| /linux/net/sunrpc/ |
| H A D | addr.c | 143 struct sockaddr *sap, const size_t salen) in rpc_pton4() argument 148 if (buflen > INET_ADDRSTRLEN || salen < sizeof(struct sockaddr_in)) in rpc_pton4() 200 struct sockaddr *sap, const size_t salen) in rpc_pton6() argument 207 salen < sizeof(struct sockaddr_in6)) in rpc_pton6() 223 struct sockaddr *sap, const size_t salen) in rpc_pton6() argument 235 * @salen: size of buffer in bytes 245 struct sockaddr *sap, const size_t salen) in rpc_pton() argument 251 return rpc_pton6(net, buf, buflen, sap, salen); in rpc_pton() 252 return rpc_pton4(buf, buflen, sap, salen); in rpc_pton() 302 * @salen: size of buffer [all …]
|
| H A D | svcsock.c | 806 struct sockaddr *sa, int salen, in svc_udp_create() argument 809 return svc_create_socket(serv, IPPROTO_UDP, net, sa, salen, flags); in svc_udp_create() 1315 struct sockaddr *sa, int salen, in svc_tcp_create() argument 1318 return svc_create_socket(serv, IPPROTO_TCP, net, sa, salen, flags); in svc_tcp_create() 1512 int salen; in svc_addsock() local 1538 salen = kernel_getsockname(svsk->sk_sock, sin); in svc_addsock() 1539 if (salen >= 0) in svc_addsock() 1540 svc_xprt_set_local(&svsk->sk_xprt, sin, salen); in svc_addsock()
|
| H A D | rpcb_clnt.c | 368 struct sockaddr *srvaddr, size_t salen, in rpcb_create() argument 377 .addrsize = salen, in rpcb_create() 680 size_t salen; in rpcb_getport_async() local 705 salen = rpc_peeraddr(clnt, sap, sizeof(addr)); in rpcb_getport_async() 731 xprt->servername, sap, salen, in rpcb_getport_async()
|
| H A D | clnt.c | 1444 static int rpc_sockname(struct net *net, struct sockaddr *sap, size_t salen, in rpc_sockname() argument 1477 err = kernel_connect(sock, (struct sockaddr_unsized *)sap, salen, 0); in rpc_sockname() 1556 size_t salen; in rpc_localaddr() local 1561 salen = xprt->addrlen; in rpc_localaddr() 1562 memcpy(sap, &xprt->addr, salen); in rpc_localaddr() 1567 err = rpc_sockname(net, sap, salen, buf); in rpc_localaddr()
|
| /linux/include/linux/sunrpc/ |
| H A D | svc_xprt.h | 196 const size_t salen) in svc_xprt_set_local() argument 198 memcpy(&xprt->xpt_local, sa, salen); in svc_xprt_set_local() 199 xprt->xpt_locallen = salen; in svc_xprt_set_local() 203 const size_t salen) in svc_xprt_set_remote() argument 205 memcpy(&xprt->xpt_remote, sa, salen); in svc_xprt_set_remote() 206 xprt->xpt_remotelen = salen; in svc_xprt_set_remote()
|
| /linux/tools/testing/selftests/net/mptcp/ |
| H A D | mptcp_connect.c | 1076 socklen_t salen) in check_sockaddr() argument 1096 fprintf(stderr, "accept: Unknown pf %d, salen %u\n", pf, salen); in check_sockaddr() 1100 if (salen != wanted_size) in check_sockaddr() 1102 (int)salen, wanted_size); in check_sockaddr() 1109 static void check_getpeername(int fd, struct sockaddr_storage *ss, socklen_t salen) in check_getpeername() argument 1119 if (peersalen != salen) { in check_getpeername() 1120 fprintf(stderr, "%s: %d vs %d\n", __func__, peersalen, salen); in check_getpeername() 1130 xgetnameinfo((struct sockaddr *)ss, salen, in check_getpeername() 1136 fprintf(stderr, "%s: memcmp failure: accept %s vs peername %s, %s vs %s salen %d vs %d\n", in check_getpeername() 1137 __func__, a, c, b, d, peersalen, salen); in check_getpeername() [all …]
|
| /linux/fs/nfs/ |
| H A D | nfs4namespace.c | 168 size_t salen, struct net *net, int port) in nfs_parse_server_name() argument 173 ret = rpc_pton(net, string, len, sa, salen); in nfs_parse_server_name() 175 ret = rpc_uaddr2sockaddr(net, string, len, sa, salen); in nfs_parse_server_name() 177 ret = nfs_dns_resolve_name(net, string, len, ss, salen); in nfs_parse_server_name() 490 size_t salen; in nfs4_try_replacing_one_location() local 508 salen = nfs_parse_server_name(buf->data, buf->len, in nfs4_try_replacing_one_location() 510 if (salen == 0) in nfs4_try_replacing_one_location() 519 error = nfs4_update_server(server, hostname, sap, salen, net); in nfs4_try_replacing_one_location()
|
| H A D | dns_resolve.c | 21 struct sockaddr_storage *ss, size_t salen) in nfs_dns_resolve_name() argument 31 ret = rpc_pton(net, ip_addr, ip_len, sa, salen); in nfs_dns_resolve_name() 343 size_t namelen, struct sockaddr_storage *ss, size_t salen) in nfs_dns_resolve_name() argument 355 if (salen >= item->addrlen) { in nfs_dns_resolve_name()
|
| H A D | dns_resolve.h | 35 size_t namelen, struct sockaddr_storage *sa, size_t salen);
|
| H A D | nfs4client.c | 1134 * @salen: size of "sap" 1144 struct sockaddr_storage *sap, size_t salen, struct net *net) in nfs4_update_server() argument 1152 .addrlen = salen, in nfs4_update_server() 1162 .addrlen = salen, in nfs4_update_server()
|
| H A D | mount_clnt.c | 157 .addrsize = info->salen, in nfs_mount()
|
| /linux/fs/lockd/ |
| H A D | host.c | 56 const size_t salen; /* it's length */ member 120 nsm = nsm_get_handle(ni->net, ni->sap, ni->salen, in nlm_alloc_host() 136 memcpy(nlm_addr(host), ni->sap, ni->salen); in nlm_alloc_host() 137 host->h_addrlen = ni->salen; in nlm_alloc_host() 202 * @salen: length of server address 216 const size_t salen, in nlmclnt_lookup_host() argument 227 .salen = salen, in nlmclnt_lookup_host() 340 .salen = rqstp->rq_addrlen, in nlmsvc_lookup_host()
|
| H A D | mon.c | 273 const size_t salen, in nsm_create_handle() argument 288 memcpy(nsm_addr(new), sap, salen); in nsm_create_handle() 289 new->sm_addrlen = salen; in nsm_create_handle() 306 * @salen: length of socket address 319 const size_t salen, const char *hostname, in nsm_get_handle() argument 364 new = nsm_create_handle(sap, salen, hostname, hostname_len); in nsm_get_handle()
|
| /linux/drivers/net/ovpn/ |
| H A D | peer.c | 201 size_t salen = 0; in ovpn_peer_endpoints_update() local 221 salen = sizeof(*sa); in ovpn_peer_endpoints_update() 251 salen = sizeof(*sa6); in ovpn_peer_endpoints_update() 277 if (likely(!salen)) in ovpn_peer_endpoints_update() 311 salen = sizeof(*sa); in ovpn_peer_endpoints_update() 314 salen = sizeof(*sa6); in ovpn_peer_endpoints_update() 322 &bind->remote, salen); in ovpn_peer_endpoints_update() 939 size_t salen; in ovpn_peer_add_mp() local 961 salen = sizeof(*sa4); in ovpn_peer_add_mp() 969 salen = sizeof(*sa6); in ovpn_peer_add_mp() [all …]
|
| /linux/net/netfilter/ipvs/ |
| H A D | ip_vs_sync.c | 1440 static void get_mcast_sockaddr(union ipvs_sockaddr *sa, int *salen, in get_mcast_sockaddr() argument 1449 *salen = sizeof(sa->in6); in get_mcast_sockaddr() 1456 *salen = sizeof(sa->in); in get_mcast_sockaddr() 1469 int result, salen; in make_send_sock() local 1502 get_mcast_sockaddr(&mcast_addr, &salen, &ipvs->mcfg, id); in make_send_sock() 1504 salen, 0); in make_send_sock() 1526 int result, salen; in make_receive_sock() local 1542 get_mcast_sockaddr(&mcast_addr, &salen, &ipvs->bcfg, id); in make_receive_sock() 1544 result = kernel_bind(sock, (struct sockaddr_unsized *)&mcast_addr, salen); in make_receive_sock()
|
| /linux/net/sunrpc/xprtrdma/ |
| H A D | svc_rdma_transport.c | 72 struct sockaddr *sa, int salen, 355 struct sockaddr *sa, int salen, in svc_rdma_create() argument 381 svc_xprt_set_local(&cma_xprt->sc_xprt, sa, salen); in svc_rdma_create()
|
| /linux/include/linux/lockd/ |
| H A D | lockd.h | 233 const size_t salen, 261 const size_t salen,
|
| /linux/tools/testing/selftests/net/ |
| H A D | tun.c | 316 int salen = sockaddr_len(family); in udp_socket_open() local 322 if (bind(fd, (struct sockaddr *)ssa, salen) < 0) { in udp_socket_open() 327 if (do_connect && connect(fd, (struct sockaddr *)dsa, salen) < 0) { in udp_socket_open()
|
| /linux/include/trace/events/ |
| H A D | sunrpc.h | 1958 size_t salen, 1962 TP_ARGS(program, protocol, sap, salen, xprt), 1968 __sockaddr(addr, salen) 1975 __assign_sockaddr(addr, sap, salen);
|
| /linux/fs/nfsd/ |
| H A D | nfsctl.c | 231 size_t salen = sizeof(address); in write_unlock_ip() local 246 if (rpc_pton(net, fo_path, size, sap, salen) == 0) in write_unlock_ip()
|