Home
last modified time | relevance | path

Searched refs:sel (Results 1 – 24 of 24) sorted by relevance

/net/ipv6/
Dmip6.c203 struct xfrm_selector sel; in mip6_destopt_reject() local
226 memset(&sel, 0, sizeof(sel)); in mip6_destopt_reject()
227 memcpy(&sel.daddr, (xfrm_address_t *)&ipv6_hdr(skb)->daddr, in mip6_destopt_reject()
228 sizeof(sel.daddr)); in mip6_destopt_reject()
229 sel.prefixlen_d = 128; in mip6_destopt_reject()
230 memcpy(&sel.saddr, (xfrm_address_t *)&ipv6_hdr(skb)->saddr, in mip6_destopt_reject()
231 sizeof(sel.saddr)); in mip6_destopt_reject()
232 sel.prefixlen_s = 128; in mip6_destopt_reject()
233 sel.family = AF_INET6; in mip6_destopt_reject()
234 sel.proto = fl6->flowi6_proto; in mip6_destopt_reject()
[all …]
Dipcomp6.c89 memcpy(&t->sel, &x->sel, sizeof(t->sel)); in ipcomp6_tunnel_create()
Dipv6_sockglue.c58 int ip6_ra_control(struct sock *sk, int sel) in ip6_ra_control() argument
66 new_ra = (sel >= 0) ? kmalloc(sizeof(*new_ra), GFP_KERNEL) : NULL; in ip6_ra_control()
67 if (sel >= 0 && !new_ra) in ip6_ra_control()
73 if (sel >= 0) { in ip6_ra_control()
92 new_ra->sel = sel; in ip6_ra_control()
Desp6_offload.c178 if (x->sel.family != AF_INET6) { in xfrm6_beet_gso_segment()
Dip6_output.c347 static int ip6_call_ra_chain(struct sk_buff *skb, int sel) in ip6_call_ra_chain() argument
355 if (sk && ra->sel == sel && in ip6_call_ra_chain()
Dip6_vti.c372 if (x->sel.family == AF_UNSPEC) { in vti6_rcv_cb()
Desp6.c1208 if (x->sel.family != AF_INET6) in esp6_init_state()
/net/sched/
Dcls_u32.c66 struct tc_u32_sel sel; member
95 const struct tc_u32_sel *sel, in u32_hash_fold() argument
98 unsigned int h = ntohl(key & sel->hmask) >> fshift; in u32_hash_fold()
116 int sel = 0; in u32_classify() local
123 n = rcu_dereference_bh(ht->ht[sel]); in u32_classify()
127 struct tc_u32_key *key = n->sel.keys; in u32_classify()
148 for (i = n->sel.nkeys; i > 0; i--, key++) { in u32_classify()
171 if (n->sel.flags & TC_U32_TERMINAL) { in u32_classify()
201 sel = 0; in u32_classify()
205 data = skb_header_pointer(skb, off + n->sel.hoff, 4, in u32_classify()
[all …]
/net/xfrm/
Dxfrm_hash.h146 static inline unsigned int __sel_hash(const struct xfrm_selector *sel, in __sel_hash() argument
150 const xfrm_address_t *daddr = &sel->daddr; in __sel_hash()
151 const xfrm_address_t *saddr = &sel->saddr; in __sel_hash()
156 if (sel->prefixlen_d < dbits || in __sel_hash()
157 sel->prefixlen_s < sbits) in __sel_hash()
164 if (sel->prefixlen_d < dbits || in __sel_hash()
165 sel->prefixlen_s < sbits) in __sel_hash()
Dxfrm_state.c878 __xfrm4_init_tempsel(struct xfrm_selector *sel, const struct flowi *fl) in __xfrm4_init_tempsel() argument
882 sel->daddr.a4 = fl4->daddr; in __xfrm4_init_tempsel()
883 sel->saddr.a4 = fl4->saddr; in __xfrm4_init_tempsel()
884 sel->dport = xfrm_flowi_dport(fl, &fl4->uli); in __xfrm4_init_tempsel()
885 sel->dport_mask = htons(0xffff); in __xfrm4_init_tempsel()
886 sel->sport = xfrm_flowi_sport(fl, &fl4->uli); in __xfrm4_init_tempsel()
887 sel->sport_mask = htons(0xffff); in __xfrm4_init_tempsel()
888 sel->family = AF_INET; in __xfrm4_init_tempsel()
889 sel->prefixlen_d = 32; in __xfrm4_init_tempsel()
890 sel->prefixlen_s = 32; in __xfrm4_init_tempsel()
[all …]
Dxfrm_policy.c198 __xfrm4_selector_match(const struct xfrm_selector *sel, const struct flowi *fl) in __xfrm4_selector_match() argument
202 return addr4_match(fl4->daddr, sel->daddr.a4, sel->prefixlen_d) && in __xfrm4_selector_match()
203 addr4_match(fl4->saddr, sel->saddr.a4, sel->prefixlen_s) && in __xfrm4_selector_match()
204 !((xfrm_flowi_dport(fl, &fl4->uli) ^ sel->dport) & sel->dport_mask) && in __xfrm4_selector_match()
205 !((xfrm_flowi_sport(fl, &fl4->uli) ^ sel->sport) & sel->sport_mask) && in __xfrm4_selector_match()
206 (fl4->flowi4_proto == sel->proto || !sel->proto) && in __xfrm4_selector_match()
207 (fl4->flowi4_oif == sel->ifindex || !sel->ifindex); in __xfrm4_selector_match()
211 __xfrm6_selector_match(const struct xfrm_selector *sel, const struct flowi *fl) in __xfrm6_selector_match() argument
215 return addr_match(&fl6->daddr, &sel->daddr, sel->prefixlen_d) && in __xfrm6_selector_match()
216 addr_match(&fl6->saddr, &sel->saddr, sel->prefixlen_s) && in __xfrm6_selector_match()
[all …]
Dxfrm_user.c170 switch (p->sel.family) { in verify_newsa_info()
175 if (p->sel.prefixlen_d > 32 || p->sel.prefixlen_s > 32) in verify_newsa_info()
182 if (p->sel.prefixlen_d > 128 || p->sel.prefixlen_s > 128) in verify_newsa_info()
501 memcpy(&x->sel, &p->sel, sizeof(x->sel)); in copy_from_user_state()
511 if (!x->sel.family && !(p->flags & XFRM_STATE_AF_UNSPEC)) in copy_from_user_state()
512 x->sel.family = p->family; in copy_from_user_state()
799 memcpy(&p->sel, &x->sel, sizeof(p->sel)); in copy_to_user_state()
1579 switch (p->sel.family) { in verify_newpolicy_info()
1581 if (p->sel.prefixlen_d > 32 || p->sel.prefixlen_s > 32) in verify_newpolicy_info()
1588 if (p->sel.prefixlen_d > 128 || p->sel.prefixlen_s > 128) in verify_newpolicy_info()
[all …]
Dxfrm_input.c213 iph->daddr = x->sel.daddr.a4; in xfrm4_remove_beet_encap()
214 iph->saddr = x->sel.saddr.a4; in xfrm4_remove_beet_encap()
315 ip6h->daddr = x->sel.daddr.in6; in xfrm6_remove_beet_encap()
316 ip6h->saddr = x->sel.saddr.in6; in xfrm6_remove_beet_encap()
372 if (x->sel.family == AF_UNSPEC) { in xfrm_prepare_input()
694 if (x->sel.family == AF_UNSPEC) { in xfrm_input()
Dxfrm_compat.c24 struct xfrm_selector sel; member
33 struct xfrm_selector sel; member
48 struct xfrm_selector sel; member
Dxfrm_output.c238 if (x->sel.family != AF_INET6) in xfrm4_beet_encap_add()
367 if (x->sel.family != AF_INET6) in xfrm6_beet_encap_add()
869 if (x->sel.family == AF_UNSPEC) in xfrm_inner_extract_output()
Dxfrm_device.c57 if (x->sel.family != AF_INET6) { in __xfrm_mode_beet_prep()
Dxfrm_interface_core.c288 if (x->sel.family == AF_UNSPEC) { in xfrmi_rcv_cb()
/net/key/
Daf_key.c801 if (!xfrm_addr_equal(&x->sel.saddr, &x->props.saddr, x->props.family)) in __pfkey_xfrm_state2msg()
944 if (!xfrm_addr_equal(&x->sel.saddr, &x->props.saddr, in __pfkey_xfrm_state2msg()
953 pfkey_proto_from_xfrm(x->sel.proto); in __pfkey_xfrm_state2msg()
954 addr->sadb_address_prefixlen = x->sel.prefixlen_s; in __pfkey_xfrm_state2msg()
957 pfkey_sockaddr_fill(&x->sel.saddr, x->sel.sport, in __pfkey_xfrm_state2msg()
1253 x->sel.family = pfkey_sadb_addr2xfrm_addr(addr, &x->sel.saddr); in pfkey_msg2xfrm_state()
1254 x->sel.prefixlen_s = addr->sadb_address_prefixlen; in pfkey_msg2xfrm_state()
1257 if (!x->sel.family) in pfkey_msg2xfrm_state()
1258 x->sel.family = x->props.family; in pfkey_msg2xfrm_state()
2368 struct xfrm_selector sel; in pfkey_spddelete() local
[all …]
/net/ipv4/
Dipcomp.c69 memcpy(&t->sel, &x->sel, sizeof(t->sel)); in ipcomp_tunnel_create()
Desp4_offload.c143 if (x->sel.family != AF_INET6) { in xfrm4_beet_gso_segment()
Dip_vti.c120 if (x->sel.family == AF_UNSPEC) { in vti_rcv_cb()
Desp4.c1166 else if (x->props.mode == XFRM_MODE_BEET && x->sel.family != AF_INET6) in esp_init_state()
/net/tipc/
Dnode.h111 int tipc_node_get_mtu(struct net *net, u32 addr, u32 sel, bool connected);
Dnode.c197 static struct tipc_link *node_active_link(struct tipc_node *n, int sel) in node_active_link() argument
199 int bearer_id = n->active_links[sel & 1]; in node_active_link()
207 int tipc_node_get_mtu(struct net *net, u32 addr, u32 sel, bool connected) in tipc_node_get_mtu() argument
225 bearer_id = n->active_links[sel & 1]; in tipc_node_get_mtu()