/net/ipv6/ |
D | mip6.c | 203 struct xfrm_selector sel; in mip6_destopt_reject() local 226 memset(&sel, 0, sizeof(sel)); in mip6_destopt_reject() 227 memcpy(&sel.daddr, (xfrm_address_t *)&ipv6_hdr(skb)->daddr, in mip6_destopt_reject() 228 sizeof(sel.daddr)); in mip6_destopt_reject() 229 sel.prefixlen_d = 128; in mip6_destopt_reject() 230 memcpy(&sel.saddr, (xfrm_address_t *)&ipv6_hdr(skb)->saddr, in mip6_destopt_reject() 231 sizeof(sel.saddr)); in mip6_destopt_reject() 232 sel.prefixlen_s = 128; in mip6_destopt_reject() 233 sel.family = AF_INET6; in mip6_destopt_reject() 234 sel.proto = fl6->flowi6_proto; in mip6_destopt_reject() [all …]
|
D | ipcomp6.c | 89 memcpy(&t->sel, &x->sel, sizeof(t->sel)); in ipcomp6_tunnel_create()
|
D | ipv6_sockglue.c | 58 int ip6_ra_control(struct sock *sk, int sel) in ip6_ra_control() argument 66 new_ra = (sel >= 0) ? kmalloc(sizeof(*new_ra), GFP_KERNEL) : NULL; in ip6_ra_control() 67 if (sel >= 0 && !new_ra) in ip6_ra_control() 73 if (sel >= 0) { in ip6_ra_control() 92 new_ra->sel = sel; in ip6_ra_control()
|
D | esp6_offload.c | 178 if (x->sel.family != AF_INET6) { in xfrm6_beet_gso_segment()
|
D | ip6_output.c | 347 static int ip6_call_ra_chain(struct sk_buff *skb, int sel) in ip6_call_ra_chain() argument 355 if (sk && ra->sel == sel && in ip6_call_ra_chain()
|
D | esp6.c | 1208 if (x->sel.family != AF_INET6) in esp6_init_state()
|
D | ip6_vti.c | 372 if (x->sel.family == AF_UNSPEC) { in vti6_rcv_cb()
|
/net/sched/ |
D | cls_u32.c | 66 struct tc_u32_sel sel; member 95 const struct tc_u32_sel *sel, in u32_hash_fold() argument 98 unsigned int h = ntohl(key & sel->hmask) >> fshift; in u32_hash_fold() 116 int sel = 0; in u32_classify() local 123 n = rcu_dereference_bh(ht->ht[sel]); in u32_classify() 127 struct tc_u32_key *key = n->sel.keys; in u32_classify() 148 for (i = n->sel.nkeys; i > 0; i--, key++) { in u32_classify() 171 if (n->sel.flags & TC_U32_TERMINAL) { in u32_classify() 201 sel = 0; in u32_classify() 205 data = skb_header_pointer(skb, off + n->sel.hoff, 4, in u32_classify() [all …]
|
/net/xfrm/ |
D | xfrm_hash.h | 146 static inline unsigned int __sel_hash(const struct xfrm_selector *sel, in __sel_hash() argument 150 const xfrm_address_t *daddr = &sel->daddr; in __sel_hash() 151 const xfrm_address_t *saddr = &sel->saddr; in __sel_hash() 156 if (sel->prefixlen_d < dbits || in __sel_hash() 157 sel->prefixlen_s < sbits) in __sel_hash() 164 if (sel->prefixlen_d < dbits || in __sel_hash() 165 sel->prefixlen_s < sbits) in __sel_hash()
|
D | xfrm_state.c | 878 __xfrm4_init_tempsel(struct xfrm_selector *sel, const struct flowi *fl) in __xfrm4_init_tempsel() argument 882 sel->daddr.a4 = fl4->daddr; in __xfrm4_init_tempsel() 883 sel->saddr.a4 = fl4->saddr; in __xfrm4_init_tempsel() 884 sel->dport = xfrm_flowi_dport(fl, &fl4->uli); in __xfrm4_init_tempsel() 885 sel->dport_mask = htons(0xffff); in __xfrm4_init_tempsel() 886 sel->sport = xfrm_flowi_sport(fl, &fl4->uli); in __xfrm4_init_tempsel() 887 sel->sport_mask = htons(0xffff); in __xfrm4_init_tempsel() 888 sel->family = AF_INET; in __xfrm4_init_tempsel() 889 sel->prefixlen_d = 32; in __xfrm4_init_tempsel() 890 sel->prefixlen_s = 32; in __xfrm4_init_tempsel() [all …]
|
D | xfrm_policy.c | 198 __xfrm4_selector_match(const struct xfrm_selector *sel, const struct flowi *fl) in __xfrm4_selector_match() argument 202 return addr4_match(fl4->daddr, sel->daddr.a4, sel->prefixlen_d) && in __xfrm4_selector_match() 203 addr4_match(fl4->saddr, sel->saddr.a4, sel->prefixlen_s) && in __xfrm4_selector_match() 204 !((xfrm_flowi_dport(fl, &fl4->uli) ^ sel->dport) & sel->dport_mask) && in __xfrm4_selector_match() 205 !((xfrm_flowi_sport(fl, &fl4->uli) ^ sel->sport) & sel->sport_mask) && in __xfrm4_selector_match() 206 (fl4->flowi4_proto == sel->proto || !sel->proto) && in __xfrm4_selector_match() 207 (fl4->flowi4_oif == sel->ifindex || !sel->ifindex); in __xfrm4_selector_match() 211 __xfrm6_selector_match(const struct xfrm_selector *sel, const struct flowi *fl) in __xfrm6_selector_match() argument 215 return addr_match(&fl6->daddr, &sel->daddr, sel->prefixlen_d) && in __xfrm6_selector_match() 216 addr_match(&fl6->saddr, &sel->saddr, sel->prefixlen_s) && in __xfrm6_selector_match() [all …]
|
D | xfrm_user.c | 170 switch (p->sel.family) { in verify_newsa_info() 175 if (p->sel.prefixlen_d > 32 || p->sel.prefixlen_s > 32) in verify_newsa_info() 182 if (p->sel.prefixlen_d > 128 || p->sel.prefixlen_s > 128) in verify_newsa_info() 501 memcpy(&x->sel, &p->sel, sizeof(x->sel)); in copy_from_user_state() 511 if (!x->sel.family && !(p->flags & XFRM_STATE_AF_UNSPEC)) in copy_from_user_state() 512 x->sel.family = p->family; in copy_from_user_state() 799 memcpy(&p->sel, &x->sel, sizeof(p->sel)); in copy_to_user_state() 1579 switch (p->sel.family) { in verify_newpolicy_info() 1581 if (p->sel.prefixlen_d > 32 || p->sel.prefixlen_s > 32) in verify_newpolicy_info() 1588 if (p->sel.prefixlen_d > 128 || p->sel.prefixlen_s > 128) in verify_newpolicy_info() [all …]
|
D | xfrm_input.c | 213 iph->daddr = x->sel.daddr.a4; in xfrm4_remove_beet_encap() 214 iph->saddr = x->sel.saddr.a4; in xfrm4_remove_beet_encap() 315 ip6h->daddr = x->sel.daddr.in6; in xfrm6_remove_beet_encap() 316 ip6h->saddr = x->sel.saddr.in6; in xfrm6_remove_beet_encap() 372 if (x->sel.family == AF_UNSPEC) { in xfrm_prepare_input() 680 if (x->sel.family == AF_UNSPEC) { in xfrm_input()
|
D | xfrm_compat.c | 24 struct xfrm_selector sel; member 33 struct xfrm_selector sel; member 48 struct xfrm_selector sel; member
|
D | xfrm_output.c | 238 if (x->sel.family != AF_INET6) in xfrm4_beet_encap_add() 367 if (x->sel.family != AF_INET6) in xfrm6_beet_encap_add() 869 if (x->sel.family == AF_UNSPEC) in xfrm_inner_extract_output()
|
D | xfrm_device.c | 57 if (x->sel.family != AF_INET6) { in __xfrm_mode_beet_prep()
|
D | xfrm_interface_core.c | 242 if (x->sel.family == AF_UNSPEC) { in xfrmi_rcv_cb()
|
/net/key/ |
D | af_key.c | 801 if (!xfrm_addr_equal(&x->sel.saddr, &x->props.saddr, x->props.family)) in __pfkey_xfrm_state2msg() 944 if (!xfrm_addr_equal(&x->sel.saddr, &x->props.saddr, in __pfkey_xfrm_state2msg() 953 pfkey_proto_from_xfrm(x->sel.proto); in __pfkey_xfrm_state2msg() 954 addr->sadb_address_prefixlen = x->sel.prefixlen_s; in __pfkey_xfrm_state2msg() 957 pfkey_sockaddr_fill(&x->sel.saddr, x->sel.sport, in __pfkey_xfrm_state2msg() 1253 x->sel.family = pfkey_sadb_addr2xfrm_addr(addr, &x->sel.saddr); in pfkey_msg2xfrm_state() 1254 x->sel.prefixlen_s = addr->sadb_address_prefixlen; in pfkey_msg2xfrm_state() 1257 if (!x->sel.family) in pfkey_msg2xfrm_state() 1258 x->sel.family = x->props.family; in pfkey_msg2xfrm_state() 2368 struct xfrm_selector sel; in pfkey_spddelete() local [all …]
|
/net/ipv4/ |
D | ipcomp.c | 69 memcpy(&t->sel, &x->sel, sizeof(t->sel)); in ipcomp_tunnel_create()
|
D | esp4_offload.c | 143 if (x->sel.family != AF_INET6) { in xfrm4_beet_gso_segment()
|
D | ip_vti.c | 120 if (x->sel.family == AF_UNSPEC) { in vti_rcv_cb()
|
D | esp4.c | 1166 else if (x->props.mode == XFRM_MODE_BEET && x->sel.family != AF_INET6) in esp_init_state()
|
/net/tipc/ |
D | node.h | 111 int tipc_node_get_mtu(struct net *net, u32 addr, u32 sel, bool connected);
|
D | node.c | 197 static struct tipc_link *node_active_link(struct tipc_node *n, int sel) in node_active_link() argument 199 int bearer_id = n->active_links[sel & 1]; in node_active_link() 207 int tipc_node_get_mtu(struct net *net, u32 addr, u32 sel, bool connected) in tipc_node_get_mtu() argument 225 bearer_id = n->active_links[sel & 1]; in tipc_node_get_mtu()
|