[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.20
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
src
/
kernels
/
4.18.0-553.63.1.el8_10.x86_64
/
include
/
net
/
netns
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📄 bpf.h
590 B
SET
[ EDIT ]
|
[ DEL ]
📄 can.h
1,109 B
SET
[ EDIT ]
|
[ DEL ]
📄 conntrack.h
3,017 B
SET
[ EDIT ]
|
[ DEL ]
📄 core.h
362 B
SET
[ EDIT ]
|
[ DEL ]
📄 dccp.h
185 B
SET
[ EDIT ]
|
[ DEL ]
📄 generic.h
1,175 B
SET
[ EDIT ]
|
[ DEL ]
📄 hash.h
212 B
SET
[ EDIT ]
|
[ DEL ]
📄 ieee802154_6lowpan.h
399 B
SET
[ EDIT ]
|
[ DEL ]
📄 ipv4.h
5,482 B
SET
[ EDIT ]
|
[ DEL ]
📄 ipv6.h
2,963 B
SET
[ EDIT ]
|
[ DEL ]
📄 mib.h
1,097 B
SET
[ EDIT ]
|
[ DEL ]
📄 mpls.h
371 B
SET
[ EDIT ]
|
[ DEL ]
📄 netfilter.h
1,048 B
SET
[ EDIT ]
|
[ DEL ]
📄 nftables.h
275 B
SET
[ EDIT ]
|
[ DEL ]
📄 packet.h
295 B
SET
[ EDIT ]
|
[ DEL ]
📄 sctp.h
3,997 B
SET
[ EDIT ]
|
[ DEL ]
📄 smc.h
604 B
SET
[ EDIT ]
|
[ DEL ]
📄 unix.h
263 B
SET
[ EDIT ]
|
[ DEL ]
📄 x_tables.h
507 B
SET
[ EDIT ]
|
[ DEL ]
📄 xdp.h
331 B
SET
[ EDIT ]
|
[ DEL ]
📄 xfrm.h
1,880 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: xfrm.h
/* SPDX-License-Identifier: GPL-2.0 */ #ifndef __NETNS_XFRM_H #define __NETNS_XFRM_H #include <linux/list.h> #include <linux/wait.h> #include <linux/workqueue.h> #include <linux/rhashtable-types.h> #include <linux/xfrm.h> #include <net/dst_ops.h> struct ctl_table_header; struct xfrm_policy_hash { struct hlist_head __rcu *table; unsigned int hmask; u8 dbits4; u8 sbits4; u8 dbits6; u8 sbits6; }; struct xfrm_policy_hthresh { struct work_struct work; seqlock_t lock; u8 lbits4; u8 rbits4; u8 lbits6; u8 rbits6; }; struct netns_xfrm { struct list_head state_all; /* * Hash table to find appropriate SA towards given target (endpoint of * tunnel or destination of transport mode) allowed by selector. * * Main use is finding SA after policy selected tunnel or transport * mode. Also, it can be used by ah/esp icmp error handler to find * offending SA. */ struct hlist_head __rcu *state_bydst; struct hlist_head __rcu *state_bysrc; struct hlist_head __rcu *state_byspi; unsigned int state_hmask; unsigned int state_num; struct work_struct state_hash_work; struct list_head policy_all; struct hlist_head *policy_byidx; unsigned int policy_idx_hmask; struct hlist_head policy_inexact[XFRM_POLICY_MAX]; struct xfrm_policy_hash policy_bydst[XFRM_POLICY_MAX]; unsigned int policy_count[XFRM_POLICY_MAX * 2]; struct work_struct policy_hash_work; struct xfrm_policy_hthresh policy_hthresh; struct sock *nlsk; struct sock *nlsk_stash; u32 sysctl_aevent_etime; u32 sysctl_aevent_rseqth; int sysctl_larval_drop; u32 sysctl_acq_expires; #ifdef CONFIG_SYSCTL struct ctl_table_header *sysctl_hdr; #endif struct dst_ops xfrm4_dst_ops; #if IS_ENABLED(CONFIG_IPV6) struct dst_ops xfrm6_dst_ops; #endif spinlock_t xfrm_state_lock; spinlock_t xfrm_policy_lock; struct mutex xfrm_cfg_mutex; }; #endif