OXIESEC PANEL
- Current Dir:
/
/
usr
/
src
/
linux-headers-4.15.0-213
/
include
/
net
/
netns
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
05/09/2024 07:14:16 AM
rwxr-xr-x
📄
can.h
1.08 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
conntrack.h
2.72 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
core.h
285 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
dccp.h
185 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
generic.h
1.15 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
hash.h
212 bytes
06/16/2023 05:32:39 PM
rw-r--r--
📄
ieee802154_6lowpan.h
399 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
ipv4.h
5.2 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
ipv6.h
2.64 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
mib.h
986 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
mpls.h
371 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
netfilter.h
689 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
nftables.h
440 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
packet.h
295 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sctp.h
3.83 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
unix.h
263 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
x_tables.h
507 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
xfrm.h
1.84 KB
06/16/2023 05:32:39 PM
rw-r--r--
Editing: xfrm.h
Close
/* SPDX-License-Identifier: GPL-2.0 */ #ifndef __NETNS_XFRM_H #define __NETNS_XFRM_H #include <linux/list.h> #include <linux/wait.h> #include <linux/workqueue.h> #include <linux/xfrm.h> #include <net/dst_ops.h> struct ctl_table_header; struct xfrm_policy_hash { struct hlist_head __rcu *table; unsigned int hmask; u8 dbits4; u8 sbits4; u8 dbits6; u8 sbits6; }; struct xfrm_policy_hthresh { struct work_struct work; seqlock_t lock; u8 lbits4; u8 rbits4; u8 lbits6; u8 rbits6; }; struct netns_xfrm { struct list_head state_all; /* * Hash table to find appropriate SA towards given target (endpoint of * tunnel or destination of transport mode) allowed by selector. * * Main use is finding SA after policy selected tunnel or transport * mode. Also, it can be used by ah/esp icmp error handler to find * offending SA. */ struct hlist_head __rcu *state_bydst; struct hlist_head __rcu *state_bysrc; struct hlist_head __rcu *state_byspi; unsigned int state_hmask; unsigned int state_num; struct work_struct state_hash_work; struct list_head policy_all; struct hlist_head *policy_byidx; unsigned int policy_idx_hmask; struct hlist_head policy_inexact[XFRM_POLICY_MAX]; struct xfrm_policy_hash policy_bydst[XFRM_POLICY_MAX]; unsigned int policy_count[XFRM_POLICY_MAX * 2]; struct work_struct policy_hash_work; struct xfrm_policy_hthresh policy_hthresh; struct sock *nlsk; struct sock *nlsk_stash; u32 sysctl_aevent_etime; u32 sysctl_aevent_rseqth; int sysctl_larval_drop; u32 sysctl_acq_expires; #ifdef CONFIG_SYSCTL struct ctl_table_header *sysctl_hdr; #endif struct dst_ops xfrm4_dst_ops; #if IS_ENABLED(CONFIG_IPV6) struct dst_ops xfrm6_dst_ops; #endif spinlock_t xfrm_state_lock; seqcount_t xfrm_state_hash_generation; spinlock_t xfrm_policy_lock; struct mutex xfrm_cfg_mutex; }; #endif