| /net/ipv6/ |
| A D | mip6.c | 203 struct xfrm_selector sel; in mip6_destopt_reject() local 226 memset(&sel, 0, sizeof(sel)); in mip6_destopt_reject() 228 sizeof(sel.daddr)); in mip6_destopt_reject() 229 sel.prefixlen_d = 128; in mip6_destopt_reject() 231 sizeof(sel.saddr)); in mip6_destopt_reject() 232 sel.prefixlen_s = 128; in mip6_destopt_reject() 233 sel.family = AF_INET6; in mip6_destopt_reject() 236 if (sel.dport) in mip6_destopt_reject() 237 sel.dport_mask = htons(~0); in mip6_destopt_reject() 239 if (sel.sport) in mip6_destopt_reject() [all …]
|
| A D | ipcomp6.c | 91 memcpy(&t->sel, &x->sel, sizeof(t->sel)); in ipcomp6_tunnel_create()
|
| A D | ipv6_sockglue.c | 60 int ip6_ra_control(struct sock *sk, int sel) in ip6_ra_control() argument 68 new_ra = (sel >= 0) ? kmalloc(sizeof(*new_ra), GFP_KERNEL) : NULL; in ip6_ra_control() 69 if (sel >= 0 && !new_ra) in ip6_ra_control() 75 if (sel >= 0) { in ip6_ra_control() 94 new_ra->sel = sel; in ip6_ra_control()
|
| A D | esp6_offload.c | 194 if (x->sel.family != AF_INET6) { in xfrm6_beet_gso_segment()
|
| A D | ip6_output.c | 384 static int ip6_call_ra_chain(struct sk_buff *skb, int sel) in ip6_call_ra_chain() argument 392 if (sk && ra->sel == sel && in ip6_call_ra_chain()
|
| A D | esp6.c | 1166 if (x->sel.family != AF_INET6) in esp6_init_state()
|
| A D | ip6_vti.c | 367 if (x->sel.family == AF_UNSPEC) { in vti6_rcv_cb()
|
| /net/sched/ |
| A D | cls_u32.c | 67 struct tc_u32_sel sel; member 128 int sel = 0; in u32_classify() local 213 sel = 0; in u32_classify() 221 sel = ht->divisor & u32_hash_fold(*data, &n->sel, in u32_classify() 238 n->sel.offshift; in u32_classify() 281 unsigned int sel; in u32_lookup_key() local 285 if (sel > ht->divisor) in u32_lookup_key() 567 cls_u32.knode.sel = &n->sel; in u32_replace_hw_knode() 1276 cls_u32.knode.sel = &n->sel; in u32_reoffload_knode() 1371 if (nla_put(skb, TCA_U32_SEL, struct_size(&n->sel, keys, n->sel.nkeys), in u32_dump() [all …]
|
| /net/xfrm/ |
| A D | xfrm_hash.h | 146 static inline unsigned int __sel_hash(const struct xfrm_selector *sel, in __sel_hash() argument 150 const xfrm_address_t *daddr = &sel->daddr; in __sel_hash() 151 const xfrm_address_t *saddr = &sel->saddr; in __sel_hash() 156 if (sel->prefixlen_d < dbits || in __sel_hash() 157 sel->prefixlen_s < sbits) in __sel_hash() 164 if (sel->prefixlen_d < dbits || in __sel_hash() 165 sel->prefixlen_s < sbits) in __sel_hash()
|
| A D | xfrm_policy.c | 221 return addr4_match(fl4->daddr, sel->daddr.a4, sel->prefixlen_d) && in __xfrm4_selector_match() 222 addr4_match(fl4->saddr, sel->saddr.a4, sel->prefixlen_s) && in __xfrm4_selector_match() 223 !((xfrm_flowi_dport(fl, &fl4->uli) ^ sel->dport) & sel->dport_mask) && in __xfrm4_selector_match() 224 !((xfrm_flowi_sport(fl, &fl4->uli) ^ sel->sport) & sel->sport_mask) && in __xfrm4_selector_match() 225 (fl4->flowi4_proto == sel->proto || !sel->proto) && in __xfrm4_selector_match() 226 (fl4->flowi4_oif == sel->ifindex || !sel->ifindex); in __xfrm4_selector_match() 234 return addr_match(&fl6->daddr, &sel->daddr, sel->prefixlen_d) && in __xfrm6_selector_match() 235 addr_match(&fl6->saddr, &sel->saddr, sel->prefixlen_s) && in __xfrm6_selector_match() 238 (fl6->flowi6_proto == sel->proto || !sel->proto) && in __xfrm6_selector_match() 239 (fl6->flowi6_oif == sel->ifindex || !sel->ifindex); in __xfrm6_selector_match() [all …]
|
| A D | xfrm_state.c | 1044 sel->family = AF_INET; in __xfrm4_init_tempsel() 1045 sel->prefixlen_d = 32; in __xfrm4_init_tempsel() 1046 sel->prefixlen_s = 32; in __xfrm4_init_tempsel() 1063 sel->family = AF_INET6; in __xfrm6_init_tempsel() 1064 sel->prefixlen_d = 128; in __xfrm6_init_tempsel() 1065 sel->prefixlen_s = 128; in __xfrm6_init_tempsel() 1317 if ((x->sel.family && in xfrm_state_look_at() 1338 if ((!x->sel.family || in xfrm_state_look_at() 1977 memcpy(&x->sel, &orig->sel, sizeof(x->sel)); in xfrm_state_clone_and_setup() 2232 if (!use_spi && memcmp(&x1->sel, &x->sel, sizeof(x1->sel))) in xfrm_state_update() [all …]
|
| A D | xfrm_user.c | 277 if (p->sel.prefixlen_d > 32 || p->sel.prefixlen_s > 32) { in verify_newsa_info() 286 if (p->sel.prefixlen_d > 128 || p->sel.prefixlen_s > 128) { in verify_newsa_info() 808 memcpy(&x->sel, &p->sel, sizeof(x->sel)); in copy_from_user_state() 1126 memcpy(&p->sel, &x->sel, sizeof(p->sel)); in copy_to_user_state() 1967 if (p->sel.prefixlen_d > 32 || p->sel.prefixlen_s > 32) { in verify_newpolicy_info() 2166 memcpy(&p->sel, &xp->selector, sizeof(p->sel)); in copy_to_user_policy() 3019 memcpy(&x->sel, &ua->sel, sizeof(ua->sel)); in xfrm_add_acquire() 3218 memcpy(&pol_id->sel, sel, sizeof(pol_id->sel)); in build_migrate() 3800 memcpy(&ua->sel, &x->sel, sizeof(ua->sel)); in build_acquire() 4005 memcpy(&id->sel, &xp->selector, sizeof(id->sel)); in xfrm_notify_policy() [all …]
|
| A D | xfrm_input.c | 217 iph->daddr = x->sel.daddr.a4; in xfrm4_remove_beet_encap() 218 iph->saddr = x->sel.saddr.a4; in xfrm4_remove_beet_encap() 320 ip6h->daddr = x->sel.daddr.in6; in xfrm6_remove_beet_encap() 321 ip6h->saddr = x->sel.saddr.in6; in xfrm6_remove_beet_encap() 343 switch (x->sel.family) { in xfrm_inner_mode_encap_remove()
|
| A D | xfrm_compat.c | 24 struct xfrm_selector sel; member 33 struct xfrm_selector sel; member 48 struct xfrm_selector sel; member
|
| A D | xfrm_output.c | 237 if (x->sel.family != AF_INET6) in xfrm4_beet_encap_add() 366 if (x->sel.family != AF_INET6) in xfrm6_beet_encap_add()
|
| A D | xfrm_device.c | 59 if (x->sel.family != AF_INET6) { in __xfrm_mode_beet_prep()
|
| A D | xfrm_interface_core.c | 392 if (x->sel.family == AF_UNSPEC) { in xfrmi_rcv_cb()
|
| /net/key/ |
| A D | af_key.c | 957 pfkey_sockaddr_fill(&x->sel.saddr, x->sel.sport, in __pfkey_xfrm_state2msg() 1253 x->sel.family = pfkey_sadb_addr2xfrm_addr(addr, &x->sel.saddr); in pfkey_msg2xfrm_state() 1257 if (!x->sel.family) in pfkey_msg2xfrm_state() 2382 memset(&sel, 0, sizeof(sel)); in pfkey_spddelete() 2385 sel.family = pfkey_sadb_addr2xfrm_addr(sa, &sel.saddr); in pfkey_spddelete() 2389 if (sel.sport) in pfkey_spddelete() 2397 if (sel.dport) in pfkey_spddelete() 2589 memset(&sel, 0, sizeof(sel)); in pfkey_migrate() 2593 sel.family = pfkey_sadb_addr2xfrm_addr(sa, &sel.saddr); in pfkey_migrate() 2597 if (sel.sport) in pfkey_migrate() [all …]
|
| /net/ipv4/ |
| A D | ipcomp.c | 71 memcpy(&t->sel, &x->sel, sizeof(t->sel)); in ipcomp_tunnel_create()
|
| A D | esp4_offload.c | 158 if (x->sel.family != AF_INET6) { in xfrm4_beet_gso_segment()
|
| A D | ip_vti.c | 123 if (x->sel.family == AF_UNSPEC) { in vti_rcv_cb()
|
| A D | esp4.c | 1129 else if (x->props.mode == XFRM_MODE_BEET && x->sel.family != AF_INET6) in esp_init_state()
|
| /net/tipc/ |
| A D | node.h | 111 int tipc_node_get_mtu(struct net *net, u32 addr, u32 sel, bool connected);
|
| A D | node.c | 195 static struct tipc_link *node_active_link(struct tipc_node *n, int sel) in node_active_link() argument 197 int bearer_id = n->active_links[sel & 1]; in node_active_link() 205 int tipc_node_get_mtu(struct net *net, u32 addr, u32 sel, bool connected) in tipc_node_get_mtu() argument 223 bearer_id = n->active_links[sel & 1]; in tipc_node_get_mtu()
|
| /net/dsa/ |
| A D | user.c | 2190 dsa_user_dcbnl_set_apptrust(struct net_device *dev, u8 *sel, int nsel) in dsa_user_dcbnl_set_apptrust() argument 2199 return ds->ops->port_set_apptrust(ds, port, sel, nsel); in dsa_user_dcbnl_set_apptrust() 2203 dsa_user_dcbnl_get_apptrust(struct net_device *dev, u8 *sel, int *nsel) in dsa_user_dcbnl_get_apptrust() argument 2212 return ds->ops->port_get_apptrust(ds, port, sel, nsel); in dsa_user_dcbnl_get_apptrust()
|