Home
last modified time | relevance | path

Searched refs:match (Results 1 – 25 of 129) sorted by relevance

123456

/net/openvswitch/
Dflow_netlink.c62 static void update_range(struct sw_flow_match *match, in update_range() argument
70 range = &match->range; in update_range()
72 range = &match->mask->range; in update_range()
87 #define SW_FLOW_KEY_PUT(match, field, value, is_mask) \ argument
89 update_range(match, offsetof(struct sw_flow_key, field), \
90 sizeof((match)->key->field), is_mask); \
92 (match)->mask->key.field = value; \
94 (match)->key->field = value; \
97 #define SW_FLOW_KEY_MEMCPY_OFFSET(match, offset, value_p, len, is_mask) \ argument
99 update_range(match, offset, len, is_mask); \
[all …]
Dflow_table.c454 const struct sw_flow_match *match) in ovs_flow_cmp_unmasked_key() argument
456 struct sw_flow_key *key = match->key; in ovs_flow_cmp_unmasked_key()
458 int key_end = match->range.end; in ovs_flow_cmp_unmasked_key()
511 const struct sw_flow_match *match) in ovs_flow_tbl_lookup_exact() argument
519 flow = masked_flow_lookup(ti, match->key, mask); in ovs_flow_tbl_lookup_exact()
521 ovs_flow_cmp_unmasked_key(flow, match)) in ovs_flow_tbl_lookup_exact()
541 bool ovs_flow_cmp(const struct sw_flow *flow, const struct sw_flow_match *match) in ovs_flow_cmp() argument
544 return flow_cmp_masked_key(flow, match->key, &match->range); in ovs_flow_cmp()
546 return ovs_flow_cmp_unmasked_key(flow, match); in ovs_flow_cmp()
/net/netfilter/
Dxt_ipvs.c57 bool match = true; in ipvs_mt() local
60 match = skb->ipvs_property ^ in ipvs_mt()
67 match = false; in ipvs_mt()
76 match = false; in ipvs_mt()
82 match = false; in ipvs_mt()
91 match = false; in ipvs_mt()
103 match = false; in ipvs_mt()
111 match = false; in ipvs_mt()
120 match = false; in ipvs_mt()
126 match = false; in ipvs_mt()
[all …]
Dx_tables.c51 struct list_head match; member
122 int xt_register_match(struct xt_match *match) in xt_register_match() argument
124 u_int8_t af = match->family; in xt_register_match()
127 list_add(&match->list, &xt[af].match); in xt_register_match()
134 xt_unregister_match(struct xt_match *match) in xt_unregister_match() argument
136 u_int8_t af = match->family; in xt_unregister_match()
139 list_del(&match->list); in xt_unregister_match()
145 xt_register_matches(struct xt_match *match, unsigned int n) in xt_register_matches() argument
151 err = xt_register_match(&match[i]); in xt_register_matches()
159 xt_unregister_matches(match, i); in xt_register_matches()
[all …]
Dnft_compat.c327 struct xt_match *match = expr->ops->data; in nft_match_eval() local
331 nft_compat_set_par((struct xt_action_param *)&pkt->xt, match, info); in nft_match_eval()
333 ret = match->match(skb, (struct xt_action_param *)&pkt->xt); in nft_match_eval()
359 struct xt_match *match, void *info, in nft_match_set_mtchk_param() argument
384 par->match = match; in nft_match_set_mtchk_param()
414 struct xt_match *match = expr->ops->data; in nft_match_init() local
422 ret = nft_compat_chain_validate_dependency(match->table, ctx->chain); in nft_match_init()
426 match_compat_from_user(match, nla_data(tb[NFTA_MATCH_INFO]), info); in nft_match_init()
434 nft_match_set_mtchk_param(&par, ctx, match, info, &e, proto, inv); in nft_match_init()
442 module_put(match->me); in nft_match_init()
[all …]
DKconfig53 filtering (see `Connection state match support' below).
67 `CONNMARK' target and `connmark' match. Similar to the mark value
142 to connection tracking entries. It selected by the connlabel match.
468 This option adds the "exthdr" expression that you can use to match
474 This option adds the "meta" expression that you can use to match and
487 This option adds the "meta" expression that you can use to match
554 This option adds the "quota" expression that you can use to match
575 x_tables match/target extensions over the nf_tables
620 tristate 'nfmark target and match support'
623 This option adds the "MARK" target and "mark" match.
[all …]
Dxt_owner.c29 if ((info->match & (XT_OWNER_UID|XT_OWNER_GID)) && in owner_check()
34 if (info->match & XT_OWNER_UID) { in owner_check()
46 if (info->match & XT_OWNER_GID) { in owner_check()
69 return (info->match ^ info->invert) == 0; in owner_mt()
70 else if (info->match & info->invert & XT_OWNER_SOCKET) in owner_mt()
79 return ((info->match ^ info->invert) & in owner_mt()
82 if (info->match & XT_OWNER_UID) { in owner_mt()
91 if (info->match & XT_OWNER_GID) { in owner_mt()
108 .match = owner_mt,
Dxt_tcpudp.c168 .match = tcp_mt,
177 .match = tcp_mt,
186 .match = udp_mt,
195 .match = udp_mt,
204 .match = udp_mt,
213 .match = udp_mt,
Dxt_dscp.c74 .match = dscp_mt,
82 .match = dscp_mt6,
90 .match = tos_mt,
98 .match = tos_mt,
Dxt_policy.c41 #define MATCH_ADDR(x,y,z) (!e->match.x || \ in match_xfrm_state()
44 #define MATCH(x,y) (!e->match.x || ((e->x == (y)) ^ e->invert.x)) in match_xfrm_state()
161 .match = policy_mt,
169 .match = policy_mt,
Dxt_socket.c490 .match = socket_mt4_v0,
499 .match = socket_mt4_v1_v2_v3,
511 .match = socket_mt6_v1_v2_v3,
523 .match = socket_mt4_v1_v2_v3,
535 .match = socket_mt6_v1_v2_v3,
547 .match = socket_mt4_v1_v2_v3,
559 .match = socket_mt6_v1_v2_v3,
Dxt_length.c46 .match = length_mt,
53 .match = length_mt6,
Dxt_set.c559 .match = set_match_v0,
569 .match = set_match_v1,
579 .match = set_match_v1,
590 .match = set_match_v1,
600 .match = set_match_v1,
611 .match = set_match_v3,
621 .match = set_match_v3,
632 .match = set_match_v4,
642 .match = set_match_v4,
Dxt_hl.c71 .match = ttl_mt,
79 .match = hl_mt6,
Dxt_conntrack.c222 if (par->match->revision != 3) { in conntrack_mt()
292 .match = conntrack_mt_v1,
302 .match = conntrack_mt_v2,
312 .match = conntrack_mt_v3,
Dxt_ipcomp.c85 .match = comp_mt,
94 .match = comp_mt,
Dxt_esp.c80 .match = esp_mt,
89 .match = esp_mt,
/net/bridge/netfilter/
DKconfig81 This option adds the among match, which allows matching the MAC source
90 This option adds the ARP match, which allows ARP and RARP header field
98 This option adds the IP match, which allows basic IP header field
107 This option adds the IP6 match, which allows basic IPV6 header field
113 tristate "ebt: limit match support"
115 This option adds the limit match, which allows you to control
116 the rate at which a rule can be matched. This match is the
117 equivalent of the iptables limit match.
125 This option adds the mark match, which allows matching frames based on
127 This value is the same as the one used in the iptables mark match and
[all …]
Debtables.c102 par->match = m->u.match; in ebt_do_match()
104 return m->u.match->match(skb, par) ? EBT_MATCH : EBT_NOMATCH; in ebt_do_match()
361 struct xt_match *match; in ebt_check_match() local
369 match = xt_find_match(NFPROTO_BRIDGE, m->u.name, 0); in ebt_check_match()
370 if (IS_ERR(match) || match->family != NFPROTO_BRIDGE) { in ebt_check_match()
371 if (!IS_ERR(match)) in ebt_check_match()
372 module_put(match->me); in ebt_check_match()
374 match = xt_find_match(NFPROTO_BRIDGE, m->u.name, 0); in ebt_check_match()
376 if (IS_ERR(match)) in ebt_check_match()
377 return PTR_ERR(match); in ebt_check_match()
[all …]
/net/wireless/
Dwext-spy.c198 int match = -1; in wireless_spy_update() local
209 match = i; in wireless_spy_update()
216 if (match >= 0) { in wireless_spy_update()
217 if (spydata->spy_thr_under[match]) { in wireless_spy_update()
219 spydata->spy_thr_under[match] = 0; in wireless_spy_update()
225 spydata->spy_thr_under[match] = 1; in wireless_spy_update()
/net/sched/
Dem_canid.c101 int match = 0; in em_canid_match() local
111 match = 1; in em_canid_match()
117 match = (test_bit(can_id, cm->match_sff) ? 1 : 0); in em_canid_match()
120 return match; in em_canid_match()
211 .match = em_canid_match,
/net/ipv6/netfilter/
DKconfig140 tristate '"ah" match support'
143 This module allows one to match AH packets.
158 tristate '"frag" Fragmentation header match support'
161 frag matching allows you to match packets based on the fragmentation
167 tristate '"hbh" hop-by-hop and "dst" opts header match support'
170 This allows one to match packets based on the hop-by-hop
176 tristate '"hl" hoplimit match support'
188 This module allows one to match packets based upon
194 tristate '"mh" match support'
197 This module allows one to match MH packets.
[all …]
Dip6_tables.c341 acpar.match = ematch->u.kernel.match; in ip6t_do_table()
343 if (!acpar.match->match(skb, &acpar)) in ip6t_do_table()
510 par.match = m->u.kernel.match; in cleanup_match()
513 if (par.match->destroy != NULL) in cleanup_match()
514 par.match->destroy(&par); in cleanup_match()
515 module_put(par.match->me); in cleanup_match()
522 par->match = m->u.kernel.match; in check_match()
532 struct xt_match *match; in find_check_match() local
535 match = xt_request_find_match(NFPROTO_IPV6, m->u.user.name, in find_check_match()
537 if (IS_ERR(match)) in find_check_match()
[all …]
Dip6t_hbh.c64 (par->match == &hbh_mt6_reg[0]) ? in hbh_mt6()
189 .match = hbh_mt6,
197 .match = hbh_mt6,
/net/ipv4/netfilter/
Dip_tables.c309 acpar.match = ematch->u.kernel.match; in ipt_do_table()
311 if (!acpar.match->match(skb, &acpar)) in ipt_do_table()
482 par.match = m->u.kernel.match; in cleanup_match()
485 if (par.match->destroy != NULL) in cleanup_match()
486 par.match->destroy(&par); in cleanup_match()
487 module_put(par.match->me); in cleanup_match()
495 par->match = m->u.kernel.match; in check_match()
505 struct xt_match *match; in find_check_match() local
508 match = xt_request_find_match(NFPROTO_IPV4, m->u.user.name, in find_check_match()
510 if (IS_ERR(match)) in find_check_match()
[all …]

123456