Home
last modified time | relevance | path

Searched refs:conntrack (Results 1 – 20 of 20) sorted by relevance

/linux-2.4.37.9/net/ipv4/netfilter/ !
Dip_nat_core.c75 IP_NF_ASSERT(info->bysource.conntrack); in ip_nat_cleanup_conntrack()
76 IP_NF_ASSERT(info->byipsproto.conntrack); in ip_nat_cleanup_conntrack()
173 return (i->conntrack->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.protonum in src_cmp()
175 && i->conntrack->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.ip in src_cmp()
177 && i->conntrack->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u.all in src_cmp()
180 &i->conntrack->tuplehash[IP_CT_DIR_ORIGINAL] in src_cmp()
196 return &i->conntrack->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src; in find_appropriate_src()
224 const struct ip_conntrack *conntrack) in fake_cmp() argument
229 if (i->conntrack != conntrack in fake_cmp()
230 && i->conntrack->tuplehash[IP_CT_DIR_REPLY].tuple.src.ip == dst in fake_cmp()
[all …]
Dip_conntrack_proto_tcp.c137 const struct ip_conntrack *conntrack) in tcp_print_conntrack() argument
142 state = conntrack->proto.tcp.state; in tcp_print_conntrack()
158 static int tcp_packet(struct ip_conntrack *conntrack, in tcp_packet() argument
173 oldtcpstate = conntrack->proto.tcp.state; in tcp_packet()
183 conntrack->proto.tcp.state); in tcp_packet()
188 conntrack->proto.tcp.state = newconntrack; in tcp_packet()
194 conntrack->proto.tcp.handshake_ack in tcp_packet()
201 if (!test_bit(IPS_SEEN_REPLY_BIT, &conntrack->status) && tcph->rst) { in tcp_packet()
203 if (del_timer(&conntrack->timeout)) in tcp_packet()
204 conntrack->timeout.function((unsigned long)conntrack); in tcp_packet()
[all …]
Dip_conntrack_proto_udp.c42 const struct ip_conntrack *conntrack) in udp_print_conntrack() argument
48 static int udp_packet(struct ip_conntrack *conntrack, in udp_packet() argument
54 if (test_bit(IPS_SEEN_REPLY_BIT, &conntrack->status)) { in udp_packet()
55 ip_ct_refresh(conntrack, ip_ct_udp_timeout_stream); in udp_packet()
57 set_bit(IPS_ASSURED_BIT, &conntrack->status); in udp_packet()
59 ip_ct_refresh(conntrack, ip_ct_udp_timeout); in udp_packet()
65 static int udp_new(struct ip_conntrack *conntrack, in udp_new() argument
Dip_nat_rule.c224 alloc_null_binding(struct ip_conntrack *conntrack, in alloc_null_binding() argument
234 ? conntrack->tuplehash[IP_CT_DIR_REPLY].tuple.dst.ip in alloc_null_binding()
235 : conntrack->tuplehash[IP_CT_DIR_REPLY].tuple.src.ip); in alloc_null_binding()
239 DEBUGP("Allocating NULL binding for %p (%u.%u.%u.%u)\n", conntrack, in alloc_null_binding()
241 return ip_nat_setup_info(conntrack, &mr, hooknum); in alloc_null_binding()
245 alloc_null_binding_confirmed(struct ip_conntrack *conntrack, in alloc_null_binding_confirmed() argument
251 ? conntrack->tuplehash[IP_CT_DIR_REPLY].tuple.dst.ip in alloc_null_binding_confirmed()
252 : conntrack->tuplehash[IP_CT_DIR_REPLY].tuple.src.ip); in alloc_null_binding_confirmed()
255 ? conntrack->tuplehash[IP_CT_DIR_REPLY].tuple.dst.u.all in alloc_null_binding_confirmed()
256 : conntrack->tuplehash[IP_CT_DIR_REPLY].tuple.src.u.all); in alloc_null_binding_confirmed()
[all …]
Dip_conntrack_core.c58 void (*ip_conntrack_destroyed)(struct ip_conntrack *conntrack) = NULL;
650 struct ip_conntrack *conntrack; in init_conntrack() local
686 conntrack = kmem_cache_alloc(ip_conntrack_cachep, GFP_ATOMIC); in init_conntrack()
687 if (!conntrack) { in init_conntrack()
692 memset(conntrack, 0, sizeof(*conntrack)); in init_conntrack()
693 atomic_set(&conntrack->ct_general.use, 1); in init_conntrack()
694 conntrack->ct_general.destroy = destroy_conntrack; in init_conntrack()
695 conntrack->tuplehash[IP_CT_DIR_ORIGINAL].tuple = *tuple; in init_conntrack()
696 conntrack->tuplehash[IP_CT_DIR_ORIGINAL].ctrack = conntrack; in init_conntrack()
697 conntrack->tuplehash[IP_CT_DIR_REPLY].tuple = repl_tuple; in init_conntrack()
[all …]
Dip_conntrack_proto_icmp.c65 const struct ip_conntrack *conntrack) in icmp_print_conntrack() argument
92 static int icmp_new(struct ip_conntrack *conntrack, in icmp_new() argument
101 if (conntrack->tuplehash[0].tuple.dst.u.icmp.type >= sizeof(valid_new) in icmp_new()
102 || !valid_new[conntrack->tuplehash[0].tuple.dst.u.icmp.type]) { in icmp_new()
105 conntrack->tuplehash[0].tuple.dst.u.icmp.type); in icmp_new()
106 DUMP_TUPLE(&conntrack->tuplehash[0].tuple); in icmp_new()
109 atomic_set(&conntrack->proto.icmp.count, 0); in icmp_new()
Dip_fw_compat_masq.c222 print_masq(char *buffer, const struct ip_conntrack *conntrack) in print_masq() argument
230 masq_proto_name(conntrack->tuplehash[0].tuple.dst.protonum), in print_masq()
231 ntohl(conntrack->tuplehash[0].tuple.src.ip), in print_masq()
232 ntohs(conntrack->tuplehash[0].tuple.src.u.all), in print_masq()
233 ntohl(conntrack->tuplehash[0].tuple.dst.ip), in print_masq()
234 ntohs(conntrack->tuplehash[0].tuple.dst.u.all), in print_masq()
235 ntohs(conntrack->tuplehash[1].tuple.dst.u.all), in print_masq()
238 conntrack->timeout.expires - jiffies); in print_masq()
Dip_conntrack_standalone.c83 print_conntrack(char *buffer, struct ip_conntrack *conntrack) in print_conntrack() argument
87 = __ip_ct_find_proto(conntrack->tuplehash[IP_CT_DIR_ORIGINAL] in print_conntrack()
92 conntrack->tuplehash[IP_CT_DIR_ORIGINAL] in print_conntrack()
94 timer_pending(&conntrack->timeout) in print_conntrack()
95 ? (conntrack->timeout.expires - jiffies)/HZ : 0); in print_conntrack()
97 len += proto->print_conntrack(buffer + len, conntrack); in print_conntrack()
99 &conntrack->tuplehash[IP_CT_DIR_ORIGINAL].tuple, in print_conntrack()
101 if (!(test_bit(IPS_SEEN_REPLY_BIT, &conntrack->status))) in print_conntrack()
104 &conntrack->tuplehash[IP_CT_DIR_REPLY].tuple, in print_conntrack()
106 if (test_bit(IPS_ASSURED_BIT, &conntrack->status)) in print_conntrack()
[all …]
Dip_conntrack_proto_generic.c42 static int established(struct ip_conntrack *conntrack, in established() argument
46 ip_ct_refresh(conntrack, ip_ct_generic_timeout); in established()
52 new(struct ip_conntrack *conntrack, struct iphdr *iph, size_t len) in new() argument
Dip_nat_proto_icmp.c26 const struct ip_conntrack *conntrack) in icmp_unique_tuple() argument
40 if (!ip_nat_used_tuple(tuple, conntrack)) in icmp_unique_tuple()
Dip_nat_proto_tcp.c32 const struct ip_conntrack *conntrack) in tcp_unique_tuple() argument
70 if (!ip_nat_used_tuple(tuple, conntrack)) { in tcp_unique_tuple()
Dip_nat_proto_udp.c33 const struct ip_conntrack *conntrack) in udp_unique_tuple() argument
70 if (!ip_nat_used_tuple(tuple, conntrack)) in udp_unique_tuple()
Dip_nat_proto_unknown.c25 const struct ip_conntrack *conntrack) in unknown_unique_tuple() argument
/linux-2.4.37.9/include/linux/netfilter_ipv4/ !
Dip_nat_core.h20 struct ip_conntrack *conntrack,
24 extern void replace_in_hashes(struct ip_conntrack *conntrack,
26 extern void place_in_hashes(struct ip_conntrack *conntrack,
Dip_conntrack_protocol.h36 int (*packet)(struct ip_conntrack *conntrack,
42 int (*new)(struct ip_conntrack *conntrack, struct iphdr *iph,
46 void (*destroy)(struct ip_conntrack *conntrack);
Dip_nat_rule.h19 alloc_null_binding(struct ip_conntrack *conntrack,
24 alloc_null_binding_confirmed(struct ip_conntrack *conntrack,
Dip_nat.h89 struct ip_conntrack *conntrack; member
112 extern unsigned int ip_nat_setup_info(struct ip_conntrack *conntrack,
Dip_conntrack.h218 ip_conntrack_alter_reply(struct ip_conntrack *conntrack,
250 extern void (*ip_conntrack_destroyed)(struct ip_conntrack *conntrack);
Dip_nat_protocol.h39 const struct ip_conntrack *conntrack);
/linux-2.4.37.9/Documentation/ !
DConfigure.help2982 conntrack match support
2984 This is a general conntrack match module, a superset of the state match.
2986 It allows matching on additional conntrack information, which is
3177 tracked by a conntrack-helper, ie. ip_conntrack_ftp