Lines Matching defs:dir

78  * xfrm_pol_inexact_bin = hash(dir,type,family,if_id);
118 u8 dir, type;
169 static void __xfrm_policy_link(struct xfrm_policy *pol, int dir);
171 int dir);
174 xfrm_policy_inexact_lookup(struct net *net, u8 type, u16 family, u8 dir,
179 u8 type, u16 family, u8 dir, u32 if_id);
320 int dir;
327 dir = xfrm_policy_id2dir(xp->index);
367 km_policy_expired(xp, dir, 0, 0);
379 if (!xfrm_policy_delete(xp, dir))
380 km_policy_expired(xp, dir, 1, 0);
464 unsigned short family, int dir,
469 *dbits = net->xfrm.policy_bydst[dir].dbits4;
470 *sbits = net->xfrm.policy_bydst[dir].sbits4;
474 *dbits = net->xfrm.policy_bydst[dir].dbits6;
475 *sbits = net->xfrm.policy_bydst[dir].sbits6;
486 unsigned short family, int dir)
488 unsigned int hmask = net->xfrm.policy_bydst[dir].hmask;
493 __get_hash_thresh(net, family, dir, &dbits, &sbits);
499 return rcu_dereference_check(net->xfrm.policy_bydst[dir].table,
506 unsigned short family, int dir)
508 unsigned int hmask = net->xfrm.policy_bydst[dir].hmask;
513 __get_hash_thresh(net, family, dir, &dbits, &sbits);
516 return rcu_dereference_check(net->xfrm.policy_bydst[dir].table,
524 int dir)
536 __get_hash_thresh(net, pol->family, dir, &dbits, &sbits);
577 static void xfrm_bydst_resize(struct net *net, int dir)
579 unsigned int hmask = net->xfrm.policy_bydst[dir].hmask;
592 odst = rcu_dereference_protected(net->xfrm.policy_bydst[dir].table,
596 xfrm_dst_hash_transfer(net, odst + i, ndst, nhashmask, dir);
598 rcu_assign_pointer(net->xfrm.policy_bydst[dir].table, ndst);
599 net->xfrm.policy_bydst[dir].hmask = nhashmask;
634 static inline int xfrm_bydst_should_resize(struct net *net, int dir, int *total)
636 unsigned int cnt = net->xfrm.policy_count[dir];
637 unsigned int hmask = net->xfrm.policy_bydst[dir].hmask;
677 int dir, total;
682 for (dir = 0; dir < XFRM_POLICY_MAX; dir++) {
683 if (xfrm_bydst_should_resize(net, dir, &total))
684 xfrm_bydst_resize(net, dir);
697 xfrm_policy_inexact_alloc_bin(const struct xfrm_policy *pol, u8 dir)
703 .dir = dir,
993 u16 family, u8 prefixlen, u8 dir)
1128 struct xfrm_policy *policy, u8 dir)
1148 dir);
1162 policy->selector.prefixlen_d, dir);
1178 policy->selector.prefixlen_s, dir);
1187 xfrm_policy_inexact_insert(struct xfrm_policy *policy, u8 dir, int excl)
1194 bin = xfrm_policy_inexact_alloc_bin(policy, dir);
1201 chain = xfrm_policy_inexact_alloc_chain(bin, policy, dir);
1213 chain = &net->xfrm.policy_inexact[dir];
1233 int dir;
1262 dir = xfrm_policy_id2dir(policy->index);
1263 if (dir >= XFRM_POLICY_MAX)
1266 if ((dir & XFRM_POLICY_MASK) == XFRM_POLICY_OUT) {
1288 bin = xfrm_policy_inexact_alloc_bin(policy, dir);
1292 if (!xfrm_policy_inexact_alloc_chain(bin, policy, dir))
1297 for (dir = 0; dir < XFRM_POLICY_MAX; dir++) {
1301 &net->xfrm.policy_inexact[dir],
1307 hmask = net->xfrm.policy_bydst[dir].hmask;
1308 odst = net->xfrm.policy_bydst[dir].table;
1313 if ((dir & XFRM_POLICY_MASK) == XFRM_POLICY_OUT) {
1314 /* dir out => dst = remote, src = local */
1315 net->xfrm.policy_bydst[dir].dbits4 = rbits4;
1316 net->xfrm.policy_bydst[dir].sbits4 = lbits4;
1317 net->xfrm.policy_bydst[dir].dbits6 = rbits6;
1318 net->xfrm.policy_bydst[dir].sbits6 = lbits6;
1320 /* dir in/fwd => dst = local, src = remote */
1321 net->xfrm.policy_bydst[dir].dbits4 = lbits4;
1322 net->xfrm.policy_bydst[dir].sbits4 = rbits4;
1323 net->xfrm.policy_bydst[dir].dbits6 = lbits6;
1324 net->xfrm.policy_bydst[dir].sbits6 = rbits6;
1332 dir = xfrm_policy_id2dir(policy->index);
1333 if (dir >= XFRM_POLICY_MAX) {
1339 policy->family, dir);
1342 void *p = xfrm_policy_inexact_insert(policy, dir, 0);
1376 static u32 xfrm_gen_index(struct net *net, int dir, u32 index)
1385 idx = (net->xfrm.idx_generator | dir);
1458 u32 a = k->type << 24 | k->dir << 16 | k->family;
1481 ret = b->k.dir ^ key->dir;
1577 int xfrm_policy_insert(int dir, struct xfrm_policy *policy, int excl)
1584 chain = policy_hash_bysel(net, &policy->selector, policy->family, dir);
1588 delpol = xfrm_policy_inexact_insert(policy, dir, excl);
1595 __xfrm_policy_link(policy, dir);
1605 __xfrm_policy_unlink(delpol, dir);
1607 policy->index = delpol ? delpol->index : xfrm_gen_index(net, dir, policy->index);
1617 else if (xfrm_bydst_should_resize(net, dir, NULL))
1626 u32 if_id, u8 type, int dir, struct xfrm_selector *sel,
1648 u8 type, int dir, struct xfrm_selector *sel,
1657 chain = policy_hash_bysel(net, sel, sel->family, dir);
1663 sel->family, dir, if_id);
1681 if_id, type, dir,
1690 pol = __xfrm_policy_bysel_ctx(chain, mark, if_id, type, dir,
1702 __xfrm_policy_unlink(pol, dir);
1718 u8 type, int dir, u32 id, int delete, int *err)
1724 if (xfrm_policy_id2dir(id) != dir)
1742 __xfrm_policy_unlink(pol, dir);
1816 int dir, err = 0, cnt = 0;
1830 dir = xfrm_policy_id2dir(pol->index);
1831 if (dir >= XFRM_POLICY_MAX ||
1835 __xfrm_policy_unlink(pol, dir);
1857 int dir, err = 0, cnt = 0;
1871 dir = xfrm_policy_id2dir(pol->index);
1872 if (dir >= XFRM_POLICY_MAX ||
1876 __xfrm_policy_unlink(pol, dir);
2061 u8 dir, u32 if_id)
2066 .dir = dir,
2078 u8 dir, u32 if_id)
2085 bin = xfrm_policy_inexact_lookup_rcu(net, type, family, dir, if_id);
2156 u16 family, u8 dir,
2176 chain = policy_hash_direct(net, daddr, saddr, family, dir);
2197 bin = xfrm_policy_inexact_lookup_rcu(net, type, family, dir, if_id);
2224 u16 family, u8 dir, u32 if_id)
2230 dir, if_id);
2235 dir, if_id);
2238 static struct xfrm_policy *xfrm_sk_policy_lookup(const struct sock *sk, int dir,
2246 pol = rcu_dereference(sk->sk_policy[dir]);
2281 static void __xfrm_policy_link(struct xfrm_policy *pol, int dir)
2286 net->xfrm.policy_count[dir]++;
2291 int dir)
2306 net->xfrm.policy_count[dir]--;
2311 static void xfrm_sk_policy_link(struct xfrm_policy *pol, int dir)
2313 __xfrm_policy_link(pol, XFRM_POLICY_MAX + dir);
2316 static void xfrm_sk_policy_unlink(struct xfrm_policy *pol, int dir)
2318 __xfrm_policy_unlink(pol, XFRM_POLICY_MAX + dir);
2321 int xfrm_policy_delete(struct xfrm_policy *pol, int dir)
2326 pol = __xfrm_policy_unlink(pol, dir);
2337 int xfrm_sk_policy_insert(struct sock *sk, int dir, struct xfrm_policy *pol)
2348 old_pol = rcu_dereference_protected(sk->sk_policy[dir],
2352 pol->index = xfrm_gen_index(net, XFRM_POLICY_MAX+dir, 0);
2353 xfrm_sk_policy_link(pol, dir);
2355 rcu_assign_pointer(sk->sk_policy[dir], pol);
2363 xfrm_sk_policy_unlink(old_pol, dir);
2373 static struct xfrm_policy *clone_policy(const struct xfrm_policy *old, int dir)
2398 xfrm_sk_policy_link(newp, dir);
3029 u16 family, u8 dir,
3039 pols[0] = xfrm_policy_lookup(net, fl, family, dir, if_id);
3125 u8 dir = XFRM_POLICY_OUT;
3180 xdst = xfrm_bundle_lookup(net, fl, family, dir, &xflo, if_id);
3249 net->xfrm.policy_default[dir] == XFRM_USERPOLICY_BLOCK) {
3596 int __xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb,
3625 reverse = dir & ~XFRM_POLICY_MASK;
3626 dir &= XFRM_POLICY_MASK;
3651 if (sk && sk->sk_policy[dir]) {
3652 pol = xfrm_sk_policy_lookup(sk, dir, &fl, family, if_id);
3660 pol = xfrm_policy_lookup(net, &fl, family, dir, if_id);
3668 if (net->xfrm.policy_default[dir] == XFRM_USERPOLICY_BLOCK) {
4115 int dir, err;
4135 for (dir = 0; dir < XFRM_POLICY_MAX; dir++) {
4138 net->xfrm.policy_count[dir] = 0;
4139 net->xfrm.policy_count[XFRM_POLICY_MAX + dir] = 0;
4140 INIT_HLIST_HEAD(&net->xfrm.policy_inexact[dir]);
4142 htab = &net->xfrm.policy_bydst[dir];
4166 for (dir--; dir >= 0; dir--) {
4169 htab = &net->xfrm.policy_bydst[dir];
4181 int dir;
4191 for (dir = 0; dir < XFRM_POLICY_MAX; dir++) {
4194 WARN_ON(!hlist_empty(&net->xfrm.policy_inexact[dir]));
4196 htab = &net->xfrm.policy_bydst[dir];
4362 u8 dir, u8 type, struct net *net, u32 if_id)
4369 chain = policy_hash_direct(net, &sel->daddr, &sel->saddr, sel->family, dir);
4379 chain = &net->xfrm.policy_inexact[dir];
4507 int xfrm_migrate(const struct xfrm_selector *sel, u8 dir, u8 type,
4525 if (dir >= XFRM_POLICY_MAX) {
4532 pol = xfrm_migrate_policy_find(sel, dir, type, net, if_id);
4567 km_migrate(sel, dir, type, m, num_migrate, k, encap);