Searched refs:family (Results 1 - 25 of 316) sorted by relevance

1234567891011>>

/net/netlink/
H A Dgenetlink.c75 * also abused this API and relied on family == group ID, we
76 * cater to that by giving it a static family and group ID.
86 static int genl_ctrl_event(int event, struct genl_family *family,
124 static const struct genl_ops *genl_get_cmd(u8 cmd, struct genl_family *family) argument
128 for (i = 0; i < family->n_ops; i++)
129 if (family->ops[i].cmd == cmd)
130 return &family->ops[i];
217 static int genl_validate_assign_mc_groups(struct genl_family *family) argument
220 int n_groups = family->n_mcgrps;
228 const struct genl_multicast_group *grp = &family
295 genl_unregister_mc_groups(struct genl_family *family) argument
320 genl_validate_ops(const struct genl_family *family) argument
357 __genl_register_family(struct genl_family *family) argument
432 genl_unregister_family(struct genl_family *family) argument
490 genlmsg_put(struct sk_buff *skb, u32 portid, u32 seq, struct genl_family *family, int flags, u8 cmd) argument
536 genl_family_rcv_msg(struct genl_family *family, struct sk_buff *skb, struct nlmsghdr *nlh) argument
643 struct genl_family *family; local
680 ctrl_fill_info(struct genl_family *family, u32 portid, u32 seq, u32 flags, struct sk_buff *skb, u8 cmd) argument
766 ctrl_fill_mcgrp_info(struct genl_family *family, const struct genl_multicast_group *grp, int grp_id, u32 portid, u32 seq, u32 flags, struct sk_buff *skb, u8 cmd) argument
838 ctrl_build_family_msg(struct genl_family *family, u32 portid, int seq, u8 cmd) argument
858 ctrl_build_mcgrp_msg(struct genl_family *family, const struct genl_multicast_group *grp, int grp_id, u32 portid, int seq, u8 cmd) argument
932 genl_ctrl_event(int event, struct genl_family *family, const struct genl_multicast_group *grp, int grp_id) argument
1069 genlmsg_multicast_allns(struct genl_family *family, struct sk_buff *skb, u32 portid, unsigned int group, gfp_t flags) argument
1079 genl_notify(struct genl_family *family, struct sk_buff *skb, struct net *net, u32 portid, u32 group, struct nlmsghdr *nlh, gfp_t flags) argument
[all...]
/net/xfrm/
H A Dxfrm_hash.h86 u32 reqid, unsigned short family,
89 unsigned int h = family ^ reqid;
90 switch (family) {
103 unsigned short family,
106 unsigned int h = family;
107 switch (family) {
120 unsigned short family, unsigned int hmask)
123 switch (family) {
140 unsigned short family, unsigned int hmask,
147 switch (family) {
84 __xfrm_dst_hash(const xfrm_address_t *daddr, const xfrm_address_t *saddr, u32 reqid, unsigned short family, unsigned int hmask) argument
101 __xfrm_src_hash(const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family, unsigned int hmask) argument
119 __xfrm_spi_hash(const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family, unsigned int hmask) argument
139 __sel_hash(const struct xfrm_selector *sel, unsigned short family, unsigned int hmask, u8 dbits, u8 sbits) argument
168 __addr_hash(const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family, unsigned int hmask, u8 dbits, u8 sbits) argument
[all...]
H A Dxfrm_input.c28 if (unlikely(afinfo->family >= NPROTO))
31 if (unlikely(xfrm_input_afinfo[afinfo->family] != NULL))
34 rcu_assign_pointer(xfrm_input_afinfo[afinfo->family], afinfo);
46 if (unlikely(afinfo->family >= NPROTO))
49 if (likely(xfrm_input_afinfo[afinfo->family] != NULL)) {
50 if (unlikely(xfrm_input_afinfo[afinfo->family] != afinfo))
53 RCU_INIT_POINTER(xfrm_input_afinfo[afinfo->family], NULL);
61 static struct xfrm_input_afinfo *xfrm_input_get_afinfo(unsigned int family) argument
65 if (unlikely(family >= NPROTO))
68 afinfo = rcu_dereference(xfrm_input_afinfo[family]);
79 xfrm_rcv_cb(struct sk_buff *skb, unsigned int family, u8 protocol, int err) argument
189 unsigned int family; local
[all...]
H A Dxfrm_state.c34 2. Hash table by (daddr,family,reqid) to find what SAs exist for given
44 unsigned short family)
46 return __xfrm_dst_hash(daddr, saddr, reqid, family, net->xfrm.state_hmask);
52 unsigned short family)
54 return __xfrm_src_hash(daddr, saddr, family, net->xfrm.state_hmask);
59 __be32 spi, u8 proto, unsigned short family)
61 return __xfrm_spi_hash(daddr, spi, proto, family, net->xfrm.state_hmask);
77 x->props.reqid, x->props.family,
82 x->props.family,
88 x->id.proto, x->props.family,
40 xfrm_dst_hash(struct net *net, const xfrm_address_t *daddr, const xfrm_address_t *saddr, u32 reqid, unsigned short family) argument
49 xfrm_src_hash(struct net *net, const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family) argument
58 xfrm_spi_hash(struct net *net, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family) argument
161 xfrm_register_type(const struct xfrm_type *type, unsigned short family) argument
182 xfrm_unregister_type(const struct xfrm_type *type, unsigned short family) argument
203 xfrm_get_type(u8 proto, unsigned short family) argument
236 xfrm_register_mode(struct xfrm_mode *mode, int family) argument
270 xfrm_unregister_mode(struct xfrm_mode *mode, int family) argument
298 xfrm_get_mode(unsigned int encap, int family) argument
633 xfrm_init_tempstate(struct xfrm_state *x, const struct flowi *fl, const struct xfrm_tmpl *tmpl, const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family) argument
654 __xfrm_state_lookup(struct net *net, u32 mark, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family) argument
678 __xfrm_state_lookup_byaddr(struct net *net, u32 mark, const xfrm_address_t *daddr, const xfrm_address_t *saddr, u8 proto, unsigned short family) argument
703 __xfrm_state_locate(struct xfrm_state *x, int use_spi, int family) argument
726 xfrm_state_look_at(struct xfrm_policy *pol, struct xfrm_state *x, const struct flowi *fl, unsigned short family, struct xfrm_state **best, int *acq_in_progress, int *error) argument
764 xfrm_state_find(const xfrm_address_t *daddr, const xfrm_address_t *saddr, const struct flowi *fl, struct xfrm_tmpl *tmpl, struct xfrm_policy *pol, int *err, unsigned short family) argument
885 xfrm_stateonly_find(struct net *net, u32 mark, xfrm_address_t *daddr, xfrm_address_t *saddr, unsigned short family, u8 mode, u8 proto, u32 reqid) argument
917 xfrm_state_lookup_byspi(struct net *net, __be32 spi, unsigned short family) argument
973 unsigned short family = xnew->props.family; local
1002 __find_acq_core(struct net *net, const struct xfrm_mark *m, unsigned short family, u8 mode, u32 reqid, u8 proto, const xfrm_address_t *daddr, const xfrm_address_t *saddr, int create) argument
1084 int family; local
1392 xfrm_state_lookup(struct net *net, u32 mark, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family) argument
1405 xfrm_state_lookup_byaddr(struct net *net, u32 mark, const xfrm_address_t *daddr, const xfrm_address_t *saddr, u8 proto, unsigned short family) argument
1419 xfrm_find_acq(struct net *net, const struct xfrm_mark *mark, u8 mode, u32 reqid, u8 proto, const xfrm_address_t *daddr, const xfrm_address_t *saddr, int create, unsigned short family) argument
1435 xfrm_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n, unsigned short family, struct net *net) argument
1453 xfrm_state_sort(struct xfrm_state **dst, struct xfrm_state **src, int n, unsigned short family) argument
1939 xfrm_state_get_afinfo(unsigned int family) argument
1989 int family = x->props.family; local
2159 xfrm_audit_helper_pktinfo(struct sk_buff *skb, u16 family, struct audit_buffer *audit_buf) argument
2246 xfrm_audit_state_notfound_simple(struct sk_buff *skb, u16 family) argument
2258 xfrm_audit_state_notfound(struct sk_buff *skb, u16 family, __be32 net_spi, __be32 net_seq) argument
[all...]
/net/netfilter/
H A Dxt_connmark.c80 ret = nf_ct_l3proto_try_module_get(par->family);
83 par->family);
89 nf_ct_l3proto_module_put(par->family);
110 ret = nf_ct_l3proto_try_module_get(par->family);
113 par->family);
119 nf_ct_l3proto_module_put(par->family);
125 .family = NFPROTO_UNSPEC,
136 .family = NFPROTO_UNSPEC,
H A Dxt_state.c46 ret = nf_ct_l3proto_try_module_get(par->family);
49 par->family);
55 nf_ct_l3proto_module_put(par->family);
60 .family = NFPROTO_UNSPEC,
H A Dxt_LOG.c42 nf_log_packet(net, par->family, par->hooknum, skb, par->in, par->out,
51 if (par->family != NFPROTO_IPV4 && par->family != NFPROTO_IPV6)
64 return nf_logger_find_get(par->family, NF_LOG_TYPE_LOG);
69 nf_logger_put(par->family, NF_LOG_TYPE_LOG);
75 .family = NFPROTO_IPV4,
85 .family = NFPROTO_IPV6,
H A Dxt_ipvs.c51 /* ipvs_mt_check ensures that family is only NFPROTO_IPV[46]. */
52 const u_int8_t family = par->family; local
70 ip_vs_fill_iph_skb(family, skb, &iph);
88 cp = pp->conn_out_get(family, skb, &iph, 1 /* inverse */);
139 &data->vmask, family) ^
155 if (par->family != NFPROTO_IPV4
157 && par->family != NFPROTO_IPV6
160 pr_info("protocol family %u not supported\n", par->family);
[all...]
H A Dxt_conntrack.c45 u_int8_t family)
48 &info->origsrc_addr, &info->origsrc_mask, family);
54 u_int8_t family)
57 &info->origdst_addr, &info->origdst_mask, family);
63 u_int8_t family)
66 &info->replsrc_addr, &info->replsrc_mask, family);
72 u_int8_t family)
75 &info->repldst_addr, &info->repldst_mask, family);
203 if (conntrack_mt_origsrc(ct, info, par->family) ^
208 if (conntrack_mt_origdst(ct, info, par->family)
43 conntrack_mt_origsrc(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument
52 conntrack_mt_origdst(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument
61 conntrack_mt_replsrc(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument
70 conntrack_mt_repldst(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument
[all...]
H A Dxt_CONNSECMARK.c109 ret = nf_ct_l3proto_try_module_get(par->family);
112 par->family);
118 nf_ct_l3proto_module_put(par->family);
124 .family = NFPROTO_UNSPEC,
H A Dxt_connlabel.c55 ret = nf_ct_l3proto_try_module_get(par->family);
58 par->family);
75 nf_ct_l3proto_module_put(par->family);
80 .family = NFPROTO_UNSPEC,
H A Dxt_helper.c62 ret = nf_ct_l3proto_try_module_get(par->family);
65 par->family);
74 nf_ct_l3proto_module_put(par->family);
80 .family = NFPROTO_UNSPEC,
H A Dxt_pkttype.c33 else if (par->family == NFPROTO_IPV4 &&
36 else if (par->family == NFPROTO_IPV6 &&
48 .family = NFPROTO_UNSPEC,
H A Dxt_policy.c26 const union nf_inet_addr *a2, unsigned short family)
28 switch (family) {
39 unsigned short family)
42 (xt_addr_cmp(&e->x, &e->y, (const union nf_inet_addr *)(z), family) \
56 unsigned short family)
74 if (match_xfrm_state(sp->xvec[i], e, family)) {
86 unsigned short family)
102 if (match_xfrm_state(dst->xfrm, e, family)) {
119 ret = match_policy_in(skb, info, par->family);
121 ret = match_policy_out(skb, info, par->family);
25 xt_addr_cmp(const union nf_inet_addr *a1, const union nf_inet_addr *m, const union nf_inet_addr *a2, unsigned short family) argument
38 match_xfrm_state(const struct xfrm_state *x, const struct xt_policy_elem *e, unsigned short family) argument
55 match_policy_in(const struct sk_buff *skb, const struct xt_policy_info *info, unsigned short family) argument
85 match_policy_out(const struct sk_buff *skb, const struct xt_policy_info *info, unsigned short family) argument
[all...]
H A Dxt_dscp.c61 if (par->family == NFPROTO_IPV4)
72 .family = NFPROTO_IPV4,
80 .family = NFPROTO_IPV6,
89 .family = NFPROTO_IPV4,
97 .family = NFPROTO_IPV6,
H A Dnft_nat.c35 u8 family; member in struct:nft_nat
50 if (priv->family == AF_INET) {
95 u32 family; local
121 family = ntohl(nla_get_be32(tb[NFTA_NAT_FAMILY]));
122 if (family != AF_INET && family != AF_INET6)
124 if (family != ctx->afi->family)
126 priv->family = family;
[all...]
H A Dxt_NFQUEUE.c46 par->family, jhash_initval);
101 par->family, jhash_initval);
115 .family = NFPROTO_UNSPEC,
123 .family = NFPROTO_UNSPEC,
132 .family = NFPROTO_UNSPEC,
141 .family = NFPROTO_UNSPEC,
H A Dnf_tables_inet.c28 ops->pf = afi->family;
34 .family = NFPROTO_INET,
72 .family = NFPROTO_INET,
H A Dxt_TRACE.c23 .family = NFPROTO_UNSPEC,
H A Dxt_comment.c28 .family = NFPROTO_UNSPEC,
H A Dxt_connlimit.c101 const union nf_inet_addr *u3, u_int8_t family)
103 if (family == NFPROTO_IPV4) {
204 u8 family)
224 diff = same_source_net(addr, mask, &rbconn->addr, family);
293 u_int8_t family)
299 if (family == NFPROTO_IPV6) {
309 count = count_tree(net, root, tuple, addr, mask, family);
332 par->family, &tuple))
335 if (par->family == NFPROTO_IPV6) {
346 &info->mask, par->family);
99 same_source_net(const union nf_inet_addr *addr, const union nf_inet_addr *mask, const union nf_inet_addr *u3, u_int8_t family) argument
201 count_tree(struct net *net, struct rb_root *root, const struct nf_conntrack_tuple *tuple, const union nf_inet_addr *addr, const union nf_inet_addr *mask, u8 family) argument
288 count_them(struct net *net, struct xt_connlimit_data *data, const struct nf_conntrack_tuple *tuple, const union nf_inet_addr *addr, const union nf_inet_addr *mask, u_int8_t family) argument
[all...]
H A Dxt_CLASSIFY.c44 .family = NFPROTO_UNSPEC,
54 .family = NFPROTO_ARP,
/net/ipv4/
H A Dtunnel4.c21 static inline struct xfrm_tunnel __rcu **fam_handlers(unsigned short family) argument
23 return (family == AF_INET) ? &tunnel4_handlers : &tunnel64_handlers;
26 int xfrm4_tunnel_register(struct xfrm_tunnel *handler, unsigned short family) argument
36 for (pprev = fam_handlers(family);
58 int xfrm4_tunnel_deregister(struct xfrm_tunnel *handler, unsigned short family) argument
66 for (pprev = fam_handlers(family);
/net/sched/
H A Dem_ipset.c64 acpar.family = NFPROTO_IPV4;
70 acpar.family = NFPROTO_IPV6;
82 opt.family = acpar.family;
/net/core/
H A Dsock_diag.c107 if (hndl->family >= AF_MAX)
111 if (sock_diag_handlers[hndl->family])
114 sock_diag_handlers[hndl->family] = hndl;
123 int family = hnld->family; local
125 if (family >= AF_MAX)
129 BUG_ON(sock_diag_handlers[family] != hnld);
130 sock_diag_handlers[family] = NULL;

Completed in 392 milliseconds

1234567891011>>