/net/netfilter/ |
D | xt_bpf.c | 34 program.filter = insns; in __bpf_mt_check_bytecode() 72 &info->filter); in bpf_mt_check() 82 &info->filter); in bpf_mt_check_v1() 84 return __bpf_mt_check_fd(info->fd, &info->filter); in bpf_mt_check_v1() 86 return __bpf_mt_check_path(info->path, &info->filter); in bpf_mt_check_v1() 95 return BPF_PROG_RUN(info->filter, skb); in bpf_mt() 102 return !!bpf_prog_run_save_cb(info->filter, (struct sk_buff *) skb); in bpf_mt_v1() 109 bpf_prog_destroy(info->filter); in bpf_mt_destroy() 116 bpf_prog_destroy(info->filter); in bpf_mt_destroy_v1() 128 .usersize = offsetof(struct xt_bpf_info, filter), [all …]
|
D | nfnetlink_acct.c | 195 const struct nfacct_filter *filter = cb->data; in nfnl_acct_dump() local 213 if (filter && (cur->flags & filter->mask) != filter->value) in nfnl_acct_dump() 245 struct nfacct_filter *filter; in nfnl_acct_start() local 259 filter = kzalloc(sizeof(struct nfacct_filter), GFP_KERNEL); in nfnl_acct_start() 260 if (!filter) in nfnl_acct_start() 263 filter->mask = ntohl(nla_get_be32(tb[NFACCT_FILTER_MASK])); in nfnl_acct_start() 264 filter->value = ntohl(nla_get_be32(tb[NFACCT_FILTER_VALUE])); in nfnl_acct_start() 265 cb->data = filter; in nfnl_acct_start()
|
D | nf_conntrack_netlink.c | 779 struct ctnetlink_filter *filter; in ctnetlink_alloc_filter() local 781 filter = kzalloc(sizeof(*filter), GFP_KERNEL); in ctnetlink_alloc_filter() 782 if (filter == NULL) in ctnetlink_alloc_filter() 785 filter->mark.val = ntohl(nla_get_be32(cda[CTA_MARK])); in ctnetlink_alloc_filter() 786 filter->mark.mask = ntohl(nla_get_be32(cda[CTA_MARK_MASK])); in ctnetlink_alloc_filter() 788 return filter; in ctnetlink_alloc_filter() 797 struct ctnetlink_filter *filter = NULL; in ctnetlink_start() local 800 filter = ctnetlink_alloc_filter(cda); in ctnetlink_start() 801 if (IS_ERR(filter)) in ctnetlink_start() 802 return PTR_ERR(filter); in ctnetlink_start() [all …]
|
D | nf_tables_api.c | 4637 struct nft_obj_filter *filter = cb->data; in nf_tables_dump_obj() local 4662 if (filter && filter->table && in nf_tables_dump_obj() 4663 strcmp(filter->table, table->name)) in nf_tables_dump_obj() 4665 if (filter && in nf_tables_dump_obj() 4666 filter->type != NFT_OBJECT_UNSPEC && in nf_tables_dump_obj() 4667 obj->ops->type->type != filter->type) in nf_tables_dump_obj() 4692 struct nft_obj_filter *filter = cb->data; in nf_tables_dump_obj_done() local 4694 if (filter) { in nf_tables_dump_obj_done() 4695 kfree(filter->table); in nf_tables_dump_obj_done() 4696 kfree(filter); in nf_tables_dump_obj_done() [all …]
|
/net/sched/ |
D | act_bpf.c | 27 struct bpf_prog *filter; member 42 struct bpf_prog *filter; in tcf_bpf() local 49 filter = rcu_dereference(prog->filter); in tcf_bpf() 53 filter_res = BPF_PROG_RUN(filter, skb); in tcf_bpf() 57 filter_res = BPF_PROG_RUN(filter, skb); in tcf_bpf() 125 if (nla_put_u32(skb, TCA_ACT_BPF_ID, prog->filter->aux->id)) in tcf_bpf_dump_ebpf_info() 128 nla = nla_reserve(skb, TCA_ACT_BPF_TAG, sizeof(prog->filter->tag)); in tcf_bpf_dump_ebpf_info() 132 memcpy(nla_data(nla), prog->filter->tag, nla_len(nla)); in tcf_bpf_dump_ebpf_info() 206 fprog_tmp.filter = bpf_ops; in tcf_bpf_init_from_ops() 216 cfg->filter = fp; in tcf_bpf_init_from_ops() [all …]
|
D | cls_bpf.c | 40 struct bpf_prog *filter; member 106 filter_res = BPF_PROG_RUN(prog->filter, skb); in cls_bpf_classify() 110 filter_res = BPF_PROG_RUN(prog->filter, skb); in cls_bpf_classify() 159 cls_bpf.prog = prog->filter; in cls_bpf_offload_cmd() 252 bpf_prog_put(prog->filter); in cls_bpf_free_parms() 254 bpf_prog_destroy(prog->filter); in cls_bpf_free_parms() 353 fprog_tmp.filter = bpf_ops; in cls_bpf_prog_from_ops() 364 prog->filter = fp; in cls_bpf_prog_from_ops() 392 prog->filter = fp; in cls_bpf_prog_from_efd() 570 if (nla_put_u32(skb, TCA_BPF_ID, prog->filter->aux->id)) in cls_bpf_dump_ebpf_info() [all …]
|
D | sch_fq_codel.c | 86 struct tcf_proto *filter; in fq_codel_classify() local 95 filter = rcu_dereference_bh(q->filter_list); in fq_codel_classify() 96 if (!filter) in fq_codel_classify() 100 result = tcf_classify(skb, filter, &res, false); in fq_codel_classify()
|
D | cls_route.c | 33 struct route4_filter *filter; member 92 head->fastmap[h].filter = f; in route4_set_fastmap() 154 (f = head->fastmap[h].filter) != NULL) { in route4_classify()
|
/net/can/ |
D | raw.c | 94 struct can_filter *filter; /* pointer to filter(s) */ member 185 struct sock *sk, struct can_filter *filter, in raw_enable_filters() argument 192 err = can_rx_register(net, dev, filter[i].can_id, in raw_enable_filters() 193 filter[i].can_mask, in raw_enable_filters() 198 can_rx_unregister(net, dev, filter[i].can_id, in raw_enable_filters() 199 filter[i].can_mask, in raw_enable_filters() 221 struct sock *sk, struct can_filter *filter, in raw_disable_filters() argument 227 can_rx_unregister(net, dev, filter[i].can_id, in raw_disable_filters() 228 filter[i].can_mask, raw_rcv, sk); in raw_disable_filters() 248 raw_disable_filters(net, dev, sk, ro->filter, ro->count); in raw_disable_allfilters() [all …]
|
D | gw.c | 122 struct can_filter filter; member 465 return can_rx_register(net, gwj->src.dev, gwj->ccgw.filter.can_id, in cgw_register_filter() 466 gwj->ccgw.filter.can_mask, can_can_gw_rcv, in cgw_register_filter() 472 can_rx_unregister(net, gwj->src.dev, gwj->ccgw.filter.can_id, in cgw_unregister_filter() 473 gwj->ccgw.filter.can_mask, can_can_gw_rcv, gwj); in cgw_unregister_filter() 592 if (gwj->ccgw.filter.can_id || gwj->ccgw.filter.can_mask) { in cgw_put_job() 594 &gwj->ccgw.filter) < 0) in cgw_put_job() 808 nla_memcpy(&ccgw->filter, tb[CGW_FILTER], in cgw_parse_attr()
|
/net/bluetooth/bnep/ |
D | Kconfig | 14 bool "Multicast filter support" 17 This option enables the multicast filter support for BNEP. 20 bool "Protocol filter support" 23 This option enables the protocol filter support for BNEP.
|
/net/bridge/netfilter/ |
D | Kconfig | 53 tristate "ebt: filter table support" 55 The ebtables filter table is used to define frame filtering rules at 73 tristate "ebt: 802.3 filter support" 80 tristate "ebt: among filter support" 89 tristate "ebt: ARP filter support" 97 tristate "ebt: IP filter support" 105 tristate "ebt: IP6 filter support" 124 tristate "ebt: mark filter support" 134 tristate "ebt: packet type filter support" 144 tristate "ebt: STP filter support" [all …]
|
/net/tipc/ |
D | subscr.c | 129 !(htohl(sub->evt.s.filter, sub->swap) & TIPC_SUB_PORTS)) in tipc_subscrp_report_overlap() 256 u32 filter = htohl(s->filter, swap); in tipc_subscrp_create() local 274 if (((filter & TIPC_SUB_PORTS) && (filter & TIPC_SUB_SERVICE)) || in tipc_subscrp_create() 329 swap = !(s->filter & (TIPC_SUB_PORTS | TIPC_SUB_SERVICE | in tipc_subscrb_rcv_cb() 333 if (s->filter & htohl(TIPC_SUB_CANCEL, swap)) { in tipc_subscrb_rcv_cb() 334 s->filter &= ~htohl(TIPC_SUB_CANCEL, swap); in tipc_subscrb_rcv_cb()
|
D | msg.h | 870 static inline u32 tipc_skb_peek_port(struct sk_buff_head *list, u32 filter) in tipc_skb_peek_port() argument 879 if (!filter || skb_queue_is_last(list, skb)) in tipc_skb_peek_port() 881 if (dport == filter) in tipc_skb_peek_port()
|
/net/atm/ |
D | br2684.c | 76 struct br2684_filter filter; member 384 memcpy(&brvcc->filter, &fs.filter, sizeof(brvcc->filter)); in br2684_setfilt() 392 if (brvcc->filter.netmask == 0) in packet_fails_filter() 395 (((struct iphdr *)(skb->data))->daddr & brvcc->filter. in packet_fails_filter() 396 netmask) == brvcc->filter.prefix) in packet_fails_filter() 804 if (brvcc->filter.netmask != 0) in br2684_seq_show() 806 &brvcc->filter.prefix, in br2684_seq_show() 807 &brvcc->filter.netmask); in br2684_seq_show()
|
/net/core/ |
D | sock_diag.c | 72 struct sk_filter *filter; in sock_diag_put_filterinfo() local 83 filter = rcu_dereference(sk->sk_filter); in sock_diag_put_filterinfo() 84 if (!filter) in sock_diag_put_filterinfo() 87 fprog = filter->prog->orig_prog; in sock_diag_put_filterinfo() 99 memcpy(nla_data(attr), fprog->filter, flen); in sock_diag_put_filterinfo()
|
D | filter.c | 76 struct sk_filter *filter; in sk_filter_trim_cap() local 96 filter = rcu_dereference(sk->sk_filter); in sk_filter_trim_cap() 97 if (filter) { in sk_filter_trim_cap() 102 pkt_len = bpf_prog_run_save_cb(filter->prog, skb); in sk_filter_trim_cap() 676 static int check_load_and_stores(const struct sock_filter *filter, int flen) in check_load_and_stores() argument 692 switch (filter[pc].code) { in check_load_and_stores() 695 memvalid |= (1 << filter[pc].k); in check_load_and_stores() 699 if (!(memvalid & (1 << filter[pc].k))) { in check_load_and_stores() 706 masks[pc + 1 + filter[pc].k] &= memvalid; in check_load_and_stores() 718 masks[pc + 1 + filter[pc].jt] &= memvalid; in check_load_and_stores() [all …]
|
D | ptp_classifier.c | 189 .len = ARRAY_SIZE(ptp_filter), .filter = ptp_filter, in ptp_classifier_init()
|
D | Makefile | 12 neighbour.o rtnetlink.o utils.o link_watch.o filter.o \
|
/net/smc/ |
D | smc_wr.h | 96 smc_wr_tx_filter filter, unsigned long data); 98 smc_wr_tx_filter filter,
|
D | smc_wr.c | 306 smc_wr_tx_filter filter, in smc_wr_tx_dismiss_slots() argument 319 if (filter(tx_pend, data)) in smc_wr_tx_dismiss_slots() 325 smc_wr_tx_filter filter, unsigned long data) in smc_wr_tx_has_pending() argument 336 if (filter(tx_pend, data)) in smc_wr_tx_has_pending()
|
/net/ipv6/ |
D | raw.c | 125 const __u32 *data = &raw6_sk(sk)->filter.data[0]; in icmpv6_filter() 138 int rawv6_mh_filter_register(mh_filter_t filter) in rawv6_mh_filter_register() argument 140 rcu_assign_pointer(mh_filter, filter); in rawv6_mh_filter_register() 145 int rawv6_mh_filter_unregister(mh_filter_t filter) in rawv6_mh_filter_unregister() argument 204 mh_filter_t *filter; in ipv6_raw_deliver() local 206 filter = rcu_dereference(mh_filter); in ipv6_raw_deliver() 207 filtered = filter ? (*filter)(sk, skb) : 0; in ipv6_raw_deliver() 984 if (copy_from_user(&raw6_sk(sk)->filter, optval, optlen)) in rawv6_seticmpfilter() 1009 if (copy_to_user(optval, &raw6_sk(sk)->filter, len)) in rawv6_geticmpfilter()
|
/net/xfrm/ |
D | xfrm_state.c | 1824 struct xfrm_address_filter *filter) in __xfrm_state_filter_match() argument 1826 if (filter) { in __xfrm_state_filter_match() 1827 if ((filter->family == AF_INET || in __xfrm_state_filter_match() 1828 filter->family == AF_INET6) && in __xfrm_state_filter_match() 1829 x->props.family != filter->family) in __xfrm_state_filter_match() 1832 return addr_match(&x->props.saddr, &filter->saddr, in __xfrm_state_filter_match() 1833 filter->splen) && in __xfrm_state_filter_match() 1834 addr_match(&x->id.daddr, &filter->daddr, in __xfrm_state_filter_match() 1835 filter->dplen); in __xfrm_state_filter_match() 1862 if (!__xfrm_state_filter_match(state, walk->filter)) in xfrm_state_walk() [all …]
|
/net/ipv4/ |
D | raw.c | 159 __u32 data = raw_sk(sk)->filter.data; in icmp_filter() 807 memset(&rp->filter, 0, sizeof(rp->filter)); in raw_init() 815 if (copy_from_user(&raw_sk(sk)->filter, optval, optlen)) in raw_seticmpfilter() 833 copy_to_user(optval, &raw_sk(sk)->filter, len)) in raw_geticmpfilter()
|
/net/ipv4/netfilter/ |
D | Kconfig | 214 tristate '"rpfilter" reverse path filter match support' 233 # `filter', generic and specific targets 238 Packet filtering defines a table `filter', which has a series of 408 ARP packet filtering defines a table `filter', which has a series of
|