| /linux/net/netfilter/ |
| H A D | nft_ct.c | 31 u8 l4proto; member 847 const struct nf_conntrack_l4proto *l4proto, in nft_ct_timeout_parse_policy() argument 853 tb = kzalloc_objs(*tb, l4proto->ctnl_timeout.nlattr_max + 1); in nft_ct_timeout_parse_policy() 859 l4proto->ctnl_timeout.nlattr_max, in nft_ct_timeout_parse_policy() 861 l4proto->ctnl_timeout.nla_policy, in nft_ct_timeout_parse_policy() 866 ret = l4proto->ctnl_timeout.nlattr_to_obj(tb, net, timeouts); in nft_ct_timeout_parse_policy() 875 u8 l4proto; member 887 if (priv->l4proto != pkt->tprot) in nft_ct_timeout_obj_eval() 917 const struct nf_conntrack_l4proto *l4proto; in nft_ct_timeout_obj_init() local 931 priv->l4proto = l4num; in nft_ct_timeout_obj_init() [all …]
|
| H A D | nf_conntrack_timeout.c | 99 if (timeout->l4proto->l4proto != l4num) { in nf_ct_set_timeout() 103 timeout_name, 4, timeout->l4proto->l4proto); in nf_ct_set_timeout()
|
| H A D | nft_tproxy.c | 96 int l4proto; in nft_tproxy_eval_v6() local 105 l4proto = pkt->tprot; in nft_tproxy_eval_v6() 117 sk = nf_tproxy_get_sock_v6(nft_net(pkt), skb, thoff, l4proto, in nft_tproxy_eval_v6() 134 sk = nf_tproxy_handle_time_wait6(skb, l4proto, thoff, in nft_tproxy_eval_v6() 144 l4proto, &iph->saddr, &taddr, in nft_tproxy_eval_v6()
|
| H A D | xt_CT.c | 109 const struct nf_conntrack_l4proto *l4proto; in xt_ct_set_timeout() local 118 l4proto = nf_ct_l4proto_find(proto); in xt_ct_set_timeout() 119 return nf_ct_set_timeout(par->net, ct, par->family, l4proto->l4proto, in xt_ct_set_timeout()
|
| H A D | nf_conntrack_netlink.c | 69 const struct nf_conntrack_l4proto *l4proto) in ctnetlink_dump_tuples_proto() argument 80 if (likely(l4proto->tuple_to_nlattr)) in ctnetlink_dump_tuples_proto() 81 ret = l4proto->tuple_to_nlattr(skb, tuple); in ctnetlink_dump_tuples_proto() 139 const struct nf_conntrack_l4proto *l4proto; in ctnetlink_dump_tuples() local 146 l4proto = nf_ct_l4proto_find(tuple->dst.protonum); in ctnetlink_dump_tuples() 147 ret = ctnetlink_dump_tuples_proto(skb, tuple, l4proto); in ctnetlink_dump_tuples() 200 const struct nf_conntrack_l4proto *l4proto; in ctnetlink_dump_protoinfo() local 204 l4proto = nf_ct_l4proto_find(nf_ct_protonum(ct)); in ctnetlink_dump_protoinfo() 205 if (!l4proto->to_nlattr) in ctnetlink_dump_protoinfo() 212 ret = l4proto->to_nlattr(skb, nest_proto, ct, destroy); in ctnetlink_dump_protoinfo() [all …]
|
| H A D | xt_conntrack.c | 83 (nf_ct_protonum(ct) == info->l4proto) ^ in ct_proto_port_check() 127 (nf_ct_protonum(ct) == info->l4proto) ^ in ct_proto_port_check_v3()
|
| H A D | nft_compat.c | 204 u32 l4proto; in nft_parse_compat() local 223 l4proto = ntohl(nla_get_be32(tb[NFTA_RULE_COMPAT_PROTO])); in nft_parse_compat() 224 if (l4proto > U16_MAX) in nft_parse_compat() 227 *proto = l4proto; in nft_parse_compat()
|
| H A D | xt_ipvs.c | 75 if ((iph.protocol == data->l4proto) ^ in ipvs_mt()
|
| H A D | nf_flow_table_offload.c | 173 switch (tuple->l4proto) { in nf_flow_rule_match() 186 key->basic.ip_proto = tuple->l4proto; in nf_flow_rule_match() 193 switch (tuple->l4proto) { in nf_flow_rule_match() 475 u8 protonum = flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.l4proto; in flow_offload_l4proto() 564 u8 protonum = flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.l4proto; in flow_offload_ipv4_checksum()
|
| H A D | nf_flow_table_core.c | 42 ft->l4proto = ctt->dst.protonum; in flow_offload_fill_dir() 526 u8 l4proto = nf_ct_protonum(ct); in nf_flow_table_extend_ct_timeout() local 529 switch (l4proto) { in nf_flow_table_extend_ct_timeout()
|
| H A D | nf_conntrack_proto_gre.c | 308 .l4proto = IPPROTO_GRE,
|
| /linux/tools/testing/selftests/net/netfilter/ |
| H A D | conntrack_icmp_related.sh | 120 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept 121 …meta l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" ac… 122 meta l4proto { icmp, icmpv6 } ct state new,established accept 141 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 142 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept 157 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 159 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new" accept 160 meta l4proto { icmp, icmpv6 } ct state "established" counter name "established" accept 165 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 167 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new" [all …]
|
| H A D | nft_meta.sh | 59 meta l4proto icmp counter name "il4protocounter" 73 meta l4proto icmp counter name "ol4protocounter"
|
| H A D | nft_synproxy.sh | 74 … meta iif veth0 meta l4proto tcp ct state untracked,invalid synproxy mss 1460 sack-perm timestamp
|
| H A D | conntrack_clash.sh | 27 …meta l4proto udp dnat to numgen random mod 3 map { 0 : 10.0.2.1 . 9000, 1 : 10.0.2.1 . 9001, 2 : 1…
|
| H A D | nft_flowtable.sh | 183 meta nfproto ipv4 meta l4proto icmp accept 184 meta nfproto ipv6 meta l4proto icmpv6 accept 201 meta l4proto tcp goto {
|
| /linux/include/uapi/linux/netfilter/ |
| H A D | xt_conntrack.h | 44 __u16 l4proto; member 57 __u16 l4proto; member 70 __u16 l4proto; member
|
| H A D | xt_ipvs.h | 23 __u8 l4proto; member
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | test_bpf_nf.c | 56 u8 l4proto; 64 u8 l4proto; 95 struct bpf_ct_opts___local opts_def = { .l4proto = IPPROTO_TCP, .netns_id = -1 }; in nf_ct_test() 105 opts_def.l4proto = IPPROTO_TCP; in nf_ct_test() 127 opts_def.l4proto = IPPROTO_ICMP; in nf_ct_test() 130 opts_def.l4proto = IPPROTO_TCP; in nf_ct_test() 244 struct bpf_ct_opts___new opts_def = { .l4proto = IPPROTO_TCP, .netns_id = -1 }; 57 u8 l4proto; global() member 65 u8 l4proto; global() member
|
| H A D | test_bpf_nf_fail.c | 14 u8 l4proto; 13 u8 l4proto; global() member
|
| /linux/include/net/netfilter/ |
| H A D | nf_conntrack_timeout.h | 16 const struct nf_conntrack_l4proto *l4proto; member
|
| H A D | nf_tables_core.h | 172 u8 l4proto; member
|
| /linux/drivers/net/ethernet/mediatek/ |
| H A D | mtk_ppe_offload.c | 279 u8 l4proto = 0; in mtk_flow_offload_replace() local 322 l4proto = match.key->ip_proto; in mtk_flow_offload_replace() 402 err = mtk_foe_entry_prepare(eth, &foe, offload_type, l4proto, 0, in mtk_flow_offload_replace()
|
| /linux/drivers/net/ethernet/airoha/ |
| H A D | airoha_ppe.c | 304 int l4proto) in airoha_ppe_foe_entry_prepare() argument 315 FIELD_PREP(AIROHA_FOE_IB1_BIND_UDP, l4proto == IPPROTO_UDP) | in airoha_ppe_foe_entry_prepare() 368 ports_pad = 0xa5a5a500 | (l4proto & 0xff); in airoha_ppe_foe_entry_prepare() 1044 u8 l4proto = 0; in airoha_ppe_flow_offload_replace() local 1069 l4proto = match.key->ip_proto; in airoha_ppe_flow_offload_replace() 1139 &data, l4proto); in airoha_ppe_flow_offload_replace()
|
| /linux/drivers/net/ethernet/qlogic/qlcnic/ |
| H A D | qlcnic_io.c | 461 u8 l4proto, opcode = 0, hdr_len = 0, tag_vlan = 0; in qlcnic_tx_pkt() local 557 l4proto = ip_hdr(skb)->protocol; in qlcnic_tx_pkt() 559 if (l4proto == IPPROTO_TCP) in qlcnic_tx_pkt() 561 else if (l4proto == IPPROTO_UDP) in qlcnic_tx_pkt() 564 l4proto = ipv6_hdr(skb)->nexthdr; in qlcnic_tx_pkt() 566 if (l4proto == IPPROTO_TCP) in qlcnic_tx_pkt() 568 else if (l4proto == IPPROTO_UDP) in qlcnic_tx_pkt()
|