Home
last modified time | relevance | path

Searched refs:tcp (Results 1 – 25 of 198) sorted by relevance

12345678

/linux/net/netfilter/
H A Dnf_conntrack_proto_tcp.c271 seq_printf(s, "%s ", tcp_conntrack_names[ct->proto.tcp.state]); in tcp_print_conntrack()
515 struct ip_ct_tcp *state = &ct->proto.tcp; in tcp_in_window()
753 if (ct->proto.tcp.last_dir != dir && in nf_tcp_handle_invalid()
754 (ct->proto.tcp.last_index == TCP_FIN_SET || in nf_tcp_handle_invalid()
755 ct->proto.tcp.last_index == TCP_RST_SET)) { in nf_tcp_handle_invalid()
769 index, dir, ct->proto.tcp.last_index, timeout); in nf_tcp_handle_invalid()
774 ct->proto.tcp.last_index = index; in nf_tcp_handle_invalid()
775 ct->proto.tcp.last_dir = dir; in nf_tcp_handle_invalid()
857 memset(&ct->proto.tcp, 0, sizeof(ct->proto.tcp)); in tcp_new()
859 ct->proto.tcp.seen[0].td_end = in tcp_new()
[all …]
H A Dnft_synproxy.c25 const struct tcphdr *tcp, in nft_synproxy_tcp_options() argument
31 if (tcp->ece && tcp->cwr) in nft_synproxy_tcp_options()
48 const struct tcphdr *tcp, in nft_synproxy_eval_v4() argument
57 if (tcp->syn) { in nft_synproxy_eval_v4()
59 nft_synproxy_tcp_options(opts, tcp, snet, &info, priv); in nft_synproxy_eval_v4()
60 synproxy_send_client_synack(net, skb, tcp, opts); in nft_synproxy_eval_v4()
63 } else if (tcp->ack) { in nft_synproxy_eval_v4()
65 if (synproxy_recv_client_ack(net, skb, tcp, opts, in nft_synproxy_eval_v4()
66 ntohl(tcp->seq))) { in nft_synproxy_eval_v4()
79 const struct tcphdr *tcp, in nft_synproxy_eval_v6() argument
[all …]
H A Dnfnetlink_osf.c171 const struct tcphdr *tcp; in nf_osf_hdr_ctx_init() local
173 tcp = skb_header_pointer(skb, ip_hdrlen(skb), sizeof(struct tcphdr), _tcph); in nf_osf_hdr_ctx_init()
174 if (!tcp) in nf_osf_hdr_ctx_init()
177 if (!tcp->syn) in nf_osf_hdr_ctx_init()
182 ctx->window = ntohs(tcp->window); in nf_osf_hdr_ctx_init()
184 if (tcp->doff * 4 > sizeof(struct tcphdr)) { in nf_osf_hdr_ctx_init()
185 ctx->optsize = tcp->doff * 4 - sizeof(struct tcphdr); in nf_osf_hdr_ctx_init()
193 return tcp; in nf_osf_hdr_ctx_init()
209 const struct tcphdr *tcp; in nf_osf_match() local
214 tcp = nf_osf_hdr_ctx_init(&ctx, skb, ip, opts, &_tcph); in nf_osf_match()
[all …]
/linux/tools/testing/selftests/bpf/progs/
H A Dtest_tcp_custom_syncookie.c63 struct tcphdr *tcp; member
98 ctx->tcp = (struct tcphdr *)(ctx->ipv4 + 1); in tcp_load_headers()
112 ctx->tcp = (struct tcphdr *)(ctx->ipv6 + 1); in tcp_load_headers()
118 if (ctx->tcp + 1 > ctx->data_end) in tcp_load_headers()
133 if (ctx->tcp->doff < sizeof(*ctx->tcp) / 4) in tcp_reload_headers()
137 if (bpf_skb_change_tail(ctx->skb, data_len + 60 - ctx->tcp->doff * 4, 0)) in tcp_reload_headers()
146 ctx->tcp = (struct tcphdr *)(ctx->ipv4 + 1); in tcp_reload_headers()
150 ctx->tcp = (struct tcphdr *)(ctx->ipv6 + 1); in tcp_reload_headers()
153 if ((void *)ctx->tcp in tcp_reload_headers()
[all...]
H A Dtest_pkt_access.c89 struct tcphdr *tcp = NULL; in test_pkt_write_access_subprog() local
94 tcp = data + off; in test_pkt_write_access_subprog()
95 if (tcp + 1 > data_end) in test_pkt_write_access_subprog()
98 tcp->check++; in test_pkt_write_access_subprog()
108 struct tcphdr *tcp = NULL; in test_pkt_access() local
122 tcp = (struct tcphdr *)((void *)(iph) + ihl_len); in test_pkt_access()
130 tcp = (struct tcphdr *)((void *)(ip6h) + ihl_len); in test_pkt_access()
139 if (tcp) { in test_pkt_access()
140 if (test_pkt_write_access_subprog(skb, (void *)tcp - data)) in test_pkt_access()
142 if (((void *)(tcp) + 20) > data_end || proto != 6) in test_pkt_access()
[all …]
H A Dtest_migrate_reuseport.c50 struct tcphdr *tcp = NULL; in drop_ack() local
65 tcp = (struct tcphdr *)((void *)ip + ip->ihl * 4); in drop_ack()
77 tcp = (struct tcphdr *)(ipv6 + 1); in drop_ack()
84 if (tcp + 1 > data_end) in drop_ack()
87 if (tcp->dest != server_port) in drop_ack()
90 if (!tcp->syn && tcp->ack) in drop_ack()
H A Dbpf_iter_tcp6.c69 static bool tcp_in_initial_slowstart(const struct tcp_sock *tcp) in tcp_in_initial_slowstart() argument
71 return tcp->snd_ssthresh >= TCP_INFINITE_SSTHRESH; in tcp_in_initial_slowstart()
88 icsk = &tp->tcp.inet_conn; in dump_tcp6_sock()
118 rx_queue = tp->tcp.rcv_nxt - tp->tcp.copied_seq; in dump_tcp6_sock()
131 tp->tcp.write_seq - tp->tcp.snd_una, rx_queue, in dump_tcp6_sock()
143 tp->tcp.snd_cwnd, in dump_tcp6_sock()
145 : (tcp_in_initial_slowstart(&tp->tcp) ? -1 in dump_tcp6_sock()
146 : tp->tcp in dump_tcp6_sock()
[all...]
H A Dskb_pkt_end.c34 struct tcphdr *tcp; in main_prog() local
47 tcp = (void*)(ip + 1); in main_prog()
48 if (tcp->dest != 0) in main_prog()
50 if (!tcp) in main_prog()
53 urg_ptr = tcp->urg_ptr; in main_prog()
H A Dxdpwall.c173 static __always_inline bool tcphdr_only_contains_flag(struct tcphdr *tcp, in tcphdr_only_contains_flag() argument
176 return (tcp_flag_word(tcp) & in tcphdr_only_contains_flag()
181 struct tcphdr *tcp) { in set_tcp_flags() argument
182 if (tcphdr_only_contains_flag(tcp, TCP_FLAG_SYN)) in set_tcp_flags()
184 else if (tcphdr_only_contains_flag(tcp, TCP_FLAG_ACK)) in set_tcp_flags()
186 else if (tcphdr_only_contains_flag(tcp, TCP_FLAG_RST)) in set_tcp_flags()
193 struct tcphdr *tcp = transport_hdr; in parse_tcp() local
195 if (tcp + 1 > data_end) in parse_tcp()
198 info->sport = bpf_ntohs(tcp->source); in parse_tcp()
199 info->dport = bpf_ntohs(tcp->dest); in parse_tcp()
[all …]
H A Dtest_assign_reuse.c20 struct tcphdr tcp; member
39 if (ctx->data + sizeof(headers.tcp) > ctx->data_end) in reuse_accept()
42 if (__builtin_memcmp(&headers.tcp, ctx->data, sizeof(headers.tcp)) != 0) in reuse_accept()
89 __builtin_memcpy(&headers.tcp, th, sizeof(headers.tcp)); in maybe_assign_tcp()
H A Dfexit_bpf2bpf.c162 struct tcphdr *tcp; in new_test_pkt_write_access_subprog() local
167 tcp = data + off; in new_test_pkt_write_access_subprog()
168 if (tcp + 1 > data_end) in new_test_pkt_write_access_subprog()
172 tcp->check++; in new_test_pkt_write_access_subprog()
173 tcp->syn = 0; in new_test_pkt_write_access_subprog()
/linux/drivers/net/ovpn/
H A Dtcp.c69 skb_queue_tail(&peer->tcp.user_queue, skb); in ovpn_tcp_to_userspace()
70 peer->tcp.sk_cb.sk_data_ready(sk); in ovpn_tcp_to_userspace()
104 struct ovpn_peer *peer = container_of(strp, struct ovpn_peer, tcp.strp); in ovpn_tcp_rcv()
154 schedule_work(&peer->tcp.defer_del_work); in ovpn_tcp_rcv()
177 skb = __skb_recv_datagram(sk, &peer->tcp.user_queue, flags, &off, &err); in ovpn_tcp_recvmsg()
214 strp_stop(&peer->tcp.strp); in ovpn_tcp_socket_detach()
215 skb_queue_purge(&peer->tcp.user_queue); in ovpn_tcp_socket_detach()
218 sk->sk_data_ready = peer->tcp.sk_cb.sk_data_ready; in ovpn_tcp_socket_detach()
219 sk->sk_write_space = peer->tcp.sk_cb.sk_write_space; in ovpn_tcp_socket_detach()
220 sk->sk_prot = peer->tcp.sk_cb.prot; in ovpn_tcp_socket_detach()
[all …]
/linux/tools/testing/selftests/bpf/prog_tests/
H A Dflow_dissector.c21 struct tcphdr tcp; member
28 struct tcphdr tcp; member
36 struct tcphdr tcp; member
42 struct tcphdr tcp; member
54 struct tcphdr tcp; member
64 struct tcphdr tcp; member
77 struct tcphdr tcp; member
106 .tcp.doff = 5,
107 .tcp.source = 80,
108 .tcp.dest = 8080,
[all …]
/linux/tools/testing/selftests/net/
H A Dfcnal-test.sh880 wait_local_port_listen ${NSA} 12345 tcp
888 wait_local_port_listen ${NSA} 12345 tcp
896 wait_local_port_listen ${NSA} 12345 tcp
904 wait_local_port_listen ${NSA} 12345 tcp
915 wait_local_port_listen ${NSA} 12345 tcp
923 wait_local_port_listen ${NSA} 12345 tcp
931 wait_local_port_listen ${NSA} 12345 tcp
948 wait_local_port_listen ${NSA} 12345 tcp
956 wait_local_port_listen ${NSA} 12345 tcp
964 wait_local_port_listen ${NSA} 12345 tcp
[all …]
/linux/tools/testing/selftests/net/netfilter/packetdrill/
H A Dconntrack_rst_invalid.pkt6 +0 `$xtables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
7 +0 `$xtables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
31 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED`
35 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED`
39 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED`
44 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED`
49 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED`
59 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q CLOSE\ `
H A Dconntrack_synack_old.pkt17 +0 `$xtables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
18 +0 `$xtables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
31 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null | grep UNREPLIED | grep -q SYN…
40 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null | grep ESTABLISHED | grep -q A…
44 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null | grep ASSURED | grep -q ESTAB…
50 +0 `$xtables -D INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
51 +0 `$xtables -D OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
/linux/samples/bpf/
H A Dparse_varlen.c22 static int tcp(void *data, uint64_t tp_off, void *data_end) in tcp() function
24 struct tcphdr *tcp = data + tp_off; in tcp() local
26 if (tcp + 1 > data_end) in tcp()
28 if (tcp->dest == htons(80) || tcp->source == htons(80)) in tcp()
72 return tcp(data, nh_off + ihl_len, data_end); in parse_ipv4()
106 return tcp(data, nh_off + ihl_len, data_end); in parse_ipv6()
/linux/drivers/net/ethernet/mellanox/mlx5/core/en/tc/
H A Dct_fs_hmfs.c40 static u32 get_matcher_idx(bool ipv4, bool tcp, bool gre) in get_matcher_idx() argument
42 return ipv4 * 3 + tcp * 2 + gre; in get_matcher_idx()
94 struct mlx5_flow_spec *spec, bool ipv4, bool tcp, bool gre) in mlx5_ct_fs_hmfs_matcher_create() argument
101 u32 priority = get_matcher_idx(ipv4, tcp, gre); /* Static priority based on params. */ in mlx5_ct_fs_hmfs_matcher_create()
113 bool nat, bool ipv4, bool tcp, bool gre) in mlx5_ct_fs_hmfs_matcher_get() argument
116 u32 matcher_idx = get_matcher_idx(ipv4, tcp, gre); in mlx5_ct_fs_hmfs_matcher_get()
136 hws_bwc_matcher = mlx5_ct_fs_hmfs_matcher_create(fs, tbl, spec, ipv4, tcp, gre); in mlx5_ct_fs_hmfs_matcher_get()
140 nat, ipv4, tcp, gre, hws_bwc_matcher); in mlx5_ct_fs_hmfs_matcher_get()
200 bool nat, tcp, ipv4, gre; in mlx5_ct_fs_hmfs_ct_rule_add() local
212 tcp = MLX5_GET(fte_match_param, spec->match_value, in mlx5_ct_fs_hmfs_ct_rule_add()
[all …]
H A Dct_fs_smfs.c46 mlx5_ct_fs_smfs_fill_mask(struct mlx5_ct_fs *fs, struct mlx5_flow_spec *spec, bool ipv4, bool tcp, in mlx5_ct_fs_smfs_fill_mask() argument
75 if (likely(tcp)) { in mlx5_ct_fs_smfs_fill_mask()
90 bool tcp, bool gre, u32 priority) in mlx5_ct_fs_smfs_matcher_create() argument
99 mlx5_ct_fs_smfs_fill_mask(fs, spec, ipv4, tcp, gre); in mlx5_ct_fs_smfs_matcher_create()
111 mlx5_ct_fs_smfs_matcher_get(struct mlx5_ct_fs *fs, bool nat, bool ipv4, bool tcp, bool gre) in mlx5_ct_fs_smfs_matcher_get() argument
122 smfs_matcher = &matchers->smfs_matchers[ipv4 * 3 + tcp * 2 + gre]; in mlx5_ct_fs_smfs_matcher_get()
148 dr_matcher = mlx5_ct_fs_smfs_matcher_create(fs, tbl, ipv4, tcp, gre, prio); in mlx5_ct_fs_smfs_matcher_get()
152 nat, ipv4, tcp, gre, dr_matcher); in mlx5_ct_fs_smfs_matcher_get()
232 bool nat, tcp, ipv4, gre; in mlx5_ct_fs_smfs_ct_rule_add() local
253 tcp = MLX5_GET(fte_match_param, spec->match_value, in mlx5_ct_fs_smfs_ct_rule_add()
[all …]
/linux/drivers/net/ethernet/chelsio/libcxgb/
H A Dlibcxgb_cm.c54 struct tcphdr *tcp = (struct tcphdr *) in cxgb_get_4tuple() local
60 ntohs(tcp->source), ntohs(tcp->dest)); in cxgb_get_4tuple()
67 ntohs(tcp->source), ntohs(tcp->dest)); in cxgb_get_4tuple()
72 *peer_port = tcp->source; in cxgb_get_4tuple()
73 *local_port = tcp->dest; in cxgb_get_4tuple()
/linux/net/ipv4/netfilter/
H A Dnf_nat_h323.c290 exp->saved_proto.tcp.port = exp->tuple.dst.u.tcp.port; in nat_t120()
310 ntohs(exp->tuple.src.u.tcp.port), in nat_t120()
312 ntohs(exp->tuple.dst.u.tcp.port)); in nat_t120()
329 exp->saved_proto.tcp.port = exp->tuple.dst.u.tcp.port; in nat_h245()
357 ntohs(exp->tuple.src.u.tcp.port), in nat_h245()
359 ntohs(exp->tuple.dst.u.tcp.port)); in nat_h245()
408 exp->saved_proto.tcp.port = exp->tuple.dst.u.tcp.port; in nat_q931()
449 ntohs(exp->tuple.src.u.tcp.port), in nat_q931()
451 ntohs(exp->tuple.dst.u.tcp.port)); in nat_q931()
492 exp->saved_proto.tcp.port = exp->tuple.dst.u.tcp.port; in nat_callforwarding()
[all …]
/linux/tools/testing/selftests/net/netfilter/
H A Dconntrack_tcp_unreplied.sh91 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept
92 ct state new ct status dnat tcp dport 8080 counter name "redir" accept
111 count=$(ip netns exec "$ns2" conntrack -L -p tcp --dport 80 2>/dev/null | wc -l)
130 ip daddr 10.99.99.99 tcp dport 80 redirect to :8080
141 count=$(ip netns exec "$ns2" conntrack -L -p tcp --reply-port-src 8080 2>/dev/null | wc -l)
H A Dnf_nat_edemux.sh37 if ! ip netns exec "$ns" conntrack --get -s 192.168.1.2 -d 192.168.1.1 -p tcp \
69 ip netns exec "$ns2" iptables -t nat -A OUTPUT -d 10.96.0.1/32 -p tcp --dport 443 -j DNAT --to-dest…
75 wait_local_port_listen "$ns1" 5201 tcp
96 ip netns exec "$ns1" iptables -t nat -A PREROUTING -p tcp --dport 5202 -j REDIRECT --to-ports 5201
97 ip netns exec "$ns1" iptables -t nat -A PREROUTING -p tcp --dport 5203 -j REDIRECT --to-ports 5201
/linux/drivers/net/ethernet/qlogic/qed/
H A Dqed_iwarp.c117 p_ramrod->tcp.tx_sws_timer = cpu_to_le16(QED_TX_SWS_TIMER_DFLT); in qed_iwarp_init_fw_ramrod()
118 p_ramrod->tcp.two_msl_timer = cpu_to_le32(QED_TWO_MSL_TIMER_DFLT); in qed_iwarp_init_fw_ramrod()
119 p_ramrod->tcp.max_fin_rt = QED_IWARP_MAX_FIN_RT_DEFAULT; in qed_iwarp_init_fw_ramrod()
580 p_tcp_ramrod->tcp.local_mac_addr_lo, in qed_iwarp_print_tcp_ramrod()
581 p_tcp_ramrod->tcp.local_mac_addr_mid, in qed_iwarp_print_tcp_ramrod()
582 p_tcp_ramrod->tcp.local_mac_addr_hi, in qed_iwarp_print_tcp_ramrod()
583 p_tcp_ramrod->tcp.remote_mac_addr_lo, in qed_iwarp_print_tcp_ramrod()
584 p_tcp_ramrod->tcp.remote_mac_addr_mid, in qed_iwarp_print_tcp_ramrod()
585 p_tcp_ramrod->tcp.remote_mac_addr_hi); in qed_iwarp_print_tcp_ramrod()
587 if (p_tcp_ramrod->tcp.ip_version == TCP_IPV4) { in qed_iwarp_print_tcp_ramrod()
[all …]
/linux/tools/testing/selftests/net/mptcp/
H A Dmptcp_sockopt.sh55 ip netns exec $ns $t -A OUTPUT -p tcp --syn -m mark --mark $m -j ACCEPT
58 ip netns exec $ns $t -A OUTPUT -p tcp --tcp-flags RST RST -m mark --mark 0 -j ACCEPT
60 ip netns exec $ns $t -A OUTPUT -p tcp -m mark --mark $m -j ACCEPT
61 ip netns exec $ns $t -A OUTPUT -p tcp -m mark --mark 0 -j DROP
336 for args in "-t tcp" "-r tcp"; do
349 do_tcpinq_test -r tcp -t tcp

12345678