/linux-6.12.1/net/netfilter/ |
D | nfnetlink_cttimeout.c | 71 const struct nf_conntrack_l4proto *l4proto, in ctnl_timeout_parse_policy() argument 77 tb = kcalloc(l4proto->ctnl_timeout.nlattr_max + 1, sizeof(*tb), in ctnl_timeout_parse_policy() 84 l4proto->ctnl_timeout.nlattr_max, in ctnl_timeout_parse_policy() 86 l4proto->ctnl_timeout.nla_policy, in ctnl_timeout_parse_policy() 91 ret = l4proto->ctnl_timeout.nlattr_to_obj(tb, net, timeout); in ctnl_timeout_parse_policy() 105 const struct nf_conntrack_l4proto *l4proto; in cttimeout_new_timeout() local 137 matching->timeout.l4proto->l4proto != l4num) in cttimeout_new_timeout() 141 matching->timeout.l4proto, in cttimeout_new_timeout() 149 l4proto = nf_ct_l4proto_find(l4num); in cttimeout_new_timeout() 152 if (l4proto->l4proto != l4num) { in cttimeout_new_timeout() [all …]
|
D | nft_ct.c | 29 u8 l4proto; member 869 const struct nf_conntrack_l4proto *l4proto, in nft_ct_timeout_parse_policy() argument 875 tb = kcalloc(l4proto->ctnl_timeout.nlattr_max + 1, sizeof(*tb), in nft_ct_timeout_parse_policy() 882 l4proto->ctnl_timeout.nlattr_max, in nft_ct_timeout_parse_policy() 884 l4proto->ctnl_timeout.nla_policy, in nft_ct_timeout_parse_policy() 889 ret = l4proto->ctnl_timeout.nlattr_to_obj(tb, net, timeouts); in nft_ct_timeout_parse_policy() 898 u8 l4proto; member 910 if (priv->l4proto != pkt->tprot) in nft_ct_timeout_obj_eval() 940 const struct nf_conntrack_l4proto *l4proto; in nft_ct_timeout_obj_init() local 954 priv->l4proto = l4num; in nft_ct_timeout_obj_init() [all …]
|
D | nf_conntrack_timeout.c | 99 if (timeout->l4proto->l4proto != l4num) { in nf_ct_set_timeout() 103 timeout_name, 4, timeout->l4proto->l4proto); in nf_ct_set_timeout()
|
D | nft_inner.c | 133 ctx->l4proto = iph->protocol; in nft_inner_parse_l2l3() 141 int l4proto; in nft_inner_parse_l2l3() local 154 l4proto = ipv6_find_hdr(pkt->skb, &thoff, -1, &fragoff, &fh_flags); in nft_inner_parse_l2l3() 155 if (l4proto < 0 || thoff > U16_MAX) in nft_inner_parse_l2l3() 162 ctx->l4proto = l4proto; in nft_inner_parse_l2l3()
|
D | nft_tproxy.c | 96 int l4proto; in nft_tproxy_eval_v6() local 105 l4proto = pkt->tprot; in nft_tproxy_eval_v6() 117 sk = nf_tproxy_get_sock_v6(nft_net(pkt), skb, thoff, l4proto, in nft_tproxy_eval_v6() 134 sk = nf_tproxy_handle_time_wait6(skb, l4proto, thoff, in nft_tproxy_eval_v6() 144 l4proto, &iph->saddr, &taddr, in nft_tproxy_eval_v6()
|
D | nf_conntrack_bpf.c | 56 u8 l4proto; member 132 err = bpf_nf_ct_tuple_parse(bpf_tuple, tuple_len, opts->l4proto, in __bpf_nf_ct_alloc_entry() 137 err = bpf_nf_ct_tuple_parse(bpf_tuple, tuple_len, opts->l4proto, in __bpf_nf_ct_alloc_entry() 194 if (unlikely(opts->l4proto != IPPROTO_TCP && opts->l4proto != IPPROTO_UDP)) in __bpf_nf_ct_lookup() 199 err = bpf_nf_ct_tuple_parse(bpf_tuple, tuple_len, opts->l4proto, in __bpf_nf_ct_lookup()
|
D | nf_conntrack_standalone.c | 36 const struct nf_conntrack_l4proto *l4proto) in print_tuple() argument 51 switch (l4proto->l4proto) { in print_tuple() 296 const struct nf_conntrack_l4proto *l4proto; in ct_seq_show() local 319 l4proto = nf_ct_l4proto_find(nf_ct_protonum(ct)); in ct_seq_show() 324 l4proto_name(l4proto->l4proto), nf_ct_protonum(ct)); in ct_seq_show() 329 if (l4proto->print_conntrack) in ct_seq_show() 330 l4proto->print_conntrack(s, ct); in ct_seq_show() 333 l4proto); in ct_seq_show() 345 print_tuple(s, &ct->tuplehash[IP_CT_DIR_REPLY].tuple, l4proto); in ct_seq_show()
|
D | nf_conntrack_proto_icmp.c | 109 u8 l4proto, union nf_inet_addr *outer_daddr) in nf_conntrack_inet_error() argument 174 l4proto, in nf_conntrack_inet_error() 179 l4proto, in nf_conntrack_inet_error() 367 .l4proto = IPPROTO_ICMP,
|
D | xt_CT.c | 108 const struct nf_conntrack_l4proto *l4proto; in xt_ct_set_timeout() local 117 l4proto = nf_ct_l4proto_find(proto); in xt_ct_set_timeout() 118 return nf_ct_set_timeout(par->net, ct, par->family, l4proto->l4proto, in xt_ct_set_timeout()
|
D | nf_conntrack_netlink.c | 70 const struct nf_conntrack_l4proto *l4proto) in ctnetlink_dump_tuples_proto() argument 81 if (likely(l4proto->tuple_to_nlattr)) in ctnetlink_dump_tuples_proto() 82 ret = l4proto->tuple_to_nlattr(skb, tuple); in ctnetlink_dump_tuples_proto() 140 const struct nf_conntrack_l4proto *l4proto; in ctnetlink_dump_tuples() local 147 l4proto = nf_ct_l4proto_find(tuple->dst.protonum); in ctnetlink_dump_tuples() 148 ret = ctnetlink_dump_tuples_proto(skb, tuple, l4proto); in ctnetlink_dump_tuples() 201 const struct nf_conntrack_l4proto *l4proto; in ctnetlink_dump_protoinfo() local 205 l4proto = nf_ct_l4proto_find(nf_ct_protonum(ct)); in ctnetlink_dump_protoinfo() 206 if (!l4proto->to_nlattr) in ctnetlink_dump_protoinfo() 213 ret = l4proto->to_nlattr(skb, nest_proto, ct, destroy); in ctnetlink_dump_protoinfo() [all …]
|
D | nf_conntrack_proto_generic.c | 69 .l4proto = 255,
|
D | nf_conntrack_proto_udp.c | 284 .l4proto = IPPROTO_UDP, 306 .l4proto = IPPROTO_UDPLITE,
|
D | xt_conntrack.c | 83 (nf_ct_protonum(ct) == info->l4proto) ^ in ct_proto_port_check() 127 (nf_ct_protonum(ct) == info->l4proto) ^ in ct_proto_port_check_v3()
|
D | nf_flow_table_bpf.c | 66 .l4proto = fib_tuple->l4_protocol, in bpf_xdp_flow_lookup()
|
D | xt_ipvs.c | 75 if ((iph.protocol == data->l4proto) ^ in ipvs_mt()
|
/linux-6.12.1/tools/testing/selftests/net/netfilter/ |
D | conntrack_icmp_related.sh | 120 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept 121 …meta l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" ac… 122 meta l4proto { icmp, icmpv6 } ct state new,established accept 141 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 142 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept 157 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 159 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new" accept 160 meta l4proto { icmp, icmpv6 } ct state "established" counter name "established" accept 165 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 167 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new" [all …]
|
D | nft_meta.sh | 59 meta l4proto icmp counter name "il4protocounter" 73 meta l4proto icmp counter name "ol4protocounter"
|
D | nft_synproxy.sh | 74 … meta iif veth0 meta l4proto tcp ct state untracked,invalid synproxy mss 1460 sack-perm timestamp
|
/linux-6.12.1/include/uapi/linux/netfilter/ |
D | xt_conntrack.h | 44 __u16 l4proto; member 57 __u16 l4proto; member 70 __u16 l4proto; member
|
D | xt_ipvs.h | 23 __u8 l4proto; member
|
/linux-6.12.1/tools/testing/selftests/bpf/progs/ |
D | test_bpf_nf.c | 57 u8 l4proto; member 65 u8 l4proto; member 96 struct bpf_ct_opts___local opts_def = { .l4proto = IPPROTO_TCP, .netns_id = -1 }; in nf_ct_test() 112 opts_def.l4proto = IPPROTO_TCP; in nf_ct_test() 134 opts_def.l4proto = IPPROTO_ICMP; in nf_ct_test() 137 opts_def.l4proto = IPPROTO_TCP; in nf_ct_test() 251 struct bpf_ct_opts___new opts_def = { .l4proto = IPPROTO_TCP, .netns_id = -1 }; in nf_ct_opts_new_test()
|
D | test_bpf_nf_fail.c | 13 u8 l4proto; member
|
/linux-6.12.1/include/net/netfilter/ |
D | nf_conntrack_l4proto.h | 22 u_int8_t l4proto; member 82 u8 l4proto, 150 const struct nf_conntrack_l4proto *nf_ct_l4proto_find(u8 l4proto);
|
D | nf_conntrack_timeout.h | 16 const struct nf_conntrack_l4proto *l4proto; member
|
/linux-6.12.1/drivers/net/ethernet/mediatek/ |
D | mtk_ppe_offload.c | 256 u8 l4proto = 0; in mtk_flow_offload_replace() local 299 l4proto = match.key->ip_proto; in mtk_flow_offload_replace() 378 err = mtk_foe_entry_prepare(eth, &foe, offload_type, l4proto, 0, in mtk_flow_offload_replace()
|