| /linux/net/ipv4/ |
| H A D | datagram.c | 4 * Linux INET implementation 21 struct inet_sock *inet = inet_sk(sk); in __ip4_datagram_connect() local 39 saddr = inet->inet_saddr; in __ip4_datagram_connect() 42 oif = READ_ONCE(inet->mc_index); in __ip4_datagram_connect() 44 saddr = READ_ONCE(inet->mc_addr); in __ip4_datagram_connect() 46 oif = READ_ONCE(inet->uc_index); in __ip4_datagram_connect() 48 fl4 = &inet->cork.fl.u.ip4; in __ip4_datagram_connect() 50 sk->sk_protocol, inet->inet_sport, in __ip4_datagram_connect() 66 inet->inet_daddr = fl4->daddr; in __ip4_datagram_connect() 67 inet in __ip4_datagram_connect() 104 const struct inet_sock *inet = inet_sk(sk); ip4_datagram_release_cb() local [all...] |
| H A D | ping.c | 3 * INET An implementation of the TCP/IP protocol suite for the LINUX 4 * operating system. INET is implemented using the BSD Socket 27 #include <linux/inet.h> 695 struct inet_sock *inet = inet_sk(sk); in ping_v4_sendmsg() local 706 pr_debug("ping_v4_sendmsg(sk=%p,sk->num=%u)\n", inet, inet->inet_num); in ping_v4_sendmsg() 728 daddr = inet->inet_daddr; in ping_v4_sendmsg() 732 ipcm_init_sk(&ipc, inet); in ping_v4_sendmsg() 747 inet_opt = rcu_dereference(inet->inet_opt); in ping_v4_sendmsg() 766 scope = ip_sendmsg_scope(inet, &ipc, msg); in ping_v4_sendmsg() 770 ipc.oif = READ_ONCE(inet->mc_index); in ping_v4_sendmsg() [all …]
|
| H A D | protocol.c | 3 * INET An implementation of the TCP/IP protocol suite for the LINUX 4 * operating system. INET is implemented using the BSD Socket 7 * INET protocol dispatch tables.
|
| H A D | ip_output.c | 3 * INET An implementation of the TCP/IP protocol suite for the LINUX 4 * operating system. INET is implemented using the BSD Socket 59 #include <linux/inet.h> 137 static inline int ip_select_ttl(const struct inet_sock *inet, in ip_select_ttl() argument 140 int ttl = READ_ONCE(inet->uc_ttl); in ip_select_ttl() 155 const struct inet_sock *inet = inet_sk(sk); in ip_build_and_send_pkt() local 167 iph->ttl = ip_select_ttl(inet, &rt->dst); in ip_build_and_send_pkt() 466 struct inet_sock *inet = inet_sk(sk); in __ip_queue_xmit() local 478 inet_opt = rcu_dereference(inet->inet_opt); in __ip_queue_xmit() 487 inet_sk_init_flowi4(inet, fl4); in __ip_queue_xmit() [all …]
|
| H A D | udp.c | 3 * INET An implementation of the TCP/IP protocol suite for the LINUX 4 * operating system. INET is implemented using the BSD Socket 93 #include <linux/inet.h> 374 struct inet_sock *inet; in compute_score() local 387 inet = inet_sk(sk); in compute_score() 388 if (inet->inet_daddr) { in compute_score() 389 if (inet->inet_daddr != saddr) in compute_score() 394 if (inet->inet_dport) { in compute_score() 395 if (inet->inet_dport != sport) in compute_score() 795 const struct inet_sock *inet = inet_sk(sk); in __udp_is_mcast_sock() local [all …]
|
| /linux/tools/testing/selftests/net/netfilter/ |
| H A D | nft_nat.sh | 69 ip netns exec "$ns" nft list counter inet filter "$counter" 1>&2 77 if ! ip netns exec "$ns" nft list counter inet filter ns0in | grep -q "packets 1 bytes 84";then 82 if ! ip netns exec "$ns" nft list counter inet filter ns0out | grep -q "packets 1 bytes 84";then 88 if ! ip netns exec "$ns" nft list counter inet filter ns0in6 | grep -q "$expect";then 92 if ! ip netns exec "$ns" nft list counter inet filter ns0out6 | grep -q "$expect";then 105 if ! ip netns exec "$ns0" nft list counter inet filter ns0in | grep -q "packets 0 bytes 0";then 110 if ! ip netns exec "$ns0" nft list counter inet filter ns0in6 | grep -q "packets 0 bytes 0";then 115 if ! ip netns exec "$ns0" nft list counter inet filter ns0out | grep -q "packets 0 bytes 0";then 119 if ! ip netns exec "$ns0" nft list counter inet filter ns0out6 | grep -q "packets 0 bytes 0";then 126 if ! ip netns exec "$ns0" nft list counter inet filte [all...] |
| H A D | nft_nat_zones.sh | 117 table inet raw { 166 ( echo add element inet raw iiftomark \{ 171 echo add element inet raw iiftozone \{ 195 if ! ip netns exec "$gw" nft get element inet raw inicmp "{ 10.1.0.3 . \"veth$i\" . 10.3.0.99 }" | grep -q "{ 10.1.0.3 . \"veth$i\" . 10.3.0.99 counter packets 3 bytes 252 }"; then 198 ip netns exec "$gw" nft get element inet raw inicmp "{ 10.1.0.3 . \"veth$i\" . 10.3.0.99 }" 1>&2 203 if ! ip netns exec "$gw" nft get element inet raw inicmp "{ 10.3.0.99 . \"veth0\" . 10.3.0.1 }" | grep -q "{ 10.3.0.99 . \"veth0\" . 10.3.0.1 counter packets $((3 * maxclients)) bytes $((252 * maxclients)) }"; then 206 ip netns exec "$gw" nft get element inet raw inicmp "{ 10.3.99 . \"veth0\" . 10.3.0.1 }" 1>&2 250 if ! ip netns exec "$gw" nft get element inet raw inflows "{ 10.1.0.3 . 10000 . \"veth$i\" . 10.3.0.99 . 5201 }" > /dev/null;then 260 if ! ip netns exec "$gw" nft get element inet raw inflows "{ 10.3.0.99 . 5201 . \"veth0\" . 10.3.0.1 . 10000 }" > /dev/null;then
|
| H A D | conntrack_tcp_unreplied.sh | 39 if ! ip netns exec "$ns2" nft list counter inet filter "$name" | grep -q "$expect"; then 41 ip netns exec "$ns2" nft list counter inet filter "$name" 1>&2 69 table inet filter { 86 table inet filter { 127 table inet nat {
|
| H A D | nft_concat_range.sh | 439 table inet filter { 1003 nft reset counter inet filter test >/dev/null 2>&1 1139 # Add single entry to 'test' set in 'inet filter' table 1141 if ! nft add element inet filter test "${1}"; then 1179 if ! nft delete element inet filter test "${1}"; then 1186 # Return packet count for elem $1 from 'test' counter in 'inet filter' table 1189 for token in $(nft reset element inet filter test "${1}" ); do 1195 # Return packet count from 'test' counter in 'inet filter' table 1198 for token in $(nft list counter inet filter test); do 1268 nft reset counter inet filter test >/dev/null [all …]
|
| H A D | nft_fib.sh | 43 table inet filter { 56 table inet filter { 69 table inet filter { 166 table inet filter { 192 …if ! ip netns exec "$ns" nft list table inet filter | grep 'fib saddr . iif' | grep "$address" | g… 194 ip netns exec "$ns" nft list table inet filter 345 table inet t { 444 …if ! ip netns exec "$nsrouter" nft get element inet t "$setname" { "$iifname" . "$addr" . "$type" … 446 ip netns exec "$nsrouter" nft list set inet t "$setname" 455 …if ! ip netns exec "$nsrouter" nft delete element inet t "$setname" { "$iifname" . "$addr" . "$typ… [all …]
|
| H A D | nft_queue.sh | 91 table inet $name { 127 table inet countrules { 323 table inet filter { 368 table inet filter { 390 if ! ip netns exec "$ns1" nft list chain inet filter "$n" | grep -q "oifname \"$d\" icmp type echo-request counter packets 1"; then 446 table inet sctpq { 464 if ! ip netns exec "$nsrouter" nft delete table inet sctpq; then 478 table inet sctpq { 499 if ! ip netns exec "$ns1" nft delete table inet sctpq; then 525 table inet udp [all...] |
| /linux/include/trace/events/ |
| H A D | tcp.h | 37 const struct inet_sock *inet = inet_sk(sk); 44 __entry->sport = ntohs(inet->inet_sport); 45 __entry->dport = ntohs(inet->inet_dport); 49 *p32 = inet->inet_saddr; 52 *p32 = inet->inet_daddr; 54 TP_STORE_ADDRS(__entry, inet->inet_saddr, inet->inet_daddr, 109 const struct inet_sock *inet = inet_sk(sk); 111 TP_STORE_ADDR_PORTS(__entry, inet, sk); 157 struct inet_sock *inet = inet_sk(sk); 162 __entry->sport = ntohs(inet->inet_sport); [all …]
|
| H A D | net_probe_common.h | 6 #define TP_STORE_ADDR_PORTS_V4(__entry, inet, sk) \ argument 11 v4->sin_port = inet->inet_sport; \ 12 v4->sin_addr.s_addr = inet->inet_saddr; \ 15 v4->sin_port = inet->inet_dport; \ 16 v4->sin_addr.s_addr = inet->inet_daddr; \ 21 #define TP_STORE_ADDR_PORTS(__entry, inet, sk) \ argument 27 v6->sin6_port = inet->inet_sport; \ 31 v6->sin6_port = inet->inet_dport; \ 34 TP_STORE_ADDR_PORTS_V4(__entry, inet, sk); \ 39 #define TP_STORE_ADDR_PORTS(__entry, inet, sk) \ argument [all …]
|
| H A D | sock.h | 161 const struct inet_sock *inet = inet_sk(sk); 170 __entry->sport = ntohs(inet->inet_sport); 171 __entry->dport = ntohs(inet->inet_dport); 174 *p32 = inet->inet_saddr; 177 *p32 = inet->inet_daddr; 179 TP_STORE_ADDRS(__entry, inet->inet_saddr, inet->inet_daddr, 212 const struct inet_sock *inet = inet_sk(sk); 218 __entry->sport = ntohs(inet->inet_sport); 219 __entry->dport = ntohs(inet [all...] |
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | sock_destroy_prog.c | 78 const struct inet_sock *inet; in iter_tcp6_server() local 93 inet = &icsk->icsk_inet; in iter_tcp6_server() 94 srcp = inet->inet_sport; in iter_tcp6_server() 131 struct inet_sock *inet; in iter_udp6_server() local 137 inet = &udp_sk->inet; in iter_udp6_server() 138 srcp = inet->inet_sport; in iter_udp6_server()
|
| H A D | bpf_iter_tcp4.c | 79 const struct inet_sock *inet; in dump_tcp_sock() local 89 inet = &icsk->icsk_inet; in dump_tcp_sock() 90 sp = &inet->sk; in dump_tcp_sock() 93 dest = inet->inet_daddr; in dump_tcp_sock() 94 src = inet->inet_rcv_saddr; in dump_tcp_sock() 95 destp = bpf_ntohs(inet->inet_dport); in dump_tcp_sock() 96 srcp = bpf_ntohs(inet->inet_sport); in dump_tcp_sock()
|
| /linux/drivers/net/ |
| H A D | Kconfig | 43 depends on INET 77 depends on NET && INET 107 depends on NET && INET 185 depends on INET 204 depends on INET 223 depends on INET 236 depends on INET 251 depends on INET 267 depends on INET 280 depends on INET [all …]
|
| /linux/net/dccp/ |
| H A D | ipv4.c | |
| H A D | trace.h | |
| /linux/Documentation/devicetree/bindings/leds/ |
| H A D | leds-bcm6328.yaml | 137 label = "green:inet"; 193 label = "red:inet"; 217 label = "green:inet"; 278 inet@1 { 282 /* INET activity routed to INET LED */ 333 /* USB/INET link/activity routed to USB LED */ 363 /* USB link/act and INET act routed to USB LED */
|
| /linux/fs/ocfs2/cluster/ |
| H A D | netdebug.c | 297 struct inet_sock *inet = NULL; in sc_show_sock_container() local 305 inet = inet_sk(sc->sc_sock->sk); in sc_show_sock_container() 307 saddr = (__force __be32)inet->inet_saddr; in sc_show_sock_container() 308 daddr = (__force __be32)inet->inet_daddr; in sc_show_sock_container() 309 sport = (__force __be16)inet->inet_sport; in sc_show_sock_container() 310 dport = (__force __be16)inet->inet_dport; in sc_show_sock_container() 313 /* XXX sigh, inet-> doesn't have sparse annotation so any in sc_show_sock_container() 332 &saddr, inet ? ntohs(sport) : 0, in sc_show_sock_container() 333 &daddr, inet ? ntohs(dport) : 0, in sc_show_sock_container()
|
| /linux/security/tomoyo/ |
| H A D | network.c | 11 /* Structure for holding inet domain socket's address. */ 28 struct tomoyo_inet_addr_info inet; member 136 * "enum tomoyo_mac_index" for inet domain socket. 356 * @family: Name of socket family ("inet" or "unix"). 373 * tomoyo_audit_inet_log - Audit INET network log. 393 return tomoyo_audit_net_log(r, "inet", r->param.inet_network.protocol, in tomoyo_audit_inet_log() 412 * tomoyo_check_inet_acl - Check permission for inet domain socket operation. 461 * tomoyo_inet_entry - Check permission for INET network operation. 479 r.param.inet_network.is_ipv6 = address->inet.is_ipv6; in tomoyo_inet_entry() 480 r.param.inet_network.address = address->inet.address; in tomoyo_inet_entry() [all …]
|
| /linux/drivers/block/drbd/ |
| H A D | Kconfig | 6 comment "DRBD disabled because PROC_FS or INET not selected" 7 depends on PROC_FS='n' || INET='n' 11 depends on PROC_FS && INET
|
| /linux/net/atm/ |
| H A D | Kconfig | 24 depends on ATM && INET 52 depends on ATM && INET && ATM_LANE!=n 61 depends on ATM && INET
|
| /linux/net/rds/ |
| H A D | tcp_listen.c | 103 struct inet_sock *inet; in rds_tcp_accept_one() local 126 inet = inet_sk(new_sock->sk); in rds_tcp_accept_one() 132 ipv6_addr_set_v4mapped(inet->inet_saddr, &saddr); in rds_tcp_accept_one() 133 ipv6_addr_set_v4mapped(inet->inet_daddr, &daddr); in rds_tcp_accept_one() 139 my_addr, ntohs(inet->inet_sport), in rds_tcp_accept_one() 140 peer_addr, ntohs(inet->inet_dport)); in rds_tcp_accept_one()
|