Home
last modified time | relevance | path

Searched refs:tcp (Results 1 – 25 of 46) sorted by relevance

12

/net/netfilter/
Dnf_conntrack_proto_tcp.c271 seq_printf(s, "%s ", tcp_conntrack_names[ct->proto.tcp.state]); in tcp_print_conntrack()
515 struct ip_ct_tcp *state = &ct->proto.tcp; in tcp_in_window()
753 if (ct->proto.tcp.last_dir != dir && in nf_tcp_handle_invalid()
754 (ct->proto.tcp.last_index == TCP_FIN_SET || in nf_tcp_handle_invalid()
755 ct->proto.tcp.last_index == TCP_RST_SET)) { in nf_tcp_handle_invalid()
769 index, dir, ct->proto.tcp.last_index, timeout); in nf_tcp_handle_invalid()
774 ct->proto.tcp.last_index = index; in nf_tcp_handle_invalid()
775 ct->proto.tcp.last_dir = dir; in nf_tcp_handle_invalid()
856 memset(&ct->proto.tcp, 0, sizeof(ct->proto.tcp)); in tcp_new()
858 ct->proto.tcp.seen[0].td_end = in tcp_new()
[all …]
Dnft_synproxy.c24 const struct tcphdr *tcp, in nft_synproxy_tcp_options() argument
30 if (tcp->ece && tcp->cwr) in nft_synproxy_tcp_options()
47 const struct tcphdr *tcp, in nft_synproxy_eval_v4() argument
56 if (tcp->syn) { in nft_synproxy_eval_v4()
58 nft_synproxy_tcp_options(opts, tcp, snet, &info, priv); in nft_synproxy_eval_v4()
59 synproxy_send_client_synack(net, skb, tcp, opts); in nft_synproxy_eval_v4()
62 } else if (tcp->ack) { in nft_synproxy_eval_v4()
64 if (synproxy_recv_client_ack(net, skb, tcp, opts, in nft_synproxy_eval_v4()
65 ntohl(tcp->seq))) { in nft_synproxy_eval_v4()
78 const struct tcphdr *tcp, in nft_synproxy_eval_v6() argument
[all …]
Dnfnetlink_osf.c171 const struct tcphdr *tcp; in nf_osf_hdr_ctx_init() local
173 tcp = skb_header_pointer(skb, ip_hdrlen(skb), sizeof(struct tcphdr), _tcph); in nf_osf_hdr_ctx_init()
174 if (!tcp) in nf_osf_hdr_ctx_init()
177 if (!tcp->syn) in nf_osf_hdr_ctx_init()
182 ctx->window = ntohs(tcp->window); in nf_osf_hdr_ctx_init()
184 if (tcp->doff * 4 > sizeof(struct tcphdr)) { in nf_osf_hdr_ctx_init()
185 ctx->optsize = tcp->doff * 4 - sizeof(struct tcphdr); in nf_osf_hdr_ctx_init()
193 return tcp; in nf_osf_hdr_ctx_init()
209 const struct tcphdr *tcp; in nf_osf_match() local
214 tcp = nf_osf_hdr_ctx_init(&ctx, skb, ip, opts, &_tcph); in nf_osf_match()
[all …]
Dnf_nat_amanda.c39 exp->saved_proto.tcp.port = exp->tuple.dst.u.tcp.port; in help()
47 port = nf_nat_exp_find_port(exp, ntohs(exp->saved_proto.tcp.port)); in help()
Dnf_conntrack_proto.c278 tuple.src.u.tcp.port = inet->inet_sport; in getorigdst()
280 tuple.dst.u.tcp.port = inet->inet_dport; in getorigdst()
300 .tuple.dst.u.tcp.port; in getorigdst()
337 tuple.src.u.tcp.port = inet->inet_sport; in ipv6_getorigdst()
339 tuple.dst.u.tcp.port = inet->inet_dport; in ipv6_getorigdst()
359 sin6.sin6_port = ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.u.tcp.port; in ipv6_getorigdst()
428 ct->proto.tcp.state == TCP_CONNTRACK_ESTABLISHED) { in nf_ct_tcp_fixup()
429 ct->proto.tcp.seen[0].td_maxwin = 0; in nf_ct_tcp_fixup()
430 ct->proto.tcp.seen[1].td_maxwin = 0; in nf_ct_tcp_fixup()
Dnft_osf.c27 const struct tcphdr *tcp; in nft_osf_eval() local
36 tcp = skb_header_pointer(skb, ip_hdrlen(skb), in nft_osf_eval()
38 if (!tcp) { in nft_osf_eval()
42 if (!tcp->syn) { in nft_osf_eval()
Dnf_nat_irc.c47 exp->saved_proto.tcp.port = exp->tuple.dst.u.tcp.port; in help()
52 ntohs(exp->saved_proto.tcp.port)); in help()
Dnf_nat_ftp.c82 exp->saved_proto.tcp.port = exp->tuple.dst.u.tcp.port; in nf_nat_ftp()
89 port = nf_nat_exp_find_port(exp, ntohs(exp->saved_proto.tcp.port)); in nf_nat_ftp()
Dnf_flow_table_core.c46 ft->src_port = ctt->src.u.tcp.port; in flow_offload_fill_dir()
47 ft->dst_port = ctt->dst.u.tcp.port; in flow_offload_fill_dir()
168 static void flow_offload_fixup_tcp(struct ip_ct_tcp *tcp) in flow_offload_fixup_tcp() argument
170 tcp->seen[0].td_maxwin = 0; in flow_offload_fixup_tcp()
171 tcp->seen[1].td_maxwin = 0; in flow_offload_fixup_tcp()
183 flow_offload_fixup_tcp(&ct->proto.tcp); in flow_offload_fixup_ct()
185 timeout = tn->timeouts[ct->proto.tcp.state]; in flow_offload_fixup_ct()
Dnf_conntrack_bpf.c81 sport->tcp.port = bpf_tuple->ipv4.sport; in bpf_nf_ct_tuple_parse()
83 dport->tcp.port = bpf_tuple->ipv4.dport; in bpf_nf_ct_tuple_parse()
88 sport->tcp.port = bpf_tuple->ipv6.sport; in bpf_nf_ct_tuple_parse()
90 dport->tcp.port = bpf_tuple->ipv6.dport; in bpf_nf_ct_tuple_parse()
Dnf_conntrack_ftp.c163 cmd->u.tcp.port = htons((array[4] << 8) | array[5]); in try_rfc959()
265 return get_port(data, 3 + length + 1, dlen, delim, &cmd->u.tcp.port); in try_eprt()
282 return get_port(data, 3, dlen, delim, &cmd->u.tcp.port); in try_epsv_response()
517 IPPROTO_TCP, NULL, &cmd.u.tcp.port); in help()
Dnf_conntrack_h323_main.c826 ntohs(ct->tuplehash[!dir].tuple.src.u.tcp.port)); in process_setup()
830 ct->tuplehash[!dir].tuple.src.u.tcp.port); in process_setup()
843 ntohs(ct->tuplehash[!dir].tuple.dst.u.tcp.port)); in process_setup()
847 ct->tuplehash[!dir].tuple.dst.u.tcp.port); in process_setup()
1147 .tuple.src.u.tcp.port = cpu_to_be16(Q931_PORT),
1156 .tuple.src.u.tcp.port = cpu_to_be16(Q931_PORT),
1192 tuple.src.u.tcp.port = 0; in find_expect()
1194 tuple.dst.u.tcp.port = port; in find_expect()
Dnf_nat_core.c210 old_state = READ_ONCE(ct->proto.tcp.state); in nf_nat_may_kill()
225 return (__s32)(new->proto.tcp.seen[0].td_end - in nf_seq_has_advanced()
226 old->proto.tcp.seen[0].td_end) > 0; in nf_seq_has_advanced()
247 ignored_conntrack->proto.tcp.state != TCP_CONNTRACK_SYN_SENT) in nf_nat_used_tuple_harder()
/net/ipv4/netfilter/
Dnf_nat_h323.c290 exp->saved_proto.tcp.port = exp->tuple.dst.u.tcp.port; in nat_t120()
310 ntohs(exp->tuple.src.u.tcp.port), in nat_t120()
312 ntohs(exp->tuple.dst.u.tcp.port)); in nat_t120()
329 exp->saved_proto.tcp.port = exp->tuple.dst.u.tcp.port; in nat_h245()
357 ntohs(exp->tuple.src.u.tcp.port), in nat_h245()
359 ntohs(exp->tuple.dst.u.tcp.port)); in nat_h245()
408 exp->saved_proto.tcp.port = exp->tuple.dst.u.tcp.port; in nat_q931()
449 ntohs(exp->tuple.src.u.tcp.port), in nat_q931()
451 ntohs(exp->tuple.dst.u.tcp.port)); in nat_q931()
492 exp->saved_proto.tcp.port = exp->tuple.dst.u.tcp.port; in nat_callforwarding()
[all …]
Dipt_ECN.c56 tcph->ece == einfo->proto.tcp.ece) && in set_ect_tcp()
58 tcph->cwr == einfo->proto.tcp.cwr)) in set_ect_tcp()
67 tcph->ece = einfo->proto.tcp.ece; in set_ect_tcp()
69 tcph->cwr = einfo->proto.tcp.cwr; in set_ect_tcp()
Dnf_socket_ipv4.c141 ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u.tcp.port : in nf_sk_lookup_slow_v4()
/net/core/
Dselftests.c22 bool tcp; member
67 if (attr->tcp) in net_test_get_skb()
88 if (attr->tcp) in net_test_get_skb()
102 if (attr->tcp) { in net_test_get_skb()
120 if (attr->tcp) in net_test_get_skb()
125 if (attr->tcp) in net_test_get_skb()
154 if (attr->tcp) { in net_test_get_skb()
208 if (tpriv->packet->tcp) { in net_test_loopback_validate()
335 attr.tcp = true; in net_test_phy_loopback_tcp()
/net/netfilter/ipvs/
Dip_vs_nfct.c112 new_tuple.src.u.tcp.port = cp->dport; in ip_vs_update_conntrack()
117 new_tuple.dst.u.tcp.port = cp->vport; in ip_vs_update_conntrack()
159 &orig->src.u3, orig->src.u.tcp.port, in ip_vs_nfct_expect_callback()
160 &orig->dst.u3, orig->dst.u.tcp.port, &p); in ip_vs_nfct_expect_callback()
172 new_reply.dst.u.tcp.port = cp->vport; in ip_vs_nfct_expect_callback()
188 new_reply.src.u.tcp.port = cp->dport; in ip_vs_nfct_expect_callback()
/net/ipv4/
Dtcp_bpf.c16 struct tcp_sock *tcp; in tcp_eat_skb() local
25 tcp = tcp_sk(sk); in tcp_eat_skb()
26 copied = tcp->copied_seq + skb->len; in tcp_eat_skb()
27 WRITE_ONCE(tcp->copied_seq, copied); in tcp_eat_skb()
224 struct tcp_sock *tcp = tcp_sk(sk); in tcp_bpf_recvmsg_parser() local
226 u32 seq = tcp->copied_seq; in tcp_bpf_recvmsg_parser()
320 WRITE_ONCE(tcp->copied_seq, seq); in tcp_bpf_recvmsg_parser()
/net/sched/
Dact_ct.c147 __be16 target_src = target.src.u.tcp.port; in tcf_ct_flow_table_add_action_nat_tcp()
148 __be16 target_dst = target.dst.u.tcp.port; in tcf_ct_flow_table_add_action_nat_tcp()
150 if (target_src != tuple->src.u.tcp.port) in tcf_ct_flow_table_add_action_nat_tcp()
154 if (target_dst != tuple->dst.u.tcp.port) in tcf_ct_flow_table_add_action_nat_tcp()
422 bool tcp, bool bidirectional) in tcf_ct_flow_table_add() argument
437 if (tcp) { in tcf_ct_flow_table_add()
438 ct->proto.tcp.seen[0].flags |= IP_CT_TCP_FLAG_BE_LIBERAL; in tcf_ct_flow_table_add()
439 ct->proto.tcp.seen[1].flags |= IP_CT_TCP_FLAG_BE_LIBERAL; in tcf_ct_flow_table_add()
466 bool tcp = false, bidirectional = true; in tcf_ct_flow_table_process_conn() local
473 ct->proto.tcp.state != TCP_CONNTRACK_ESTABLISHED) in tcf_ct_flow_table_process_conn()
[all …]
/net/openvswitch/
Dflow.c726 struct tcphdr *tcp = tcp_hdr(skb); in key_extract_l3l4() local
727 key->tp.src = tcp->source; in key_extract_l3l4()
728 key->tp.dst = tcp->dest; in key_extract_l3l4()
729 key->tp.flags = TCP_FLAGS_BE16(tcp); in key_extract_l3l4()
850 struct tcphdr *tcp = tcp_hdr(skb); in key_extract_l3l4() local
851 key->tp.src = tcp->source; in key_extract_l3l4()
852 key->tp.dst = tcp->dest; in key_extract_l3l4()
853 key->tp.flags = TCP_FLAGS_BE16(tcp); in key_extract_l3l4()
/net/wireless/
Dcore.h140 if (rdev->wiphy.wowlan_config->tcp && in cfg80211_rdev_free_wowlan()
141 rdev->wiphy.wowlan_config->tcp->sock) in cfg80211_rdev_free_wowlan()
142 sock_release(rdev->wiphy.wowlan_config->tcp->sock); in cfg80211_rdev_free_wowlan()
143 kfree(rdev->wiphy.wowlan_config->tcp); in cfg80211_rdev_free_wowlan()
/net/smc/
Dsmc_close.c26 struct socket *tcp; in smc_clcsock_release() local
32 tcp = smc->clcsock; in smc_clcsock_release()
34 sock_release(tcp); in smc_clcsock_release()
/net/rds/
DMakefile14 rds_tcp-y := tcp.o tcp_connect.o tcp_listen.o tcp_recv.o \
/net/9p/
Dtrans_fd.c745 if (clnt->trans_opts.tcp.port != P9_PORT) in p9_fd_show_options()
746 seq_printf(m, ",port=%u", clnt->trans_opts.tcp.port); in p9_fd_show_options()
1006 client->trans_opts.tcp.port = opts.port; in p9_fd_create_tcp()
1007 client->trans_opts.tcp.privport = opts.privport; in p9_fd_create_tcp()

12