/net/netfilter/ |
H A D | nf_nat_proto_common.c | 28 port = tuple->src.u.all; 30 port = tuple->dst.u.all; 32 return ntohs(port) >= ntohs(min->all) && 33 ntohs(port) <= ntohs(max->all); 49 portptr = &tuple->src.u.all; 51 portptr = &tuple->dst.u.all; 73 min = ntohs(range->min_proto.all); 74 range_size = ntohs(range->max_proto.all) - min + 1; 79 ? tuple->dst.u.all 80 : tuple->src.u.all); [all...] |
H A D | nf_conntrack_proto_generic.c | 26 tuple->src.u.all = 0; 27 tuple->dst.u.all = 0; 35 tuple->src.u.all = 0; 36 tuple->dst.u.all = 0;
|
H A D | xt_conntrack.c | 90 /* Shortcut to match all recognized protocols by using ->src.all. */ 92 (tuple->src.u.all == info->origsrc_port) ^ 97 (tuple->dst.u.all == info->origdst_port) ^ 104 (tuple->src.u.all == info->replsrc_port) ^ 109 (tuple->dst.u.all == info->repldst_port) ^ 134 /* Shortcut to match all recognized protocols by using ->src.all. */ 137 ntohs(tuple->src.u.all), 143 ntohs(tuple->dst.u.all), [all...] |
H A D | nf_conntrack_expect.c | 83 hash = jhash2(tuple->dst.u3.all, ARRAY_SIZE(tuple->dst.u3.all), 85 (__force __u16)tuple->dst.u.all) ^ nf_conntrack_hash_rnd); 169 /* delete all expectations for this conntrack */ 198 intersect_mask.src.u.all = a->mask.src.u.all & b->mask.src.u.all; 201 intersect_mask.src.u3.all[count] = 202 a->mask.src.u3.all[count] & b->mask.src.u3.all[coun [all...] |
H A D | nf_nat_core.c | 181 t->src.u.all == tuple->src.u.all); 259 0 : (__force u32)tuple->dst.u3.all[max] ^ zone); 267 minip = ntohl((__force __be32)range->min_addr.all[i]); 268 maxip = ntohl((__force __be32)range->max_addr.all[i]); 275 var_ipp->all[i] = (__force __u32) 277 if (var_ipp->all[i] != range->max_addr.all[i]) 281 j ^= (__force u32)tuple->dst.u3.all[i]; 346 (range->min_proto.all [all...] |
H A D | nf_conntrack_ftp.c | 420 memcpy(cmd.u3.all, &ct->tuplehash[dir].tuple.src.u3.all, 421 sizeof(cmd.u3.all)); 435 /* We don't usually drop packets. After all, this is 466 memcmp(&cmd.u3.all, &ct->tuplehash[dir].tuple.src.u3.all, 467 sizeof(cmd.u3.all))) {
|
H A D | nf_conntrack_proto_gre.c | 90 km->tuple.dst.u.all == t->dst.u.all; 207 tuple->src.u.all = 0; 208 tuple->dst.u.all = 0;
|
H A D | xt_HMARK.c | 103 t->uports.b16.src = otuple->src.u.all; 104 t->uports.b16.dst = rtuple->src.u.all; 283 /* follow-up fragments don't contain ports, skip all fragments */
|
H A D | nf_conntrack_helper.c | 112 (__force __u16)tuple->src.u.all) % nf_ct_helper_hsize; 119 struct nf_conntrack_tuple_mask mask = { .src.u.all = htons(0xFFFF) };
|
/net/wimax/ |
H A D | Kconfig | 37 If set at zero, this will compile out all the debug code.
|
/net/ipv4/netfilter/ |
H A D | iptable_nat.c | 198 ct->tuplehash[dir].tuple.src.u.all != 199 ct->tuplehash[!dir].tuple.dst.u.all)) { 240 ct->tuplehash[dir].tuple.dst.u.all != 241 ct->tuplehash[!dir].tuple.src.u.all) {
|
H A D | nf_nat_l3proto_ipv4.c | 48 fl4->fl4_dport = t->dst.u.all; 60 fl4->fl4_sport = t->src.u.all;
|
/net/ipv6/netfilter/ |
H A D | ip6table_nat.c | 200 ct->tuplehash[dir].tuple.src.u.all != 201 ct->tuplehash[!dir].tuple.dst.u.all)) { 241 ct->tuplehash[dir].tuple.dst.u.all != 242 ct->tuplehash[!dir].tuple.src.u.all) {
|
H A D | nf_nat_l3proto_ipv6.c | 47 fl6->fl6_dport = t->dst.u.all; 59 fl6->fl6_sport = t->src.u.all;
|
H A D | Kconfig | 216 Masquerading is a special case of NAT: all outgoing connections are
|
/net/netfilter/ipvs/ |
H A D | ip_vs_nfct.c | 35 * this way we can see their proper conntrack state in all hooks 36 * - support for all forwarding methods, not only NAT 71 #define ARG_TUPLE(T) &(T)->src.u3.ip, ntohs((T)->src.u.all), \ 72 &(T)->dst.u3.ip, ntohs((T)->dst.u.all), \ 263 tuple.src.u.all = cp->cport; 266 tuple.dst.u.all = cp->vport;
|
H A D | Kconfig | 178 server set. If all the node in the server set are over loaded, 242 until all slots in the table are filled. When using weights to 245 needs to be large enough to effectively fit all the destinations
|
/net/ipv4/ |
H A D | Kconfig | 26 answering N will just cause the configurator to skip all the 50 echo 1 > /proc/sys/net/ipv4/conf/all/rp_filter 92 for those packets. The router considers all these paths to be of 118 on NFS" as well), because all other machines configure the network 131 does DHCP itself, providing all necessary information on the kernel 148 does BOOTP itself, providing all necessary information on the kernel 215 Network), but can be distributed all over the Internet. If you want 442 Nearly all users can safely say no here, and a safe default 585 for all connections.
|
H A D | devinet.c | 193 /* Locks all the inet devices. */ 327 /* 1. Deleting primary ifaddr forces deletion all secondaries 362 /* On promotion all secondaries from subnet are changing 363 * the primary IP, we must remove all their routes silently 365 * while all addresses are on the device list. 920 case SIOCKILLADDR: /* Nuke all sockets on this address */ 1100 case SIOCKILLADDR: /* Nuke all connections on this address */ 2190 struct ipv4_devconf *all, *dflt; local 2197 all = &ipv4_devconf; 2201 all [all...] |
/net/xfrm/ |
H A D | xfrm_state.c | 498 INIT_LIST_HEAD(&x->km.all); 541 list_del(&x->km.all); 867 list_add(&x->km.all, &net->xfrm.state_all); 935 list_add(&x->km.all, &net->xfrm.state_all); 1054 list_add(&x->km.all, &net->xfrm.state_all); 1562 if (walk->seq != 0 && list_empty(&walk->all)) 1566 if (list_empty(&walk->all)) 1567 x = list_first_entry(&net->xfrm.state_all, struct xfrm_state_walk, all); 1569 x = list_entry(&walk->all, struct xfrm_state_walk, all); [all...] |
H A D | xfrm_policy.c | 289 INIT_LIST_HEAD(&policy->walk.all); 674 list_add(&policy->walk.all, &net->xfrm.policy_all); 891 if (list_empty(&walk->walk.all) && walk->seq != 0) 895 if (list_empty(&walk->walk.all)) 896 x = list_first_entry(&net->xfrm.policy_all, struct xfrm_policy_walk_entry, all); 898 x = list_entry(&walk->walk.all, struct xfrm_policy_walk_entry, all); 899 list_for_each_entry_from(x, &net->xfrm.policy_all, all) { 909 list_move_tail(&walk->walk.all, &x->all); [all...] |
/net/tipc/ |
H A D | link.h | 243 void tipc_link_wakeup_ports(struct tipc_link *l_ptr, int all);
|
/net/ |
H A D | Kconfig | 181 If you say Y here you can select between all the netfilter modules.
|
/net/bluetooth/ |
H A D | hci_sysfs.c | 407 list_for_each_entry(e, &cache->all, all) {
|
/net/sched/ |
H A D | cls_flow.c | 173 return ntohs(CTTUPLE(skb, src.u.all)); 180 return ntohs(CTTUPLE(skb, dst.u.all));
|