/Linux-v4.19/net/ipv4/ |
D | udp_tunnel.c | 90 ti.sa_family = sk->sk_family; in udp_tunnel_push_rx_port() 108 ti.sa_family = sk->sk_family; in udp_tunnel_drop_rx_port() 124 ti.sa_family = sk->sk_family; in udp_tunnel_notify_add_rx_port() 148 ti.sa_family = sk->sk_family; in udp_tunnel_notify_del_rx_port()
|
D | ping.c | 202 sk->sk_family == AF_INET) { in ping_lookup() 212 sk->sk_family == AF_INET6) { in ping_lookup() 266 if (sk->sk_family == AF_INET6) in ping_init_sock() 303 if (sk->sk_family == AF_INET) { in ping_check_bind_addr() 330 } else if (sk->sk_family == AF_INET6) { in ping_check_bind_addr() 394 if (sk->sk_family == AF_INET) { in ping_clear_saddr() 398 } else if (sk->sk_family == AF_INET6) { in ping_clear_saddr() 440 if (sk->sk_family == AF_INET && isk->inet_rcv_saddr) in ping_bind() 443 if (sk->sk_family == AF_INET6 && !ipv6_addr_any(&sk->sk_v6_rcv_saddr)) in ping_bind() 454 if (sk->sk_family == AF_INET6) in ping_bind() [all …]
|
D | inet_hashtables.c | 50 if (sk->sk_family == AF_INET6 && in sk_ehashfn() 178 if (sk->sk_family == AF_INET6) in inet_lhash2_bucket_sk() 200 if (sk->sk_reuseport && sk->sk_family == AF_INET6) in inet_hash2() 236 score = sk->sk_family == PF_INET ? 2 : 1; in compute_score() 568 sk2->sk_family == sk->sk_family && in inet_reuseport_add_sock() 601 sk->sk_family == AF_INET6) in __inet_hash()
|
D | inet_diag.c | 72 r->idiag_family = sk->sk_family; in inet_diag_msg_common_fill() 80 if (sk->sk_family == AF_INET6) { in inet_diag_msg_common_fill() 663 if (sk->sk_family == AF_INET6) { in entry_fill_addrs() 682 entry.family = sk->sk_family; in inet_diag_bc_sk() 869 offsetof(struct sock, sk_family)); in twsk_build_assert() 929 sk->sk_family != r->sdiag_family) in inet_diag_dump_icsk() 988 sk->sk_family != r->sdiag_family) in inet_diag_dump_icsk()
|
/Linux-v4.19/net/core/ |
D | sock.c | 382 switch (sk->sk_family) { in sock_needs_netstamp() 635 switch (sk->sk_family) { in sk_mc_loop() 1016 if (sk->sk_family == PF_INET || sk->sk_family == PF_INET6) { in sock_setsockopt() 1019 } else if (sk->sk_family != PF_RDS) { in sock_setsockopt() 1150 v.val = sk->sk_family; in sock_getsockopt() 1420 af_family_kern_slock_key_strings[sk->sk_family], in sock_lock_init() 1421 af_family_kern_slock_keys + sk->sk_family, in sock_lock_init() 1422 af_family_kern_key_strings[sk->sk_family], in sock_lock_init() 1423 af_family_kern_keys + sk->sk_family); in sock_lock_init() 1427 af_family_slock_key_strings[sk->sk_family], in sock_lock_init() [all …]
|
/Linux-v4.19/security/apparmor/include/ |
D | net.h | 72 DEFINE_AUDIT_NET(NAME, OP, SK, (SK)->sk_family, (SK)->sk_type, \ 98 return aa_profile_af_perm(profile, sa, request, sk->sk_family, in aa_profile_af_sk_perm()
|
/Linux-v4.19/include/linux/ |
D | ipv6.h | 343 if (sk_from->sk_family == PF_INET6) in inet_sk_copy_descendant() 351 #define ipv6_sk_rxinfo(sk) ((sk)->sk_family == PF_INET6 && \ 356 if (sk->sk_family == AF_INET6) in inet6_rcv_saddr()
|
D | sock_diag.h | 39 switch (sk->sk_family) { in sock_diag_destroy_group()
|
/Linux-v4.19/tools/testing/selftests/bpf/ |
D | test_tcp_estats.c | 76 #define sk_family __sk_common.skc_family macro 217 if (_(sk->sk_family) == AF_INET6) in tcp_estats_conn_id_init()
|
/Linux-v4.19/net/atm/ |
D | proc.c | 75 return !family || (sk->sk_family == family); in compare_family() 187 switch (sk->sk_family) { in vcc_info() 195 seq_printf(seq, "%3d", sk->sk_family); in vcc_info()
|
/Linux-v4.19/net/sctp/ |
D | bind_addr.c | 356 if (sctp_opt2sk(bp_sp)->sk_family == AF_INET6) in sctp_bind_addr_conflict() 358 else if (sctp_opt2sk(addr_sp)->sk_family == AF_INET6) in sctp_bind_addr_conflict() 477 fam = sk->sk_family; in sctp_is_any()
|
D | diag.c | 54 r->idiag_family = sk->sk_family; in inet_diag_msg_sctpasoc_fill() 61 if (sk->sk_family == AF_INET6) { in inet_diag_msg_sctpasoc_fill() 380 if (r->sdiag_family != AF_UNSPEC && sk->sk_family != r->sdiag_family) in sctp_sock_filter() 407 sk->sk_family != r->sdiag_family) in sctp_ep_dump()
|
/Linux-v4.19/include/trace/events/ |
D | sock.h | 166 __entry->family = sk->sk_family; 178 if (sk->sk_family == AF_INET6) {
|
D | net_probe_common.h | 23 if (sk->sk_family == AF_INET6) { \
|
/Linux-v4.19/kernel/bpf/ |
D | cgroup.c | 532 if (sk->sk_family != AF_INET && sk->sk_family != AF_INET6) in __cgroup_bpf_run_filter_skb() 601 if (sk->sk_family != AF_INET && sk->sk_family != AF_INET6) in __cgroup_bpf_run_filter_sock_addr()
|
D | reuseport_array.c | 222 if (nsk->sk_family != AF_INET && nsk->sk_family != AF_INET6) in reuseport_array_update_check()
|
/Linux-v4.19/security/apparmor/ |
D | lsm.c | 870 return af_select(sock->sk->sk_family, in apparmor_socket_bind() 886 return af_select(sock->sk->sk_family, in apparmor_socket_connect() 900 return af_select(sock->sk->sk_family, in apparmor_socket_listen() 918 return af_select(sock->sk->sk_family, in apparmor_socket_accept() 931 return af_select(sock->sk->sk_family, in aa_sock_msg_perm() 961 return af_select(sock->sk->sk_family, in aa_sock_perm() 990 return af_select(sock->sk->sk_family, in aa_sock_opt_perm()
|
/Linux-v4.19/net/rds/ |
D | tcp_listen.c | 143 ret = sock_create_lite(sock->sk->sk_family, in rds_tcp_accept_one() 181 sock->sk->sk_family, in rds_tcp_accept_one()
|
/Linux-v4.19/net/sunrpc/ |
D | svcsock.c | 91 switch (sk->sk_family) { in svc_reclassify_socket() 156 switch (svsk->sk_sk->sk_family) { in svc_set_cmsg_data() 298 switch (sk->sk_family) { in svc_one_sock_name() 315 sk->sk_family); in svc_one_sock_name() 730 switch (svsk->sk_sk->sk_family) { in svc_udp_init() 1379 err = svc_register(serv, sock_net(sock->sk), inet->sk_family, in svc_setup_socket() 1456 if ((so->sk->sk_family != PF_INET) && (so->sk->sk_family != PF_INET6)) in svc_addsock()
|
/Linux-v4.19/security/selinux/ |
D | netlabel.c | 297 if (ep->base.sk->sk_family != PF_INET && in selinux_netlbl_sctp_assoc_request() 298 ep->base.sk->sk_family != PF_INET6) in selinux_netlbl_sctp_assoc_request()
|
/Linux-v4.19/net/ipv4/netfilter/ |
D | nf_defrag_ipv4.c | 70 if (sk && sk_fullsock(sk) && (sk->sk_family == PF_INET) && in ipv4_conntrack_defrag()
|
/Linux-v4.19/include/net/ |
D | inet6_hashtables.h | 115 ((__sk)->sk_family == AF_INET6) && \
|
D | udp_tunnel.h | 169 if (sock->sk->sk_family == PF_INET6) in udp_tunnel_encap_enable()
|
/Linux-v4.19/drivers/crypto/chelsio/chtls/ |
D | chtls_cm.c | 609 if (sk->sk_family != PF_INET) in chtls_listen_start() 636 stid = cxgb4_alloc_stid(cdev->tids, sk->sk_family, ctx); in chtls_listen_start() 656 cxgb4_free_stid(cdev->tids, stid, sk->sk_family); in chtls_listen_start() 701 cxgb4_free_stid(cdev->tids, stid, listen_ctx->lsk->sk_family); in chtls_pass_open_rpl() 726 cxgb4_free_stid(cdev->tids, stid, listen_ctx->lsk->sk_family); in chtls_close_listsrv_rpl() 753 cxgb4_remove_tid(tids, csk->port_id, tid, sk->sk_family); in chtls_release_resources() 1164 cxgb4_remove_tid(cdev->tids, 0, tid, sk->sk_family); in chtls_pass_accept_request() 1216 cxgb4_insert_tid(cdev->tids, newsk, tid, newsk->sk_family); in chtls_pass_accept_request() 1995 sk->sk_family); in chtls_abort_rpl_rss()
|
/Linux-v4.19/security/smack/ |
D | smack_lsm.c | 2354 if (sk->sk_family == PF_INET6) { in smack_sk_free_security() 2503 rc = netlbl_sock_setattr(sk, sk->sk_family, &skp->smk_netlabel); in smack_netlabel() 2792 if (sock->sk->sk_family == PF_INET) { in smack_inode_setsecurity() 2803 if (sock->sk->sk_family == PF_INET6) in smack_inode_setsecurity() 2882 if (sock->sk != NULL && sock->sk->sk_family == PF_INET6) in smack_socket_bind() 2917 switch (sock->sk->sk_family) { in smack_socket_connect() 3771 switch (sock->sk->sk_family) { in smack_socket_sendmsg() 3929 u16 family = sk->sk_family; in smack_socket_sock_rcv_skb() 4088 family = sock->sk->sk_family; in smack_socket_getpeersec_dgram() 4140 (sk->sk_family != PF_INET && sk->sk_family != PF_INET6)) in smack_sock_graft() [all …]
|