/net/ipv4/ |
H A D | tunnel4.c | 21 static inline struct xfrm_tunnel __rcu **fam_handlers(unsigned short family) argument 23 return (family == AF_INET) ? &tunnel4_handlers : &tunnel64_handlers; 26 int xfrm4_tunnel_register(struct xfrm_tunnel *handler, unsigned short family) argument 36 for (pprev = fam_handlers(family); 58 int xfrm4_tunnel_deregister(struct xfrm_tunnel *handler, unsigned short family) argument 66 for (pprev = fam_handlers(family);
|
H A D | inet_timewait_sock.c | 481 struct inet_timewait_death_row *twdr, int family) 495 if ((tw->tw_family != family) || 502 if (unlikely((tw->tw_family != family) || 480 inet_twsk_purge(struct inet_hashinfo *hashinfo, struct inet_timewait_death_row *twdr, int family) argument
|
H A D | inet_diag.c | 45 u16 family; member in struct:inet_diag_entry 116 * hence this needs to be included regardless of socket family. 445 if (cond->family != AF_UNSPEC && 446 cond->family != entry->family) { 447 if (entry->family == AF_INET6 && 448 cond->family == AF_INET) { 489 entry.family = sk->sk_family; 491 if (entry.family == AF_INET6) { 540 /* Check address family an [all...] |
H A D | inetpeer.c | 97 static atomic_t *inetpeer_seq_ptr(int family) argument 99 return (family == AF_INET ? &v4_seq : &v6_seq); 102 static inline void flush_check(struct inet_peer_base *base, int family) argument 104 atomic_t *fp = inetpeer_seq_ptr(family); 112 void inetpeer_invalidate_family(int family) argument 114 atomic_t *fp = inetpeer_seq_ptr(family); 203 int i, n = (a->family == AF_INET ? 1 : 4); 468 flush_check(base, daddr->family); 508 (daddr->family == AF_INET) ?
|
/net/ipv6/ |
H A D | tunnel6.c | 39 int xfrm6_tunnel_register(struct xfrm6_tunnel *handler, unsigned short family) argument 48 for (pprev = (family == AF_INET6) ? &tunnel6_handlers : &tunnel46_handlers; 71 int xfrm6_tunnel_deregister(struct xfrm6_tunnel *handler, unsigned short family) argument 79 for (pprev = (family == AF_INET6) ? &tunnel6_handlers : &tunnel46_handlers;
|
/net/netfilter/ |
H A D | xt_cluster.c | 69 xt_cluster_is_multicast_addr(const struct sk_buff *skb, u_int8_t family) argument 73 switch(family) { 114 if (!xt_cluster_is_multicast_addr(skb, par->family) && 155 .family = NFPROTO_UNSPEC,
|
H A D | xt_ipvs.c | 51 /* ipvs_mt_check ensures that family is only NFPROTO_IPV[46]. */ 52 const u_int8_t family = par->family; local 70 ip_vs_fill_iph_skb(family, skb, &iph); 88 cp = pp->conn_out_get(family, skb, &iph, 1 /* inverse */); 139 &data->vmask, family) ^ 155 if (par->family != NFPROTO_IPV4 157 && par->family != NFPROTO_IPV6 160 pr_info("protocol family %u not supported\n", par->family); [all...] |
H A D | xt_policy.c | 26 const union nf_inet_addr *a2, unsigned short family) 28 switch (family) { 39 unsigned short family) 42 (xt_addr_cmp(&e->x, &e->y, (const union nf_inet_addr *)(z), family) \ 56 unsigned short family) 74 if (match_xfrm_state(sp->xvec[i], e, family)) { 86 unsigned short family) 102 if (match_xfrm_state(dst->xfrm, e, family)) { 119 ret = match_policy_in(skb, info, par->family); 121 ret = match_policy_out(skb, info, par->family); 25 xt_addr_cmp(const union nf_inet_addr *a1, const union nf_inet_addr *m, const union nf_inet_addr *a2, unsigned short family) argument 38 match_xfrm_state(const struct xfrm_state *x, const struct xt_policy_elem *e, unsigned short family) argument 55 match_policy_in(const struct sk_buff *skb, const struct xt_policy_info *info, unsigned short family) argument 85 match_policy_out(const struct sk_buff *skb, const struct xt_policy_info *info, unsigned short family) argument [all...] |
H A D | xt_conntrack.c | 45 u_int8_t family) 48 &info->origsrc_addr, &info->origsrc_mask, family); 54 u_int8_t family) 57 &info->origdst_addr, &info->origdst_mask, family); 63 u_int8_t family) 66 &info->replsrc_addr, &info->replsrc_mask, family); 72 u_int8_t family) 75 &info->repldst_addr, &info->repldst_mask, family); 203 if (conntrack_mt_origsrc(ct, info, par->family) ^ 208 if (conntrack_mt_origdst(ct, info, par->family) 43 conntrack_mt_origsrc(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument 52 conntrack_mt_origdst(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument 61 conntrack_mt_replsrc(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument 70 conntrack_mt_repldst(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument [all...] |
H A D | xt_TCPMSS.c | 140 if (par->family == NFPROTO_IPV4) 165 unsigned int family) 172 if (family == PF_INET) { 183 ai = nf_get_afinfo(family); 304 .family = NFPROTO_IPV4, 314 .family = NFPROTO_IPV6, 164 tcpmss_reverse_mtu(const struct sk_buff *skb, unsigned int family) argument
|
H A D | xt_connlimit.c | 78 const union nf_inet_addr *u3, u_int8_t family) 80 if (family == NFPROTO_IPV4) { 100 u_int8_t family) 110 if (family == NFPROTO_IPV6) 154 if (same_source_net(addr, mask, &conn->addr, family)) 192 par->family, &tuple)) 195 if (par->family == NFPROTO_IPV6) { 207 &info->mask, par->family); 236 ret = nf_ct_l3proto_try_module_get(par->family); 239 "address family 76 same_source_net(const union nf_inet_addr *addr, const union nf_inet_addr *mask, const union nf_inet_addr *u3, u_int8_t family) argument 95 count_them(struct net *net, struct xt_connlimit_data *data, const struct nf_conntrack_tuple *tuple, const union nf_inet_addr *addr, const union nf_inet_addr *mask, u_int8_t family) argument [all...] |
H A D | nf_conntrack_expect.c | 247 u_int8_t family, 254 if (family == AF_INET) 263 exp->tuple.src.l3num = family; 246 nf_ct_expect_init(struct nf_conntrack_expect *exp, unsigned int class, u_int8_t family, const union nf_inet_addr *saddr, const union nf_inet_addr *daddr, u_int8_t proto, const __be16 *src, const __be16 *dst) argument
|
H A D | nf_nat_core.c | 42 __nf_nat_l3proto_find(u8 family) argument 44 return rcu_dereference(nf_nat_l3protos[family]); 48 __nf_nat_l4proto_find(u8 family, u8 protonum) argument 50 return rcu_dereference(nf_nat_l4protos[family][protonum]); 62 u8 family; local 68 family = ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.l3num; 70 l3proto = __nf_nat_l3proto_find(family); 85 int nf_xfrm_me_harder(struct sk_buff *skb, unsigned int family) argument 92 err = xfrm_decode_session(skb, &fl, family);
|
H A D | xt_recent.c | 69 u_int16_t family; member in struct:recent_entry 123 const union nf_inet_addr *addrp, u_int16_t family, 129 if (family == NFPROTO_IPV4) 135 if (e->family == family && 171 u_int16_t family, u_int8_t ttl) 188 e->family = family; 189 if (family == NFPROTO_IPV4) 240 if (par->family 122 recent_entry_lookup(const struct recent_table *table, const union nf_inet_addr *addrp, u_int16_t family, u_int8_t ttl) argument 170 recent_entry_init(struct recent_table *t, const union nf_inet_addr *addr, u_int16_t family, u_int8_t ttl) argument 546 u_int16_t family; local [all...] |
/net/xfrm/ |
H A D | xfrm_hash.h | 33 u32 reqid, unsigned short family, 36 unsigned int h = family ^ reqid; 37 switch (family) { 50 unsigned short family, 53 unsigned int h = family; 54 switch (family) { 67 unsigned short family, unsigned int hmask) 70 switch (family) { 87 unsigned short family, unsigned int hmask) 93 switch (family) { 31 __xfrm_dst_hash(const xfrm_address_t *daddr, const xfrm_address_t *saddr, u32 reqid, unsigned short family, unsigned int hmask) argument 48 __xfrm_src_hash(const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family, unsigned int hmask) argument 66 __xfrm_spi_hash(const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family, unsigned int hmask) argument 86 __sel_hash(const struct xfrm_selector *sel, unsigned short family, unsigned int hmask) argument 114 __addr_hash(const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family, unsigned int hmask) argument [all...] |
H A D | xfrm_input.c | 94 if (x->sel.family == AF_UNSPEC) { 114 unsigned int family; local 142 family = XFRM_SPI_SKB_CB(skb)->family; 156 x = xfrm_state_lookup(net, skb->mark, daddr, spi, nexthdr, family); 159 xfrm_audit_state_notfound(skb, family, spi, seq); 231 if (x->sel.family == AF_UNSPEC) { 252 family = x->outer_mode->afinfo->family;
|
/net/core/ |
H A D | dev_ioctl.c | 45 * @family: Address family 52 int register_gifconf(unsigned int family, gifconf_func_t *gifconf) argument 54 if (family >= NPROTO) 56 gifconf_list[family] = gifconf;
|
H A D | sock_diag.c | 110 if (hndl->family >= AF_MAX) 114 if (sock_diag_handlers[hndl->family]) 117 sock_diag_handlers[hndl->family] = hndl; 126 int family = hnld->family; local 128 if (family >= AF_MAX) 132 BUG_ON(sock_diag_handlers[family] != hnld); 133 sock_diag_handlers[family] = NULL;
|
H A D | fib_rules.c | 67 static struct fib_rules_ops *lookup_rules_ops(struct net *net, int family) argument 73 if (ops->family == family) { 115 if (ops->family == o->family) 303 ops = lookup_rules_ops(net, frh->family); 465 ops = lookup_rules_ops(net, frh->family); 593 frh->family = ops->family; 672 int idx = 0, family; local [all...] |
H A D | flow.c | 34 u16 family; member in struct:flow_cache_entry 208 flow_cache_lookup(struct net *net, const struct flowi *key, u16 family, u8 dir, argument 224 keysize = flow_key_size(family); 239 tfle->family == family && 254 fle->family = family; 280 flo = resolver(net, key, family, dir, flo, ctx);
|
/net/atm/ |
H A D | proc.c | 71 int family; member in struct:vcc_state 74 static inline int compare_family(struct sock *sk, int family) argument 76 return !family || (sk->sk_family == family); 79 static int __vcc_walk(struct sock **sock, int family, int *bucket, loff_t l) argument 95 l -= compare_family(sk, family); 111 return __vcc_walk(&state->sk, state->family, &state->bucket, l) ? 116 int family, const struct seq_operations *ops) 124 state->family = family; 115 __vcc_seq_open(struct inode *inode, struct file *file, int family, const struct seq_operations *ops) argument [all...] |
H A D | common.c | 144 int vcc_create(struct net *net, struct socket *sock, int protocol, int family) argument 152 sk = sk_alloc(net, family, GFP_KERNEL, &vcc_proto);
|
/net/netlabel/ |
H A D | netlabel_kapi.c | 58 * @family: address family 70 u16 family, 78 switch (family) { 92 * @family: address family 104 u16 family, 133 switch (family) { 206 * @family: address family 69 netlbl_cfg_map_del(const char *domain, u16 family, const void *addr, const void *mask, struct netlbl_audit *audit_info) argument 103 netlbl_cfg_unlbl_map_add(const char *domain, u16 family, const void *addr, const void *mask, struct netlbl_audit *audit_info) argument 216 netlbl_cfg_unlbl_static_add(struct net *net, const char *dev_name, const void *addr, const void *mask, u16 family, u32 secid, struct netlbl_audit *audit_info) argument 260 netlbl_cfg_unlbl_static_del(struct net *net, const char *dev_name, const void *addr, const void *mask, u16 family, struct netlbl_audit *audit_info) argument 645 netlbl_sock_setattr(struct sock *sk, u16 family, const struct netlbl_lsm_secattr *secattr) argument 896 netlbl_skbuff_setattr(struct sk_buff *skb, u16 family, const struct netlbl_lsm_secattr *secattr) argument 958 netlbl_skbuff_getattr(const struct sk_buff *skb, u16 family, struct netlbl_lsm_secattr *secattr) argument [all...] |
H A D | netlabel_unlabeled.c | 126 /* NetLabel Generic NETLINK unlabeled family */ 1457 * @family: protocol family 1466 u16 family, 1477 switch (family) { 1465 netlbl_unlabel_getattr(const struct sk_buff *skb, u16 family, struct netlbl_lsm_secattr *secattr) argument
|
/net/llc/ |
H A D | llc_conn.c | 928 * @family: upper layer protocol family 934 struct sock *llc_sk_alloc(struct net *net, int family, gfp_t priority, struct proto *prot) argument 936 struct sock *sk = sk_alloc(net, family, priority, prot);
|