct net *net, const char *dev_name, const void *addr, const void *mask, u16 family, u32 secid, struct netlbl_audit *audit_info) argument
260 netlbl_cfg_unlbl_static_del(struct net *net, const char *dev_name, const void *addr, const void *mask, u16 family, struct netlbl_audit *audit_info) argument
645 netlbl_sock_setattr(struct sock *sk, u16 family, const struct netlbl_lsm_secattr *secattr) argument
896 netlbl_skbuff_setattr(struct sk_buff *skb, u16 family, const struct netlbl_lsm_secattr *secattr) argument
958 netlbl_skbuff_getattr(const struct sk_buff *skb, u16 family, struct netlbl_lsm_secattr *secattr) argument
[all...]
H A Dnetlabel_unlabeled.c126 /* NetLabel Generic NETLINK unlabeled family */
1457 * @family: protocol family
1466 u16 family,
1477 switch (family) {
1465 netlbl_unlabel_getattr(const struct sk_buff *skb, u16 family, struct netlbl_lsm_secattr *secattr) argument
/net/llc/
H A Dllc_conn.c928 * @family: upper layer protocol family
934 struct sock *llc_sk_alloc(struct net *net, int family, gfp_t priority, struct proto *prot) argument
936 struct sock *sk = sk_alloc(net, family, priority, prot);

Completed in 283 milliseconds

12