Home
last modified time | relevance | path

Searched refs:match (Results 1 – 25 of 121) sorted by relevance

12345

/net/openvswitch/
Dflow_netlink.c62 static void update_range(struct sw_flow_match *match, in update_range() argument
70 range = &match->range; in update_range()
72 range = &match->mask->range; in update_range()
87 #define SW_FLOW_KEY_PUT(match, field, value, is_mask) \ argument
89 update_range(match, offsetof(struct sw_flow_key, field), \
90 sizeof((match)->key->field), is_mask); \
92 (match)->mask->key.field = value; \
94 (match)->key->field = value; \
97 #define SW_FLOW_KEY_MEMCPY_OFFSET(match, offset, value_p, len, is_mask) \ argument
99 update_range(match, offset, len, is_mask); \
[all …]
Dflow_table.c461 const struct sw_flow_match *match) in ovs_flow_cmp_unmasked_key() argument
463 struct sw_flow_key *key = match->key; in ovs_flow_cmp_unmasked_key()
465 int key_end = match->range.end; in ovs_flow_cmp_unmasked_key()
518 const struct sw_flow_match *match) in ovs_flow_tbl_lookup_exact() argument
526 flow = masked_flow_lookup(ti, match->key, mask); in ovs_flow_tbl_lookup_exact()
528 ovs_flow_cmp_unmasked_key(flow, match)) in ovs_flow_tbl_lookup_exact()
548 bool ovs_flow_cmp(const struct sw_flow *flow, const struct sw_flow_match *match) in ovs_flow_cmp() argument
551 return flow_cmp_masked_key(flow, match->key, &match->range); in ovs_flow_cmp()
553 return ovs_flow_cmp_unmasked_key(flow, match); in ovs_flow_cmp()
/net/netfilter/
Dxt_ipvs.c57 bool match = true; in ipvs_mt() local
60 match = skb->ipvs_property ^ in ipvs_mt()
67 match = false; in ipvs_mt()
76 match = false; in ipvs_mt()
82 match = false; in ipvs_mt()
91 match = false; in ipvs_mt()
103 match = false; in ipvs_mt()
111 match = false; in ipvs_mt()
120 match = false; in ipvs_mt()
126 match = false; in ipvs_mt()
[all …]
Dx_tables.c50 struct list_head match; member
121 int xt_register_match(struct xt_match *match) in xt_register_match() argument
123 u_int8_t af = match->family; in xt_register_match()
126 list_add(&match->list, &xt[af].match); in xt_register_match()
133 xt_unregister_match(struct xt_match *match) in xt_unregister_match() argument
135 u_int8_t af = match->family; in xt_unregister_match()
138 list_del(&match->list); in xt_unregister_match()
144 xt_register_matches(struct xt_match *match, unsigned int n) in xt_register_matches() argument
150 err = xt_register_match(&match[i]); in xt_register_matches()
158 xt_unregister_matches(match, i); in xt_register_matches()
[all …]
Dnft_compat.c312 struct xt_match *match = expr->ops->data; in nft_match_eval() local
316 nft_compat_set_par((struct xt_action_param *)&pkt->xt, match, info); in nft_match_eval()
318 ret = match->match(skb, (struct xt_action_param *)&pkt->xt); in nft_match_eval()
344 struct xt_match *match, void *info, in nft_match_set_mtchk_param() argument
369 par->match = match; in nft_match_set_mtchk_param()
399 struct xt_match *match = expr->ops->data; in nft_match_init() local
407 ret = nft_compat_chain_validate_dependency(match->table, ctx->chain); in nft_match_init()
411 match_compat_from_user(match, nla_data(tb[NFTA_MATCH_INFO]), info); in nft_match_init()
419 nft_match_set_mtchk_param(&par, ctx, match, info, &e, proto, inv); in nft_match_init()
427 module_put(match->me); in nft_match_init()
[all …]
DKconfig53 filtering (see `Connection state match support' below).
67 `CONNMARK' target and `connmark' match. Similar to the mark value
142 to connection tracking entries. It selected by the connlabel match.
468 This option adds the "exthdr" expression that you can use to match
474 This option adds the "meta" expression that you can use to match and
481 This option adds the "meta" expression that you can use to match
563 x_tables match/target extensions over the nf_tables
580 tristate 'nfmark target and match support'
583 This option adds the "MARK" target and "mark" match.
585 Netfilter mark matching allows you to match packets based on the
[all …]
Dxt_owner.c26 if ((info->match & (XT_OWNER_UID|XT_OWNER_GID)) && in owner_check()
40 return (info->match ^ info->invert) == 0; in owner_mt()
41 else if (info->match & info->invert & XT_OWNER_SOCKET) in owner_mt()
50 return ((info->match ^ info->invert) & in owner_mt()
53 if (info->match & XT_OWNER_UID) { in owner_mt()
62 if (info->match & XT_OWNER_GID) { in owner_mt()
79 .match = owner_mt,
Dxt_tcpudp.c171 .match = tcp_mt,
180 .match = tcp_mt,
189 .match = udp_mt,
198 .match = udp_mt,
207 .match = udp_mt,
216 .match = udp_mt,
Dxt_dscp.c74 .match = dscp_mt,
82 .match = dscp_mt6,
90 .match = tos_mt,
98 .match = tos_mt,
Dxt_policy.c41 #define MATCH_ADDR(x,y,z) (!e->match.x || \ in match_xfrm_state()
44 #define MATCH(x,y) (!e->match.x || ((e->x == (y)) ^ e->invert.x)) in match_xfrm_state()
161 .match = policy_mt,
169 .match = policy_mt,
Dxt_socket.c476 .match = socket_mt4_v0,
485 .match = socket_mt4_v1_v2_v3,
497 .match = socket_mt6_v1_v2_v3,
509 .match = socket_mt4_v1_v2_v3,
521 .match = socket_mt6_v1_v2_v3,
533 .match = socket_mt4_v1_v2_v3,
545 .match = socket_mt6_v1_v2_v3,
Dxt_length.c46 .match = length_mt,
53 .match = length_mt6,
Dxt_set.c559 .match = set_match_v0,
569 .match = set_match_v1,
579 .match = set_match_v1,
590 .match = set_match_v1,
600 .match = set_match_v1,
611 .match = set_match_v3,
621 .match = set_match_v3,
632 .match = set_match_v4,
642 .match = set_match_v4,
Dxt_hl.c71 .match = ttl_mt,
79 .match = hl_mt6,
Dxt_ipcomp.c83 .match = comp_mt,
92 .match = comp_mt,
Dxt_conntrack.c222 if (par->match->revision != 3) { in conntrack_mt()
294 .match = conntrack_mt_v1,
304 .match = conntrack_mt_v2,
314 .match = conntrack_mt_v3,
Dxt_esp.c80 .match = esp_mt,
89 .match = esp_mt,
/net/bridge/netfilter/
DKconfig81 This option adds the among match, which allows matching the MAC source
90 This option adds the ARP match, which allows ARP and RARP header field
98 This option adds the IP match, which allows basic IP header field
107 This option adds the IP6 match, which allows basic IPV6 header field
113 tristate "ebt: limit match support"
115 This option adds the limit match, which allows you to control
116 the rate at which a rule can be matched. This match is the
117 equivalent of the iptables limit match.
125 This option adds the mark match, which allows matching frames based on
127 This value is the same as the one used in the iptables mark match and
[all …]
Debtables.c103 par->match = m->u.match; in ebt_do_match()
105 return m->u.match->match(skb, par) ? EBT_MATCH : EBT_NOMATCH; in ebt_do_match()
365 struct xt_match *match; in ebt_check_match() local
373 match = xt_request_find_match(NFPROTO_BRIDGE, m->u.name, 0); in ebt_check_match()
374 if (IS_ERR(match)) in ebt_check_match()
375 return PTR_ERR(match); in ebt_check_match()
376 m->u.match = match; in ebt_check_match()
378 par->match = match; in ebt_check_match()
383 module_put(match->me); in ebt_check_match()
604 par.match = m->u.match; in ebt_cleanup_match()
[all …]
/net/wireless/
Dwext-spy.c198 int match = -1; in wireless_spy_update() local
209 match = i; in wireless_spy_update()
216 if (match >= 0) { in wireless_spy_update()
217 if (spydata->spy_thr_under[match]) { in wireless_spy_update()
219 spydata->spy_thr_under[match] = 0; in wireless_spy_update()
225 spydata->spy_thr_under[match] = 1; in wireless_spy_update()
/net/sched/
Dem_canid.c101 int match = 0; in em_canid_match() local
111 match = 1; in em_canid_match()
117 match = (test_bit(can_id, cm->match_sff) ? 1 : 0); in em_canid_match()
120 return match; in em_canid_match()
211 .match = em_canid_match,
/net/ipv6/netfilter/
DKconfig140 tristate '"ah" match support'
143 This module allows one to match AH packets.
158 tristate '"frag" Fragmentation header match support'
161 frag matching allows you to match packets based on the fragmentation
167 tristate '"hbh" hop-by-hop and "dst" opts header match support'
170 This allows one to match packets based on the hop-by-hop
176 tristate '"hl" hoplimit match support'
188 This module allows one to match packets based upon
194 tristate '"mh" match support'
197 This module allows one to match MH packets.
[all …]
Dip6_tables.c391 acpar.match = ematch->u.kernel.match; in ip6t_do_table()
393 if (!acpar.match->match(skb, &acpar)) in ip6t_do_table()
589 par.match = m->u.kernel.match; in cleanup_match()
592 if (par.match->destroy != NULL) in cleanup_match()
593 par.match->destroy(&par); in cleanup_match()
594 module_put(par.match->me); in cleanup_match()
602 par->match = m->u.kernel.match; in check_match()
609 par.match->name); in check_match()
618 struct xt_match *match; in find_check_match() local
621 match = xt_request_find_match(NFPROTO_IPV6, m->u.user.name, in find_check_match()
[all …]
Dip6t_hbh.c64 (par->match == &hbh_mt6_reg[0]) ? in hbh_mt6()
189 .match = hbh_mt6,
197 .match = hbh_mt6,
/net/ipv4/netfilter/
Dip_tables.c367 acpar.match = ematch->u.kernel.match; in ipt_do_table()
369 if (!acpar.match->match(skb, &acpar)) in ipt_do_table()
576 par.match = m->u.kernel.match; in cleanup_match()
579 if (par.match->destroy != NULL) in cleanup_match()
580 par.match->destroy(&par); in cleanup_match()
581 module_put(par.match->me); in cleanup_match()
590 par->match = m->u.kernel.match; in check_match()
596 duprintf("check failed for `%s'.\n", par->match->name); in check_match()
605 struct xt_match *match; in find_check_match() local
608 match = xt_request_find_match(NFPROTO_IPV4, m->u.user.name, in find_check_match()
[all …]

12345