/net/netlink/ |
H A D | genetlink.c | 75 * also abused this API and relied on family == group ID, we 76 * cater to that by giving it a static family and group ID. 86 static int genl_ctrl_event(int event, struct genl_family *family, 124 static const struct genl_ops *genl_get_cmd(u8 cmd, struct genl_family *family) argument 128 for (i = 0; i < family->n_ops; i++) 129 if (family->ops[i].cmd == cmd) 130 return &family->ops[i]; 217 static int genl_validate_assign_mc_groups(struct genl_family *family) argument 220 int n_groups = family->n_mcgrps; 228 const struct genl_multicast_group *grp = &family 295 genl_unregister_mc_groups(struct genl_family *family) argument 320 genl_validate_ops(const struct genl_family *family) argument 357 __genl_register_family(struct genl_family *family) argument 432 genl_unregister_family(struct genl_family *family) argument 490 genlmsg_put(struct sk_buff *skb, u32 portid, u32 seq, struct genl_family *family, int flags, u8 cmd) argument 536 genl_family_rcv_msg(struct genl_family *family, struct sk_buff *skb, struct nlmsghdr *nlh) argument 643 struct genl_family *family; local 680 ctrl_fill_info(struct genl_family *family, u32 portid, u32 seq, u32 flags, struct sk_buff *skb, u8 cmd) argument 766 ctrl_fill_mcgrp_info(struct genl_family *family, const struct genl_multicast_group *grp, int grp_id, u32 portid, u32 seq, u32 flags, struct sk_buff *skb, u8 cmd) argument 838 ctrl_build_family_msg(struct genl_family *family, u32 portid, int seq, u8 cmd) argument 858 ctrl_build_mcgrp_msg(struct genl_family *family, const struct genl_multicast_group *grp, int grp_id, u32 portid, int seq, u8 cmd) argument 932 genl_ctrl_event(int event, struct genl_family *family, const struct genl_multicast_group *grp, int grp_id) argument 1069 genlmsg_multicast_allns(struct genl_family *family, struct sk_buff *skb, u32 portid, unsigned int group, gfp_t flags) argument 1079 genl_notify(struct genl_family *family, struct sk_buff *skb, struct net *net, u32 portid, u32 group, struct nlmsghdr *nlh, gfp_t flags) argument [all...] |
/net/xfrm/ |
H A D | xfrm_hash.h | 86 u32 reqid, unsigned short family, 89 unsigned int h = family ^ reqid; 90 switch (family) { 103 unsigned short family, 106 unsigned int h = family; 107 switch (family) { 120 unsigned short family, unsigned int hmask) 123 switch (family) { 140 unsigned short family, unsigned int hmask, 147 switch (family) { 84 __xfrm_dst_hash(const xfrm_address_t *daddr, const xfrm_address_t *saddr, u32 reqid, unsigned short family, unsigned int hmask) argument 101 __xfrm_src_hash(const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family, unsigned int hmask) argument 119 __xfrm_spi_hash(const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family, unsigned int hmask) argument 139 __sel_hash(const struct xfrm_selector *sel, unsigned short family, unsigned int hmask, u8 dbits, u8 sbits) argument 168 __addr_hash(const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family, unsigned int hmask, u8 dbits, u8 sbits) argument [all...] |
H A D | xfrm_input.c | 28 if (unlikely(afinfo->family >= NPROTO)) 31 if (unlikely(xfrm_input_afinfo[afinfo->family] != NULL)) 34 rcu_assign_pointer(xfrm_input_afinfo[afinfo->family], afinfo); 46 if (unlikely(afinfo->family >= NPROTO)) 49 if (likely(xfrm_input_afinfo[afinfo->family] != NULL)) { 50 if (unlikely(xfrm_input_afinfo[afinfo->family] != afinfo)) 53 RCU_INIT_POINTER(xfrm_input_afinfo[afinfo->family], NULL); 61 static struct xfrm_input_afinfo *xfrm_input_get_afinfo(unsigned int family) argument 65 if (unlikely(family >= NPROTO)) 68 afinfo = rcu_dereference(xfrm_input_afinfo[family]); 79 xfrm_rcv_cb(struct sk_buff *skb, unsigned int family, u8 protocol, int err) argument 189 unsigned int family; local [all...] |
H A D | xfrm_state.c | 34 2. Hash table by (daddr,family,reqid) to find what SAs exist for given 44 unsigned short family) 46 return __xfrm_dst_hash(daddr, saddr, reqid, family, net->xfrm.state_hmask); 52 unsigned short family) 54 return __xfrm_src_hash(daddr, saddr, family, net->xfrm.state_hmask); 59 __be32 spi, u8 proto, unsigned short family) 61 return __xfrm_spi_hash(daddr, spi, proto, family, net->xfrm.state_hmask); 77 x->props.reqid, x->props.family, 82 x->props.family, 88 x->id.proto, x->props.family, 40 xfrm_dst_hash(struct net *net, const xfrm_address_t *daddr, const xfrm_address_t *saddr, u32 reqid, unsigned short family) argument 49 xfrm_src_hash(struct net *net, const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family) argument 58 xfrm_spi_hash(struct net *net, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family) argument 161 xfrm_register_type(const struct xfrm_type *type, unsigned short family) argument 182 xfrm_unregister_type(const struct xfrm_type *type, unsigned short family) argument 203 xfrm_get_type(u8 proto, unsigned short family) argument 236 xfrm_register_mode(struct xfrm_mode *mode, int family) argument 270 xfrm_unregister_mode(struct xfrm_mode *mode, int family) argument 298 xfrm_get_mode(unsigned int encap, int family) argument 633 xfrm_init_tempstate(struct xfrm_state *x, const struct flowi *fl, const struct xfrm_tmpl *tmpl, const xfrm_address_t *daddr, const xfrm_address_t *saddr, unsigned short family) argument 654 __xfrm_state_lookup(struct net *net, u32 mark, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family) argument 678 __xfrm_state_lookup_byaddr(struct net *net, u32 mark, const xfrm_address_t *daddr, const xfrm_address_t *saddr, u8 proto, unsigned short family) argument 703 __xfrm_state_locate(struct xfrm_state *x, int use_spi, int family) argument 726 xfrm_state_look_at(struct xfrm_policy *pol, struct xfrm_state *x, const struct flowi *fl, unsigned short family, struct xfrm_state **best, int *acq_in_progress, int *error) argument 764 xfrm_state_find(const xfrm_address_t *daddr, const xfrm_address_t *saddr, const struct flowi *fl, struct xfrm_tmpl *tmpl, struct xfrm_policy *pol, int *err, unsigned short family) argument 885 xfrm_stateonly_find(struct net *net, u32 mark, xfrm_address_t *daddr, xfrm_address_t *saddr, unsigned short family, u8 mode, u8 proto, u32 reqid) argument 917 xfrm_state_lookup_byspi(struct net *net, __be32 spi, unsigned short family) argument 973 unsigned short family = xnew->props.family; local 1002 __find_acq_core(struct net *net, const struct xfrm_mark *m, unsigned short family, u8 mode, u32 reqid, u8 proto, const xfrm_address_t *daddr, const xfrm_address_t *saddr, int create) argument 1084 int family; local 1392 xfrm_state_lookup(struct net *net, u32 mark, const xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family) argument 1405 xfrm_state_lookup_byaddr(struct net *net, u32 mark, const xfrm_address_t *daddr, const xfrm_address_t *saddr, u8 proto, unsigned short family) argument 1419 xfrm_find_acq(struct net *net, const struct xfrm_mark *mark, u8 mode, u32 reqid, u8 proto, const xfrm_address_t *daddr, const xfrm_address_t *saddr, int create, unsigned short family) argument 1435 xfrm_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n, unsigned short family, struct net *net) argument 1453 xfrm_state_sort(struct xfrm_state **dst, struct xfrm_state **src, int n, unsigned short family) argument 1939 xfrm_state_get_afinfo(unsigned int family) argument 1989 int family = x->props.family; local 2159 xfrm_audit_helper_pktinfo(struct sk_buff *skb, u16 family, struct audit_buffer *audit_buf) argument 2246 xfrm_audit_state_notfound_simple(struct sk_buff *skb, u16 family) argument 2258 xfrm_audit_state_notfound(struct sk_buff *skb, u16 family, __be32 net_spi, __be32 net_seq) argument [all...] |
/net/netfilter/ |
H A D | xt_connmark.c | 80 ret = nf_ct_l3proto_try_module_get(par->family); 83 par->family); 89 nf_ct_l3proto_module_put(par->family); 110 ret = nf_ct_l3proto_try_module_get(par->family); 113 par->family); 119 nf_ct_l3proto_module_put(par->family); 125 .family = NFPROTO_UNSPEC, 136 .family = NFPROTO_UNSPEC,
|
H A D | xt_state.c | 46 ret = nf_ct_l3proto_try_module_get(par->family); 49 par->family); 55 nf_ct_l3proto_module_put(par->family); 60 .family = NFPROTO_UNSPEC,
|
H A D | xt_LOG.c | 42 nf_log_packet(net, par->family, par->hooknum, skb, par->in, par->out, 51 if (par->family != NFPROTO_IPV4 && par->family != NFPROTO_IPV6) 64 return nf_logger_find_get(par->family, NF_LOG_TYPE_LOG); 69 nf_logger_put(par->family, NF_LOG_TYPE_LOG); 75 .family = NFPROTO_IPV4, 85 .family = NFPROTO_IPV6,
|
H A D | xt_ipvs.c | 51 /* ipvs_mt_check ensures that family is only NFPROTO_IPV[46]. */ 52 const u_int8_t family = par->family; local 70 ip_vs_fill_iph_skb(family, skb, &iph); 88 cp = pp->conn_out_get(family, skb, &iph, 1 /* inverse */); 139 &data->vmask, family) ^ 155 if (par->family != NFPROTO_IPV4 157 && par->family != NFPROTO_IPV6 160 pr_info("protocol family %u not supported\n", par->family); [all...] |
H A D | xt_conntrack.c | 45 u_int8_t family) 48 &info->origsrc_addr, &info->origsrc_mask, family); 54 u_int8_t family) 57 &info->origdst_addr, &info->origdst_mask, family); 63 u_int8_t family) 66 &info->replsrc_addr, &info->replsrc_mask, family); 72 u_int8_t family) 75 &info->repldst_addr, &info->repldst_mask, family); 203 if (conntrack_mt_origsrc(ct, info, par->family) ^ 208 if (conntrack_mt_origdst(ct, info, par->family) 43 conntrack_mt_origsrc(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument 52 conntrack_mt_origdst(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument 61 conntrack_mt_replsrc(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument 70 conntrack_mt_repldst(const struct nf_conn *ct, const struct xt_conntrack_mtinfo2 *info, u_int8_t family) argument [all...] |
H A D | xt_CONNSECMARK.c | 109 ret = nf_ct_l3proto_try_module_get(par->family); 112 par->family); 118 nf_ct_l3proto_module_put(par->family); 124 .family = NFPROTO_UNSPEC,
|
H A D | xt_connlabel.c | 55 ret = nf_ct_l3proto_try_module_get(par->family); 58 par->family); 75 nf_ct_l3proto_module_put(par->family); 80 .family = NFPROTO_UNSPEC,
|
H A D | xt_helper.c | 62 ret = nf_ct_l3proto_try_module_get(par->family); 65 par->family); 74 nf_ct_l3proto_module_put(par->family); 80 .family = NFPROTO_UNSPEC,
|
H A D | xt_pkttype.c | 33 else if (par->family == NFPROTO_IPV4 && 36 else if (par->family == NFPROTO_IPV6 && 48 .family = NFPROTO_UNSPEC,
|
H A D | xt_policy.c | 26 const union nf_inet_addr *a2, unsigned short family) 28 switch (family) { 39 unsigned short family) 42 (xt_addr_cmp(&e->x, &e->y, (const union nf_inet_addr *)(z), family) \ 56 unsigned short family) 74 if (match_xfrm_state(sp->xvec[i], e, family)) { 86 unsigned short family) 102 if (match_xfrm_state(dst->xfrm, e, family)) { 119 ret = match_policy_in(skb, info, par->family); 121 ret = match_policy_out(skb, info, par->family); 25 xt_addr_cmp(const union nf_inet_addr *a1, const union nf_inet_addr *m, const union nf_inet_addr *a2, unsigned short family) argument 38 match_xfrm_state(const struct xfrm_state *x, const struct xt_policy_elem *e, unsigned short family) argument 55 match_policy_in(const struct sk_buff *skb, const struct xt_policy_info *info, unsigned short family) argument 85 match_policy_out(const struct sk_buff *skb, const struct xt_policy_info *info, unsigned short family) argument [all...] |
H A D | xt_dscp.c | 61 if (par->family == NFPROTO_IPV4) 72 .family = NFPROTO_IPV4, 80 .family = NFPROTO_IPV6, 89 .family = NFPROTO_IPV4, 97 .family = NFPROTO_IPV6,
|
H A D | nft_nat.c | 35 u8 family; member in struct:nft_nat 50 if (priv->family == AF_INET) { 95 u32 family; local 121 family = ntohl(nla_get_be32(tb[NFTA_NAT_FAMILY])); 122 if (family != AF_INET && family != AF_INET6) 124 if (family != ctx->afi->family) 126 priv->family = family; [all...] |
H A D | xt_NFQUEUE.c | 46 par->family, jhash_initval); 101 par->family, jhash_initval); 115 .family = NFPROTO_UNSPEC, 123 .family = NFPROTO_UNSPEC, 132 .family = NFPROTO_UNSPEC, 141 .family = NFPROTO_UNSPEC,
|
H A D | nf_tables_inet.c | 28 ops->pf = afi->family; 34 .family = NFPROTO_INET, 72 .family = NFPROTO_INET,
|
H A D | xt_TRACE.c | 23 .family = NFPROTO_UNSPEC,
|
H A D | xt_comment.c | 28 .family = NFPROTO_UNSPEC,
|
H A D | xt_connlimit.c | 101 const union nf_inet_addr *u3, u_int8_t family) 103 if (family == NFPROTO_IPV4) { 204 u8 family) 224 diff = same_source_net(addr, mask, &rbconn->addr, family); 293 u_int8_t family) 299 if (family == NFPROTO_IPV6) { 309 count = count_tree(net, root, tuple, addr, mask, family); 332 par->family, &tuple)) 335 if (par->family == NFPROTO_IPV6) { 346 &info->mask, par->family); 99 same_source_net(const union nf_inet_addr *addr, const union nf_inet_addr *mask, const union nf_inet_addr *u3, u_int8_t family) argument 201 count_tree(struct net *net, struct rb_root *root, const struct nf_conntrack_tuple *tuple, const union nf_inet_addr *addr, const union nf_inet_addr *mask, u8 family) argument 288 count_them(struct net *net, struct xt_connlimit_data *data, const struct nf_conntrack_tuple *tuple, const union nf_inet_addr *addr, const union nf_inet_addr *mask, u_int8_t family) argument [all...] |
H A D | xt_CLASSIFY.c | 44 .family = NFPROTO_UNSPEC, 54 .family = NFPROTO_ARP,
|
/net/ipv4/ |
H A D | tunnel4.c | 21 static inline struct xfrm_tunnel __rcu **fam_handlers(unsigned short family) argument 23 return (family == AF_INET) ? &tunnel4_handlers : &tunnel64_handlers; 26 int xfrm4_tunnel_register(struct xfrm_tunnel *handler, unsigned short family) argument 36 for (pprev = fam_handlers(family); 58 int xfrm4_tunnel_deregister(struct xfrm_tunnel *handler, unsigned short family) argument 66 for (pprev = fam_handlers(family);
|
/net/sched/ |
H A D | em_ipset.c | 64 acpar.family = NFPROTO_IPV4; 70 acpar.family = NFPROTO_IPV6; 82 opt.family = acpar.family;
|
/net/core/ |
H A D | sock_diag.c | 107 if (hndl->family >= AF_MAX) 111 if (sock_diag_handlers[hndl->family]) 114 sock_diag_handlers[hndl->family] = hndl; 123 int family = hnld->family; local 125 if (family >= AF_MAX) 129 BUG_ON(sock_diag_handlers[family] != hnld); 130 sock_diag_handlers[family] = NULL;
|