/net/openvswitch/ |
D | flow_netlink.c | 62 static void update_range(struct sw_flow_match *match, in update_range() argument 70 range = &match->range; in update_range() 72 range = &match->mask->range; in update_range() 87 #define SW_FLOW_KEY_PUT(match, field, value, is_mask) \ argument 89 update_range(match, offsetof(struct sw_flow_key, field), \ 90 sizeof((match)->key->field), is_mask); \ 92 (match)->mask->key.field = value; \ 94 (match)->key->field = value; \ 97 #define SW_FLOW_KEY_MEMCPY_OFFSET(match, offset, value_p, len, is_mask) \ argument 99 update_range(match, offset, len, is_mask); \ [all …]
|
D | flow_table.c | 454 const struct sw_flow_match *match) in ovs_flow_cmp_unmasked_key() argument 456 struct sw_flow_key *key = match->key; in ovs_flow_cmp_unmasked_key() 458 int key_end = match->range.end; in ovs_flow_cmp_unmasked_key() 511 const struct sw_flow_match *match) in ovs_flow_tbl_lookup_exact() argument 519 flow = masked_flow_lookup(ti, match->key, mask); in ovs_flow_tbl_lookup_exact() 521 ovs_flow_cmp_unmasked_key(flow, match)) in ovs_flow_tbl_lookup_exact() 541 bool ovs_flow_cmp(const struct sw_flow *flow, const struct sw_flow_match *match) in ovs_flow_cmp() argument 544 return flow_cmp_masked_key(flow, match->key, &match->range); in ovs_flow_cmp() 546 return ovs_flow_cmp_unmasked_key(flow, match); in ovs_flow_cmp()
|
/net/netfilter/ |
D | xt_ipvs.c | 57 bool match = true; in ipvs_mt() local 60 match = skb->ipvs_property ^ in ipvs_mt() 67 match = false; in ipvs_mt() 76 match = false; in ipvs_mt() 82 match = false; in ipvs_mt() 91 match = false; in ipvs_mt() 103 match = false; in ipvs_mt() 111 match = false; in ipvs_mt() 120 match = false; in ipvs_mt() 126 match = false; in ipvs_mt() [all …]
|
D | x_tables.c | 51 struct list_head match; member 122 int xt_register_match(struct xt_match *match) in xt_register_match() argument 124 u_int8_t af = match->family; in xt_register_match() 127 list_add(&match->list, &xt[af].match); in xt_register_match() 134 xt_unregister_match(struct xt_match *match) in xt_unregister_match() argument 136 u_int8_t af = match->family; in xt_unregister_match() 139 list_del(&match->list); in xt_unregister_match() 145 xt_register_matches(struct xt_match *match, unsigned int n) in xt_register_matches() argument 151 err = xt_register_match(&match[i]); in xt_register_matches() 159 xt_unregister_matches(match, i); in xt_register_matches() [all …]
|
D | nft_compat.c | 327 struct xt_match *match = expr->ops->data; in nft_match_eval() local 331 nft_compat_set_par((struct xt_action_param *)&pkt->xt, match, info); in nft_match_eval() 333 ret = match->match(skb, (struct xt_action_param *)&pkt->xt); in nft_match_eval() 359 struct xt_match *match, void *info, in nft_match_set_mtchk_param() argument 384 par->match = match; in nft_match_set_mtchk_param() 414 struct xt_match *match = expr->ops->data; in nft_match_init() local 422 ret = nft_compat_chain_validate_dependency(match->table, ctx->chain); in nft_match_init() 426 match_compat_from_user(match, nla_data(tb[NFTA_MATCH_INFO]), info); in nft_match_init() 434 nft_match_set_mtchk_param(&par, ctx, match, info, &e, proto, inv); in nft_match_init() 442 module_put(match->me); in nft_match_init() [all …]
|
D | Kconfig | 53 filtering (see `Connection state match support' below). 67 `CONNMARK' target and `connmark' match. Similar to the mark value 142 to connection tracking entries. It selected by the connlabel match. 468 This option adds the "exthdr" expression that you can use to match 474 This option adds the "meta" expression that you can use to match and 487 This option adds the "meta" expression that you can use to match 554 This option adds the "quota" expression that you can use to match 575 x_tables match/target extensions over the nf_tables 620 tristate 'nfmark target and match support' 623 This option adds the "MARK" target and "mark" match. [all …]
|
D | xt_owner.c | 29 if ((info->match & (XT_OWNER_UID|XT_OWNER_GID)) && in owner_check() 34 if (info->match & XT_OWNER_UID) { in owner_check() 46 if (info->match & XT_OWNER_GID) { in owner_check() 69 return (info->match ^ info->invert) == 0; in owner_mt() 70 else if (info->match & info->invert & XT_OWNER_SOCKET) in owner_mt() 79 return ((info->match ^ info->invert) & in owner_mt() 82 if (info->match & XT_OWNER_UID) { in owner_mt() 91 if (info->match & XT_OWNER_GID) { in owner_mt() 108 .match = owner_mt,
|
D | xt_tcpudp.c | 168 .match = tcp_mt, 177 .match = tcp_mt, 186 .match = udp_mt, 195 .match = udp_mt, 204 .match = udp_mt, 213 .match = udp_mt,
|
D | xt_dscp.c | 74 .match = dscp_mt, 82 .match = dscp_mt6, 90 .match = tos_mt, 98 .match = tos_mt,
|
D | xt_policy.c | 41 #define MATCH_ADDR(x,y,z) (!e->match.x || \ in match_xfrm_state() 44 #define MATCH(x,y) (!e->match.x || ((e->x == (y)) ^ e->invert.x)) in match_xfrm_state() 161 .match = policy_mt, 169 .match = policy_mt,
|
D | xt_socket.c | 490 .match = socket_mt4_v0, 499 .match = socket_mt4_v1_v2_v3, 511 .match = socket_mt6_v1_v2_v3, 523 .match = socket_mt4_v1_v2_v3, 535 .match = socket_mt6_v1_v2_v3, 547 .match = socket_mt4_v1_v2_v3, 559 .match = socket_mt6_v1_v2_v3,
|
D | xt_length.c | 46 .match = length_mt, 53 .match = length_mt6,
|
D | xt_set.c | 559 .match = set_match_v0, 569 .match = set_match_v1, 579 .match = set_match_v1, 590 .match = set_match_v1, 600 .match = set_match_v1, 611 .match = set_match_v3, 621 .match = set_match_v3, 632 .match = set_match_v4, 642 .match = set_match_v4,
|
D | xt_hl.c | 71 .match = ttl_mt, 79 .match = hl_mt6,
|
D | xt_conntrack.c | 222 if (par->match->revision != 3) { in conntrack_mt() 292 .match = conntrack_mt_v1, 302 .match = conntrack_mt_v2, 312 .match = conntrack_mt_v3,
|
D | xt_ipcomp.c | 85 .match = comp_mt, 94 .match = comp_mt,
|
D | xt_esp.c | 80 .match = esp_mt, 89 .match = esp_mt,
|
/net/bridge/netfilter/ |
D | Kconfig | 81 This option adds the among match, which allows matching the MAC source 90 This option adds the ARP match, which allows ARP and RARP header field 98 This option adds the IP match, which allows basic IP header field 107 This option adds the IP6 match, which allows basic IPV6 header field 113 tristate "ebt: limit match support" 115 This option adds the limit match, which allows you to control 116 the rate at which a rule can be matched. This match is the 117 equivalent of the iptables limit match. 125 This option adds the mark match, which allows matching frames based on 127 This value is the same as the one used in the iptables mark match and [all …]
|
D | ebtables.c | 102 par->match = m->u.match; in ebt_do_match() 104 return m->u.match->match(skb, par) ? EBT_MATCH : EBT_NOMATCH; in ebt_do_match() 361 struct xt_match *match; in ebt_check_match() local 369 match = xt_find_match(NFPROTO_BRIDGE, m->u.name, 0); in ebt_check_match() 370 if (IS_ERR(match) || match->family != NFPROTO_BRIDGE) { in ebt_check_match() 371 if (!IS_ERR(match)) in ebt_check_match() 372 module_put(match->me); in ebt_check_match() 374 match = xt_find_match(NFPROTO_BRIDGE, m->u.name, 0); in ebt_check_match() 376 if (IS_ERR(match)) in ebt_check_match() 377 return PTR_ERR(match); in ebt_check_match() [all …]
|
/net/wireless/ |
D | wext-spy.c | 198 int match = -1; in wireless_spy_update() local 209 match = i; in wireless_spy_update() 216 if (match >= 0) { in wireless_spy_update() 217 if (spydata->spy_thr_under[match]) { in wireless_spy_update() 219 spydata->spy_thr_under[match] = 0; in wireless_spy_update() 225 spydata->spy_thr_under[match] = 1; in wireless_spy_update()
|
/net/sched/ |
D | em_canid.c | 101 int match = 0; in em_canid_match() local 111 match = 1; in em_canid_match() 117 match = (test_bit(can_id, cm->match_sff) ? 1 : 0); in em_canid_match() 120 return match; in em_canid_match() 211 .match = em_canid_match,
|
/net/ipv6/netfilter/ |
D | Kconfig | 140 tristate '"ah" match support' 143 This module allows one to match AH packets. 158 tristate '"frag" Fragmentation header match support' 161 frag matching allows you to match packets based on the fragmentation 167 tristate '"hbh" hop-by-hop and "dst" opts header match support' 170 This allows one to match packets based on the hop-by-hop 176 tristate '"hl" hoplimit match support' 188 This module allows one to match packets based upon 194 tristate '"mh" match support' 197 This module allows one to match MH packets. [all …]
|
D | ip6_tables.c | 341 acpar.match = ematch->u.kernel.match; in ip6t_do_table() 343 if (!acpar.match->match(skb, &acpar)) in ip6t_do_table() 510 par.match = m->u.kernel.match; in cleanup_match() 513 if (par.match->destroy != NULL) in cleanup_match() 514 par.match->destroy(&par); in cleanup_match() 515 module_put(par.match->me); in cleanup_match() 522 par->match = m->u.kernel.match; in check_match() 532 struct xt_match *match; in find_check_match() local 535 match = xt_request_find_match(NFPROTO_IPV6, m->u.user.name, in find_check_match() 537 if (IS_ERR(match)) in find_check_match() [all …]
|
D | ip6t_hbh.c | 64 (par->match == &hbh_mt6_reg[0]) ? in hbh_mt6() 189 .match = hbh_mt6, 197 .match = hbh_mt6,
|
/net/ipv4/netfilter/ |
D | ip_tables.c | 309 acpar.match = ematch->u.kernel.match; in ipt_do_table() 311 if (!acpar.match->match(skb, &acpar)) in ipt_do_table() 482 par.match = m->u.kernel.match; in cleanup_match() 485 if (par.match->destroy != NULL) in cleanup_match() 486 par.match->destroy(&par); in cleanup_match() 487 module_put(par.match->me); in cleanup_match() 495 par->match = m->u.kernel.match; in check_match() 505 struct xt_match *match; in find_check_match() local 508 match = xt_request_find_match(NFPROTO_IPV4, m->u.user.name, in find_check_match() 510 if (IS_ERR(match)) in find_check_match() [all …]
|