Home
last modified time | relevance | path

Searched refs:l4proto (Results 1 – 25 of 39) sorted by relevance

12

/Linux-v5.10/net/netfilter/
Dnfnetlink_cttimeout.c47 const struct nf_conntrack_l4proto *l4proto, in ctnl_timeout_parse_policy() argument
53 tb = kcalloc(l4proto->ctnl_timeout.nlattr_max + 1, sizeof(*tb), in ctnl_timeout_parse_policy()
60 l4proto->ctnl_timeout.nlattr_max, in ctnl_timeout_parse_policy()
62 l4proto->ctnl_timeout.nla_policy, in ctnl_timeout_parse_policy()
67 ret = l4proto->ctnl_timeout.nlattr_to_obj(tb, net, timeout); in ctnl_timeout_parse_policy()
82 const struct nf_conntrack_l4proto *l4proto; in cttimeout_new_timeout() local
114 matching->timeout.l4proto->l4proto != l4num) in cttimeout_new_timeout()
118 matching->timeout.l4proto, in cttimeout_new_timeout()
125 l4proto = nf_ct_l4proto_find(l4num); in cttimeout_new_timeout()
128 if (l4proto->l4proto != l4num) { in cttimeout_new_timeout()
[all …]
Dnft_ct.c38 u8 l4proto; member
792 const struct nf_conntrack_l4proto *l4proto, in nft_ct_timeout_parse_policy() argument
798 tb = kcalloc(l4proto->ctnl_timeout.nlattr_max + 1, sizeof(*tb), in nft_ct_timeout_parse_policy()
805 l4proto->ctnl_timeout.nlattr_max, in nft_ct_timeout_parse_policy()
807 l4proto->ctnl_timeout.nla_policy, in nft_ct_timeout_parse_policy()
812 ret = l4proto->ctnl_timeout.nlattr_to_obj(tb, net, timeouts); in nft_ct_timeout_parse_policy()
821 u8 l4proto; member
833 if (priv->l4proto != pkt->tprot) in nft_ct_timeout_obj_eval()
863 const struct nf_conntrack_l4proto *l4proto; in nft_ct_timeout_obj_init() local
877 priv->l4proto = l4num; in nft_ct_timeout_obj_init()
[all …]
Dnf_conntrack_timeout.c93 if (timeout->l4proto->l4proto != l4num) { in nf_ct_set_timeout()
97 timeout_name, 4, timeout->l4proto->l4proto); in nf_ct_set_timeout()
Dnft_tproxy.c90 int l4proto; in nft_tproxy_eval_v6() local
98 l4proto = pkt->tprot; in nft_tproxy_eval_v6()
110 sk = nf_tproxy_get_sock_v6(nft_net(pkt), skb, thoff, l4proto, in nft_tproxy_eval_v6()
127 sk = nf_tproxy_handle_time_wait6(skb, l4proto, thoff, in nft_tproxy_eval_v6()
137 l4proto, &iph->saddr, &taddr, in nft_tproxy_eval_v6()
Dnf_conntrack_standalone.c36 const struct nf_conntrack_l4proto *l4proto) in print_tuple() argument
51 switch (l4proto->l4proto) { in print_tuple()
297 const struct nf_conntrack_l4proto *l4proto; in ct_seq_show() local
317 l4proto = nf_ct_l4proto_find(nf_ct_protonum(ct)); in ct_seq_show()
322 l4proto_name(l4proto->l4proto), nf_ct_protonum(ct)); in ct_seq_show()
327 if (l4proto->print_conntrack) in ct_seq_show()
328 l4proto->print_conntrack(s, ct); in ct_seq_show()
331 l4proto); in ct_seq_show()
344 print_tuple(s, &ct->tuplehash[IP_CT_DIR_REPLY].tuple, l4proto); in ct_seq_show()
Dnf_conntrack_proto_icmp.c109 u8 l4proto, union nf_inet_addr *outer_daddr) in nf_conntrack_inet_error() argument
174 l4proto, in nf_conntrack_inet_error()
179 l4proto, in nf_conntrack_inet_error()
368 .l4proto = IPPROTO_ICMP,
Dxt_CT.c108 const struct nf_conntrack_l4proto *l4proto; in xt_ct_set_timeout() local
117 l4proto = nf_ct_l4proto_find(proto); in xt_ct_set_timeout()
118 return nf_ct_set_timeout(par->net, ct, par->family, l4proto->l4proto, in xt_ct_set_timeout()
Dnf_conntrack_netlink.c63 const struct nf_conntrack_l4proto *l4proto) in ctnetlink_dump_tuples_proto() argument
74 if (likely(l4proto->tuple_to_nlattr)) in ctnetlink_dump_tuples_proto()
75 ret = l4proto->tuple_to_nlattr(skb, tuple); in ctnetlink_dump_tuples_proto()
133 const struct nf_conntrack_l4proto *l4proto; in ctnetlink_dump_tuples() local
140 l4proto = nf_ct_l4proto_find(tuple->dst.protonum); in ctnetlink_dump_tuples()
141 ret = ctnetlink_dump_tuples_proto(skb, tuple, l4proto); in ctnetlink_dump_tuples()
184 const struct nf_conntrack_l4proto *l4proto; in ctnetlink_dump_protoinfo() local
188 l4proto = nf_ct_l4proto_find(nf_ct_protonum(ct)); in ctnetlink_dump_protoinfo()
189 if (!l4proto->to_nlattr) in ctnetlink_dump_protoinfo()
196 ret = l4proto->to_nlattr(skb, nest_proto, ct); in ctnetlink_dump_protoinfo()
[all …]
Dnf_conntrack_proto_generic.c69 .l4proto = 255,
Dnf_flow_table_core.c41 ft->l4proto = ctt->dst.protonum; in flow_offload_fill_dir()
139 const struct nf_conntrack_l4proto *l4proto; in flow_offload_fixup_ct_timeout() local
143 l4proto = nf_ct_l4proto_find(l4num); in flow_offload_fixup_ct_timeout()
144 if (!l4proto) in flow_offload_fixup_ct_timeout()
Dnf_conntrack_proto_udp.c277 .l4proto = IPPROTO_UDP,
299 .l4proto = IPPROTO_UDPLITE,
Dxt_conntrack.c83 (nf_ct_protonum(ct) == info->l4proto) ^ in ct_proto_port_check()
127 (nf_ct_protonum(ct) == info->l4proto) ^ in ct_proto_port_check_v3()
Dxt_ipvs.c75 if ((iph.protocol == data->l4proto) ^ in ipvs_mt()
Dnf_flow_table_offload.c127 switch (tuple->l4proto) { in nf_flow_rule_match()
139 key->basic.ip_proto = tuple->l4proto; in nf_flow_rule_match()
369 u8 protonum = flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.l4proto; in flow_offload_l4proto()
450 u8 protonum = flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.l4proto; in flow_offload_ipv4_checksum()
Dnf_conntrack_core.c1043 const struct nf_conntrack_l4proto *l4proto; in nf_ct_resolve_clash() local
1052 l4proto = nf_ct_l4proto_find(nf_ct_protonum(ct)); in nf_ct_resolve_clash()
1053 if (!l4proto->allow_clash) in nf_ct_resolve_clash()
1335 const struct nf_conntrack_l4proto *l4proto; in gc_worker_can_early_drop() local
1340 l4proto = nf_ct_l4proto_find(nf_ct_protonum(ct)); in gc_worker_can_early_drop()
1341 if (l4proto->can_early_drop && l4proto->can_early_drop(ct)) in gc_worker_can_early_drop()
/Linux-v5.10/tools/testing/selftests/netfilter/
Dconntrack_icmp_related.sh136 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept
137 …meta l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" ac…
138 meta l4proto { icmp, icmpv6 } ct state new,established accept
151 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
153 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept
167 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
169 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new" accept
170 meta l4proto { icmp, icmpv6 } ct state "established" counter name "established" accept
175 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
177 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new"
[all …]
Dnft_meta.sh59 meta l4proto icmp counter name "il4protocounter"
73 meta l4proto icmp counter name "ol4protocounter"
Dnft_flowtable.sh188 meta nfproto ipv4 meta l4proto icmp accept
189 meta nfproto ipv6 meta l4proto icmpv6 accept
/Linux-v5.10/include/uapi/linux/netfilter/
Dxt_conntrack.h44 __u16 l4proto; member
57 __u16 l4proto; member
70 __u16 l4proto; member
Dxt_ipvs.h23 __u8 l4proto; member
/Linux-v5.10/include/net/netfilter/
Dnf_conntrack_l4proto.h22 u_int8_t l4proto; member
82 u8 l4proto,
150 const struct nf_conntrack_l4proto *nf_ct_l4proto_find(u8 l4proto);
Dnf_conntrack_timeout.h16 const struct nf_conntrack_l4proto *l4proto; member
Dnf_flow_table.h109 u8 l4proto; member
/Linux-v5.10/drivers/net/ethernet/aquantia/atlantic/
Daq_nic.c579 u8 l4proto = 0; in aq_nic_map_skb() local
582 l4proto = ip_hdr(skb)->protocol; in aq_nic_map_skb()
584 l4proto = ipv6_hdr(skb)->nexthdr; in aq_nic_map_skb()
592 if (l4proto == IPPROTO_TCP) { in aq_nic_map_skb()
595 } else if (l4proto == IPPROTO_UDP) { in aq_nic_map_skb()
646 dx_buff->is_tcp_cso = (l4proto == IPPROTO_TCP); in aq_nic_map_skb()
647 dx_buff->is_udp_cso = (l4proto == IPPROTO_UDP); in aq_nic_map_skb()
/Linux-v5.10/drivers/infiniband/hw/i40iw/
Di40iw_puda.h62 u8 l4proto; member

12