/net/openvswitch/ |
D | flow_netlink.c | 62 static void update_range(struct sw_flow_match *match, in update_range() argument 70 range = &match->range; in update_range() 72 range = &match->mask->range; in update_range() 87 #define SW_FLOW_KEY_PUT(match, field, value, is_mask) \ argument 89 update_range(match, offsetof(struct sw_flow_key, field), \ 90 sizeof((match)->key->field), is_mask); \ 92 (match)->mask->key.field = value; \ 94 (match)->key->field = value; \ 97 #define SW_FLOW_KEY_MEMCPY_OFFSET(match, offset, value_p, len, is_mask) \ argument 99 update_range(match, offset, len, is_mask); \ [all …]
|
D | flow_table.c | 461 const struct sw_flow_match *match) in ovs_flow_cmp_unmasked_key() argument 463 struct sw_flow_key *key = match->key; in ovs_flow_cmp_unmasked_key() 465 int key_end = match->range.end; in ovs_flow_cmp_unmasked_key() 518 const struct sw_flow_match *match) in ovs_flow_tbl_lookup_exact() argument 526 flow = masked_flow_lookup(ti, match->key, mask); in ovs_flow_tbl_lookup_exact() 528 ovs_flow_cmp_unmasked_key(flow, match)) in ovs_flow_tbl_lookup_exact() 548 bool ovs_flow_cmp(const struct sw_flow *flow, const struct sw_flow_match *match) in ovs_flow_cmp() argument 551 return flow_cmp_masked_key(flow, match->key, &match->range); in ovs_flow_cmp() 553 return ovs_flow_cmp_unmasked_key(flow, match); in ovs_flow_cmp()
|
/net/netfilter/ |
D | xt_ipvs.c | 57 bool match = true; in ipvs_mt() local 60 match = skb->ipvs_property ^ in ipvs_mt() 67 match = false; in ipvs_mt() 76 match = false; in ipvs_mt() 82 match = false; in ipvs_mt() 91 match = false; in ipvs_mt() 103 match = false; in ipvs_mt() 111 match = false; in ipvs_mt() 120 match = false; in ipvs_mt() 126 match = false; in ipvs_mt() [all …]
|
D | x_tables.c | 50 struct list_head match; member 121 int xt_register_match(struct xt_match *match) in xt_register_match() argument 123 u_int8_t af = match->family; in xt_register_match() 126 list_add(&match->list, &xt[af].match); in xt_register_match() 133 xt_unregister_match(struct xt_match *match) in xt_unregister_match() argument 135 u_int8_t af = match->family; in xt_unregister_match() 138 list_del(&match->list); in xt_unregister_match() 144 xt_register_matches(struct xt_match *match, unsigned int n) in xt_register_matches() argument 150 err = xt_register_match(&match[i]); in xt_register_matches() 158 xt_unregister_matches(match, i); in xt_register_matches() [all …]
|
D | nft_compat.c | 312 struct xt_match *match = expr->ops->data; in nft_match_eval() local 316 nft_compat_set_par((struct xt_action_param *)&pkt->xt, match, info); in nft_match_eval() 318 ret = match->match(skb, (struct xt_action_param *)&pkt->xt); in nft_match_eval() 344 struct xt_match *match, void *info, in nft_match_set_mtchk_param() argument 369 par->match = match; in nft_match_set_mtchk_param() 399 struct xt_match *match = expr->ops->data; in nft_match_init() local 407 ret = nft_compat_chain_validate_dependency(match->table, ctx->chain); in nft_match_init() 411 match_compat_from_user(match, nla_data(tb[NFTA_MATCH_INFO]), info); in nft_match_init() 419 nft_match_set_mtchk_param(&par, ctx, match, info, &e, proto, inv); in nft_match_init() 427 module_put(match->me); in nft_match_init() [all …]
|
D | Kconfig | 53 filtering (see `Connection state match support' below). 67 `CONNMARK' target and `connmark' match. Similar to the mark value 142 to connection tracking entries. It selected by the connlabel match. 468 This option adds the "exthdr" expression that you can use to match 474 This option adds the "meta" expression that you can use to match and 481 This option adds the "meta" expression that you can use to match 563 x_tables match/target extensions over the nf_tables 580 tristate 'nfmark target and match support' 583 This option adds the "MARK" target and "mark" match. 585 Netfilter mark matching allows you to match packets based on the [all …]
|
D | xt_owner.c | 26 if ((info->match & (XT_OWNER_UID|XT_OWNER_GID)) && in owner_check() 40 return (info->match ^ info->invert) == 0; in owner_mt() 41 else if (info->match & info->invert & XT_OWNER_SOCKET) in owner_mt() 50 return ((info->match ^ info->invert) & in owner_mt() 53 if (info->match & XT_OWNER_UID) { in owner_mt() 62 if (info->match & XT_OWNER_GID) { in owner_mt() 79 .match = owner_mt,
|
D | xt_tcpudp.c | 171 .match = tcp_mt, 180 .match = tcp_mt, 189 .match = udp_mt, 198 .match = udp_mt, 207 .match = udp_mt, 216 .match = udp_mt,
|
D | xt_dscp.c | 74 .match = dscp_mt, 82 .match = dscp_mt6, 90 .match = tos_mt, 98 .match = tos_mt,
|
D | xt_policy.c | 41 #define MATCH_ADDR(x,y,z) (!e->match.x || \ in match_xfrm_state() 44 #define MATCH(x,y) (!e->match.x || ((e->x == (y)) ^ e->invert.x)) in match_xfrm_state() 161 .match = policy_mt, 169 .match = policy_mt,
|
D | xt_socket.c | 476 .match = socket_mt4_v0, 485 .match = socket_mt4_v1_v2_v3, 497 .match = socket_mt6_v1_v2_v3, 509 .match = socket_mt4_v1_v2_v3, 521 .match = socket_mt6_v1_v2_v3, 533 .match = socket_mt4_v1_v2_v3, 545 .match = socket_mt6_v1_v2_v3,
|
D | xt_length.c | 46 .match = length_mt, 53 .match = length_mt6,
|
D | xt_set.c | 559 .match = set_match_v0, 569 .match = set_match_v1, 579 .match = set_match_v1, 590 .match = set_match_v1, 600 .match = set_match_v1, 611 .match = set_match_v3, 621 .match = set_match_v3, 632 .match = set_match_v4, 642 .match = set_match_v4,
|
D | xt_hl.c | 71 .match = ttl_mt, 79 .match = hl_mt6,
|
D | xt_ipcomp.c | 83 .match = comp_mt, 92 .match = comp_mt,
|
D | xt_conntrack.c | 222 if (par->match->revision != 3) { in conntrack_mt() 294 .match = conntrack_mt_v1, 304 .match = conntrack_mt_v2, 314 .match = conntrack_mt_v3,
|
D | xt_esp.c | 80 .match = esp_mt, 89 .match = esp_mt,
|
/net/bridge/netfilter/ |
D | Kconfig | 81 This option adds the among match, which allows matching the MAC source 90 This option adds the ARP match, which allows ARP and RARP header field 98 This option adds the IP match, which allows basic IP header field 107 This option adds the IP6 match, which allows basic IPV6 header field 113 tristate "ebt: limit match support" 115 This option adds the limit match, which allows you to control 116 the rate at which a rule can be matched. This match is the 117 equivalent of the iptables limit match. 125 This option adds the mark match, which allows matching frames based on 127 This value is the same as the one used in the iptables mark match and [all …]
|
D | ebtables.c | 103 par->match = m->u.match; in ebt_do_match() 105 return m->u.match->match(skb, par) ? EBT_MATCH : EBT_NOMATCH; in ebt_do_match() 365 struct xt_match *match; in ebt_check_match() local 373 match = xt_request_find_match(NFPROTO_BRIDGE, m->u.name, 0); in ebt_check_match() 374 if (IS_ERR(match)) in ebt_check_match() 375 return PTR_ERR(match); in ebt_check_match() 376 m->u.match = match; in ebt_check_match() 378 par->match = match; in ebt_check_match() 383 module_put(match->me); in ebt_check_match() 604 par.match = m->u.match; in ebt_cleanup_match() [all …]
|
/net/wireless/ |
D | wext-spy.c | 198 int match = -1; in wireless_spy_update() local 209 match = i; in wireless_spy_update() 216 if (match >= 0) { in wireless_spy_update() 217 if (spydata->spy_thr_under[match]) { in wireless_spy_update() 219 spydata->spy_thr_under[match] = 0; in wireless_spy_update() 225 spydata->spy_thr_under[match] = 1; in wireless_spy_update()
|
/net/sched/ |
D | em_canid.c | 101 int match = 0; in em_canid_match() local 111 match = 1; in em_canid_match() 117 match = (test_bit(can_id, cm->match_sff) ? 1 : 0); in em_canid_match() 120 return match; in em_canid_match() 211 .match = em_canid_match,
|
/net/ipv6/netfilter/ |
D | Kconfig | 140 tristate '"ah" match support' 143 This module allows one to match AH packets. 158 tristate '"frag" Fragmentation header match support' 161 frag matching allows you to match packets based on the fragmentation 167 tristate '"hbh" hop-by-hop and "dst" opts header match support' 170 This allows one to match packets based on the hop-by-hop 176 tristate '"hl" hoplimit match support' 188 This module allows one to match packets based upon 194 tristate '"mh" match support' 197 This module allows one to match MH packets. [all …]
|
D | ip6_tables.c | 391 acpar.match = ematch->u.kernel.match; in ip6t_do_table() 393 if (!acpar.match->match(skb, &acpar)) in ip6t_do_table() 589 par.match = m->u.kernel.match; in cleanup_match() 592 if (par.match->destroy != NULL) in cleanup_match() 593 par.match->destroy(&par); in cleanup_match() 594 module_put(par.match->me); in cleanup_match() 602 par->match = m->u.kernel.match; in check_match() 609 par.match->name); in check_match() 618 struct xt_match *match; in find_check_match() local 621 match = xt_request_find_match(NFPROTO_IPV6, m->u.user.name, in find_check_match() [all …]
|
D | ip6t_hbh.c | 64 (par->match == &hbh_mt6_reg[0]) ? in hbh_mt6() 189 .match = hbh_mt6, 197 .match = hbh_mt6,
|
/net/ipv4/netfilter/ |
D | ip_tables.c | 367 acpar.match = ematch->u.kernel.match; in ipt_do_table() 369 if (!acpar.match->match(skb, &acpar)) in ipt_do_table() 576 par.match = m->u.kernel.match; in cleanup_match() 579 if (par.match->destroy != NULL) in cleanup_match() 580 par.match->destroy(&par); in cleanup_match() 581 module_put(par.match->me); in cleanup_match() 590 par->match = m->u.kernel.match; in check_match() 596 duprintf("check failed for `%s'.\n", par->match->name); in check_match() 605 struct xt_match *match; in find_check_match() local 608 match = xt_request_find_match(NFPROTO_IPV4, m->u.user.name, in find_check_match() [all …]
|