Home
last modified time | relevance | path

Searched full:tuple (Results 1 – 25 of 716) sorted by relevance

12345678910>>...29

/kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/
Dtest_sk_lookup_kern.c21 /* Fill 'tuple' with L3 info, and attempt to find L4. On fail, return NULL. */
62 struct bpf_sock_tuple *tuple; in bpf_sk_lookup_test0() local
70 tuple = get_tuple(data, sizeof(*eth), data_end, eth->h_proto, &ipv4); in bpf_sk_lookup_test0()
71 if (!tuple || tuple + sizeof *tuple > data_end) in bpf_sk_lookup_test0()
74 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in bpf_sk_lookup_test0()
75 sk = bpf_sk_lookup_tcp(skb, tuple, tuple_len, BPF_F_CURRENT_NETNS, 0); in bpf_sk_lookup_test0()
85 struct bpf_sock_tuple tuple = {}; in bpf_sk_lookup_test1() local
88 sk = bpf_sk_lookup_tcp(skb, &tuple, sizeof(tuple), BPF_F_CURRENT_NETNS, 0); in bpf_sk_lookup_test1()
97 struct bpf_sock_tuple tuple = {}; in bpf_sk_lookup_uaf() local
101 sk = bpf_sk_lookup_tcp(skb, &tuple, sizeof(tuple), BPF_F_CURRENT_NETNS, 0); in bpf_sk_lookup_uaf()
[all …]
Dconnect6_prog.c32 struct bpf_sock_tuple tuple = {}; in connect_v6_prog() local
37 memset(&tuple.ipv6.saddr, 0, sizeof(tuple.ipv6.saddr)); in connect_v6_prog()
38 memset(&tuple.ipv6.sport, 0, sizeof(tuple.ipv6.sport)); in connect_v6_prog()
40 tuple.ipv6.daddr[0] = bpf_htonl(DST_REWRITE_IP6_0); in connect_v6_prog()
41 tuple.ipv6.daddr[1] = bpf_htonl(DST_REWRITE_IP6_1); in connect_v6_prog()
42 tuple.ipv6.daddr[2] = bpf_htonl(DST_REWRITE_IP6_2); in connect_v6_prog()
43 tuple.ipv6.daddr[3] = bpf_htonl(DST_REWRITE_IP6_3); in connect_v6_prog()
45 tuple.ipv6.dport = bpf_htons(DST_REWRITE_PORT6); in connect_v6_prog()
50 sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof(tuple.ipv6), in connect_v6_prog()
53 sk = bpf_sk_lookup_udp(ctx, &tuple, sizeof(tuple.ipv6), in connect_v6_prog()
[all …]
Dtest_sk_assign.c53 /* Fill 'tuple' with L3 info, and attempt to find L4. On fail, return NULL. */
102 handle_udp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) in handle_udp() argument
111 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_udp()
112 if ((void *)tuple + tuple_len > (void *)(long)skb->data_end) in handle_udp()
115 sk = bpf_sk_lookup_udp(skb, tuple, tuple_len, BPF_F_CURRENT_NETNS, 0); in handle_udp()
119 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_udp()
134 handle_tcp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) in handle_tcp() argument
143 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_tcp()
144 if ((void *)tuple + tuple_len > (void *)(long)skb->data_end) in handle_tcp()
147 sk = bpf_skc_lookup_tcp(skb, tuple, tuple_len, BPF_F_CURRENT_NETNS, 0); in handle_tcp()
[all …]
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/
Dtest_sk_lookup_kern.c20 /* Fill 'tuple' with L3 info, and attempt to find L4. On fail, return NULL. */
61 struct bpf_sock_tuple *tuple; in sk_lookup_success() local
69 tuple = get_tuple(data, sizeof(*eth), data_end, eth->h_proto, &ipv4); in sk_lookup_success()
70 if (!tuple || tuple + sizeof *tuple > data_end) in sk_lookup_success()
73 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in sk_lookup_success()
74 sk = bpf_sk_lookup_tcp(skb, tuple, tuple_len, BPF_F_CURRENT_NETNS, 0); in sk_lookup_success()
84 struct bpf_sock_tuple tuple = {}; in sk_lookup_success_simple() local
87 sk = bpf_sk_lookup_tcp(skb, &tuple, sizeof(tuple), BPF_F_CURRENT_NETNS, 0); in sk_lookup_success_simple()
96 struct bpf_sock_tuple tuple = {}; in err_use_after_free() local
100 sk = bpf_sk_lookup_tcp(skb, &tuple, sizeof(tuple), BPF_F_CURRENT_NETNS, 0); in err_use_after_free()
[all …]
Dconnect6_prog.c30 struct bpf_sock_tuple tuple = {}; in connect_v6_prog() local
35 memset(&tuple.ipv6.saddr, 0, sizeof(tuple.ipv6.saddr)); in connect_v6_prog()
36 memset(&tuple.ipv6.sport, 0, sizeof(tuple.ipv6.sport)); in connect_v6_prog()
38 tuple.ipv6.daddr[0] = bpf_htonl(DST_REWRITE_IP6_0); in connect_v6_prog()
39 tuple.ipv6.daddr[1] = bpf_htonl(DST_REWRITE_IP6_1); in connect_v6_prog()
40 tuple.ipv6.daddr[2] = bpf_htonl(DST_REWRITE_IP6_2); in connect_v6_prog()
41 tuple.ipv6.daddr[3] = bpf_htonl(DST_REWRITE_IP6_3); in connect_v6_prog()
43 tuple.ipv6.dport = bpf_htons(DST_REWRITE_PORT6); in connect_v6_prog()
48 sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof(tuple.ipv6), in connect_v6_prog()
51 sk = bpf_sk_lookup_udp(ctx, &tuple, sizeof(tuple.ipv6), in connect_v6_prog()
[all …]
Dtest_sk_assign.c53 /* Fill 'tuple' with L3 info, and attempt to find L4. On fail, return NULL. */
102 handle_udp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) in handle_udp() argument
110 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_udp()
111 if ((void *)tuple + tuple_len > (void *)(long)skb->data_end) in handle_udp()
114 sk = bpf_sk_lookup_udp(skb, tuple, tuple_len, BPF_F_CURRENT_NETNS, 0); in handle_udp()
118 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_udp()
133 handle_tcp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) in handle_tcp() argument
141 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_tcp()
142 if ((void *)tuple + tuple_len > (void *)(long)skb->data_end) in handle_tcp()
145 sk = bpf_skc_lookup_tcp(skb, tuple, tuple_len, BPF_F_CURRENT_NETNS, 0); in handle_tcp()
[all …]
/kernel/linux/linux-6.6/drivers/pcmcia/
Dcistpl.c432 /* The high-level CIS tuple services */
447 tuple_t *tuple) in pccard_get_first_tuple() argument
454 tuple->TupleLink = tuple->Flags = 0; in pccard_get_first_tuple()
457 tuple->CISOffset = tuple->LinkOffset = 0; in pccard_get_first_tuple()
458 SPACE(tuple->Flags) = HAS_LINK(tuple->Flags) = 1; in pccard_get_first_tuple()
460 if ((s->functions > 1) && !(tuple->Attributes & TUPLE_RETURN_COMMON)) { in pccard_get_first_tuple()
461 cisdata_t req = tuple->DesiredTuple; in pccard_get_first_tuple()
462 tuple->DesiredTuple = CISTPL_LONGLINK_MFC; in pccard_get_first_tuple()
463 if (pccard_get_next_tuple(s, function, tuple) == 0) { in pccard_get_first_tuple()
464 tuple->DesiredTuple = CISTPL_LINKTARGET; in pccard_get_first_tuple()
[all …]
Dpcmcia_cis.c27 * pccard_read_tuple() - internal CIS tuple access
31 * @parse: buffer where the tuple shall be parsed (or NULL, if no parse)
33 * pccard_read_tuple() reads out one tuple and attempts to parse it
38 tuple_t tuple; in pccard_read_tuple() local
44 dev_warn(&s->dev, "no memory to read tuple\n"); in pccard_read_tuple()
47 tuple.DesiredTuple = code; in pccard_read_tuple()
48 tuple.Attributes = 0; in pccard_read_tuple()
50 tuple.Attributes = TUPLE_RETURN_COMMON; in pccard_read_tuple()
51 ret = pccard_get_first_tuple(s, function, &tuple); in pccard_read_tuple()
54 tuple.TupleData = buf; in pccard_read_tuple()
[all …]
/kernel/linux/linux-5.10/drivers/pcmcia/
Dcistpl.c432 /* The high-level CIS tuple services */
447 tuple_t *tuple) in pccard_get_first_tuple() argument
454 tuple->TupleLink = tuple->Flags = 0; in pccard_get_first_tuple()
457 tuple->CISOffset = tuple->LinkOffset = 0; in pccard_get_first_tuple()
458 SPACE(tuple->Flags) = HAS_LINK(tuple->Flags) = 1; in pccard_get_first_tuple()
460 if ((s->functions > 1) && !(tuple->Attributes & TUPLE_RETURN_COMMON)) { in pccard_get_first_tuple()
461 cisdata_t req = tuple->DesiredTuple; in pccard_get_first_tuple()
462 tuple->DesiredTuple = CISTPL_LONGLINK_MFC; in pccard_get_first_tuple()
463 if (pccard_get_next_tuple(s, function, tuple) == 0) { in pccard_get_first_tuple()
464 tuple->DesiredTuple = CISTPL_LINKTARGET; in pccard_get_first_tuple()
[all …]
Dpcmcia_cis.c26 * pccard_read_tuple() - internal CIS tuple access
30 * @parse: buffer where the tuple shall be parsed (or NULL, if no parse)
32 * pccard_read_tuple() reads out one tuple and attempts to parse it
37 tuple_t tuple; in pccard_read_tuple() local
43 dev_warn(&s->dev, "no memory to read tuple\n"); in pccard_read_tuple()
46 tuple.DesiredTuple = code; in pccard_read_tuple()
47 tuple.Attributes = 0; in pccard_read_tuple()
49 tuple.Attributes = TUPLE_RETURN_COMMON; in pccard_read_tuple()
50 ret = pccard_get_first_tuple(s, function, &tuple); in pccard_read_tuple()
53 tuple.TupleData = buf; in pccard_read_tuple()
[all …]
/kernel/linux/linux-6.6/net/netfilter/
Dnf_flow_table_ip.c85 new_addr = flow->tuplehash[FLOW_OFFLOAD_DIR_REPLY].tuple.dst_v4.s_addr; in nf_flow_snat_ip()
90 new_addr = flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.src_v4.s_addr; in nf_flow_snat_ip()
108 new_addr = flow->tuplehash[FLOW_OFFLOAD_DIR_REPLY].tuple.src_v4.s_addr; in nf_flow_dnat_ip()
113 new_addr = flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.dst_v4.s_addr; in nf_flow_dnat_ip()
142 struct flow_offload_tuple *tuple) in nf_flow_tuple_encap() argument
149 tuple->encap[i].id = skb_vlan_tag_get(skb); in nf_flow_tuple_encap()
150 tuple->encap[i].proto = skb->vlan_proto; in nf_flow_tuple_encap()
156 tuple->encap[i].id = ntohs(veth->h_vlan_TCI); in nf_flow_tuple_encap()
157 tuple->encap[i].proto = skb->protocol; in nf_flow_tuple_encap()
161 tuple->encap[i].id = ntohs(phdr->sid); in nf_flow_tuple_encap()
[all …]
Dnf_nat_sip.c107 if (nf_inet_addr_cmp(&ct->tuplehash[dir].tuple.src.u3, addr) && in map_addr()
108 ct->tuplehash[dir].tuple.src.u.udp.port == port) { in map_addr()
109 newaddr = ct->tuplehash[!dir].tuple.dst.u3; in map_addr()
110 newport = ct->tuplehash[!dir].tuple.dst.u.udp.port; in map_addr()
111 } else if (nf_inet_addr_cmp(&ct->tuplehash[dir].tuple.dst.u3, addr) && in map_addr()
112 ct->tuplehash[dir].tuple.dst.u.udp.port == port) { in map_addr()
113 newaddr = ct->tuplehash[!dir].tuple.src.u3; in map_addr()
115 ct->tuplehash[!dir].tuple.src.u.udp.port; in map_addr()
189 &ct->tuplehash[dir].tuple.src.u3) || in nf_nat_sip()
190 port != ct->tuplehash[dir].tuple.src.u.udp.port) in nf_nat_sip()
[all …]
Dnf_nat_core.c64 const struct nf_conntrack_tuple *t = &ct->tuplehash[dir].tuple; in nf_nat_ipv4_decode_session()
97 const struct nf_conntrack_tuple *t = &ct->tuplehash[dir].tuple; in nf_nat_ipv6_decode_session()
158 const struct nf_conntrack_tuple *tuple) in hash_by_src() argument
173 combined.src = tuple->src; in hash_by_src()
175 combined.protonum = tuple->dst.protonum; in hash_by_src()
187 * nf_nat_used_tuple - check if proposed nat tuple clashes with existing entry
188 * @tuple: proposed NAT binding
192 * if there is no existing entry with an identical tuple in either direction.
211 * the existing and the newly added entry (identical IP_CT_DIR_REPLY tuple).
216 nf_nat_used_tuple(const struct nf_conntrack_tuple *tuple, in nf_nat_used_tuple() argument
[all …]
Dnf_nat_proto.c41 const struct nf_conntrack_tuple *tuple, in __udp_manip_pkt() argument
48 newport = tuple->src.u.udp.port; in __udp_manip_pkt()
52 newport = tuple->dst.u.udp.port; in __udp_manip_pkt()
56 nf_csum_update(skb, iphdroff, &hdr->check, tuple, maniptype); in __udp_manip_pkt()
67 const struct nf_conntrack_tuple *tuple, in udp_manip_pkt() argument
76 __udp_manip_pkt(skb, iphdroff, hdr, tuple, maniptype, !!hdr->check); in udp_manip_pkt()
83 const struct nf_conntrack_tuple *tuple, in udplite_manip_pkt() argument
93 __udp_manip_pkt(skb, iphdroff, hdr, tuple, maniptype, true); in udplite_manip_pkt()
101 const struct nf_conntrack_tuple *tuple, in sctp_manip_pkt() argument
122 hdr->source = tuple->src.u.sctp.port; in sctp_manip_pkt()
[all …]
/kernel/linux/linux-6.6/drivers/ssb/
Dsdio.c477 struct sdio_func_tuple *tuple; in ssb_sdio_get_invariants() local
484 tuple = bus->host_sdio->tuples; in ssb_sdio_get_invariants()
485 while (tuple) { in ssb_sdio_get_invariants()
486 switch (tuple->code) { in ssb_sdio_get_invariants()
488 switch (tuple->data[0]) { in ssb_sdio_get_invariants()
490 GOTO_ERROR_ON((tuple->size != 7) && in ssb_sdio_get_invariants()
491 (tuple->data[1] != 6), in ssb_sdio_get_invariants()
494 mac = tuple->data + 2; in ssb_sdio_get_invariants()
502 case 0x80: /* vendor specific tuple */ in ssb_sdio_get_invariants()
503 switch (tuple->data[0]) { in ssb_sdio_get_invariants()
[all …]
/kernel/linux/linux-5.10/drivers/ssb/
Dsdio.c477 struct sdio_func_tuple *tuple; in ssb_sdio_get_invariants() local
484 tuple = bus->host_sdio->tuples; in ssb_sdio_get_invariants()
485 while (tuple) { in ssb_sdio_get_invariants()
486 switch (tuple->code) { in ssb_sdio_get_invariants()
488 switch (tuple->data[0]) { in ssb_sdio_get_invariants()
490 GOTO_ERROR_ON((tuple->size != 7) && in ssb_sdio_get_invariants()
491 (tuple->data[1] != 6), in ssb_sdio_get_invariants()
494 mac = tuple->data + 2; in ssb_sdio_get_invariants()
502 case 0x80: /* vendor specific tuple */ in ssb_sdio_get_invariants()
503 switch (tuple->data[0]) { in ssb_sdio_get_invariants()
[all …]
/kernel/linux/linux-5.10/net/netfilter/
Dnf_nat_sip.c107 if (nf_inet_addr_cmp(&ct->tuplehash[dir].tuple.src.u3, addr) && in map_addr()
108 ct->tuplehash[dir].tuple.src.u.udp.port == port) { in map_addr()
109 newaddr = ct->tuplehash[!dir].tuple.dst.u3; in map_addr()
110 newport = ct->tuplehash[!dir].tuple.dst.u.udp.port; in map_addr()
111 } else if (nf_inet_addr_cmp(&ct->tuplehash[dir].tuple.dst.u3, addr) && in map_addr()
112 ct->tuplehash[dir].tuple.dst.u.udp.port == port) { in map_addr()
113 newaddr = ct->tuplehash[!dir].tuple.src.u3; in map_addr()
115 ct->tuplehash[!dir].tuple.src.u.udp.port; in map_addr()
189 &ct->tuplehash[dir].tuple.src.u3) || in nf_nat_sip()
190 port != ct->tuplehash[dir].tuple.src.u.udp.port) in nf_nat_sip()
[all …]
Dnf_flow_table_ip.c97 new_addr = flow->tuplehash[FLOW_OFFLOAD_DIR_REPLY].tuple.dst_v4.s_addr; in nf_flow_snat_ip()
102 new_addr = flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.src_v4.s_addr; in nf_flow_snat_ip()
122 new_addr = flow->tuplehash[FLOW_OFFLOAD_DIR_REPLY].tuple.src_v4.s_addr; in nf_flow_dnat_ip()
127 new_addr = flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.dst_v4.s_addr; in nf_flow_dnat_ip()
163 struct flow_offload_tuple *tuple) in nf_flow_tuple_ip() argument
200 tuple->src_v4.s_addr = iph->saddr; in nf_flow_tuple_ip()
201 tuple->dst_v4.s_addr = iph->daddr; in nf_flow_tuple_ip()
202 tuple->src_port = ports->source; in nf_flow_tuple_ip()
203 tuple->dst_port = ports->dest; in nf_flow_tuple_ip()
204 tuple->l3proto = AF_INET; in nf_flow_tuple_ip()
[all …]
Dnf_nat_proto.c41 const struct nf_conntrack_tuple *tuple, in __udp_manip_pkt() argument
48 newport = tuple->src.u.udp.port; in __udp_manip_pkt()
52 newport = tuple->dst.u.udp.port; in __udp_manip_pkt()
56 nf_csum_update(skb, iphdroff, &hdr->check, tuple, maniptype); in __udp_manip_pkt()
67 const struct nf_conntrack_tuple *tuple, in udp_manip_pkt() argument
76 __udp_manip_pkt(skb, iphdroff, hdr, tuple, maniptype, !!hdr->check); in udp_manip_pkt()
83 const struct nf_conntrack_tuple *tuple, in udplite_manip_pkt() argument
93 __udp_manip_pkt(skb, iphdroff, hdr, tuple, maniptype, true); in udplite_manip_pkt()
101 const struct nf_conntrack_tuple *tuple, in sctp_manip_pkt() argument
122 hdr->source = tuple->src.u.sctp.port; in sctp_manip_pkt()
[all …]
Dnf_nat_core.c61 const struct nf_conntrack_tuple *t = &ct->tuplehash[dir].tuple; in nf_nat_ipv4_decode_session()
94 const struct nf_conntrack_tuple *t = &ct->tuplehash[dir].tuple; in nf_nat_ipv6_decode_session()
190 hash_by_src(const struct net *n, const struct nf_conntrack_tuple *tuple) in hash_by_src() argument
197 hash = jhash2((u32 *)&tuple->src, sizeof(tuple->src) / sizeof(u32), in hash_by_src()
198 tuple->dst.protonum ^ nf_nat_hash_rnd ^ net_hash_mix(n)); in hash_by_src()
203 /* Is this tuple already taken? (not by us) */
205 nf_nat_used_tuple(const struct nf_conntrack_tuple *tuple, in nf_nat_used_tuple() argument
210 * so we invert the tuple and look for the incoming reply. in nf_nat_used_tuple()
216 nf_ct_invert_tuple(&reply, tuple); in nf_nat_used_tuple()
231 /* Is the manipable part of the tuple between min and max incl? */
[all …]
/kernel/linux/linux-6.6/kernel/bpf/
Dmprog.c7 static int bpf_mprog_link(struct bpf_tuple *tuple, in bpf_mprog_link() argument
25 tuple->link = link; in bpf_mprog_link()
26 tuple->prog = link->prog; in bpf_mprog_link()
30 static int bpf_mprog_prog(struct bpf_tuple *tuple, in bpf_mprog_prog() argument
48 tuple->link = NULL; in bpf_mprog_prog()
49 tuple->prog = prog; in bpf_mprog_prog()
53 static int bpf_mprog_tuple_relative(struct bpf_tuple *tuple, in bpf_mprog_tuple_relative() argument
60 memset(tuple, 0, sizeof(*tuple)); in bpf_mprog_tuple_relative()
62 return bpf_mprog_link(tuple, id_or_fd, flags, type); in bpf_mprog_tuple_relative()
64 * tuple link/prog is just NULLed. This is the case when before/ in bpf_mprog_tuple_relative()
[all …]
/kernel/linux/linux-6.6/net/ipv4/netfilter/
Dnf_nat_h323.c105 if (addr.ip == ct->tuplehash[dir].tuple.src.u3.ip && in set_sig_addr()
118 &ct->tuplehash[!dir].tuple.dst.u3.ip, in set_sig_addr()
123 tuple.dst.u3, in set_sig_addr()
125 } else if (addr.ip == ct->tuplehash[dir].tuple.dst.u3.ip && in set_sig_addr()
130 &ct->tuplehash[!dir].tuple.src.u3.ip, in set_sig_addr()
135 tuple.src.u3, in set_sig_addr()
157 addr.ip == ct->tuplehash[dir].tuple.src.u3.ip && in set_ras_addr()
158 port == ct->tuplehash[dir].tuple.src.u.udp.port) { in set_ras_addr()
161 &ct->tuplehash[!dir].tuple.dst.u3.ip, in set_ras_addr()
162 ntohs(ct->tuplehash[!dir].tuple.dst.u.udp.port)); in set_ras_addr()
[all …]
/kernel/linux/linux-5.10/net/ipv4/netfilter/
Dnf_nat_h323.c105 if (addr.ip == ct->tuplehash[dir].tuple.src.u3.ip && in set_sig_addr()
118 &ct->tuplehash[!dir].tuple.dst.u3.ip, in set_sig_addr()
123 tuple.dst.u3, in set_sig_addr()
125 } else if (addr.ip == ct->tuplehash[dir].tuple.dst.u3.ip && in set_sig_addr()
130 &ct->tuplehash[!dir].tuple.src.u3.ip, in set_sig_addr()
135 tuple.src.u3, in set_sig_addr()
157 addr.ip == ct->tuplehash[dir].tuple.src.u3.ip && in set_ras_addr()
158 port == ct->tuplehash[dir].tuple.src.u.udp.port) { in set_ras_addr()
161 &ct->tuplehash[!dir].tuple.dst.u3.ip, in set_ras_addr()
162 ntohs(ct->tuplehash[!dir].tuple.dst.u.udp.port)); in set_ras_addr()
[all …]
/kernel/linux/linux-5.10/net/netfilter/ipvs/
Dip_vs_nfct.c100 * CIP->VIP will remain the same, so leave the tuple in in ip_vs_update_conntrack()
104 new_tuple = ct->tuplehash[IP_CT_DIR_REPLY].tuple; in ip_vs_update_conntrack()
122 ARG_TUPLE(&ct->tuplehash[IP_CT_DIR_REPLY].tuple)); in ip_vs_update_conntrack()
157 orig = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple; in ip_vs_nfct_expect_callback()
158 ip_vs_conn_fill_param(net_ipvs(net), exp->tuple.src.l3num, orig->dst.protonum, in ip_vs_nfct_expect_callback()
167 new_reply = ct->tuplehash[IP_CT_DIR_REPLY].tuple; in ip_vs_nfct_expect_callback()
168 IP_VS_DBG_BUF(7, "%s: ct=%p before alter: reply tuple=" in ip_vs_nfct_expect_callback()
183 new_reply = ct->tuplehash[IP_CT_DIR_REPLY].tuple; in ip_vs_nfct_expect_callback()
184 IP_VS_DBG_BUF(7, "%s: ct=%p before alter: reply tuple=" in ip_vs_nfct_expect_callback()
192 IP_VS_DBG_BUF(7, "%s: ct=%p, status=0x%lX, tuple=" FMT_TUPLE in ip_vs_nfct_expect_callback()
[all …]
/kernel/linux/linux-6.6/net/netfilter/ipvs/
Dip_vs_nfct.c100 * CIP->VIP will remain the same, so leave the tuple in in ip_vs_update_conntrack()
104 new_tuple = ct->tuplehash[IP_CT_DIR_REPLY].tuple; in ip_vs_update_conntrack()
122 ARG_TUPLE(&ct->tuplehash[IP_CT_DIR_REPLY].tuple)); in ip_vs_update_conntrack()
157 orig = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple; in ip_vs_nfct_expect_callback()
158 ip_vs_conn_fill_param(net_ipvs(net), exp->tuple.src.l3num, orig->dst.protonum, in ip_vs_nfct_expect_callback()
167 new_reply = ct->tuplehash[IP_CT_DIR_REPLY].tuple; in ip_vs_nfct_expect_callback()
168 IP_VS_DBG_BUF(7, "%s: ct=%p before alter: reply tuple=" in ip_vs_nfct_expect_callback()
183 new_reply = ct->tuplehash[IP_CT_DIR_REPLY].tuple; in ip_vs_nfct_expect_callback()
184 IP_VS_DBG_BUF(7, "%s: ct=%p before alter: reply tuple=" in ip_vs_nfct_expect_callback()
192 IP_VS_DBG_BUF(7, "%s: ct=%p, status=0x%lX, tuple=" FMT_TUPLE in ip_vs_nfct_expect_callback()
[all …]

12345678910>>...29