Lines Matching refs:sel
62 pedit_parse_nopopt (int *argc_p, char ***argv_p,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey) in pedit_parse_nopopt() argument
121 pack_key(struct tc_pedit_sel *sel,struct tc_pedit_key *tkey) in pack_key() argument
123 int hwm = sel->nkeys; in pack_key()
133 sel->keys[hwm].val = tkey->val; in pack_key()
134 sel->keys[hwm].mask = tkey->mask; in pack_key()
135 sel->keys[hwm].off = tkey->off; in pack_key()
136 sel->keys[hwm].at = tkey->at; in pack_key()
137 sel->keys[hwm].offmask = tkey->offmask; in pack_key()
138 sel->keys[hwm].shift = tkey->shift; in pack_key()
139 sel->nkeys++; in pack_key()
145 pack_key32(__u32 retain,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey) in pack_key32() argument
157 return pack_key(sel,tkey); in pack_key32()
161 pack_key16(__u32 retain,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey) in pack_key16() argument
189 return pack_key(sel,tkey); in pack_key16()
194 pack_key8(__u32 retain,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey) in pack_key8() argument
216 return pack_key(sel,tkey); in pack_key8()
251 parse_cmd(int *argc_p, char ***argv_p, __u32 len, int type,__u32 retain,struct tc_pedit_sel *sel,st… in parse_cmd() argument
296 res = pack_key8(retain,sel,tkey); in parse_cmd()
301 res = pack_key16(retain,sel,tkey); in parse_cmd()
306 res = pack_key32(retain,sel,tkey); in parse_cmd()
321 parse_offset(int *argc_p, char ***argv_p,struct tc_pedit_sel *sel,struct tc_pedit_key *tkey) in parse_offset() argument
390 res = parse_cmd(&argc, &argv, len, TU32,retain,sel,tkey); in parse_offset()
398 parse_munge(int *argc_p, char ***argv_p,struct tc_pedit_sel *sel) in parse_munge() argument
412 res = parse_offset(&argc, &argv,sel,&tkey); in parse_munge()
424 res = p->parse_peopt(&argc, &argv, sel,&tkey); in parse_munge()
447 struct tc_pedit_sel sel; in parse_pedit() member
449 } sel; in parse_pedit() local
456 memset(&sel, 0, sizeof(sel)); in parse_pedit()
474 if (parse_munge(&argc, &argv,&sel.sel)) { in parse_pedit()
493 sel.sel.action = TC_ACT_RECLASSIFY; in parse_pedit()
496 sel.sel.action = TC_ACT_PIPE; in parse_pedit()
500 sel.sel.action = TC_ACT_SHOT; in parse_pedit()
503 sel.sel.action = TC_ACT_UNSPEC; in parse_pedit()
506 sel.sel.action = TC_ACT_OK; in parse_pedit()
514 if (get_u32(&sel.sel.index, *argv, 10)) { in parse_pedit()
526 …addattr_l(n, MAX_MSG, TCA_PEDIT_PARMS,&sel, sizeof(sel.sel)+sel.sel.nkeys*sizeof(struct tc_pedit_k… in parse_pedit()
537 struct tc_pedit_sel *sel; in print_pedit() local
550 sel = RTA_DATA(tb[TCA_PEDIT_PARMS]); in print_pedit()
552 fprintf(f, " pedit action %s keys %d\n ", action_n2a(sel->action, b1, sizeof (b1)),sel->nkeys); in print_pedit()
553 fprintf(f, "\t index %d ref %d bind %d", sel->index,sel->refcnt, sel->bindcnt); in print_pedit()
561 if (sel->nkeys) { in print_pedit()
563 struct tc_pedit_key *key = sel->keys; in print_pedit()
565 for (i=0; i<sel->nkeys; i++, key++) { in print_pedit()
573 fprintf(f, "\npedit %x keys %d is not LEGIT", sel->index,sel->nkeys); in print_pedit()