/linux-2.4.37.9/net/ipv4/netfilter/ |
D | ip_nat_core.c | 75 IP_NF_ASSERT(info->bysource.conntrack); in ip_nat_cleanup_conntrack() 76 IP_NF_ASSERT(info->byipsproto.conntrack); in ip_nat_cleanup_conntrack() 173 return (i->conntrack->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.protonum in src_cmp() 175 && i->conntrack->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.ip in src_cmp() 177 && i->conntrack->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u.all in src_cmp() 180 &i->conntrack->tuplehash[IP_CT_DIR_ORIGINAL] in src_cmp() 196 return &i->conntrack->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src; in find_appropriate_src() 224 const struct ip_conntrack *conntrack) in fake_cmp() argument 229 if (i->conntrack != conntrack in fake_cmp() 230 && i->conntrack->tuplehash[IP_CT_DIR_REPLY].tuple.src.ip == dst in fake_cmp() [all …]
|
D | ip_conntrack_proto_tcp.c | 137 const struct ip_conntrack *conntrack) in tcp_print_conntrack() argument 142 state = conntrack->proto.tcp.state; in tcp_print_conntrack() 158 static int tcp_packet(struct ip_conntrack *conntrack, in tcp_packet() argument 173 oldtcpstate = conntrack->proto.tcp.state; in tcp_packet() 183 conntrack->proto.tcp.state); in tcp_packet() 188 conntrack->proto.tcp.state = newconntrack; in tcp_packet() 194 conntrack->proto.tcp.handshake_ack in tcp_packet() 201 if (!test_bit(IPS_SEEN_REPLY_BIT, &conntrack->status) && tcph->rst) { in tcp_packet() 203 if (del_timer(&conntrack->timeout)) in tcp_packet() 204 conntrack->timeout.function((unsigned long)conntrack); in tcp_packet() [all …]
|
D | ip_conntrack_proto_udp.c | 42 const struct ip_conntrack *conntrack) in udp_print_conntrack() argument 48 static int udp_packet(struct ip_conntrack *conntrack, in udp_packet() argument 54 if (test_bit(IPS_SEEN_REPLY_BIT, &conntrack->status)) { in udp_packet() 55 ip_ct_refresh(conntrack, ip_ct_udp_timeout_stream); in udp_packet() 57 set_bit(IPS_ASSURED_BIT, &conntrack->status); in udp_packet() 59 ip_ct_refresh(conntrack, ip_ct_udp_timeout); in udp_packet() 65 static int udp_new(struct ip_conntrack *conntrack, in udp_new() argument
|
D | ip_nat_rule.c | 224 alloc_null_binding(struct ip_conntrack *conntrack, in alloc_null_binding() argument 234 ? conntrack->tuplehash[IP_CT_DIR_REPLY].tuple.dst.ip in alloc_null_binding() 235 : conntrack->tuplehash[IP_CT_DIR_REPLY].tuple.src.ip); in alloc_null_binding() 239 DEBUGP("Allocating NULL binding for %p (%u.%u.%u.%u)\n", conntrack, in alloc_null_binding() 241 return ip_nat_setup_info(conntrack, &mr, hooknum); in alloc_null_binding() 245 alloc_null_binding_confirmed(struct ip_conntrack *conntrack, in alloc_null_binding_confirmed() argument 251 ? conntrack->tuplehash[IP_CT_DIR_REPLY].tuple.dst.ip in alloc_null_binding_confirmed() 252 : conntrack->tuplehash[IP_CT_DIR_REPLY].tuple.src.ip); in alloc_null_binding_confirmed() 255 ? conntrack->tuplehash[IP_CT_DIR_REPLY].tuple.dst.u.all in alloc_null_binding_confirmed() 256 : conntrack->tuplehash[IP_CT_DIR_REPLY].tuple.src.u.all); in alloc_null_binding_confirmed() [all …]
|
D | ip_conntrack_core.c | 58 void (*ip_conntrack_destroyed)(struct ip_conntrack *conntrack) = NULL; 650 struct ip_conntrack *conntrack; in init_conntrack() local 686 conntrack = kmem_cache_alloc(ip_conntrack_cachep, GFP_ATOMIC); in init_conntrack() 687 if (!conntrack) { in init_conntrack() 692 memset(conntrack, 0, sizeof(*conntrack)); in init_conntrack() 693 atomic_set(&conntrack->ct_general.use, 1); in init_conntrack() 694 conntrack->ct_general.destroy = destroy_conntrack; in init_conntrack() 695 conntrack->tuplehash[IP_CT_DIR_ORIGINAL].tuple = *tuple; in init_conntrack() 696 conntrack->tuplehash[IP_CT_DIR_ORIGINAL].ctrack = conntrack; in init_conntrack() 697 conntrack->tuplehash[IP_CT_DIR_REPLY].tuple = repl_tuple; in init_conntrack() [all …]
|
D | ip_conntrack_proto_icmp.c | 65 const struct ip_conntrack *conntrack) in icmp_print_conntrack() argument 92 static int icmp_new(struct ip_conntrack *conntrack, in icmp_new() argument 101 if (conntrack->tuplehash[0].tuple.dst.u.icmp.type >= sizeof(valid_new) in icmp_new() 102 || !valid_new[conntrack->tuplehash[0].tuple.dst.u.icmp.type]) { in icmp_new() 105 conntrack->tuplehash[0].tuple.dst.u.icmp.type); in icmp_new() 106 DUMP_TUPLE(&conntrack->tuplehash[0].tuple); in icmp_new() 109 atomic_set(&conntrack->proto.icmp.count, 0); in icmp_new()
|
D | ip_fw_compat_masq.c | 222 print_masq(char *buffer, const struct ip_conntrack *conntrack) in print_masq() argument 230 masq_proto_name(conntrack->tuplehash[0].tuple.dst.protonum), in print_masq() 231 ntohl(conntrack->tuplehash[0].tuple.src.ip), in print_masq() 232 ntohs(conntrack->tuplehash[0].tuple.src.u.all), in print_masq() 233 ntohl(conntrack->tuplehash[0].tuple.dst.ip), in print_masq() 234 ntohs(conntrack->tuplehash[0].tuple.dst.u.all), in print_masq() 235 ntohs(conntrack->tuplehash[1].tuple.dst.u.all), in print_masq() 238 conntrack->timeout.expires - jiffies); in print_masq()
|
D | ip_conntrack_standalone.c | 83 print_conntrack(char *buffer, struct ip_conntrack *conntrack) in print_conntrack() argument 87 = __ip_ct_find_proto(conntrack->tuplehash[IP_CT_DIR_ORIGINAL] in print_conntrack() 92 conntrack->tuplehash[IP_CT_DIR_ORIGINAL] in print_conntrack() 94 timer_pending(&conntrack->timeout) in print_conntrack() 95 ? (conntrack->timeout.expires - jiffies)/HZ : 0); in print_conntrack() 97 len += proto->print_conntrack(buffer + len, conntrack); in print_conntrack() 99 &conntrack->tuplehash[IP_CT_DIR_ORIGINAL].tuple, in print_conntrack() 101 if (!(test_bit(IPS_SEEN_REPLY_BIT, &conntrack->status))) in print_conntrack() 104 &conntrack->tuplehash[IP_CT_DIR_REPLY].tuple, in print_conntrack() 106 if (test_bit(IPS_ASSURED_BIT, &conntrack->status)) in print_conntrack() [all …]
|
D | ip_conntrack_proto_generic.c | 42 static int established(struct ip_conntrack *conntrack, in established() argument 46 ip_ct_refresh(conntrack, ip_ct_generic_timeout); in established() 52 new(struct ip_conntrack *conntrack, struct iphdr *iph, size_t len) in new() argument
|
D | ip_nat_proto_icmp.c | 26 const struct ip_conntrack *conntrack) in icmp_unique_tuple() argument 40 if (!ip_nat_used_tuple(tuple, conntrack)) in icmp_unique_tuple()
|
D | ip_nat_proto_tcp.c | 32 const struct ip_conntrack *conntrack) in tcp_unique_tuple() argument 70 if (!ip_nat_used_tuple(tuple, conntrack)) { in tcp_unique_tuple()
|
D | ip_nat_proto_udp.c | 33 const struct ip_conntrack *conntrack) in udp_unique_tuple() argument 70 if (!ip_nat_used_tuple(tuple, conntrack)) in udp_unique_tuple()
|
D | ip_nat_proto_unknown.c | 25 const struct ip_conntrack *conntrack) in unknown_unique_tuple() argument
|
/linux-2.4.37.9/include/linux/netfilter_ipv4/ |
D | ip_nat_core.h | 20 struct ip_conntrack *conntrack, 24 extern void replace_in_hashes(struct ip_conntrack *conntrack, 26 extern void place_in_hashes(struct ip_conntrack *conntrack,
|
D | ip_conntrack_protocol.h | 36 int (*packet)(struct ip_conntrack *conntrack, 42 int (*new)(struct ip_conntrack *conntrack, struct iphdr *iph, 46 void (*destroy)(struct ip_conntrack *conntrack);
|
D | ip_nat_rule.h | 19 alloc_null_binding(struct ip_conntrack *conntrack, 24 alloc_null_binding_confirmed(struct ip_conntrack *conntrack,
|
D | ip_nat.h | 89 struct ip_conntrack *conntrack; member 112 extern unsigned int ip_nat_setup_info(struct ip_conntrack *conntrack,
|
D | ip_conntrack.h | 218 ip_conntrack_alter_reply(struct ip_conntrack *conntrack, 250 extern void (*ip_conntrack_destroyed)(struct ip_conntrack *conntrack);
|
D | ip_nat_protocol.h | 39 const struct ip_conntrack *conntrack);
|
/linux-2.4.37.9/Documentation/ |
D | Configure.help | 2982 conntrack match support 2984 This is a general conntrack match module, a superset of the state match. 2986 It allows matching on additional conntrack information, which is 3177 tracked by a conntrack-helper, ie. ip_conntrack_ftp
|