Searched refs:nat (Results 1 – 11 of 11) sorted by relevance
/net/ipv4/netfilter/ |
D | nf_nat_pptp.c | 53 struct nf_conn_nat *nat; in pptp_nat_expected() local 55 nat = nf_ct_nat_ext_add(ct); in pptp_nat_expected() 56 if (WARN_ON_ONCE(!nat)) in pptp_nat_expected() 59 nat_pptp_info = &nat->help.nat_pptp_info; in pptp_nat_expected() 129 struct nf_conn_nat *nat = nfct_nat(ct); in pptp_outbound_pkt() local 135 if (WARN_ON_ONCE(!nat)) in pptp_outbound_pkt() 138 nat_pptp_info = &nat->help.nat_pptp_info; in pptp_outbound_pkt() 203 struct nf_conn_nat *nat = nfct_nat(ct); in pptp_exp_gre() local 207 if (WARN_ON_ONCE(!nat)) in pptp_exp_gre() 210 nat_pptp_info = &nat->help.nat_pptp_info; in pptp_exp_gre() [all …]
|
D | Kconfig | 216 This enables the `nat' table in iptables. This allows masquerading,
|
/net/netfilter/ |
D | nf_conntrack_helper.c | 132 struct nf_conntrack_nat_helper *nat; in nf_nat_helper_try_module_get() local 143 nat = nf_conntrack_nat_helper_find(h->nat_mod_name); in nf_nat_helper_try_module_get() 144 if (!nat) { in nf_nat_helper_try_module_get() 150 nat = nf_conntrack_nat_helper_find(mod_name); in nf_nat_helper_try_module_get() 151 if (!nat) { in nf_nat_helper_try_module_get() 157 if (!try_module_get(nat->module)) in nf_nat_helper_try_module_get() 167 struct nf_conntrack_nat_helper *nat; in nf_nat_helper_put() local 169 nat = nf_conntrack_nat_helper_find(helper->nat_mod_name); in nf_nat_helper_put() 170 if (WARN_ON_ONCE(!nat)) in nf_nat_helper_put() 173 module_put(nat->module); in nf_nat_helper_put() [all …]
|
D | nf_nat_masquerade.c | 33 struct nf_conn_nat *nat; in nf_nat_masquerade_ipv4() local 60 nat = nf_ct_nat_ext_add(ct); in nf_nat_masquerade_ipv4() 61 if (nat) in nf_nat_masquerade_ipv4() 62 nat->masq_index = out->ifindex; in nf_nat_masquerade_ipv4() 141 const struct nf_conn_nat *nat = nfct_nat(i); in device_cmp() local 144 if (!nat) in device_cmp() 146 return nat->masq_index == w->ifindex; in device_cmp() 245 struct nf_conn_nat *nat; in nf_nat_masquerade_ipv6() local 258 nat = nf_ct_nat_ext_add(ct); in nf_nat_masquerade_ipv6() 259 if (nat) in nf_nat_masquerade_ipv6() [all …]
|
D | nf_nat_core.c | 652 struct nf_conn_nat *nat = nfct_nat(ct); in nf_ct_nat_ext_add() local 653 if (nat) in nf_ct_nat_ext_add() 654 return nat; in nf_ct_nat_ext_add() 657 nat = nf_ct_ext_add(ct, NF_CT_EXT_NAT, GFP_ATOMIC); in nf_ct_nat_ext_add() 659 return nat; in nf_ct_nat_ext_add() 802 struct nf_conn_nat *nat; in nf_nat_inet_fn() local 815 nat = nfct_nat(ct); in nf_nat_inet_fn() 850 if (nf_nat_oif_changed(state->hook, ctinfo, nat, in nf_nat_inet_fn() 859 if (nf_nat_oif_changed(state->hook, ctinfo, nat, state->out)) in nf_nat_inet_fn() 1001 nfnetlink_parse_nat(const struct nlattr *nat, in nfnetlink_parse_nat() argument [all …]
|
D | nf_conntrack_ovs.c | 79 u8 proto, bool nat, struct nf_conntrack_helper **hp) in nf_ct_add_helper() argument 95 if (nat) { in nf_ct_add_helper()
|
D | nf_conntrack_pptp.c | 511 struct nf_conn_nat *nat = nf_ct_ext_find(ct, NF_CT_EXT_NAT); in conntrack_pptp_help() local 513 if (!nat && !nf_ct_ext_add(ct, NF_CT_EXT_NAT, GFP_ATOMIC)) in conntrack_pptp_help()
|
D | Kconfig | 569 tristate "Netfilter nf_tables nat module" 571 This option adds the "nat" expression that you can use to perform
|
/net/openvswitch/ |
D | conntrack.c | 66 u8 nat : 3; /* enum ovs_ct_nat */ member 674 if (!(info->nat & OVS_CT_NAT)) in ovs_ct_nat() 676 if (info->nat & OVS_CT_SRC_NAT) in ovs_ct_nat() 678 if (info->nat & OVS_CT_DST_NAT) in ovs_ct_nat() 764 if (info->nat && !(key->ct_state & OVS_CS_F_NAT_MASK) && in __ovs_ct_lookup() 785 if (info->nat && !nfct_seqadj(ct)) { in __ovs_ct_lookup() 1106 if (info->nat) { in parse_nat() 1110 info->nat |= OVS_CT_NAT; in parse_nat() 1111 info->nat |= ((type == OVS_NAT_ATTR_SRC) in parse_nat() 1161 if (!info->nat) { in parse_nat() [all …]
|
/net/bridge/netfilter/ |
D | Kconfig | 76 tristate "ebt: nat table support" 78 The ebtables nat table is used to define rules that alter the MAC
|
/net/ipv6/netfilter/ |
D | Kconfig | 259 This enables the `nat' table in ip6tables. This allows masquerading,
|