| /linux/net/ax25/ |
| H A D | ax25_iface.c | 57 struct ax25_protocol *protocol; in ax25_protocol_release() local 60 protocol = protocol_list; in ax25_protocol_release() 61 if (protocol == NULL) in ax25_protocol_release() 64 if (protocol->pid == pid) { in ax25_protocol_release() 65 protocol_list = protocol->next; in ax25_protocol_release() 69 while (protocol != NULL && protocol->next != NULL) { in ax25_protocol_release() 70 if (protocol->next->pid == pid) { in ax25_protocol_release() 71 protocol->next = protocol->next->next; in ax25_protocol_release() 75 protocol = protocol->next; in ax25_protocol_release() 161 struct ax25_protocol *protocol; in ax25_protocol_function() local [all …]
|
| /linux/include/trace/events/ |
| H A D | smbus.h | 26 char read_write, u8 command, int protocol, 28 TP_ARGS(adap, addr, flags, read_write, command, protocol, data), 30 protocol == I2C_SMBUS_PROC_CALL || 31 protocol == I2C_SMBUS_BLOCK_PROC_CALL), 38 __field(__u32, protocol ) 45 __entry->protocol = protocol; 47 switch (protocol) { 74 __print_symbolic(__entry->protocol, 94 char read_write, u8 command, int protocol), 95 TP_ARGS(adap, addr, flags, read_write, command, protocol), [all …]
|
| /linux/tools/testing/selftests/net/forwarding/ |
| H A D | tc_flower.sh | 44 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 46 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ 58 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower 59 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower 70 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 72 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ 84 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower 85 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower 94 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 96 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ [all …]
|
| H A D | tc_actions.sh | 60 local protocol=$2 66 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 75 tc filter add dev $swp1 ingress protocol $protocol pref 1 handle 101 \ 85 tc filter del dev $swp1 ingress protocol $protocol pref 1 handle 101 \ 87 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower 96 tc filter add dev $swp1 ingress protocol ip pref 2 handle 102 flower \ 105 tc filter add dev $swp1 ingress protocol ip pref 1 handle 101 flower \ 117 tc filter del dev $swp1 ingress protocol ip pref 2 handle 102 flower 118 tc filter del dev $swp1 ingress protocol ip pref 1 handle 101 flower 131 tc filter add dev $swp1 ingress protocol ip pref 1 handle 101 flower \ [all …]
|
| H A D | tc_chains.sh | 38 tc filter add dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \ 47 tc filter del dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \ 57 tc filter add dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \ 59 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ 61 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 76 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower 77 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower 78 tc filter del dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \ 128 tc chain add dev $h2 ingress protocol ip \ 130 tc chain add dev $h2 ingress chain 1 protocol ip \ [all …]
|
| H A D | router_multicast.sh | 217 tc filter add dev $h2 ingress protocol ip pref 1 handle 122 flower \ 219 tc filter add dev $h3 ingress protocol ip pref 1 handle 133 flower \ 243 tc filter del dev $h3 ingress protocol ip pref 1 handle 133 flower 244 tc filter del dev $h2 ingress protocol ip pref 1 handle 122 flower 257 tc filter add dev $h2 ingress protocol ipv6 pref 1 handle 122 flower \ 259 tc filter add dev $h3 ingress protocol ipv6 pref 1 handle 133 flower \ 283 tc filter del dev $h3 ingress protocol ipv6 pref 1 handle 133 flower 284 tc filter del dev $h2 ingress protocol ipv6 pref 1 handle 122 flower 300 tc filter add dev $h1 ingress protocol ip pref 1 handle 1 flower \ 302 tc filter add dev $h2 ingress protocol ip pref 1 handle 1 flower \ [all …]
|
| H A D | tc_flower_cfm.sh | 60 tc filter add dev $h2 ingress protocol cfm pref 1 handle 101 \ 62 tc filter add dev $h2 ingress protocol cfm pref 1 handle 102 \ 85 tc filter del dev $h2 ingress protocol cfm pref 1 handle 101 flower 86 tc filter del dev $h2 ingress protocol cfm pref 1 handle 102 flower 96 tc filter add dev $h2 ingress protocol cfm pref 1 handle 101 \ 98 tc filter add dev $h2 ingress protocol cfm pref 1 handle 102 \ 100 tc filter add dev $h2 ingress protocol cfm pref 1 handle 103 \ 131 tc filter del dev $h2 ingress protocol cfm pref 1 handle 101 flower 132 tc filter del dev $h2 ingress protocol cfm pref 1 handle 102 flower 133 tc filter del dev $h2 ingress protocol cfm pref 1 handle 103 flower [all …]
|
| /linux/drivers/ata/pata_parport/ |
| H A D | Kconfig | 3 comment "Parallel IDE protocol modules" 7 tristate "ATEN EH-100 protocol" 11 protocol. This protocol is used in some inexpensive low performance 15 tristate "MicroSolutions backpack (Series 5) protocol" 19 parallel port Series 5 IDE protocol. (Most BACKPACK drives made 27 tristate "MicroSolutions backpack (Series 6) protocol" 31 parallel port Series 6 IDE protocol. (Most BACKPACK drives made 40 tristate "DataStor Commuter protocol" 44 protocol from DataStor. 47 tristate "DataStor EP-2000 protocol" [all …]
|
| /linux/net/netfilter/ |
| H A D | utils.c | 11 unsigned int dataoff, u8 protocol) in nf_ip_checksum() argument 20 if ((protocol != IPPROTO_TCP && protocol != IPPROTO_UDP && in nf_ip_checksum() 23 skb->len - dataoff, protocol, in nf_ip_checksum() 30 if (protocol != IPPROTO_TCP && protocol != IPPROTO_UDP) in nf_ip_checksum() 35 protocol, 0); in nf_ip_checksum() 45 u8 protocol) in nf_ip_checksum_partial() argument 53 return nf_ip_checksum(skb, hook, dataoff, protocol); in nf_ip_checksum_partial() 56 skb->csum = csum_tcpudp_nofold(iph->saddr, iph->daddr, protocol, in nf_ip_checksum_partial() 65 unsigned int dataoff, u8 protocol) in nf_ip6_checksum() argument 75 skb->len - dataoff, protocol, in nf_ip6_checksum() [all …]
|
| /linux/tools/testing/selftests/drivers/net/mlxsw/ |
| H A D | tc_restrictions.sh | 47 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 59 tc filter del block 22 protocol ip pref 1 handle 101 flower 64 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 73 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 77 tc filter del block 22 protocol ip pref 1 handle 101 flower 95 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 108 tc filter del block 22 protocol ip pref 1 handle 101 flower 113 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 123 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 130 tc filter add block 22 protocol ip pref 1 handle 101 flower \ [all …]
|
| /linux/tools/testing/selftests/drivers/net/mlxsw/spectrum-2/ |
| H A D | tc_flower.sh | 101 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 110 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ 125 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower 133 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower 147 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 149 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ 158 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower 166 tc filter add dev $h2 ingress protocol ip pref 3 handle 103 flower \ 175 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower 183 tc filter del dev $h2 ingress protocol ip pref 3 handle 103 flower [all …]
|
| /linux/include/uapi/linux/usb/ |
| H A D | audio.h | 273 int protocol) in uac_mixer_unit_wChannelConfig() argument 275 if (protocol == UAC_VERSION_1) in uac_mixer_unit_wChannelConfig() 286 int protocol) in uac_mixer_unit_iChannelNames() argument 288 return (protocol == UAC_VERSION_1) ? in uac_mixer_unit_iChannelNames() 294 int protocol) in uac_mixer_unit_bmControls() argument 296 switch (protocol) { in uac_mixer_unit_bmControls() 370 int protocol) in uac_processing_unit_wChannelConfig() argument 372 if (protocol == UAC_VERSION_1) in uac_processing_unit_wChannelConfig() 383 int protocol) in uac_processing_unit_iChannelNames() argument 385 return (protocol == UAC_VERSION_1) ? in uac_processing_unit_iChannelNames() [all …]
|
| /linux/net/ipv6/ |
| H A D | xfrm6_protocol.c | 27 static inline struct xfrm6_protocol __rcu **proto_handlers(u8 protocol) in proto_handlers() argument 29 switch (protocol) { in proto_handlers() 46 static int xfrm6_rcv_cb(struct sk_buff *skb, u8 protocol, int err) in xfrm6_rcv_cb() argument 50 struct xfrm6_protocol __rcu **head = proto_handlers(protocol); in xfrm6_rcv_cb() 55 for_each_protocol_rcu(*proto_handlers(protocol), handler) in xfrm6_rcv_cb() 219 static inline const struct inet6_protocol *netproto(unsigned char protocol) in netproto() argument 221 switch (protocol) { in netproto() 234 unsigned char protocol) in xfrm6_protocol_register() argument 242 if (!proto_handlers(protocol) || !netproto(protocol)) in xfrm6_protocol_register() 247 if (!rcu_dereference_protected(*proto_handlers(protocol), in xfrm6_protocol_register() [all …]
|
| H A D | protocol.c | 28 int inet6_add_protocol(const struct inet6_protocol *prot, unsigned char protocol) in inet6_add_protocol() argument 30 return !cmpxchg((const struct inet6_protocol **)&inet6_protos[protocol], in inet6_add_protocol() 35 int inet6_del_protocol(const struct inet6_protocol *prot, unsigned char protocol) in inet6_del_protocol() argument 39 ret = (cmpxchg((const struct inet6_protocol **)&inet6_protos[protocol], in inet6_del_protocol() 52 int inet6_add_offload(const struct net_offload *prot, unsigned char protocol) in inet6_add_offload() argument 54 return !cmpxchg((const struct net_offload **)&inet6_offloads[protocol], in inet6_add_offload() 59 int inet6_del_offload(const struct net_offload *prot, unsigned char protocol) in inet6_del_offload() argument 63 ret = (cmpxchg((const struct net_offload **)&inet6_offloads[protocol], in inet6_del_offload()
|
| /linux/security/tomoyo/ |
| H A D | network.c | 26 u8 protocol; member 198 return p1->protocol == p2->protocol && in tomoyo_same_inet_acl() 217 return p1->protocol == p2->protocol && in tomoyo_same_unix_acl() 287 const char *protocol = tomoyo_read_token(param); in tomoyo_write_inet_network() local 290 for (e.protocol = 0; e.protocol < TOMOYO_SOCK_MAX; e.protocol++) in tomoyo_write_inet_network() 291 if (!strcmp(protocol, tomoyo_proto_keyword[e.protocol])) in tomoyo_write_inet_network() 296 if (e.protocol == TOMOYO_SOCK_MAX || !e.perm) in tomoyo_write_inet_network() 332 const char *protocol = tomoyo_read_token(param); in tomoyo_write_unix_network() local 335 for (e.protocol = 0; e.protocol < TOMOYO_SOCK_MAX; e.protocol++) in tomoyo_write_unix_network() 336 if (!strcmp(protocol, tomoyo_proto_keyword[e.protocol])) in tomoyo_write_unix_network() [all …]
|
| /linux/tools/testing/selftests/net/ |
| H A D | reuseport_bpf.c | 32 int protocol; member 158 fd[i] = socket(p.recv_family, p.protocol, 0); in build_recv_group() 173 if (p.protocol == SOCK_STREAM) { in build_recv_group() 192 const int fd = socket(p.send_family, p.protocol, 0), one = 1; in send_from() 244 if (p.protocol == SOCK_STREAM) { in test_recv_order() 312 fd1 = socket(p.recv_family, p.protocol, 0); in test_extra_filter() 315 fd2 = socket(p.recv_family, p.protocol, 0); in test_extra_filter() 368 fd = socket(p.recv_family, p.protocol, 0); in test_filter_no_reuseport() 467 .protocol = SOCK_DGRAM, in main() 474 .protocol = SOCK_DGRAM, in main() [all …]
|
| /linux/net/ipv4/ |
| H A D | protocol.c | 32 int inet_add_protocol(const struct net_protocol *prot, unsigned char protocol) in inet_add_protocol() argument 34 return !cmpxchg((const struct net_protocol **)&inet_protos[protocol], in inet_add_protocol() 39 int inet_add_offload(const struct net_offload *prot, unsigned char protocol) in inet_add_offload() argument 41 return !cmpxchg((const struct net_offload **)&inet_offloads[protocol], in inet_add_offload() 46 int inet_del_protocol(const struct net_protocol *prot, unsigned char protocol) in inet_del_protocol() argument 50 ret = (cmpxchg((const struct net_protocol **)&inet_protos[protocol], in inet_del_protocol() 59 int inet_del_offload(const struct net_offload *prot, unsigned char protocol) in inet_del_offload() argument 63 ret = (cmpxchg((const struct net_offload **)&inet_offloads[protocol], in inet_del_offload()
|
| /linux/security/selinux/ |
| H A D | netport.c | 78 static struct sel_netport *sel_netport_find(u8 protocol, u16 pnum) in sel_netport_find() argument 85 if (port->psec.port == pnum && port->psec.protocol == protocol) in sel_netport_find() 132 static int sel_netport_sid_slow(u8 protocol, u16 pnum, u32 *sid) in sel_netport_sid_slow() argument 139 port = sel_netport_find(protocol, pnum); in sel_netport_sid_slow() 146 ret = security_port_sid(protocol, pnum, sid); in sel_netport_sid_slow() 156 new->psec.protocol = protocol; in sel_netport_sid_slow() 182 int sel_netport_sid(u8 protocol, u16 pnum, u32 *sid) in sel_netport_sid() argument 187 port = sel_netport_find(protocol, pnum); in sel_netport_sid() 195 return sel_netport_sid_slow(protocol, pnum, sid); in sel_netport_sid()
|
| /linux/tools/testing/selftests/landlock/ |
| H A D | net_test.c | 50 srv->protocol = prot; in set_service() 93 (prot->protocol == IPPROTO_TCP || prot->protocol == IPPROTO_IP); in prot_is_tcp() 108 ret = socket(srv->protocol.domain, srv->protocol.type | SOCK_CLOEXEC, in socket_variant() 109 srv->protocol.protocol); in socket_variant() 122 switch (srv->protocol.domain) { in get_addrlen() 145 switch (srv->protocol.domain) { in set_port() 191 switch (srv->protocol.domain) { in bind_variant_addrlen() 227 switch (srv->protocol.domain) { in connect_variant_addrlen() 257 FIXTURE(protocol) in FIXTURE() argument 262 FIXTURE_VARIANT(protocol) in FIXTURE_VARIANT() argument [all …]
|
| /linux/Documentation/userspace-api/media/rc/ |
| H A D | rc-protos.rst | 9 IR is encoded as a series of pulses and spaces, using a protocol. These 12 across different devices for a given protocol. 27 how scancodes are encoded for each protocol. 32 This IR protocol uses manchester encoding to encode 14 bits. There is a 36 protocol, or the manchester BPF decoder. 182 The jvc protocol is much like nec, without the inverted values. It is 191 The sony protocol is a pulse-width encoding. There are three variants, 218 The sony protocol is a pulse-width encoding. There are three variants, 245 The sony protocol is a pulse-width encoding. There are three variants, 278 The nec protocol encodes an 8 bit address and an 8 bit command. It is [all …]
|
| /linux/drivers/media/rc/img-ir/ |
| H A D | Kconfig | 31 bool "NEC protocol support" 39 bool "JVC protocol support" 42 Say Y here to enable support for the JVC protocol in the ImgTec 46 bool "Sony protocol support" 49 Say Y here to enable support for the Sony protocol in the ImgTec 53 bool "Sharp protocol support" 56 Say Y here to enable support for the Sharp protocol in the ImgTec 60 bool "Sanyo protocol support" 63 Say Y here to enable support for the Sanyo protocol (used by Sanyo, 67 bool "Philips RC5 protocol support" [all …]
|
| /linux/drivers/net/ppp/ |
| H A D | pppox.c | 114 static int pppox_create(struct net *net, struct socket *sock, int protocol, in pppox_create() argument 119 if (protocol < 0 || protocol > PX_MAX_PROTO) in pppox_create() 123 if (!pppox_protos[protocol]) in pppox_create() 124 request_module("net-pf-%d-proto-%d", PF_PPPOX, protocol); in pppox_create() 125 if (!pppox_protos[protocol] || in pppox_create() 126 !try_module_get(pppox_protos[protocol]->owner)) in pppox_create() 129 rc = pppox_protos[protocol]->create(net, sock, kern); in pppox_create() 131 module_put(pppox_protos[protocol]->owner); in pppox_create()
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | test_tc_tunnel.c | 48 __be16 protocol; 96 * network protocol, and derive the outer header fields from in __encap_ipv4() 119 iph_inner.protocol = iph6_inner.nexthdr; in __encap_ipv4() 133 if (iph_inner.ihl != 5 || iph_inner.protocol != IPPROTO_TCP) in __encap_ipv4() 168 h_outer.l4hdr.gre.protocol = bpf_htons(l2_proto); in __encap_ipv4() 221 h_outer.ip.protocol = encap_proto; in __encap_ipv4() 299 h_outer.l4hdr.gre.protocol = bpf_htons(l2_proto); in __encap_ipv6() 424 if (skb->protocol == __bpf_constant_htons(ETH_P_IP)) in encap_ipv6_ipip6() 433 if (skb->protocol == __bpf_constant_htons(ETH_P_IP)) 442 if (skb->protocol in __encap_ipip_none() 59 __be16 protocol; global() member [all...] |
| /linux/net/netfilter/ipset/ |
| H A D | ip_set_getport.c | 25 get_port(const struct sk_buff *skb, int protocol, unsigned int protooff, in get_port() argument 28 switch (protocol) { in get_port() 92 *proto = protocol; in get_port() 103 int protocol = iph->protocol; in ip_set_get_ip4_port() local 106 if (protocol <= 0) in ip_set_get_ip4_port() 110 switch (protocol) { in ip_set_get_ip4_port() 122 *proto = protocol; in ip_set_get_ip4_port() 126 return get_port(skb, protocol, protooff, src, port, proto); in ip_set_get_ip4_port()
|
| /linux/net/ceph/ |
| H A D | auth.c | 177 ceph_encode_32_safe(&p, end, ac->protocol, e_range); in build_request() 184 ceph_auth_proto_name(ac->protocol), ret); in build_request() 204 int protocol; in ceph_handle_auth_reply() local 216 protocol = ceph_decode_32(&p); in ceph_handle_auth_reply() 236 if (!protocol && result < 0) { in ceph_handle_auth_reply() 241 if (ac->protocol && ac->protocol != protocol) { in ceph_handle_auth_reply() 243 ac->protocol = 0; in ceph_handle_auth_reply() 246 if (ac->protocol != protocol) { in ceph_handle_auth_reply() 247 ret = init_protocol(ac, protocol); in ceph_handle_auth_reply() 250 ceph_auth_proto_name(protocol), ret); in ceph_handle_auth_reply() [all …]
|