| /kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/ |
| D | test_sk_lookup_kern.c | 21 /* Fill 'tuple' with L3 info, and attempt to find L4. On fail, return NULL. */ 62 struct bpf_sock_tuple *tuple; in bpf_sk_lookup_test0() local 70 tuple = get_tuple(data, sizeof(*eth), data_end, eth->h_proto, &ipv4); in bpf_sk_lookup_test0() 71 if (!tuple || tuple + sizeof *tuple > data_end) in bpf_sk_lookup_test0() 74 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in bpf_sk_lookup_test0() 75 sk = bpf_sk_lookup_tcp(skb, tuple, tuple_len, BPF_F_CURRENT_NETNS, 0); in bpf_sk_lookup_test0() 85 struct bpf_sock_tuple tuple = {}; in bpf_sk_lookup_test1() local 88 sk = bpf_sk_lookup_tcp(skb, &tuple, sizeof(tuple), BPF_F_CURRENT_NETNS, 0); in bpf_sk_lookup_test1() 97 struct bpf_sock_tuple tuple = {}; in bpf_sk_lookup_uaf() local 101 sk = bpf_sk_lookup_tcp(skb, &tuple, sizeof(tuple), BPF_F_CURRENT_NETNS, 0); in bpf_sk_lookup_uaf() [all …]
|
| D | connect6_prog.c | 32 struct bpf_sock_tuple tuple = {}; in connect_v6_prog() local 37 memset(&tuple.ipv6.saddr, 0, sizeof(tuple.ipv6.saddr)); in connect_v6_prog() 38 memset(&tuple.ipv6.sport, 0, sizeof(tuple.ipv6.sport)); in connect_v6_prog() 40 tuple.ipv6.daddr[0] = bpf_htonl(DST_REWRITE_IP6_0); in connect_v6_prog() 41 tuple.ipv6.daddr[1] = bpf_htonl(DST_REWRITE_IP6_1); in connect_v6_prog() 42 tuple.ipv6.daddr[2] = bpf_htonl(DST_REWRITE_IP6_2); in connect_v6_prog() 43 tuple.ipv6.daddr[3] = bpf_htonl(DST_REWRITE_IP6_3); in connect_v6_prog() 45 tuple.ipv6.dport = bpf_htons(DST_REWRITE_PORT6); in connect_v6_prog() 50 sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof(tuple.ipv6), in connect_v6_prog() 53 sk = bpf_sk_lookup_udp(ctx, &tuple, sizeof(tuple.ipv6), in connect_v6_prog() [all …]
|
| D | test_sk_assign.c | 53 /* Fill 'tuple' with L3 info, and attempt to find L4. On fail, return NULL. */ 102 handle_udp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) in handle_udp() argument 111 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_udp() 112 if ((void *)tuple + tuple_len > (void *)(long)skb->data_end) in handle_udp() 115 sk = bpf_sk_lookup_udp(skb, tuple, tuple_len, BPF_F_CURRENT_NETNS, 0); in handle_udp() 119 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_udp() 134 handle_tcp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) in handle_tcp() argument 143 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_tcp() 144 if ((void *)tuple + tuple_len > (void *)(long)skb->data_end) in handle_tcp() 147 sk = bpf_skc_lookup_tcp(skb, tuple, tuple_len, BPF_F_CURRENT_NETNS, 0); in handle_tcp() [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
| D | test_sk_lookup_kern.c | 20 /* Fill 'tuple' with L3 info, and attempt to find L4. On fail, return NULL. */ 61 struct bpf_sock_tuple *tuple; in sk_lookup_success() local 69 tuple = get_tuple(data, sizeof(*eth), data_end, eth->h_proto, &ipv4); in sk_lookup_success() 70 if (!tuple || tuple + sizeof *tuple > data_end) in sk_lookup_success() 73 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in sk_lookup_success() 74 sk = bpf_sk_lookup_tcp(skb, tuple, tuple_len, BPF_F_CURRENT_NETNS, 0); in sk_lookup_success() 84 struct bpf_sock_tuple tuple = {}; in sk_lookup_success_simple() local 87 sk = bpf_sk_lookup_tcp(skb, &tuple, sizeof(tuple), BPF_F_CURRENT_NETNS, 0); in sk_lookup_success_simple() 96 struct bpf_sock_tuple tuple = {}; in err_use_after_free() local 100 sk = bpf_sk_lookup_tcp(skb, &tuple, sizeof(tuple), BPF_F_CURRENT_NETNS, 0); in err_use_after_free() [all …]
|
| D | connect6_prog.c | 30 struct bpf_sock_tuple tuple = {}; in connect_v6_prog() local 35 memset(&tuple.ipv6.saddr, 0, sizeof(tuple.ipv6.saddr)); in connect_v6_prog() 36 memset(&tuple.ipv6.sport, 0, sizeof(tuple.ipv6.sport)); in connect_v6_prog() 38 tuple.ipv6.daddr[0] = bpf_htonl(DST_REWRITE_IP6_0); in connect_v6_prog() 39 tuple.ipv6.daddr[1] = bpf_htonl(DST_REWRITE_IP6_1); in connect_v6_prog() 40 tuple.ipv6.daddr[2] = bpf_htonl(DST_REWRITE_IP6_2); in connect_v6_prog() 41 tuple.ipv6.daddr[3] = bpf_htonl(DST_REWRITE_IP6_3); in connect_v6_prog() 43 tuple.ipv6.dport = bpf_htons(DST_REWRITE_PORT6); in connect_v6_prog() 48 sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof(tuple.ipv6), in connect_v6_prog() 51 sk = bpf_sk_lookup_udp(ctx, &tuple, sizeof(tuple.ipv6), in connect_v6_prog() [all …]
|
| D | test_sk_assign.c | 53 /* Fill 'tuple' with L3 info, and attempt to find L4. On fail, return NULL. */ 102 handle_udp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) in handle_udp() argument 110 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_udp() 111 if ((void *)tuple + tuple_len > (void *)(long)skb->data_end) in handle_udp() 114 sk = bpf_sk_lookup_udp(skb, tuple, tuple_len, BPF_F_CURRENT_NETNS, 0); in handle_udp() 118 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_udp() 133 handle_tcp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) in handle_tcp() argument 141 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_tcp() 142 if ((void *)tuple + tuple_len > (void *)(long)skb->data_end) in handle_tcp() 145 sk = bpf_skc_lookup_tcp(skb, tuple, tuple_len, BPF_F_CURRENT_NETNS, 0); in handle_tcp() [all …]
|
| /kernel/linux/linux-6.6/drivers/pcmcia/ |
| D | cistpl.c | 432 /* The high-level CIS tuple services */ 447 tuple_t *tuple) in pccard_get_first_tuple() argument 454 tuple->TupleLink = tuple->Flags = 0; in pccard_get_first_tuple() 457 tuple->CISOffset = tuple->LinkOffset = 0; in pccard_get_first_tuple() 458 SPACE(tuple->Flags) = HAS_LINK(tuple->Flags) = 1; in pccard_get_first_tuple() 460 if ((s->functions > 1) && !(tuple->Attributes & TUPLE_RETURN_COMMON)) { in pccard_get_first_tuple() 461 cisdata_t req = tuple->DesiredTuple; in pccard_get_first_tuple() 462 tuple->DesiredTuple = CISTPL_LONGLINK_MFC; in pccard_get_first_tuple() 463 if (pccard_get_next_tuple(s, function, tuple) == 0) { in pccard_get_first_tuple() 464 tuple->DesiredTuple = CISTPL_LINKTARGET; in pccard_get_first_tuple() [all …]
|
| D | pcmcia_cis.c | 27 * pccard_read_tuple() - internal CIS tuple access 31 * @parse: buffer where the tuple shall be parsed (or NULL, if no parse) 33 * pccard_read_tuple() reads out one tuple and attempts to parse it 38 tuple_t tuple; in pccard_read_tuple() local 44 dev_warn(&s->dev, "no memory to read tuple\n"); in pccard_read_tuple() 47 tuple.DesiredTuple = code; in pccard_read_tuple() 48 tuple.Attributes = 0; in pccard_read_tuple() 50 tuple.Attributes = TUPLE_RETURN_COMMON; in pccard_read_tuple() 51 ret = pccard_get_first_tuple(s, function, &tuple); in pccard_read_tuple() 54 tuple.TupleData = buf; in pccard_read_tuple() [all …]
|
| /kernel/linux/linux-5.10/drivers/pcmcia/ |
| D | cistpl.c | 432 /* The high-level CIS tuple services */ 447 tuple_t *tuple) in pccard_get_first_tuple() argument 454 tuple->TupleLink = tuple->Flags = 0; in pccard_get_first_tuple() 457 tuple->CISOffset = tuple->LinkOffset = 0; in pccard_get_first_tuple() 458 SPACE(tuple->Flags) = HAS_LINK(tuple->Flags) = 1; in pccard_get_first_tuple() 460 if ((s->functions > 1) && !(tuple->Attributes & TUPLE_RETURN_COMMON)) { in pccard_get_first_tuple() 461 cisdata_t req = tuple->DesiredTuple; in pccard_get_first_tuple() 462 tuple->DesiredTuple = CISTPL_LONGLINK_MFC; in pccard_get_first_tuple() 463 if (pccard_get_next_tuple(s, function, tuple) == 0) { in pccard_get_first_tuple() 464 tuple->DesiredTuple = CISTPL_LINKTARGET; in pccard_get_first_tuple() [all …]
|
| D | pcmcia_cis.c | 26 * pccard_read_tuple() - internal CIS tuple access 30 * @parse: buffer where the tuple shall be parsed (or NULL, if no parse) 32 * pccard_read_tuple() reads out one tuple and attempts to parse it 37 tuple_t tuple; in pccard_read_tuple() local 43 dev_warn(&s->dev, "no memory to read tuple\n"); in pccard_read_tuple() 46 tuple.DesiredTuple = code; in pccard_read_tuple() 47 tuple.Attributes = 0; in pccard_read_tuple() 49 tuple.Attributes = TUPLE_RETURN_COMMON; in pccard_read_tuple() 50 ret = pccard_get_first_tuple(s, function, &tuple); in pccard_read_tuple() 53 tuple.TupleData = buf; in pccard_read_tuple() [all …]
|
| /kernel/linux/linux-6.6/net/netfilter/ |
| D | nf_flow_table_ip.c | 85 new_addr = flow->tuplehash[FLOW_OFFLOAD_DIR_REPLY].tuple.dst_v4.s_addr; in nf_flow_snat_ip() 90 new_addr = flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.src_v4.s_addr; in nf_flow_snat_ip() 108 new_addr = flow->tuplehash[FLOW_OFFLOAD_DIR_REPLY].tuple.src_v4.s_addr; in nf_flow_dnat_ip() 113 new_addr = flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.dst_v4.s_addr; in nf_flow_dnat_ip() 142 struct flow_offload_tuple *tuple) in nf_flow_tuple_encap() argument 149 tuple->encap[i].id = skb_vlan_tag_get(skb); in nf_flow_tuple_encap() 150 tuple->encap[i].proto = skb->vlan_proto; in nf_flow_tuple_encap() 156 tuple->encap[i].id = ntohs(veth->h_vlan_TCI); in nf_flow_tuple_encap() 157 tuple->encap[i].proto = skb->protocol; in nf_flow_tuple_encap() 161 tuple->encap[i].id = ntohs(phdr->sid); in nf_flow_tuple_encap() [all …]
|
| D | nf_nat_sip.c | 107 if (nf_inet_addr_cmp(&ct->tuplehash[dir].tuple.src.u3, addr) && in map_addr() 108 ct->tuplehash[dir].tuple.src.u.udp.port == port) { in map_addr() 109 newaddr = ct->tuplehash[!dir].tuple.dst.u3; in map_addr() 110 newport = ct->tuplehash[!dir].tuple.dst.u.udp.port; in map_addr() 111 } else if (nf_inet_addr_cmp(&ct->tuplehash[dir].tuple.dst.u3, addr) && in map_addr() 112 ct->tuplehash[dir].tuple.dst.u.udp.port == port) { in map_addr() 113 newaddr = ct->tuplehash[!dir].tuple.src.u3; in map_addr() 115 ct->tuplehash[!dir].tuple.src.u.udp.port; in map_addr() 189 &ct->tuplehash[dir].tuple.src.u3) || in nf_nat_sip() 190 port != ct->tuplehash[dir].tuple.src.u.udp.port) in nf_nat_sip() [all …]
|
| D | nf_nat_core.c | 64 const struct nf_conntrack_tuple *t = &ct->tuplehash[dir].tuple; in nf_nat_ipv4_decode_session() 97 const struct nf_conntrack_tuple *t = &ct->tuplehash[dir].tuple; in nf_nat_ipv6_decode_session() 158 const struct nf_conntrack_tuple *tuple) in hash_by_src() argument 173 combined.src = tuple->src; in hash_by_src() 175 combined.protonum = tuple->dst.protonum; in hash_by_src() 187 * nf_nat_used_tuple - check if proposed nat tuple clashes with existing entry 188 * @tuple: proposed NAT binding 192 * if there is no existing entry with an identical tuple in either direction. 211 * the existing and the newly added entry (identical IP_CT_DIR_REPLY tuple). 216 nf_nat_used_tuple(const struct nf_conntrack_tuple *tuple, in nf_nat_used_tuple() argument [all …]
|
| D | nf_nat_proto.c | 41 const struct nf_conntrack_tuple *tuple, in __udp_manip_pkt() argument 48 newport = tuple->src.u.udp.port; in __udp_manip_pkt() 52 newport = tuple->dst.u.udp.port; in __udp_manip_pkt() 56 nf_csum_update(skb, iphdroff, &hdr->check, tuple, maniptype); in __udp_manip_pkt() 67 const struct nf_conntrack_tuple *tuple, in udp_manip_pkt() argument 76 __udp_manip_pkt(skb, iphdroff, hdr, tuple, maniptype, !!hdr->check); in udp_manip_pkt() 83 const struct nf_conntrack_tuple *tuple, in udplite_manip_pkt() argument 93 __udp_manip_pkt(skb, iphdroff, hdr, tuple, maniptype, true); in udplite_manip_pkt() 101 const struct nf_conntrack_tuple *tuple, in sctp_manip_pkt() argument 122 hdr->source = tuple->src.u.sctp.port; in sctp_manip_pkt() [all …]
|
| /kernel/linux/linux-6.6/drivers/ssb/ |
| D | sdio.c | 477 struct sdio_func_tuple *tuple; in ssb_sdio_get_invariants() local 484 tuple = bus->host_sdio->tuples; in ssb_sdio_get_invariants() 485 while (tuple) { in ssb_sdio_get_invariants() 486 switch (tuple->code) { in ssb_sdio_get_invariants() 488 switch (tuple->data[0]) { in ssb_sdio_get_invariants() 490 GOTO_ERROR_ON((tuple->size != 7) && in ssb_sdio_get_invariants() 491 (tuple->data[1] != 6), in ssb_sdio_get_invariants() 494 mac = tuple->data + 2; in ssb_sdio_get_invariants() 502 case 0x80: /* vendor specific tuple */ in ssb_sdio_get_invariants() 503 switch (tuple->data[0]) { in ssb_sdio_get_invariants() [all …]
|
| /kernel/linux/linux-5.10/drivers/ssb/ |
| D | sdio.c | 477 struct sdio_func_tuple *tuple; in ssb_sdio_get_invariants() local 484 tuple = bus->host_sdio->tuples; in ssb_sdio_get_invariants() 485 while (tuple) { in ssb_sdio_get_invariants() 486 switch (tuple->code) { in ssb_sdio_get_invariants() 488 switch (tuple->data[0]) { in ssb_sdio_get_invariants() 490 GOTO_ERROR_ON((tuple->size != 7) && in ssb_sdio_get_invariants() 491 (tuple->data[1] != 6), in ssb_sdio_get_invariants() 494 mac = tuple->data + 2; in ssb_sdio_get_invariants() 502 case 0x80: /* vendor specific tuple */ in ssb_sdio_get_invariants() 503 switch (tuple->data[0]) { in ssb_sdio_get_invariants() [all …]
|
| /kernel/linux/linux-5.10/net/netfilter/ |
| D | nf_nat_sip.c | 107 if (nf_inet_addr_cmp(&ct->tuplehash[dir].tuple.src.u3, addr) && in map_addr() 108 ct->tuplehash[dir].tuple.src.u.udp.port == port) { in map_addr() 109 newaddr = ct->tuplehash[!dir].tuple.dst.u3; in map_addr() 110 newport = ct->tuplehash[!dir].tuple.dst.u.udp.port; in map_addr() 111 } else if (nf_inet_addr_cmp(&ct->tuplehash[dir].tuple.dst.u3, addr) && in map_addr() 112 ct->tuplehash[dir].tuple.dst.u.udp.port == port) { in map_addr() 113 newaddr = ct->tuplehash[!dir].tuple.src.u3; in map_addr() 115 ct->tuplehash[!dir].tuple.src.u.udp.port; in map_addr() 189 &ct->tuplehash[dir].tuple.src.u3) || in nf_nat_sip() 190 port != ct->tuplehash[dir].tuple.src.u.udp.port) in nf_nat_sip() [all …]
|
| D | nf_flow_table_ip.c | 97 new_addr = flow->tuplehash[FLOW_OFFLOAD_DIR_REPLY].tuple.dst_v4.s_addr; in nf_flow_snat_ip() 102 new_addr = flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.src_v4.s_addr; in nf_flow_snat_ip() 122 new_addr = flow->tuplehash[FLOW_OFFLOAD_DIR_REPLY].tuple.src_v4.s_addr; in nf_flow_dnat_ip() 127 new_addr = flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.dst_v4.s_addr; in nf_flow_dnat_ip() 163 struct flow_offload_tuple *tuple) in nf_flow_tuple_ip() argument 200 tuple->src_v4.s_addr = iph->saddr; in nf_flow_tuple_ip() 201 tuple->dst_v4.s_addr = iph->daddr; in nf_flow_tuple_ip() 202 tuple->src_port = ports->source; in nf_flow_tuple_ip() 203 tuple->dst_port = ports->dest; in nf_flow_tuple_ip() 204 tuple->l3proto = AF_INET; in nf_flow_tuple_ip() [all …]
|
| D | nf_nat_proto.c | 41 const struct nf_conntrack_tuple *tuple, in __udp_manip_pkt() argument 48 newport = tuple->src.u.udp.port; in __udp_manip_pkt() 52 newport = tuple->dst.u.udp.port; in __udp_manip_pkt() 56 nf_csum_update(skb, iphdroff, &hdr->check, tuple, maniptype); in __udp_manip_pkt() 67 const struct nf_conntrack_tuple *tuple, in udp_manip_pkt() argument 76 __udp_manip_pkt(skb, iphdroff, hdr, tuple, maniptype, !!hdr->check); in udp_manip_pkt() 83 const struct nf_conntrack_tuple *tuple, in udplite_manip_pkt() argument 93 __udp_manip_pkt(skb, iphdroff, hdr, tuple, maniptype, true); in udplite_manip_pkt() 101 const struct nf_conntrack_tuple *tuple, in sctp_manip_pkt() argument 122 hdr->source = tuple->src.u.sctp.port; in sctp_manip_pkt() [all …]
|
| D | nf_nat_core.c | 61 const struct nf_conntrack_tuple *t = &ct->tuplehash[dir].tuple; in nf_nat_ipv4_decode_session() 94 const struct nf_conntrack_tuple *t = &ct->tuplehash[dir].tuple; in nf_nat_ipv6_decode_session() 190 hash_by_src(const struct net *n, const struct nf_conntrack_tuple *tuple) in hash_by_src() argument 197 hash = jhash2((u32 *)&tuple->src, sizeof(tuple->src) / sizeof(u32), in hash_by_src() 198 tuple->dst.protonum ^ nf_nat_hash_rnd ^ net_hash_mix(n)); in hash_by_src() 203 /* Is this tuple already taken? (not by us) */ 205 nf_nat_used_tuple(const struct nf_conntrack_tuple *tuple, in nf_nat_used_tuple() argument 210 * so we invert the tuple and look for the incoming reply. in nf_nat_used_tuple() 216 nf_ct_invert_tuple(&reply, tuple); in nf_nat_used_tuple() 231 /* Is the manipable part of the tuple between min and max incl? */ [all …]
|
| /kernel/linux/linux-6.6/kernel/bpf/ |
| D | mprog.c | 7 static int bpf_mprog_link(struct bpf_tuple *tuple, in bpf_mprog_link() argument 25 tuple->link = link; in bpf_mprog_link() 26 tuple->prog = link->prog; in bpf_mprog_link() 30 static int bpf_mprog_prog(struct bpf_tuple *tuple, in bpf_mprog_prog() argument 48 tuple->link = NULL; in bpf_mprog_prog() 49 tuple->prog = prog; in bpf_mprog_prog() 53 static int bpf_mprog_tuple_relative(struct bpf_tuple *tuple, in bpf_mprog_tuple_relative() argument 60 memset(tuple, 0, sizeof(*tuple)); in bpf_mprog_tuple_relative() 62 return bpf_mprog_link(tuple, id_or_fd, flags, type); in bpf_mprog_tuple_relative() 64 * tuple link/prog is just NULLed. This is the case when before/ in bpf_mprog_tuple_relative() [all …]
|
| /kernel/linux/linux-6.6/net/ipv4/netfilter/ |
| D | nf_nat_h323.c | 105 if (addr.ip == ct->tuplehash[dir].tuple.src.u3.ip && in set_sig_addr() 118 &ct->tuplehash[!dir].tuple.dst.u3.ip, in set_sig_addr() 123 tuple.dst.u3, in set_sig_addr() 125 } else if (addr.ip == ct->tuplehash[dir].tuple.dst.u3.ip && in set_sig_addr() 130 &ct->tuplehash[!dir].tuple.src.u3.ip, in set_sig_addr() 135 tuple.src.u3, in set_sig_addr() 157 addr.ip == ct->tuplehash[dir].tuple.src.u3.ip && in set_ras_addr() 158 port == ct->tuplehash[dir].tuple.src.u.udp.port) { in set_ras_addr() 161 &ct->tuplehash[!dir].tuple.dst.u3.ip, in set_ras_addr() 162 ntohs(ct->tuplehash[!dir].tuple.dst.u.udp.port)); in set_ras_addr() [all …]
|
| /kernel/linux/linux-5.10/net/ipv4/netfilter/ |
| D | nf_nat_h323.c | 105 if (addr.ip == ct->tuplehash[dir].tuple.src.u3.ip && in set_sig_addr() 118 &ct->tuplehash[!dir].tuple.dst.u3.ip, in set_sig_addr() 123 tuple.dst.u3, in set_sig_addr() 125 } else if (addr.ip == ct->tuplehash[dir].tuple.dst.u3.ip && in set_sig_addr() 130 &ct->tuplehash[!dir].tuple.src.u3.ip, in set_sig_addr() 135 tuple.src.u3, in set_sig_addr() 157 addr.ip == ct->tuplehash[dir].tuple.src.u3.ip && in set_ras_addr() 158 port == ct->tuplehash[dir].tuple.src.u.udp.port) { in set_ras_addr() 161 &ct->tuplehash[!dir].tuple.dst.u3.ip, in set_ras_addr() 162 ntohs(ct->tuplehash[!dir].tuple.dst.u.udp.port)); in set_ras_addr() [all …]
|
| /kernel/linux/linux-5.10/net/netfilter/ipvs/ |
| D | ip_vs_nfct.c | 100 * CIP->VIP will remain the same, so leave the tuple in in ip_vs_update_conntrack() 104 new_tuple = ct->tuplehash[IP_CT_DIR_REPLY].tuple; in ip_vs_update_conntrack() 122 ARG_TUPLE(&ct->tuplehash[IP_CT_DIR_REPLY].tuple)); in ip_vs_update_conntrack() 157 orig = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple; in ip_vs_nfct_expect_callback() 158 ip_vs_conn_fill_param(net_ipvs(net), exp->tuple.src.l3num, orig->dst.protonum, in ip_vs_nfct_expect_callback() 167 new_reply = ct->tuplehash[IP_CT_DIR_REPLY].tuple; in ip_vs_nfct_expect_callback() 168 IP_VS_DBG_BUF(7, "%s: ct=%p before alter: reply tuple=" in ip_vs_nfct_expect_callback() 183 new_reply = ct->tuplehash[IP_CT_DIR_REPLY].tuple; in ip_vs_nfct_expect_callback() 184 IP_VS_DBG_BUF(7, "%s: ct=%p before alter: reply tuple=" in ip_vs_nfct_expect_callback() 192 IP_VS_DBG_BUF(7, "%s: ct=%p, status=0x%lX, tuple=" FMT_TUPLE in ip_vs_nfct_expect_callback() [all …]
|
| /kernel/linux/linux-6.6/net/netfilter/ipvs/ |
| D | ip_vs_nfct.c | 100 * CIP->VIP will remain the same, so leave the tuple in in ip_vs_update_conntrack() 104 new_tuple = ct->tuplehash[IP_CT_DIR_REPLY].tuple; in ip_vs_update_conntrack() 122 ARG_TUPLE(&ct->tuplehash[IP_CT_DIR_REPLY].tuple)); in ip_vs_update_conntrack() 157 orig = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple; in ip_vs_nfct_expect_callback() 158 ip_vs_conn_fill_param(net_ipvs(net), exp->tuple.src.l3num, orig->dst.protonum, in ip_vs_nfct_expect_callback() 167 new_reply = ct->tuplehash[IP_CT_DIR_REPLY].tuple; in ip_vs_nfct_expect_callback() 168 IP_VS_DBG_BUF(7, "%s: ct=%p before alter: reply tuple=" in ip_vs_nfct_expect_callback() 183 new_reply = ct->tuplehash[IP_CT_DIR_REPLY].tuple; in ip_vs_nfct_expect_callback() 184 IP_VS_DBG_BUF(7, "%s: ct=%p before alter: reply tuple=" in ip_vs_nfct_expect_callback() 192 IP_VS_DBG_BUF(7, "%s: ct=%p, status=0x%lX, tuple=" FMT_TUPLE in ip_vs_nfct_expect_callback() [all …]
|