Home
last modified time | relevance | path

Searched refs:l4proto (Results 1 – 25 of 54) sorted by relevance

123

/linux/net/netfilter/
A Dnfnetlink_cttimeout.c137 matching->timeout.l4proto->l4proto != l4num) in cttimeout_new_timeout()
141 matching->timeout.l4proto, in cttimeout_new_timeout()
152 if (l4proto->l4proto != l4num) { in cttimeout_new_timeout()
171 timeout->timeout.l4proto = l4proto; in cttimeout_new_timeout()
189 const struct nf_conntrack_l4proto *l4proto = timeout->timeout.l4proto; in ctnl_timeout_fill_info() local
202 nla_put_u8(skb, CTA_TIMEOUT_L4PROTO, l4proto->l4proto) || in ctnl_timeout_fill_info()
377 if (l4proto->l4proto != l4num) { in cttimeout_default_set()
410 nla_put_u8(skb, CTA_TIMEOUT_L4PROTO, l4proto->l4proto)) in cttimeout_default_fill_info()
450 if (l4proto->l4proto != l4num) in cttimeout_default_get()
453 switch (l4proto->l4proto) { in cttimeout_default_get()
[all …]
A Dnft_ct.c29 u8 l4proto; member
898 u8 l4proto; member
954 priv->l4proto = l4num; in nft_ct_timeout_obj_init()
958 if (l4proto->l4proto != l4num) { in nft_ct_timeout_obj_init()
976 timeout->l4proto = l4proto; in nft_ct_timeout_obj_init()
1010 if (nla_put_u8(skb, NFTA_CT_TIMEOUT_L4PROTO, timeout->l4proto->l4proto) || in nft_ct_timeout_obj_dump()
1065 if (!priv->l4proto) in nft_ct_helper_obj_init()
1082 priv->l4proto); in nft_ct_helper_obj_init()
1089 priv->l4proto); in nft_ct_helper_obj_init()
1095 priv->l4proto); in nft_ct_helper_obj_init()
[all …]
A Dnf_conntrack_timeout.c99 if (timeout->l4proto->l4proto != l4num) { in nf_ct_set_timeout()
103 timeout_name, 4, timeout->l4proto->l4proto); in nf_ct_set_timeout()
A Dnft_inner.c133 ctx->l4proto = iph->protocol; in nft_inner_parse_l2l3()
141 int l4proto; in nft_inner_parse_l2l3() local
154 l4proto = ipv6_find_hdr(pkt->skb, &thoff, -1, &fragoff, &fh_flags); in nft_inner_parse_l2l3()
155 if (l4proto < 0 || thoff > U16_MAX) in nft_inner_parse_l2l3()
162 ctx->l4proto = l4proto; in nft_inner_parse_l2l3()
A Dnft_tproxy.c96 int l4proto; in nft_tproxy_eval_v6() local
105 l4proto = pkt->tprot; in nft_tproxy_eval_v6()
117 sk = nf_tproxy_get_sock_v6(nft_net(pkt), skb, thoff, l4proto, in nft_tproxy_eval_v6()
134 sk = nf_tproxy_handle_time_wait6(skb, l4proto, thoff, in nft_tproxy_eval_v6()
144 l4proto, &iph->saddr, &taddr, in nft_tproxy_eval_v6()
A Dnf_conntrack_bpf.c56 u8 l4proto; member
132 err = bpf_nf_ct_tuple_parse(bpf_tuple, tuple_len, opts->l4proto, in __bpf_nf_ct_alloc_entry()
137 err = bpf_nf_ct_tuple_parse(bpf_tuple, tuple_len, opts->l4proto, in __bpf_nf_ct_alloc_entry()
194 if (unlikely(opts->l4proto != IPPROTO_TCP && opts->l4proto != IPPROTO_UDP)) in __bpf_nf_ct_lookup()
199 err = bpf_nf_ct_tuple_parse(bpf_tuple, tuple_len, opts->l4proto, in __bpf_nf_ct_lookup()
A Dnf_conntrack_standalone.c36 const struct nf_conntrack_l4proto *l4proto) in print_tuple() argument
51 switch (l4proto->l4proto) { in print_tuple()
296 const struct nf_conntrack_l4proto *l4proto; in ct_seq_show() local
319 l4proto = nf_ct_l4proto_find(nf_ct_protonum(ct)); in ct_seq_show()
324 l4proto_name(l4proto->l4proto), nf_ct_protonum(ct)); in ct_seq_show()
329 if (l4proto->print_conntrack) in ct_seq_show()
330 l4proto->print_conntrack(s, ct); in ct_seq_show()
333 l4proto); in ct_seq_show()
345 print_tuple(s, &ct->tuplehash[IP_CT_DIR_REPLY].tuple, l4proto); in ct_seq_show()
A Dnf_conntrack_proto_icmp.c109 u8 l4proto, union nf_inet_addr *outer_daddr) in nf_conntrack_inet_error() argument
174 l4proto, in nf_conntrack_inet_error()
179 l4proto, in nf_conntrack_inet_error()
367 .l4proto = IPPROTO_ICMP,
A Dxt_CT.c108 const struct nf_conntrack_l4proto *l4proto; in xt_ct_set_timeout() local
117 l4proto = nf_ct_l4proto_find(proto); in xt_ct_set_timeout()
118 return nf_ct_set_timeout(par->net, ct, par->family, l4proto->l4proto, in xt_ct_set_timeout()
A Dnf_conntrack_netlink.c81 if (likely(l4proto->tuple_to_nlattr)) in ctnetlink_dump_tuples_proto()
82 ret = l4proto->tuple_to_nlattr(skb, tuple); in ctnetlink_dump_tuples_proto()
140 const struct nf_conntrack_l4proto *l4proto; in ctnetlink_dump_tuples() local
206 if (!l4proto->to_nlattr) in ctnetlink_dump_protoinfo()
644 len += l4proto->nlattr_size; in ctnetlink_proto_size()
645 if (l4proto->nlattr_tuple_size) { in ctnetlink_proto_size()
646 len4 = l4proto->nlattr_tuple_size(); in ctnetlink_proto_size()
1375 if (likely(l4proto->nlattr_to_tuple)) { in ctnetlink_parse_tuple_proto()
1377 l4proto->nla_policy, in ctnetlink_parse_tuple_proto()
2032 if (l4proto->from_nlattr) in ctnetlink_change_protoinfo()
[all …]
A Dnf_conntrack_proto_generic.c69 .l4proto = 255,
A Dnf_conntrack_proto_udp.c284 .l4proto = IPPROTO_UDP,
306 .l4proto = IPPROTO_UDPLITE,
A Dnf_flow_table_bpf.c66 .l4proto = fib_tuple->l4_protocol, in bpf_xdp_flow_lookup()
A Dxt_conntrack.c83 (nf_ct_protonum(ct) == info->l4proto) ^ in ct_proto_port_check()
127 (nf_ct_protonum(ct) == info->l4proto) ^ in ct_proto_port_check_v3()
A Dxt_ipvs.c75 if ((iph.protocol == data->l4proto) ^ in ipvs_mt()
/linux/tools/testing/selftests/net/netfilter/
A Dconntrack_icmp_related.sh120 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept
121 …meta l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" ac…
122 meta l4proto { icmp, icmpv6 } ct state new,established accept
141 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
142 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept
157 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
159 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new" accept
160 meta l4proto { icmp, icmpv6 } ct state "established" counter name "established" accept
165 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
167 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new"
[all …]
A Dnft_meta.sh59 meta l4proto icmp counter name "il4protocounter"
73 meta l4proto icmp counter name "ol4protocounter"
A Dnft_synproxy.sh74 … meta iif veth0 meta l4proto tcp ct state untracked,invalid synproxy mss 1460 sack-perm timestamp
/linux/include/uapi/linux/netfilter/
A Dxt_conntrack.h44 __u16 l4proto; member
57 __u16 l4proto; member
70 __u16 l4proto; member
A Dxt_ipvs.h23 __u8 l4proto; member
/linux/tools/testing/selftests/bpf/progs/
A Dtest_bpf_nf.c57 u8 l4proto; member
65 u8 l4proto; member
96 struct bpf_ct_opts___local opts_def = { .l4proto = IPPROTO_TCP, .netns_id = -1 }; in nf_ct_test()
112 opts_def.l4proto = IPPROTO_TCP; in nf_ct_test()
134 opts_def.l4proto = IPPROTO_ICMP; in nf_ct_test()
137 opts_def.l4proto = IPPROTO_TCP; in nf_ct_test()
251 struct bpf_ct_opts___new opts_def = { .l4proto = IPPROTO_TCP, .netns_id = -1 }; in nf_ct_opts_new_test()
A Dtest_bpf_nf_fail.c13 u8 l4proto; member
/linux/include/net/netfilter/
A Dnf_conntrack_l4proto.h22 u_int8_t l4proto; member
82 u8 l4proto,
150 const struct nf_conntrack_l4proto *nf_ct_l4proto_find(u8 l4proto);
A Dnf_conntrack_timeout.h16 const struct nf_conntrack_l4proto *l4proto; member
/linux/drivers/net/ethernet/mediatek/
A Dmtk_ppe_offload.c256 u8 l4proto = 0; in mtk_flow_offload_replace() local
299 l4proto = match.key->ip_proto; in mtk_flow_offload_replace()
378 err = mtk_foe_entry_prepare(eth, &foe, offload_type, l4proto, 0, in mtk_flow_offload_replace()

Completed in 47 milliseconds

123