/openbmc/linux/net/ipv4/ |
H A D | inet_hashtables.c | 50 if (sk->sk_family == AF_INET6 && in sk_ehashfn() 113 tb->family = sk->sk_family; in inet_bind2_bucket_init() 114 if (sk->sk_family == AF_INET6) in inet_bind2_bucket_init() 152 if (sk->sk_family != tb2->family) { in inet_bind2_bucket_addr_match() 153 if (sk->sk_family == AF_INET) in inet_bind2_bucket_addr_match() 161 if (sk->sk_family == AF_INET6) in inet_bind2_bucket_addr_match() 307 if (sk->sk_family == AF_INET6) in inet_lhash2_bucket_sk() 334 if (sk->sk_family == PF_INET) in compute_score() 636 if (sk->sk_family == AF_INET) { in inet_ehash_lookup_by_sk() 643 else if (sk->sk_family == AF_INET6) { in inet_ehash_lookup_by_sk() [all …]
|
H A D | udp_tunnel_core.c | 92 ti.sa_family = sk->sk_family; in udp_tunnel_push_rx_port() 106 ti.sa_family = sk->sk_family; in udp_tunnel_drop_rx_port() 122 ti.sa_family = sk->sk_family; in udp_tunnel_notify_add_rx_port() 142 ti.sa_family = sk->sk_family; in udp_tunnel_notify_del_rx_port()
|
H A D | udp_bpf.c | 17 if (sk->sk_family == AF_INET6) in sk_udp_recvmsg() 143 int family = sk->sk_family == AF_INET ? UDP_BPF_IPV4 : UDP_BPF_IPV6; in udp_bpf_update_proto() 151 if (sk->sk_family == AF_INET6) in udp_bpf_update_proto()
|
H A D | ping.c | 198 sk->sk_family == AF_INET) { in ping_lookup() 208 sk->sk_family == AF_INET6) { in ping_lookup() 261 if (sk->sk_family == AF_INET6) in ping_init_sock() 312 if (sk->sk_family == AF_INET) { in ping_check_bind_addr() 341 } else if (sk->sk_family == AF_INET6) { in ping_check_bind_addr() 446 if (sk->sk_family == AF_INET && isk->inet_rcv_saddr) in ping_bind() 449 if (sk->sk_family == AF_INET6 && !ipv6_addr_any(&sk->sk_v6_rcv_saddr)) in ping_bind() 460 if (sk->sk_family == AF_INET6) in ping_bind() 855 int family = sk->sk_family; in ping_recvmsg() 1043 sk->sk_family == state->family) in ping_get_first()
|
/openbmc/linux/include/trace/events/ |
H A D | sock.h | 169 __entry->family = sk->sk_family; 181 if (sk->sk_family == AF_INET6) { 230 __entry->family = sk->sk_family; 242 if (sk->sk_family == AF_INET6) { 281 __entry->family = sk->sk_family; 309 __entry->family = sk->sk_family;
|
H A D | tcp.h | 28 if (sk->sk_family == AF_INET6) { \ 79 __entry->family = sk->sk_family; 147 __entry->family = sk->sk_family; 217 __entry->family = sk->sk_family; 277 __entry->family = sk->sk_family; 400 __entry->family = sk->sk_family;
|
H A D | net_probe_common.h | 23 if (sk->sk_family == AF_INET6) { \
|
/openbmc/linux/net/core/ |
H A D | sock.c | 353 switch (sk->sk_family) { in sk_error_report() 464 switch (sk->sk_family) { in sock_needs_netstamp() 771 switch (READ_ONCE(sk->sk_family)) { in sk_mc_loop() 1466 if (sk->sk_family == PF_INET || sk->sk_family == PF_INET6) { in sk_setsockopt() 1471 } else if (sk->sk_family != PF_RDS) { in sk_setsockopt() 1677 v.val = sk->sk_family; in sk_getsockopt() 2035 af_family_kern_slock_key_strings[sk->sk_family], in sock_lock_init() 2036 af_family_kern_slock_keys + sk->sk_family, in sock_lock_init() 2037 af_family_kern_key_strings[sk->sk_family], in sock_lock_init() 2038 af_family_kern_keys + sk->sk_family); in sock_lock_init() [all …]
|
/openbmc/linux/security/apparmor/include/ |
H A D | net.h | 69 DEFINE_AUDIT_NET(NAME, OP, SK, (SK)->sk_family, (SK)->sk_type, \ 104 return aa_profile_af_perm(profile, ad, request, sk->sk_family, in aa_profile_af_sk_perm()
|
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_tcp_estats.c | 76 #define sk_family __sk_common.skc_family macro 217 if (_(sk->sk_family) == AF_INET6) in tcp_estats_conn_id_init()
|
H A D | bpf_iter_bpf_sk_storage_map.c | 30 if (sk->sk_family == AF_INET6) in rw_bpf_sk_storage_map()
|
H A D | bpf_iter_setsockopt.c | 49 if (sk->sk_family != AF_INET6 || in change_tcp_cc()
|
H A D | bpf_iter_udp4.c | 47 if (inet->sk.sk_family == AF_INET6) in dump_udp4()
|
H A D | bpf_tracing_net.h | 83 #define sk_family __sk_common.skc_family macro
|
/openbmc/linux/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
H A D | chtls_cm.c | 104 switch (sk->sk_family) { in chtls_find_netdev() 489 if (sk->sk_family == AF_INET) in chtls_destroy_sock() 679 stid = cxgb4_alloc_stid(cdev->tids, sk->sk_family, ctx); in chtls_listen_start() 687 if (sk->sk_family == PF_INET) { in chtls_listen_start() 722 cxgb4_free_stid(cdev->tids, stid, sk->sk_family); in chtls_listen_start() 743 cdev->lldi->rxq_ids[0], sk->sk_family == PF_INET6); in chtls_listen_stop() 746 if (sk->sk_family == PF_INET6) { in chtls_listen_stop() 779 cxgb4_free_stid(cdev->tids, stid, listen_ctx->lsk->sk_family); in chtls_pass_open_rpl() 802 cxgb4_free_stid(cdev->tids, stid, listen_ctx->lsk->sk_family); in chtls_close_listsrv_rpl() 843 cxgb4_remove_tid(tids, csk->port_id, tid, sk->sk_family); in chtls_release_resources() [all …]
|
/openbmc/linux/net/atm/ |
H A D | proc.c | 75 return !family || (sk->sk_family == family); in compare_family() 187 switch (sk->sk_family) { in vcc_info() 195 seq_printf(seq, "%3d", sk->sk_family); in vcc_info()
|
/openbmc/linux/net/sctp/ |
H A D | diag.c | 39 r->idiag_family = sk->sk_family; in inet_diag_msg_sctpasoc_fill() 46 if (sk->sk_family == AF_INET6) { in inet_diag_msg_sctpasoc_fill() 351 if (r->sdiag_family != AF_UNSPEC && sk->sk_family != r->sdiag_family) in sctp_sock_filter() 378 sk->sk_family != r->sdiag_family) in sctp_ep_dump()
|
H A D | bind_addr.c | 378 if (sctp_opt2sk(bp_sp)->sk_family == AF_INET6) in sctp_bind_addr_conflict() 380 else if (sctp_opt2sk(addr_sp)->sk_family == AF_INET6) in sctp_bind_addr_conflict() 495 fam = sk->sk_family; in sctp_is_any()
|
/openbmc/linux/net/rds/ |
H A D | tcp_listen.c | 116 ret = sock_create_lite(sock->sk->sk_family, in rds_tcp_accept_one() 154 sock->sk->sk_family, in rds_tcp_accept_one()
|
/openbmc/linux/net/mptcp/ |
H A D | mptcp_diag.c | 115 sk->sk_family != r->sdiag_family) in mptcp_diag_dump_listeners() 176 sk->sk_family != r->sdiag_family) in mptcp_diag_dump()
|
/openbmc/linux/include/linux/ |
H A D | ipv6.h | 337 #define ipv6_sk_rxinfo(sk) ((sk)->sk_family == PF_INET6 && \ 342 if (sk->sk_family == AF_INET6) in inet6_rcv_saddr()
|
H A D | sock_diag.h | 57 switch (sk->sk_family) { in sock_diag_destroy_group()
|
/openbmc/linux/net/sunrpc/ |
H A D | svcsock.c | 100 switch (sk->sk_family) { in svc_reclassify_socket() 160 switch (svsk->sk_sk->sk_family) { in svc_set_cmsg_data() 203 switch (sk->sk_family) { in svc_one_sock_name() 220 sk->sk_family); in svc_one_sock_name() 815 switch (svsk->sk_sk->sk_family) { in svc_udp_init() 1413 err = svc_register(serv, sock_net(sock->sk), inet->sk_family, in svc_setup_socket() 1474 if ((so->sk->sk_family != PF_INET) && (so->sk->sk_family != PF_INET6)) in svc_addsock()
|
/openbmc/linux/kernel/bpf/ |
H A D | reuseport_array.c | 203 if (nsk->sk_family != AF_INET && nsk->sk_family != AF_INET6) in reuseport_array_update_check()
|
/openbmc/linux/security/selinux/ |
H A D | netlabel.c | 284 if (asoc->base.sk->sk_family != PF_INET && in selinux_netlbl_sctp_assoc_request() 285 asoc->base.sk->sk_family != PF_INET6) in selinux_netlbl_sctp_assoc_request()
|