/net/netfilter/ |
H A D | nf_nat_proto_udplite.c | 27 const struct nf_conn *ct) 29 nf_nat_l4proto_unique_tuple(l3proto, tuple, range, maniptype, ct, 23 udplite_unique_tuple(const struct nf_nat_l3proto *l3proto, struct nf_conntrack_tuple *tuple, const struct nf_nat_range *range, enum nf_nat_manip_type maniptype, const struct nf_conn *ct) argument
|
H A D | nfnetlink_queue_ct.c | 21 struct nf_conn *ct; local 28 ct = nf_ct_get(entskb, ctinfo); 29 if (ct) { 30 if (!nf_ct_is_untracked(ct)) 31 *size += nfq_ct->build_size(ct); 33 ct = NULL; 35 return ct; 43 struct nf_conn *ct; local 50 ct = nf_ct_get(skb, ctinfo); 51 if (ct 57 nfqnl_ct_put(struct sk_buff *skb, struct nf_conn *ct, enum ip_conntrack_info ctinfo) argument 87 nfqnl_ct_seq_adjust(struct sk_buff *skb, struct nf_conn *ct, enum ip_conntrack_info ctinfo, int diff) argument 100 nfqnl_attach_expect(struct nf_conn *ct, const struct nlattr *attr, u32 portid, u32 report) argument [all...] |
H A D | xt_NETMAP.c | 26 struct nf_conn *ct; local 31 ct = nf_ct_get(skb, &ctinfo); 54 return nf_nat_setup_info(ct, &newrange, HOOK2MANIP(par->hooknum)); 69 struct nf_conn *ct; local 79 ct = nf_ct_get(skb, &ctinfo); 99 return nf_nat_setup_info(ct, &newrange, HOOK2MANIP(par->hooknum));
|
H A D | xt_REDIRECT.c | 39 struct nf_conn *ct; local 41 ct = nf_ct_get(skb, &ctinfo); 70 return nf_nat_setup_info(ct, &newrange, NF_NAT_MANIP_DST); 101 struct nf_conn *ct; local 110 ct = nf_ct_get(skb, &ctinfo); 111 NF_CT_ASSERT(ct && (ctinfo == IP_CT_NEW || ctinfo == IP_CT_RELATED)); 142 return nf_nat_setup_info(ct, &newrange, NF_NAT_MANIP_DST);
|
H A D | xt_connbytes.c | 24 const struct nf_conn *ct; local 32 ct = nf_ct_get(skb, &ctinfo); 33 if (!ct) 36 acct = nf_conn_acct_find(ct);
|
H A D | xt_nat.c | 48 struct nf_conn *ct; local 50 ct = nf_ct_get(skb, &ctinfo); 51 NF_CT_ASSERT(ct != NULL && 56 return nf_nat_setup_info(ct, &range, NF_NAT_MANIP_SRC); 65 struct nf_conn *ct; local 67 ct = nf_ct_get(skb, &ctinfo); 68 NF_CT_ASSERT(ct != NULL && 72 return nf_nat_setup_info(ct, &range, NF_NAT_MANIP_DST); 80 struct nf_conn *ct; local 82 ct 95 struct nf_conn *ct; local [all...] |
H A D | xt_u32.c | 19 const struct xt_u32_test *ct; local 34 ct = &data->tests[testind]; 36 pos = ct->location[0].number; 44 nnums = ct->nnums; 48 u_int32_t number = ct->location[i].number; 49 switch (ct->location[i].nextop) { 77 nvals = ct->nvalues; 79 if (ct->value[i].min <= val && val <= ct->value[i].max) 82 if (i >= ct [all...] |
H A D | nf_conntrack_extend.c | 22 void __nf_ct_ext_destroy(struct nf_conn *ct) argument 26 struct nf_ct_ext *ext = ct->ext; 40 t->destroy(ct); 72 void *__nf_ct_ext_add_length(struct nf_conn *ct, enum nf_ct_ext_id id, argument 80 NF_CT_ASSERT(!nf_ct_is_confirmed(ct)); 82 old = ct->ext; 84 return nf_ct_ext_create(&ct->ext, id, var_alloc_len, gfp); 114 ct->ext = new;
|
H A D | nf_conntrack_labels.c | 23 bool nf_connlabel_match(const struct nf_conn *ct, u16 bit) argument 25 struct nf_conn_labels *labels = nf_ct_labels_find(ct); 34 int nf_connlabel_set(struct nf_conn *ct, u16 bit) argument 36 struct nf_conn_labels *labels = nf_ct_labels_find(ct); 45 nf_conntrack_event_cache(IPCT_LABEL, ct); 62 int nf_connlabels_replace(struct nf_conn *ct, argument 70 labels = nf_ct_labels_find(ct); 88 nf_conntrack_event_cache(IPCT_LABEL, ct);
|
H A D | nf_nat_ftp.c | 29 static int nf_nat_ftp_fmt_cmd(struct nf_conn *ct, enum nf_ct_ftp_type type, argument 44 if (nf_ct_l3num(ct) == NFPROTO_IPV4) 70 struct nf_conn *ct = exp->master; local 77 newaddr = ct->tuplehash[!dir].tuple.dst.u3; 100 nf_ct_helper_log(skb, ct, "all ports in use"); 104 buflen = nf_nat_ftp_fmt_cmd(ct, type, buffer, sizeof(buffer), 111 if (!nf_nat_mangle_tcp_packet(skb, ct, ctinfo, protoff, matchoff, 118 nf_ct_helper_log(skb, ct, "cannot mangle packet");
|
H A D | nf_nat_helper.c | 93 struct nf_conn *ct, 123 l3proto = __nf_nat_l3proto_find(nf_ct_l3num(ct)); 128 nf_ct_seqadj_set(ct, ctinfo, tcph->seq, 147 struct nf_conn *ct, 181 l3proto = __nf_nat_l3proto_find(nf_ct_l3num(ct)); 191 void nf_nat_follow_master(struct nf_conn *ct, argument 197 BUG_ON(ct->status & IPS_NAT_DONE_MASK); 202 = ct->master->tuplehash[!exp->dir].tuple.dst.u3; 203 nf_nat_setup_info(ct, &range, NF_NAT_MANIP_SRC); 209 = ct 92 __nf_nat_mangle_tcp_packet(struct sk_buff *skb, struct nf_conn *ct, enum ip_conntrack_info ctinfo, unsigned int protoff, unsigned int match_offset, unsigned int match_len, const char *rep_buffer, unsigned int rep_len, bool adjust) argument 146 nf_nat_mangle_udp_packet(struct sk_buff *skb, struct nf_conn *ct, enum ip_conntrack_info ctinfo, unsigned int protoff, unsigned int match_offset, unsigned int match_len, const char *rep_buffer, unsigned int rep_len) argument [all...] |
H A D | xt_cluster.c | 19 static inline u32 nf_ct_orig_ipv4_src(const struct nf_conn *ct) argument 21 return (__force u32)ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u3.ip; 24 static inline const u32 *nf_ct_orig_ipv6_src(const struct nf_conn *ct) argument 26 return (__force u32 *)ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u3.ip6; 42 xt_cluster_hash(const struct nf_conn *ct, argument 47 switch(nf_ct_l3num(ct)) { 49 hash = xt_cluster_hash_ipv4(nf_ct_orig_ipv4_src(ct), info); 52 hash = xt_cluster_hash_ipv6(nf_ct_orig_ipv6_src(ct), info); 94 const struct nf_conn *ct; local 120 ct [all...] |
H A D | xt_ipvs.c | 95 * We found a connection, i.e. ct != 0, make sure to call 116 struct nf_conn *ct = nf_ct_get(skb, &ctinfo); local 118 if (ct == NULL || nf_ct_is_untracked(ct)) {
|
H A D | nf_conntrack_amanda.c | 88 struct nf_conn *ct, 107 nf_ct_refresh(ct, skb, master_timeout * HZ); 147 exp = nf_ct_expect_alloc(ct); 149 nf_ct_helper_log(skb, ct, "cannot alloc expectation"); 153 tuple = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple; 155 nf_ct_l3num(ct), 160 if (nf_nat_amanda && ct->status & IPS_NAT_MASK) 164 nf_ct_helper_log(skb, ct, "cannot add expectation"); 86 amanda_help(struct sk_buff *skb, unsigned int protoff, struct nf_conn *ct, enum ip_conntrack_info ctinfo) argument
|
H A D | nf_conntrack_irc.c | 107 struct nf_conn *ct, enum ip_conntrack_info ctinfo) 187 tuple = &ct->tuplehash[dir].tuple; 196 exp = nf_ct_expect_alloc(ct); 198 nf_ct_helper_log(skb, ct, 203 tuple = &ct->tuplehash[!dir].tuple; 211 if (nf_nat_irc && ct->status & IPS_NAT_MASK) 217 nf_ct_helper_log(skb, ct, 106 help(struct sk_buff *skb, unsigned int protoff, struct nf_conn *ct, enum ip_conntrack_info ctinfo) argument
|
H A D | nf_conntrack_proto_generic.c | 43 return &net->ct.nf_ct_proto.generic; 78 static int generic_packet(struct nf_conn *ct, argument 86 nf_ct_refresh_acct(ct, ctinfo, skb, *timeout); 91 static bool generic_new(struct nf_conn *ct, const struct sk_buff *skb, argument 94 return nf_generic_should_process(nf_ct_protonum(ct)); 215 return &net->ct.nf_ct_proto.generic.pn;
|
H A D | nf_conntrack_sane.c | 63 struct nf_conn *ct, 72 struct nf_ct_sane_master *ct_sane_info = nfct_help_data(ct); 139 exp = nf_ct_expect_alloc(ct); 141 nf_ct_helper_log(skb, ct, "cannot alloc expectation"); 146 tuple = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple; 147 nf_ct_expect_init(exp, NF_CT_EXPECT_CLASS_DEFAULT, nf_ct_l3num(ct), 156 nf_ct_helper_log(skb, ct, "cannot add expectation"); 61 help(struct sk_buff *skb, unsigned int protoff, struct nf_conn *ct, enum ip_conntrack_info ctinfo) argument
|
/net/core/ |
H A D | iovec.c | 40 int size, ct, err; local 64 for (ct = 0; ct < m->msg_iovlen; ct++) { 65 size_t len = iov[ct].iov_len; 69 iov[ct].iov_len = len;
|
/net/ipv4/netfilter/ |
H A D | nf_nat_masquerade_ipv4.c | 30 struct nf_conn *ct; local 39 ct = nf_ct_get(skb, &ctinfo); 40 nat = nfct_nat(ct); 42 NF_CT_ASSERT(ct && (ctinfo == IP_CT_NEW || ctinfo == IP_CT_RELATED || 48 if (ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u3.ip == 0) 71 return nf_nat_setup_info(ct, &newrange, NF_NAT_MANIP_SRC);
|
H A D | nf_nat_proto_gre.c | 46 const struct nf_conn *ct) 54 if (!ct->master) 63 pr_debug("%p: NATing GRE PPTP\n", ct); 75 if (++i == range_size || !nf_nat_used_tuple(tuple, ct)) 79 pr_debug("%p: no NAT mapping\n", ct); 42 gre_unique_tuple(const struct nf_nat_l3proto *l3proto, struct nf_conntrack_tuple *tuple, const struct nf_nat_range *range, enum nf_nat_manip_type maniptype, const struct nf_conn *ct) argument
|
H A D | nf_nat_pptp.c | 42 static void pptp_nat_expected(struct nf_conn *ct, argument 45 struct net *net = nf_ct_net(ct); 46 const struct nf_conn *master = ct->master; 79 other_exp = nf_ct_expect_find_get(net, nf_ct_zone(ct), &t); 89 BUG_ON(ct->status & IPS_NAT_DONE_MASK); 94 = ct->master->tuplehash[!exp->dir].tuple.dst.u3; 99 nf_nat_setup_info(ct, &range, NF_NAT_MANIP_SRC); 104 = ct->master->tuplehash[!exp->dir].tuple.src.u3; 109 nf_nat_setup_info(ct, &range, NF_NAT_MANIP_DST); 115 struct nf_conn *ct, 114 pptp_outbound_pkt(struct sk_buff *skb, struct nf_conn *ct, enum ip_conntrack_info ctinfo, unsigned int protoff, struct PptpControlHeader *ctlh, union pptp_ctrl_union *pptpReq) argument 193 const struct nf_conn *ct = expect_orig->master; local 218 pptp_inbound_pkt(struct sk_buff *skb, struct nf_conn *ct, enum ip_conntrack_info ctinfo, unsigned int protoff, struct PptpControlHeader *ctlh, union pptp_ctrl_union *pptpReq) argument [all...] |
/net/ipv6/netfilter/ |
H A D | nf_nat_masquerade_ipv6.c | 30 struct nf_conn *ct; local 33 ct = nf_ct_get(skb, &ctinfo); 34 NF_CT_ASSERT(ct && (ctinfo == IP_CT_NEW || ctinfo == IP_CT_RELATED || 41 nfct_nat(ct)->masq_index = out->ifindex; 49 return nf_nat_setup_info(ct, &newrange, NF_NAT_MANIP_SRC); 53 static int device_cmp(struct nf_conn *ct, void *ifindex) argument 55 const struct nf_conn_nat *nat = nfct_nat(ct); 59 if (nf_ct_l3num(ct) != NFPROTO_IPV6)
|
/net/netfilter/ipvs/ |
H A D | ip_vs_nfct.c | 85 struct nf_conn *ct = nf_ct_get(skb, &ctinfo); local 88 if (ct == NULL || nf_ct_is_confirmed(ct) || nf_ct_is_untracked(ct) || 89 nf_ct_is_dying(ct)) 101 if (cp->app && nf_ct_protonum(ct) == IPPROTO_TCP && 102 !nfct_seqadj(ct) && !nfct_seqadj_ext_add(ct)) 111 new_tuple = ct->tuplehash[IP_CT_DIR_REPLY].tuple; 126 IP_VS_DBG(7, "%s: Updating conntrack ct 143 ip_vs_nfct_expect_callback(struct nf_conn *ct, struct nf_conntrack_expect *exp) argument 225 ip_vs_nfct_expect_related(struct sk_buff *skb, struct nf_conn *ct, struct ip_vs_conn *cp, u_int8_t proto, const __be16 port, int from_rs) argument 259 struct nf_conn *ct; local [all...] |
H A D | ip_vs_pe_sip.c | 107 struct ip_vs_conn *ct) 112 if (ct->af == p->af && 113 ip_vs_addr_equal(p->af, p->caddr, &ct->caddr) && 117 p->vaddr, &ct->vaddr) && 118 ct->vport == p->vport && 119 ct->flags & IP_VS_CONN_F_TEMPLATE && 120 ct->protocol == p->protocol && 121 ct->pe_data && ct->pe_data_len == p->pe_data_len && 122 !memcmp(ct 106 ip_vs_sip_ct_match(const struct ip_vs_conn_param *p, struct ip_vs_conn *ct) argument [all...] |
/net/ax25/ |
H A D | ax25_addr.c | 119 int ct = 0; local 121 while (ct < 6) { 122 if ((a->ax25_call[ct] & 0xFE) != (b->ax25_call[ct] & 0xFE)) /* Clean off repeater bits */ 124 ct++; 127 if ((a->ax25_call[ct] & 0x1E) == (b->ax25_call[ct] & 0x1E)) /* SSID without control bit */ 222 int ct = 0; local 255 while (ct < d->ndigi) { 256 memcpy(buf, &d->calls[ct], AX25_ADDR_LE 289 int ct; local [all...] |