Home
last modified time | relevance | path

Searched refs:tcp (Results 1 – 25 of 223) sorted by relevance

123456789

/linux/net/netfilter/
A Dnf_conntrack_proto_tcp.c857 memset(&ct->proto.tcp, 0, sizeof(ct->proto.tcp)); in tcp_new()
873 memset(&ct->proto.tcp, 0, sizeof(ct->proto.tcp)); in tcp_new()
1055 ct->proto.tcp.seen[ct->proto.tcp.last_dir].td_end = in nf_conntrack_tcp_packet()
1056 ct->proto.tcp.last_end; in nf_conntrack_tcp_packet()
1057 ct->proto.tcp.seen[ct->proto.tcp.last_dir].td_maxend = in nf_conntrack_tcp_packet()
1058 ct->proto.tcp.last_end; in nf_conntrack_tcp_packet()
1059 ct->proto.tcp.seen[ct->proto.tcp.last_dir].td_maxwin = in nf_conntrack_tcp_packet()
1062 ct->proto.tcp.seen[ct->proto.tcp.last_dir].td_scale = in nf_conntrack_tcp_packet()
1065 ct->proto.tcp.seen[ct->proto.tcp.last_dir].flags = in nf_conntrack_tcp_packet()
1073 ct->proto.tcp.last_end = in nf_conntrack_tcp_packet()
[all …]
A Dnft_synproxy.c30 if (tcp->ece && tcp->cwr) in nft_synproxy_tcp_options()
47 const struct tcphdr *tcp, in nft_synproxy_eval_v4() argument
56 if (tcp->syn) { in nft_synproxy_eval_v4()
62 } else if (tcp->ack) { in nft_synproxy_eval_v4()
65 ntohl(tcp->seq))) { in nft_synproxy_eval_v4()
78 const struct tcphdr *tcp, in nft_synproxy_eval_v6() argument
87 if (tcp->syn) { in nft_synproxy_eval_v6()
93 } else if (tcp->ack) { in nft_synproxy_eval_v6()
96 ntohl(tcp->seq))) { in nft_synproxy_eval_v6()
113 const struct tcphdr *tcp; in nft_synproxy_do_eval() local
[all …]
A Dnfnetlink_osf.c171 const struct tcphdr *tcp; in nf_osf_hdr_ctx_init() local
174 if (!tcp) in nf_osf_hdr_ctx_init()
177 if (!tcp->syn) in nf_osf_hdr_ctx_init()
182 ctx->window = ntohs(tcp->window); in nf_osf_hdr_ctx_init()
193 return tcp; in nf_osf_hdr_ctx_init()
209 const struct tcphdr *tcp; in nf_osf_match() local
215 if (!tcp) in nf_osf_match()
240 &ip->daddr, ntohs(tcp->dest), in nf_osf_match()
252 &ip->daddr, ntohs(tcp->dest)); in nf_osf_match()
270 const struct tcphdr *tcp; in nf_osf_find() local
[all …]
/linux/tools/testing/selftests/bpf/progs/
A Dtest_tcp_custom_syncookie.c63 struct tcphdr *tcp; member
133 if (ctx->tcp->doff < sizeof(*ctx->tcp) / 4) in tcp_reload_headers()
180 csum = bpf_csum_diff(0, 0, (void *)ctx->tcp, ctx->tcp->doff * 4, 0); in tcp_validate_header()
306 if (!ctx->tcp->ece || !ctx->tcp->cwr) in tcp_validate_sysctl()
340 second = (u64)seq << 32 | ctx->tcp->source << 16 | ctx->tcp->dest; in tcp_prepare_cookie()
358 if (ctx->attrs.tstamp_ok && ctx->tcp->ece && ctx->tcp->cwr) in tcp_prepare_cookie()
414 swap(ctx->tcp->source, ctx->tcp->dest); in tcp_handle_syn()
416 ctx->tcp->ack_seq = bpf_htonl(bpf_ntohl(ctx->tcp->seq) + 1); in tcp_handle_syn()
418 ctx->tcp->doff = ((long)ctx->ptr32 - (long)ctx->tcp) >> 2; in tcp_handle_syn()
420 if (!ctx->attrs.tstamp_ok || !ctx->tcp->ece || !ctx->tcp->cwr) in tcp_handle_syn()
[all …]
A Dtest_pkt_access.c89 struct tcphdr *tcp = NULL; in test_pkt_write_access_subprog() local
94 tcp = data + off; in test_pkt_write_access_subprog()
95 if (tcp + 1 > data_end) in test_pkt_write_access_subprog()
98 tcp->check++; in test_pkt_write_access_subprog()
108 struct tcphdr *tcp = NULL; in test_pkt_access() local
122 tcp = (struct tcphdr *)((void *)(iph) + ihl_len); in test_pkt_access()
130 tcp = (struct tcphdr *)((void *)(ip6h) + ihl_len); in test_pkt_access()
139 if (tcp) { in test_pkt_access()
142 if (((void *)(tcp) + 20) > data_end || proto != 6) in test_pkt_access()
145 if (((void *)(tcp) + 18) > data_end) in test_pkt_access()
[all …]
A Dxdp_synproxy_kern.c372 struct tcphdr *tcp; member
422 if (hdr->tcp + 1 > data_end) in tcp_dissect()
424 hdr->tcp_len = hdr->tcp->doff * 4; in tcp_dissect()
451 tup.ipv4.dport = hdr->tcp->dest; in tcp_lookup()
457 tup.ipv6.dport = hdr->tcp->dest; in tcp_lookup()
611 if (hdr->tcp->fin || hdr->tcp->rst) in syncookie_handle_syn()
676 __builtin_memmove(new_tcp_header, hdr->tcp, sizeof(*hdr->tcp)); in syncookie_handle_syn()
677 hdr->tcp = new_tcp_header; in syncookie_handle_syn()
690 hdr->tcp->check = 0; in syncookie_handle_syn()
736 if (hdr->tcp->rst) in syncookie_handle_ack()
[all …]
A Dtest_migrate_reuseport.c50 struct tcphdr *tcp = NULL; in drop_ack() local
65 tcp = (struct tcphdr *)((void *)ip + ip->ihl * 4); in drop_ack()
77 tcp = (struct tcphdr *)(ipv6 + 1); in drop_ack()
84 if (tcp + 1 > data_end) in drop_ack()
87 if (tcp->dest != server_port) in drop_ack()
90 if (!tcp->syn && tcp->ack) in drop_ack()
A Dskb_pkt_end.c34 struct tcphdr *tcp; in main_prog() local
47 tcp = (void*)(ip + 1); in main_prog()
48 if (tcp->dest != 0) in main_prog()
50 if (!tcp) in main_prog()
53 urg_ptr = tcp->urg_ptr; in main_prog()
A Dbpf_iter_tcp6.c69 static bool tcp_in_initial_slowstart(const struct tcp_sock *tcp) in tcp_in_initial_slowstart() argument
71 return tcp->snd_ssthresh >= TCP_INFINITE_SSTHRESH; in tcp_in_initial_slowstart()
88 icsk = &tp->tcp.inet_conn; in dump_tcp6_sock()
118 rx_queue = tp->tcp.rcv_nxt - tp->tcp.copied_seq; in dump_tcp6_sock()
131 tp->tcp.write_seq - tp->tcp.snd_una, rx_queue, in dump_tcp6_sock()
143 tp->tcp.snd_cwnd, in dump_tcp6_sock()
145 : (tcp_in_initial_slowstart(&tp->tcp) ? -1 in dump_tcp6_sock()
146 : tp->tcp.snd_ssthresh) in dump_tcp6_sock()
A Dxdpwall.c173 static __always_inline bool tcphdr_only_contains_flag(struct tcphdr *tcp, in tcphdr_only_contains_flag() argument
176 return (tcp_flag_word(tcp) & in tcphdr_only_contains_flag()
181 struct tcphdr *tcp) { in set_tcp_flags() argument
182 if (tcphdr_only_contains_flag(tcp, TCP_FLAG_SYN)) in set_tcp_flags()
184 else if (tcphdr_only_contains_flag(tcp, TCP_FLAG_ACK)) in set_tcp_flags()
186 else if (tcphdr_only_contains_flag(tcp, TCP_FLAG_RST)) in set_tcp_flags()
193 struct tcphdr *tcp = transport_hdr; in parse_tcp() local
195 if (tcp + 1 > data_end) in parse_tcp()
198 info->sport = bpf_ntohs(tcp->source); in parse_tcp()
199 info->dport = bpf_ntohs(tcp->dest); in parse_tcp()
[all …]
A Dtest_assign_reuse.c20 struct tcphdr tcp; member
39 if (ctx->data + sizeof(headers.tcp) > ctx->data_end) in reuse_accept()
42 if (__builtin_memcmp(&headers.tcp, ctx->data, sizeof(headers.tcp)) != 0) in reuse_accept()
89 __builtin_memcpy(&headers.tcp, th, sizeof(headers.tcp)); in maybe_assign_tcp()
A Dfexit_bpf2bpf.c162 struct tcphdr *tcp; in new_test_pkt_write_access_subprog() local
167 tcp = data + off; in new_test_pkt_write_access_subprog()
168 if (tcp + 1 > data_end) in new_test_pkt_write_access_subprog()
172 tcp->check++; in new_test_pkt_write_access_subprog()
173 tcp->syn = 0; in new_test_pkt_write_access_subprog()
/linux/tools/testing/selftests/bpf/prog_tests/
A Dflow_dissector.c46 struct tcphdr tcp; member
53 struct tcphdr tcp; member
61 struct tcphdr tcp; member
67 struct tcphdr tcp; member
79 struct tcphdr tcp; member
118 .tcp.doff = 5,
139 .tcp.doff = 5,
162 .tcp.doff = 5,
185 .tcp.doff = 5,
209 .tcp.doff = 5,
[all …]
/linux/tools/testing/selftests/net/netfilter/packetdrill/
A Dconntrack_rst_invalid.pkt6 +0 `$xtables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
7 +0 `$xtables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
31 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED`
35 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED`
39 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED`
44 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED`
49 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED`
59 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q CLOSE\ `
A Dconntrack_synack_old.pkt17 +0 `$xtables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
18 +0 `$xtables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
31 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null | grep UNREPLIED | grep -q SYN…
40 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null | grep ESTABLISHED | grep -q A…
44 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null | grep ASSURED | grep -q ESTAB…
50 +0 `$xtables -D INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
51 +0 `$xtables -D OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
/linux/samples/bpf/
A Dparse_varlen.c22 static int tcp(void *data, uint64_t tp_off, void *data_end) in tcp() function
24 struct tcphdr *tcp = data + tp_off; in tcp() local
26 if (tcp + 1 > data_end) in tcp()
28 if (tcp->dest == htons(80) || tcp->source == htons(80)) in tcp()
72 return tcp(data, nh_off + ihl_len, data_end); in parse_ipv4()
106 return tcp(data, nh_off + ihl_len, data_end); in parse_ipv6()
/linux/drivers/net/ethernet/mellanox/mlx5/core/en/tc/
A Dct_fs_smfs.c76 if (likely(tcp)) { in mlx5_ct_fs_smfs_fill_mask()
91 bool tcp, bool gre, u32 priority) in mlx5_ct_fs_smfs_matcher_create() argument
100 mlx5_ct_fs_smfs_fill_mask(fs, spec, ipv4, tcp, gre); in mlx5_ct_fs_smfs_matcher_create()
123 smfs_matcher = &matchers->smfs_matchers[ipv4 * 3 + tcp * 2 + gre]; in mlx5_ct_fs_smfs_matcher_get()
149 dr_matcher = mlx5_ct_fs_smfs_matcher_create(fs, tbl, ipv4, tcp, gre, prio); in mlx5_ct_fs_smfs_matcher_get()
153 nat, ipv4, tcp, gre, PTR_ERR(dr_matcher)); in mlx5_ct_fs_smfs_matcher_get()
252 struct flow_match_tcp tcp; in mlx5_ct_fs_smfs_ct_validate_flow_rule() local
267 flow_rule_match_tcp(flow_rule, &tcp); in mlx5_ct_fs_smfs_ct_validate_flow_rule()
305 bool nat, tcp, ipv4, gre; in mlx5_ct_fs_smfs_ct_rule_add() local
326 tcp = MLX5_GET(fte_match_param, spec->match_value, in mlx5_ct_fs_smfs_ct_rule_add()
[all …]
/linux/drivers/net/ethernet/chelsio/libcxgb/
A Dlibcxgb_cm.c54 struct tcphdr *tcp = (struct tcphdr *) in cxgb_get_4tuple() local
60 ntohs(tcp->source), ntohs(tcp->dest)); in cxgb_get_4tuple()
67 ntohs(tcp->source), ntohs(tcp->dest)); in cxgb_get_4tuple()
72 *peer_port = tcp->source; in cxgb_get_4tuple()
73 *local_port = tcp->dest; in cxgb_get_4tuple()
/linux/Documentation/netlink/specs/
A Dtcp_metrics.yaml10 c-family-name: tcp-metrics-genl-name
11 c-version-name: tcp-metrics-genl-version
17 name: tcp-fastopen-cookie-max
23 name: tcp-metrics
24 name-prefix: tcp-metrics-attr-
66 min-len: tcp-fastopen-cookie-max
134 attribute-set: tcp-metrics
163 attribute-set: tcp-metrics
/linux/tools/testing/selftests/net/netfilter/
A Dconntrack_tcp_unreplied.sh91 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept
92 ct state new ct status dnat tcp dport 8080 counter name "redir" accept
111 count=$(ip netns exec "$ns2" conntrack -L -p tcp --dport 80 2>/dev/null | wc -l)
130 ip daddr 10.99.99.99 tcp dport 80 redirect to :8080
141 count=$(ip netns exec "$ns2" conntrack -L -p tcp --reply-port-src 8080 2>/dev/null | wc -l)
/linux/tools/testing/selftests/net/forwarding/
A Dsch_red.sh276 backlog=$(build_backlog $((3 * limit / 2)) tcp tos=0x01)
289 -a own -b $h3_mac -t tcp -q tos=0x01 &
312 -a own -b $h3_mac -t tcp -q tos=0x01 &
338 -a own -b $h3_mac -t tcp -q tos=0x01 &
342 backlog=$(build_backlog $((2 * limit / 3)) tcp tos=0x01)
350 backlog=$(build_backlog $((3 * limit / 2)) tcp tos=0x01)
412 -a own -b $h3_mac -t tcp -q tos=0x01 &
418 backlog=$(build_backlog $((2 * limit / 3)) tcp tos=0x01)
423 backlog=$(build_backlog $((3 * limit / 2)) tcp tos=0x01)
/linux/net/ipv4/netfilter/
A Dnf_nat_h323.c290 exp->saved_proto.tcp.port = exp->tuple.dst.u.tcp.port; in nat_t120()
310 ntohs(exp->tuple.src.u.tcp.port), in nat_t120()
312 ntohs(exp->tuple.dst.u.tcp.port)); in nat_t120()
329 exp->saved_proto.tcp.port = exp->tuple.dst.u.tcp.port; in nat_h245()
357 ntohs(exp->tuple.src.u.tcp.port), in nat_h245()
359 ntohs(exp->tuple.dst.u.tcp.port)); in nat_h245()
408 exp->saved_proto.tcp.port = exp->tuple.dst.u.tcp.port; in nat_q931()
449 ntohs(exp->tuple.src.u.tcp.port), in nat_q931()
451 ntohs(exp->tuple.dst.u.tcp.port)); in nat_q931()
492 exp->saved_proto.tcp.port = exp->tuple.dst.u.tcp.port; in nat_callforwarding()
[all …]
/linux/tools/testing/selftests/net/mptcp/
A Dmptcp_sockopt.sh55 ip netns exec $ns $t -A OUTPUT -p tcp --syn -m mark --mark $m -j ACCEPT
58 ip netns exec $ns $t -A OUTPUT -p tcp --tcp-flags RST RST -m mark --mark 0 -j ACCEPT
60 ip netns exec $ns $t -A OUTPUT -p tcp -m mark --mark $m -j ACCEPT
61 ip netns exec $ns $t -A OUTPUT -p tcp -m mark --mark 0 -j DROP
339 do_tcpinq_test -r tcp -t tcp
/linux/drivers/net/ethernet/qlogic/qed/
A Dqed_iwarp.c590 p_tcp_ramrod->tcp.local_ip, in qed_iwarp_print_tcp_ramrod()
594 p_tcp_ramrod->tcp.vlan_id); in qed_iwarp_print_tcp_ramrod()
608 p_tcp_ramrod->tcp.ttl, in qed_iwarp_print_tcp_ramrod()
610 p_tcp_ramrod->tcp.mss, in qed_iwarp_print_tcp_ramrod()
613 p_tcp_ramrod->tcp.flags); in qed_iwarp_print_tcp_ramrod()
675 tcp = &p_tcp_ramrod->tcp; in qed_iwarp_tcp_offload()
679 qed_set_fw_mac_addr(&tcp->local_mac_addr_hi, &tcp->local_mac_addr_mid, in qed_iwarp_tcp_offload()
703 tcp->flow_label = 0; in qed_iwarp_tcp_offload()
704 tcp->ttl = 0x40; in qed_iwarp_tcp_offload()
705 tcp->tos_or_tc = 0; in qed_iwarp_tcp_offload()
[all …]
/linux/net/core/
A Dselftests.c22 bool tcp; member
67 if (attr->tcp) in net_test_get_skb()
88 if (attr->tcp) in net_test_get_skb()
102 if (attr->tcp) { in net_test_get_skb()
120 if (attr->tcp) in net_test_get_skb()
125 if (attr->tcp) in net_test_get_skb()
154 if (attr->tcp) { in net_test_get_skb()
208 if (tpriv->packet->tcp) { in net_test_loopback_validate()
335 attr.tcp = true; in net_test_phy_loopback_tcp()

Completed in 57 milliseconds

123456789