| /linux/net/ipv4/ |
| H A D | fou_bpf.c | 45 struct bpf_fou_encap *encap, int type) in bpf_skb_set_fou_encap() argument 50 if (unlikely(!encap)) in bpf_skb_set_fou_encap() 58 info->encap.type = TUNNEL_ENCAP_FOU; in bpf_skb_set_fou_encap() 61 info->encap.type = TUNNEL_ENCAP_GUE; in bpf_skb_set_fou_encap() 64 info->encap.type = TUNNEL_ENCAP_NONE; in bpf_skb_set_fou_encap() 68 info->encap.flags |= TUNNEL_ENCAP_FLAG_CSUM; in bpf_skb_set_fou_encap() 70 info->encap.sport = encap->sport; in bpf_skb_set_fou_encap() 71 info->encap.dport = encap->dport; in bpf_skb_set_fou_encap() 87 struct bpf_fou_encap *encap) in bpf_skb_get_fou_encap() argument 95 encap->sport = info->encap.sport; in bpf_skb_get_fou_encap() [all …]
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | test_cls_redirect_dynptr.c | 273 static ret_t accept_locally(struct __sk_buff *skb, encap_headers_t *encap) in accept_locally() argument 276 sizeof(*encap) + in accept_locally() 277 sizeof(struct in_addr) * encap->unigue.hop_count; in accept_locally() 281 if (encap->gue.proto_ctype == IPPROTO_IPV6) in accept_locally() 282 encap->eth.h_proto = bpf_htons(ETH_P_IPV6); in accept_locally() 294 encap_headers_t *encap, struct in_addr *next_hop, in forward_with_gre() argument 298 sizeof(*encap) + in forward_with_gre() 299 sizeof(struct in_addr) * encap->unigue.hop_count; in forward_with_gre() 316 if (encap->gue.proto_ctype == IPPROTO_IPV6) { in forward_with_gre() 421 encap_headers_t *encap, struc in forward_to_next_hop() argument 477 get_next_hop(struct bpf_dynptr * dynptr,__u64 * offset,encap_headers_t * encap,struct in_addr * next_hop) get_next_hop() argument 860 encap_headers_t *encap; cls_redirect() local [all...] |
| H A D | test_cls_redirect.c | 379 static INLINING ret_t accept_locally(struct __sk_buff *skb, encap_headers_t *encap) in get_global_metrics() 382 sizeof(*encap) + in accept_locally() 383 sizeof(struct in_addr) * encap->unigue.hop_count; in accept_locally() 387 if (encap->gue.proto_ctype == IPPROTO_IPV6) { in accept_locally() 388 encap->eth.h_proto = bpf_htons(ETH_P_IPV6); in accept_locally() 400 static INLINING ret_t forward_with_gre(struct __sk_buff *skb, encap_headers_t *encap, in accept_locally() 406 sizeof(*encap) + in forward_with_gre() 407 sizeof(struct in_addr) * encap->unigue.hop_count; in forward_with_gre() 420 if (encap->gue.proto_ctype == IPPROTO_IPV6) { in forward_with_gre() 527 static INLINING ret_t forward_to_next_hop(struct __sk_buff *skb, encap_headers_t *encap, in forward_with_gre() 381 accept_locally(struct __sk_buff * skb,encap_headers_t * encap) accept_locally() argument 402 forward_with_gre(struct __sk_buff * skb,encap_headers_t * encap,struct in_addr * next_hop,metrics_t * metrics) forward_with_gre() argument 529 forward_to_next_hop(struct __sk_buff * skb,encap_headers_t * encap,struct in_addr * next_hop,metrics_t * metrics) forward_to_next_hop() argument 586 get_next_hop(buf_t * pkt,encap_headers_t * encap,struct in_addr * next_hop) get_next_hop() argument 951 encap_headers_t *encap; cls_redirect() local [all...] |
| H A D | test_tunnel_kern.c | 42 struct bpf_fou_encap *encap, int type) __ksym; 44 struct bpf_fou_encap *encap) __ksym; 760 struct bpf_fou_encap___local encap = {}; in ipip_gue_set_tunnel() local 781 encap.sport = 0; in ipip_gue_set_tunnel() 782 encap.dport = bpf_htons(5555); in ipip_gue_set_tunnel() 784 ret = bpf_skb_set_fou_encap(skb, (struct bpf_fou_encap *)&encap, in ipip_gue_set_tunnel() 799 struct bpf_fou_encap___local encap = {}; in ipip_fou_set_tunnel() local 820 encap.sport = 0; in ipip_fou_set_tunnel() 821 encap.dport = bpf_htons(5555); in ipip_fou_set_tunnel() 823 ret = bpf_skb_set_fou_encap(skb, (struct bpf_fou_encap *)&encap, in ipip_fou_set_tunnel() [all …]
|
| /linux/net/bridge/netfilter/ |
| H A D | ebt_vlan.c | 34 __be16 encap; in ebt_vlan_mt() local 38 encap = skb->protocol; in ebt_vlan_mt() 48 encap = fp->h_vlan_encapsulated_proto; in ebt_vlan_mt() 72 EXIT_ON_MISMATCH(encap, EBT_VLAN_ENCAP); in ebt_vlan_mt() 141 if ((unsigned short) ntohs(info->encap) < ETH_ZLEN) { in ebt_vlan_mt_check() 143 "minimal\n", ntohs(info->encap)); in ebt_vlan_mt_check()
|
| /linux/drivers/net/ethernet/sfc/ |
| H A D | tc.c | 465 struct efx_tc_encap_match *encap) in efx_tc_flower_release_encap_match() argument 469 if (!refcount_dec_and_test(&encap->ref)) in efx_tc_flower_release_encap_match() 472 if (encap->type == EFX_TC_EM_DIRECT) { in efx_tc_flower_release_encap_match() 473 rc = efx_mae_unregister_encap_match(efx, encap); in efx_tc_flower_release_encap_match() 480 encap->fw_id, rc); in efx_tc_flower_release_encap_match() 482 rhashtable_remove_fast(&efx->tc->encap_match_ht, &encap->linkage, in efx_tc_flower_release_encap_match() 484 if (encap->pseudo) in efx_tc_flower_release_encap_match() 485 efx_tc_flower_release_encap_match(efx, encap->pseudo); in efx_tc_flower_release_encap_match() 486 kfree(encap); in efx_tc_flower_release_encap_match() 497 struct efx_tc_encap_match *encap, *old, *pseudo = NULL; in efx_tc_flower_record_encap_match() local [all …]
|
| H A D | tc_counters.c | 90 struct efx_tc_encap_action *encap; in efx_tc_counter_work() local 99 encap = act->encap_md; in efx_tc_counter_work() 100 if (!encap) in efx_tc_counter_work() 102 if (!encap->neigh) /* can't happen */ in efx_tc_counter_work() 104 if (time_after_eq(encap->neigh->used, touched)) in efx_tc_counter_work() 106 encap->neigh->used = touched; in efx_tc_counter_work() 110 if (encap->neigh->dst_ip) in efx_tc_counter_work() 111 n = neigh_lookup(&arp_tbl, &encap->neigh->dst_ip, in efx_tc_counter_work() 112 encap->neigh->egdev); in efx_tc_counter_work() 116 &encap->neigh->dst_ip6, in efx_tc_counter_work() [all …]
|
| H A D | mae.c | 944 struct efx_tc_encap_action *encap) in efx_mae_allocate_encap_md() argument 951 rc = efx_mae_encap_type_to_mae_type(encap->type); in efx_mae_allocate_encap_md() 955 inlen = MC_CMD_MAE_ENCAP_HEADER_ALLOC_IN_LEN(encap->encap_hdr_len); in efx_mae_allocate_encap_md() 959 encap->encap_hdr, in efx_mae_allocate_encap_md() 960 encap->encap_hdr_len); in efx_mae_allocate_encap_md() 967 encap->fw_id = MCDI_DWORD(outbuf, MAE_ENCAP_HEADER_ALLOC_OUT_ENCAP_HEADER_ID); in efx_mae_allocate_encap_md() 972 struct efx_tc_encap_action *encap) in efx_mae_update_encap_md() argument 978 rc = efx_mae_encap_type_to_mae_type(encap->type); in efx_mae_update_encap_md() 983 encap->fw_id); in efx_mae_update_encap_md() 984 inlen = MC_CMD_MAE_ENCAP_HEADER_UPDATE_IN_LEN(encap->encap_hdr_len); in efx_mae_update_encap_md() [all …]
|
| /linux/drivers/crypto/caam/ |
| H A D | blob_gen.c | 73 struct caam_blob_info *info, bool encap) in caam_process_blob() argument 89 if (encap) { in caam_process_blob() 98 if (encap && info->pkey_info.is_pkey) { in caam_process_blob() 117 encap ? DMA_BIDIRECTIONAL : DMA_TO_DEVICE); in caam_process_blob() 146 if (encap && info->pkey_info.is_pkey) { in caam_process_blob() 207 encap ? DMA_BIDIRECTIONAL : DMA_TO_DEVICE); in caam_process_blob()
|
| /linux/tools/testing/selftests/net/ |
| H A D | srv6_hencap_red_l3vpn_test.sh | 388 encap seg6local action End dev "${VRF_DEVNAME}" 394 encap seg6local action End.DT46 vrftable "${VRF_TID}" \ 447 encap seg6 mode "${mode}" segs "${policy}" \ 458 encap seg6 mode "${mode}" segs "${policy}" \ 576 setup_rt_policy_ipv6 2 1 "3 4" 2 encap.red 577 setup_rt_policy_ipv6 1 2 "" 1 encap.red 589 setup_rt_policy_ipv4 2 1 "" 2 encap.red 590 setup_rt_policy_ipv4 1 2 "4 3" 1 encap.red 603 setup_rt_policy_ipv6 4 3 "2" 4 encap.red 604 setup_rt_policy_ipv6 3 4 "1" 3 encap.red
|
| H A D | lwt_dst_cache_ref_loop.sh | 54 encap ila 1:2:3:4 csum-mode no-action ident-type luid \ 59 encap ioam6 trace prealloc type 0x800000 ns 0 size 4 \ 63 encap rpl segs 2001:db8:3::1 dev veth0 &>/dev/null 66 encap seg6 mode inline segs 2001:db8:4::1 dev veth0 &>/dev/null 146 encap ila 2001:db8:2:0 csum-mode no-action ident-type luid \ 168 encap ioam6 trace prealloc type 0x800000 ns 1 size 4 \ 186 encap rpl segs 2001:db8:2::2 \ 208 encap seg6 mode inline segs 2001:db8:2::2 \
|
| H A D | pmtu.sh | 410 encap="${3}" 439 run_cmd ${ns_a} ip link add ${encap}_a type ${type} ${mode} local ${a_addr} remote ${b_addr} encap ${encap} encap-sport auto encap-dport 5556 || return $ksft_skip 442 run_cmd ${ns_b} ip link add ${encap}_b type ${type} ${mode} local ${b_addr} remote ${a_addr} encap ${encap} encap [all...] |
| H A D | srv6_end_dt46_l3vpn_test.sh | 137 # |cafe::2 |apply seg6 encap segs fc00:12:100::6046| 141 # |10.0.0.2 |apply seg6 encap segs fc00:12:100::6046| 150 # |cafe::4 |apply seg6 encap segs fc00:12:200::6046| 154 # |10.0.0.4 |apply seg6 encap segs fc00:12:200::6046| 173 # |cafe::1 |apply seg6 encap segs fc00:21:100::6046| 177 # |10.0.0.1 |apply seg6 encap segs fc00:21:100::6046| 186 # |cafe::3 |apply seg6 encap segs fc00:21:200::6046| 190 # |10.0.0.3 |apply seg6 encap segs fc00:21:200::6046| 330 # set the encap route for encapsulating packets which arrive from the 333 encap seg [all...] |
| /linux/include/net/ |
| H A D | ip6_tunnel.h | 65 struct ip_tunnel_encap encap; member 115 if (t->encap.type == TUNNEL_ENCAP_NONE) in ip6_tnl_encap() 118 if (t->encap.type >= MAX_IPTUN_ENCAP_OPS) in ip6_tnl_encap() 122 ops = rcu_dereference(ip6tun_encaps[t->encap.type]); in ip6_tnl_encap() 124 ret = ops->build_header(skb, &t->encap, protocol, fl6); in ip6_tnl_encap()
|
| H A D | lwtunnel.h | 40 int (*build_state)(struct net *net, struct nlattr *encap, 123 struct nlattr *encap, 220 struct nlattr *encap, in lwtunnel_build_state() argument
|
| /linux/net/l2tp/ |
| H A D | l2tp_core.c | 151 switch (tunnel->encap) { in l2tp_tunnel_free() 481 /* If existing session is in IP-encap tunnel, refuse new session */ in l2tp_session_collision_add() 482 if (session2->tunnel->encap == L2TP_ENCAPTYPE_IP) in l2tp_session_collision_add() 573 /* IP encap expects session IDs to be globally unique, while in l2tp_session_register() 574 * UDP encap doesn't. This isn't per the RFC, which says that in l2tp_session_register() 578 if (err == -ENOSPC && tunnel->encap == L2TP_ENCAPTYPE_UDP) { in l2tp_session_register() 921 tunnel->encap); in l2tp_recv_common() 943 tunnel->encap); in l2tp_recv_common() 1174 if (tunnel->encap == L2TP_ENCAPTYPE_UDP) { in l2tp_build_l2tpv3_header() 1236 uhlen = (tunnel->encap in l2tp_xmit_core() 1568 enum l2tp_encap_type encap = L2TP_ENCAPTYPE_UDP; l2tp_tunnel_create() local 1606 l2tp_validate_socket(const struct sock * sk,const struct net * net,enum l2tp_encap_type encap) l2tp_validate_socket() argument 1758 l2tp_session_set_header_len(struct l2tp_session * session,int version,enum l2tp_encap_type encap) l2tp_session_set_header_len() argument [all...] |
| H A D | trace.h | 60 __field(enum l2tp_encap_type, encap) 68 __entry->encap = tunnel->encap; 73 show_encap_type_name(__entry->encap),
|
| H A D | l2tp_netlink.c | 219 cfg.encap = nla_get_u16(attrs[L2TP_ATTR_ENCAP_TYPE]); in l2tp_nl_cmd_tunnel_create() 234 switch (cfg.encap) { in l2tp_nl_cmd_tunnel_create() 319 enum l2tp_encap_type encap) in l2tp_nl_tunnel_send_addr6() argument 324 switch (encap) { in l2tp_nl_tunnel_send_addr6() 347 enum l2tp_encap_type encap) in l2tp_nl_tunnel_send_addr4() argument 351 switch (encap) { in l2tp_nl_tunnel_send_addr4() 380 return l2tp_nl_tunnel_send_addr6(skb, sk, tunnel->encap); in l2tp_nl_tunnel_send_addr() 382 return l2tp_nl_tunnel_send_addr4(skb, sk, tunnel->encap); in l2tp_nl_tunnel_send_addr() 399 nla_put_u16(skb, L2TP_ATTR_ENCAP_TYPE, tunnel->encap)) in l2tp_nl_tunnel_send() 704 l2tp_session_set_header_len(session, tunnel->version, tunnel->encap); in l2tp_nl_cmd_session_modify()
|
| /linux/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
| H A D | ipsec_rxtx.c | 223 struct xfrm_encap_tmpl *encap; in mlx5e_ipsec_tx_build_eseg() local 249 encap = x->encap; in mlx5e_ipsec_tx_build_eseg() 250 if (!encap) { in mlx5e_ipsec_tx_build_eseg() 254 } else if (encap->encap_type == UDP_ENCAP_ESPINUDP) { in mlx5e_ipsec_tx_build_eseg()
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | cls_redirect.c | 175 static void encap_init(encap_headers_t *encap, uint8_t hop_count, uint8_t proto) in test_str() 179 *encap = (encap_headers_t){ in test_str() 211 encap_headers_t encap; 227 encap_init(&encap, test->hops == ONE_HOP ? 1 : 0, proto); in encap_init() 228 p = mempcpy(p, &encap, sizeof(encap)); in encap_init() 218 encap_init(encap_headers_t * encap,uint8_t hop_count,uint8_t proto) encap_init() argument 248 encap_headers_t encap; build_input() local
|
| /linux/net/xfrm/ |
| H A D | xfrm_state.c | 464 .encap = XFRM_MODE_BEET, 469 .encap = XFRM_MODE_TRANSPORT, 473 .encap = XFRM_MODE_TUNNEL, 478 .encap = XFRM_MODE_IPTFS, 486 .encap = XFRM_MODE_BEET, 491 .encap = XFRM_MODE_ROUTEOPTIMIZATION, 495 .encap = XFRM_MODE_TRANSPORT, 499 .encap = XFRM_MODE_TUNNEL, 504 .encap = XFRM_MODE_IPTFS, 510 static const struct xfrm_mode *xfrm_get_mode(unsigned int encap, int family) in xfrm_get_mode() argument [all …]
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | test_lwt_ip_encap.sh | |
| /linux/net/core/ |
| H A D | lwtunnel.c | 114 struct nlattr *encap, unsigned int family, in lwtunnel_build_state() argument 124 NL_SET_ERR_MSG_ATTR(extack, encap, in lwtunnel_build_state() 137 ret = ops->build_state(net, encap, family, cfg, lws, extack); in lwtunnel_build_state() 144 NL_SET_ERR_MSG_ATTR(extack, encap, in lwtunnel_build_state()
|
| /linux/net/netfilter/ |
| H A D | nf_flow_table_offload.c | 120 tuple->encap[0].proto == htons(ETH_P_8021Q)) { in nf_flow_rule_match() 123 tuple->encap[0].id, in nf_flow_rule_match() 124 tuple->encap[0].proto); in nf_flow_rule_match() 129 tuple->encap[1].proto == htons(ETH_P_8021Q)) { in nf_flow_rule_match() 134 tuple->encap[1].id, in nf_flow_rule_match() 135 tuple->encap[1].proto); in nf_flow_rule_match() 140 tuple->encap[1].id, in nf_flow_rule_match() 141 tuple->encap[1].proto); in nf_flow_rule_match() 650 if (tuple->encap[i].proto == htons(ETH_P_8021Q)) { in nf_flow_rule_route_common() 666 switch (other_tuple->encap[ in nf_flow_rule_route_common() [all...] |
| /linux/drivers/net/ethernet/cisco/enic/ |
| H A D | enic_rq.c | 107 bool outer_csum_ok = true, encap = false; in enic_rq_set_skb_flags() local 129 encap = true; in enic_rq_set_skb_flags() 135 encap = true; in enic_rq_set_skb_flags() 155 skb->csum_level = encap; in enic_rq_set_skb_flags() 156 if (encap) in enic_rq_set_skb_flags()
|