Lines Matching defs:dir
959 if (xso->dir == XFRM_DEV_OFFLOAD_IN)
1646 static int verify_policy_dir(u8 dir, struct netlink_ext_ack *extack)
1648 switch (dir) {
1733 ret = verify_policy_dir(p->dir, extack);
1736 if (p->index && (xfrm_policy_id2dir(p->index) != p->dir)) {
1782 int dir, struct netlink_ext_ack *extack)
1808 if (ut[i].optional && dir == XFRM_POLICY_OUT) {
1849 int dir, struct netlink_ext_ack *extack)
1860 err = validate_tmpl(nr, utmpl, pol->family, dir, extack);
1902 static void copy_to_user_policy(struct xfrm_policy *xp, struct xfrm_userpolicy_info *p, int dir)
1911 p->dir = dir;
1937 if (!(err = copy_from_user_tmpl(xp, attrs, p->dir, extack)))
1951 p->dir, extack);
1991 err = xfrm_policy_insert(p->dir, xp, excl);
2005 km_policy_notify(xp, p->dir, &c);
2083 static int dump_one_policy(struct xfrm_policy *xp, int dir, int count, void *ptr)
2099 copy_to_user_policy(xp, p, dir);
2168 int dir, u32 seq)
2183 err = dump_one_policy(xp, dir, 0, &info);
2302 err = verify_policy_dir(p->dir, extack);
2312 xp = xfrm_policy_byid(net, &m, if_id, type, p->dir,
2330 xp = xfrm_policy_bysel_ctx(net, &m, if_id, type, p->dir,
2340 resp_skb = xfrm_policy_netlink(skb, xp, p->dir, nlh->nlmsg_seq);
2358 km_policy_notify(xp, p->dir, &c);
2614 err = verify_policy_dir(p->dir, extack);
2624 xp = xfrm_policy_byid(net, &m, if_id, type, p->dir, p->index,
2642 xp = xfrm_policy_bysel_ctx(net, &m, if_id, type, p->dir,
2654 xfrm_policy_delete(xp, p->dir);
2657 km_policy_expired(xp, p->dir, up->hard, nlh->nlmsg_pid);
2852 err = xfrm_migrate(&pi->sel, pi->dir, type, m, n, kmp, net, encap,
2912 const struct xfrm_encap_tmpl *encap, u8 dir, u8 type)
2924 /* copy data from selector, dir, and type to the pol_id */
2927 pol_id->dir = dir;
2956 static int xfrm_send_migrate(const struct xfrm_selector *sel, u8 dir, u8 type,
2971 err = build_migrate(skb, m, num_migrate, k, sel, encap, dir, type);
2977 static int xfrm_send_migrate(const struct xfrm_selector *sel, u8 dir, u8 type,
3483 u8 *data, int len, int *dir)
3494 *dir = -EOPNOTSUPP;
3501 *dir = -EOPNOTSUPP;
3507 *dir = -EINVAL;
3511 *dir = -EINVAL;
3518 if (validate_tmpl(nr, ut, p->sel.family, p->dir, NULL))
3521 if (p->dir > XFRM_POLICY_OUT)
3526 *dir = -ENOBUFS;
3534 *dir = p->dir;
3549 int dir, const struct km_event *c)
3561 copy_to_user_policy(xp, &upe->pol, dir);
3583 static int xfrm_exp_policy_notify(struct xfrm_policy *xp, int dir, const struct km_event *c)
3593 err = build_polexpire(skb, xp, dir, c);
3599 static int xfrm_notify_policy(struct xfrm_policy *xp, int dir, const struct km_event *c)
3634 id->dir = dir;
3648 copy_to_user_policy(xp, p, dir);
3698 static int xfrm_send_policy_notify(struct xfrm_policy *xp, int dir, const struct km_event *c)
3705 return xfrm_notify_policy(xp, dir, c);
3709 return xfrm_exp_policy_notify(xp, dir, c);