Lines Matching defs:zone

59 	struct nf_conntrack_zone zone;
86 u16 zone;
190 const struct nf_conntrack_zone *zone,
194 key->ct_zone = zone->id;
238 const struct nf_conntrack_zone *zone = &nf_ct_zone_dflt;
262 zone = nf_ct_zone(ct);
266 zone = &info->zone;
268 __ovs_ct_update_key(key, state, zone, ct);
496 u16 zone, struct sk_buff *skb)
502 enum ip_defrag_users user = IP_DEFRAG_CONNTRACK_IN + zone;
512 enum ip6_defrag_users user = IP6_DEFRAG_CONNTRACK_IN + zone;
544 ovs_ct_expect_find(struct net *net, const struct nf_conntrack_zone *zone,
553 exp = __nf_ct_expect_find(net, zone, &tuple);
570 h = nf_conntrack_find_get(net, zone, &tuple);
608 ovs_ct_find_existing(struct net *net, const struct nf_conntrack_zone *zone,
633 h = nf_conntrack_find_get(net, zone, &tuple);
667 (key->ct_zone == info->zone.id);
670 ct = ovs_ct_find_existing(net, &info->zone, info->family, skb,
939 /* Pass 'skb' through conntrack in 'net', using zone configured in 'info', if
952 * different zone.
967 /* Associate skb with specified zone. */
1000 * once per packet (per zone), as guarded by the NAT bits in
1059 exp = ovs_ct_expect_find(net, &info->zone, info->family, skb);
1067 __ovs_ct_update_key(key, state, &info->zone, exp->master);
1097 const struct ovs_ct_limit_info *info, u16 zone)
1099 return &info->limits[zone & (CT_LIMIT_HASH_BUCKETS - 1)];
1109 head = ct_limit_hash_bucket(info, new_ct_limit->zone);
1111 if (ct_limit->zone == new_ct_limit->zone) {
1123 static void ct_limit_del(const struct ovs_ct_limit_info *info, u16 zone)
1129 head = ct_limit_hash_bucket(info, zone);
1131 if (ct_limit->zone == zone) {
1140 static u32 ct_limit_get(const struct ovs_ct_limit_info *info, u16 zone)
1145 head = ct_limit_hash_bucket(info, zone);
1147 if (ct_limit->zone == zone)
1163 conncount_key = info->zone.id;
1165 per_zone_limit = ct_limit_get(ct_limit_info, info->zone.id);
1170 &conncount_key, tuple, &info->zone);
1202 net_warn_ratelimited("openvswitch: zone: %u "
1204 info->zone.id);
1305 err = handle_fragments(net, key, info->zone.id, skb);
1554 info->zone.id = nla_get_u16(a);
1678 nf_ct_zone_init(&ct_info.zone, NF_CT_DEFAULT_ZONE_ID,
1686 ct_info.ct = nf_ct_tmpl_alloc(net, &ct_info.zone, GFP_KERNEL);
1804 nla_put_u16(skb, OVS_CT_ATTR_ZONE, ct_info->zone.id))
1951 u16 zone;
1963 zone_limit->zone_id, &zone))) {
1964 OVS_NLERR(true, "zone id is out of range");
1972 ct_limit->zone = zone;
1985 OVS_NLERR(true, "set zone limit has %d unknown bytes", rem);
1995 u16 zone;
2007 zone_limit->zone_id, &zone))) {
2008 OVS_NLERR(true, "zone id is out of range");
2011 ct_limit_del(info, zone);
2020 OVS_NLERR(true, "del zone limit has %d unknown bytes", rem);
2062 u16 zone;
2074 &zone))) {
2075 OVS_NLERR(true, "zone id is out of range");
2078 limit = ct_limit_get(info, zone);
2082 net, info->data, zone, limit, reply);
2092 OVS_NLERR(true, "get zone limit has %d unknown bytes", rem);
2114 ct_limit->zone, ct_limit->limit, reply);