/kernel/linux/linux-6.6/net/ipv4/ |
H A D | inet_hashtables.c | 50 if (sk->sk_family == AF_INET6 && in sk_ehashfn() 113 tb->family = sk->sk_family; in inet_bind2_bucket_init() 114 if (sk->sk_family == AF_INET6) in inet_bind2_bucket_init() 152 if (sk->sk_family != tb2->family) { in inet_bind2_bucket_addr_match() 153 if (sk->sk_family == AF_INET) in inet_bind2_bucket_addr_match() 161 if (sk->sk_family == AF_INET6) in inet_bind2_bucket_addr_match() 307 if (sk->sk_family == AF_INET6) in inet_lhash2_bucket_sk() 334 if (sk->sk_family == PF_INET) in compute_score() 636 if (sk->sk_family == AF_INET) { in inet_ehash_lookup_by_sk() 643 else if (sk->sk_family in inet_ehash_lookup_by_sk() [all...] |
H A D | udp_tunnel_core.c | 92 ti.sa_family = sk->sk_family; in udp_tunnel_push_rx_port() 106 ti.sa_family = sk->sk_family; in udp_tunnel_drop_rx_port() 122 ti.sa_family = sk->sk_family; in udp_tunnel_notify_add_rx_port() 142 ti.sa_family = sk->sk_family; in udp_tunnel_notify_del_rx_port()
|
H A D | udp_bpf.c | 17 if (sk->sk_family == AF_INET6) in sk_udp_recvmsg() 143 int family = sk->sk_family == AF_INET ? UDP_BPF_IPV4 : UDP_BPF_IPV6; in udp_bpf_update_proto() 151 if (sk->sk_family == AF_INET6) in udp_bpf_update_proto()
|
H A D | ping.c | 198 sk->sk_family == AF_INET) { in ping_lookup() 208 sk->sk_family == AF_INET6) { in ping_lookup() 261 if (sk->sk_family == AF_INET6) in ping_init_sock() 312 if (sk->sk_family == AF_INET) { in ping_check_bind_addr() 341 } else if (sk->sk_family == AF_INET6) { in ping_check_bind_addr() 446 if (sk->sk_family == AF_INET && isk->inet_rcv_saddr) in ping_bind() 449 if (sk->sk_family == AF_INET6 && !ipv6_addr_any(&sk->sk_v6_rcv_saddr)) in ping_bind() 460 if (sk->sk_family == AF_INET6) in ping_bind() 855 int family = sk->sk_family; in ping_recvmsg() 1043 sk->sk_family in ping_get_first() [all...] |
H A D | inet_timewait_sock.c | 201 tw->tw_family = sk->sk_family; in inet_twsk_alloc() 301 if (sk->sk_family != family || in inet_twsk_purge() 308 if (unlikely(sk->sk_family != family || in inet_twsk_purge()
|
/kernel/linux/linux-5.10/net/ipv4/ |
H A D | udp_bpf.c | 46 int family = sk->sk_family == AF_INET ? UDP_BPF_IPV4 : UDP_BPF_IPV6; in udp_bpf_get_proto() 48 if (sk->sk_family == AF_INET6) in udp_bpf_get_proto()
|
H A D | inet_hashtables.c | 50 if (sk->sk_family == AF_INET6 && in sk_ehashfn() 57 if (sk->sk_family == AF_NINET) { in sk_ehashfn() 193 if (sk->sk_family == AF_INET6) in inet_lhash2_bucket_sk() 215 if (sk->sk_reuseport && sk->sk_family == AF_INET6) in inet_hash2() 256 if (sk->sk_family == PF_INET) in compute_score() 540 if (sk->sk_family == AF_INET) { in inet_ehash_lookup_by_sk() 547 else if (sk->sk_family == AF_INET6) { in inet_ehash_lookup_by_sk() 624 sk2->sk_family == sk->sk_family && in inet_reuseport_add_sock() 659 sk->sk_family in __inet_hash() [all...] |
H A D | udp_tunnel_core.c | 98 ti.sa_family = sk->sk_family; in udp_tunnel_push_rx_port() 116 ti.sa_family = sk->sk_family; in udp_tunnel_drop_rx_port() 132 ti.sa_family = sk->sk_family; in udp_tunnel_notify_add_rx_port() 156 ti.sa_family = sk->sk_family; in udp_tunnel_notify_del_rx_port()
|
H A D | ping.c | 203 sk->sk_family == AF_INET) { in ping_lookup() 213 sk->sk_family == AF_INET6) { in ping_lookup() 268 if (sk->sk_family == AF_INET6) in ping_init_sock() 306 if (sk->sk_family == AF_INET) { in ping_check_bind_addr() 336 } else if (sk->sk_family == AF_INET6) { in ping_check_bind_addr() 441 if (sk->sk_family == AF_INET && isk->inet_rcv_saddr) in ping_bind() 444 if (sk->sk_family == AF_INET6 && !ipv6_addr_any(&sk->sk_v6_rcv_saddr)) in ping_bind() 455 if (sk->sk_family == AF_INET6) in ping_bind() 864 int family = sk->sk_family; in ping_recvmsg() 1041 sk->sk_family in ping_get_first() [all...] |
H A D | inet_timewait_sock.c | 180 tw->tw_family = sk->sk_family; in inet_twsk_alloc() 277 if (sk->sk_family != family || in inet_twsk_purge() 284 if (unlikely(sk->sk_family != family || in inet_twsk_purge()
|
/kernel/linux/linux-6.6/include/trace/events/ |
H A D | sock.h | 169 __entry->family = sk->sk_family; 181 if (sk->sk_family == AF_INET6) { 230 __entry->family = sk->sk_family; 242 if (sk->sk_family == AF_INET6) { 281 __entry->family = sk->sk_family; 309 __entry->family = sk->sk_family;
|
H A D | tcp.h | 28 if (sk->sk_family == AF_INET6) { \ 79 __entry->family = sk->sk_family; 147 __entry->family = sk->sk_family; 217 __entry->family = sk->sk_family; 277 __entry->family = sk->sk_family; 400 __entry->family = sk->sk_family;
|
H A D | net_probe_common.h | 23 if (sk->sk_family == AF_INET6) { \
|
/kernel/linux/linux-6.6/net/core/ |
H A D | sock.c | 352 switch (sk->sk_family) { in sk_error_report() 463 switch (sk->sk_family) { in sock_needs_netstamp() 769 /* IPV6_ADDRFORM can change sk->sk_family under us. */ in sk_mc_loop() 770 switch (READ_ONCE(sk->sk_family)) { in sk_mc_loop() 1462 if (sk->sk_family == PF_INET || sk->sk_family == PF_INET6) { in sk_setsockopt() 1467 } else if (sk->sk_family != PF_RDS) { in sk_setsockopt() 1673 v.val = sk->sk_family; in sk_getsockopt() 2039 af_family_kern_slock_key_strings[sk->sk_family], in sock_lock_init() 2040 af_family_kern_slock_keys + sk->sk_family, in sock_lock_init() [all...] |
/kernel/linux/linux-5.10/security/apparmor/include/ |
H A D | net.h | 68 DEFINE_AUDIT_NET(NAME, OP, SK, (SK)->sk_family, (SK)->sk_type, \ 101 return aa_profile_af_perm(profile, sa, request, sk->sk_family, in aa_profile_af_sk_perm()
|
/kernel/linux/linux-6.6/security/apparmor/include/ |
H A D | net.h | 69 DEFINE_AUDIT_NET(NAME, OP, SK, (SK)->sk_family, (SK)->sk_type, \ 104 return aa_profile_af_perm(profile, ad, request, sk->sk_family, in aa_profile_af_sk_perm()
|
/kernel/linux/linux-5.10/net/core/ |
H A D | sock.c | 418 switch (sk->sk_family) { in sock_needs_netstamp() 693 /* IPV6_ADDRFORM can change sk->sk_family under us. */ in sk_mc_loop() 694 switch (READ_ONCE(sk->sk_family)) { in sk_mc_loop() 1202 if (sk->sk_family == PF_INET || sk->sk_family == PF_INET6) { in sock_setsockopt() 1208 } else if (sk->sk_family != PF_RDS) { in sock_setsockopt() 1364 v.val = sk->sk_family; in sock_getsockopt() 1646 af_family_kern_slock_key_strings[sk->sk_family], in sock_lock_init() 1647 af_family_kern_slock_keys + sk->sk_family, in sock_lock_init() 1648 af_family_kern_key_strings[sk->sk_family], in sock_lock_init() [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/ |
H A D | bpf_iter_bpf_sk_storage_map.c | 29 if (sk->sk_family == AF_INET6) in dump_bpf_sk_storage_map()
|
H A D | test_tcp_estats.c | 76 #define sk_family __sk_common.skc_family macro 217 if (_(sk->sk_family) == AF_INET6) in tcp_estats_conn_id_init()
|
H A D | bpf_tracing_net.h | 35 #define sk_family __sk_common.skc_family macro
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
H A D | bpf_iter_bpf_sk_storage_map.c | 30 if (sk->sk_family == AF_INET6) in rw_bpf_sk_storage_map()
|
H A D | test_tcp_estats.c | 76 #define sk_family __sk_common.skc_family macro 217 if (_(sk->sk_family) == AF_INET6) in tcp_estats_conn_id_init()
|
/kernel/linux/linux-5.10/include/trace/events/ |
H A D | sock.h | 169 __entry->family = sk->sk_family; 181 if (sk->sk_family == AF_INET6) {
|
H A D | net_probe_common.h | 23 if (sk->sk_family == AF_INET6) { \
|
/kernel/linux/linux-5.10/net/sunrpc/ |
H A D | svcsock.c | 88 switch (sk->sk_family) { in svc_reclassify_socket() 157 switch (svsk->sk_sk->sk_family) { in svc_set_cmsg_data() 200 switch (sk->sk_family) { in svc_one_sock_name() 217 sk->sk_family); in svc_one_sock_name() 675 switch (svsk->sk_sk->sk_family) { in svc_udp_init() 1313 err = svc_register(serv, sock_net(sock->sk), inet->sk_family, in svc_setup_socket() 1386 if ((so->sk->sk_family != PF_INET) && (so->sk->sk_family != PF_INET6)) in svc_addsock()
|