/net/tipc/ |
H A D | subscr.h | 50 * @filter: event filtering to be done for subscription 62 u32 filter; member in struct:tipc_subscription
|
/net/core/ |
H A D | sock_diag.c | 56 struct sk_filter *filter; local 67 filter = rcu_dereference(sk->sk_filter); 68 if (!filter) 71 fprog = filter->prog->orig_prog; 80 memcpy(nla_data(attr), fprog->filter, flen);
|
H A D | filter.c | 43 #include <linux/filter.h> 49 * sk_filter - run a packet through a socket filter 51 * @skb: buffer to filter 53 * Run the filter code and then cut skb->data to correct size returned by 63 struct sk_filter *filter; local 78 filter = rcu_dereference(sk->sk_filter); 79 if (filter) { 80 unsigned int pkt_len = SK_RUN_FILTER(filter, skb); 288 * bpf_convert_filter - convert filter program 289 * @prog: the user passed filter progra 574 check_load_and_stores(const struct sock_filter *filter, int flen) argument 707 bpf_check_classic(const struct sock_filter *filter, unsigned int flen) argument 1094 struct sk_filter *filter; local 1115 struct sk_filter *filter; local [all...] |
H A D | sock.c | 135 #include <linux/filter.h> 1387 struct sk_filter *filter; local 1392 filter = rcu_dereference_check(sk->sk_filter, 1394 if (filter) { 1395 sk_filter_uncharge(sk, filter); 1464 struct sk_filter *filter; local 1500 filter = rcu_dereference_protected(newsk->sk_filter, 1); 1501 if (filter != NULL) 1506 is_charged = sk_filter_charge(newsk, filter);
|
/net/netfilter/ |
H A D | nfnetlink_acct.c | 189 const struct nfacct_filter *filter = cb->data; local 207 if (filter && (cur->flags & filter->mask) != filter->value) 238 struct nfacct_filter *filter; local 246 filter = kzalloc(sizeof(struct nfacct_filter), GFP_KERNEL); 247 if (!filter) 250 filter->mask = ntohl(nla_get_be32(tb[NFACCT_FILTER_MASK])); 251 filter->value = ntohl(nla_get_be32(tb[NFACCT_FILTER_VALUE])); 253 return filter; 271 struct nfacct_filter *filter; local [all...] |
H A D | nf_conntrack_netlink.c | 772 const struct ctnetlink_dump_filter *filter = cb->data; local 802 if (filter && !((ct->mark & filter->mark.mask) == 803 filter->mark.val)) { 1081 struct ctnetlink_dump_filter *filter; local 1083 filter = kzalloc(sizeof(struct ctnetlink_dump_filter), 1085 if (filter == NULL) 1088 filter->mark.val = ntohl(nla_get_be32(cda[CTA_MARK])); 1089 filter->mark.mask = 1091 c.data = filter; [all...] |
/net/sched/ |
H A D | cls_bpf.c | 18 #include <linux/filter.h> 34 struct bpf_prog *filter; member in struct:cls_bpf_prog 60 int filter_res = BPF_PROG_RUN(prog->filter, skb); 97 bpf_prog_destroy(prog->filter); 203 tmp.filter = bpf_ops; 211 prog->filter = fp;
|
H A D | cls_route.c | 33 struct route4_filter *filter; member in struct:route4_fastmap 85 /* fastmap updates must look atomic to aling id, iff, filter */ 89 head->fastmap[h].filter = f; 153 (f = head->fastmap[h].filter) != NULL) { 333 /* Remove any fastmap lookups that might ref filter 334 * notice we unlink'd the filter so we can't get it
|
H A D | sch_fq_codel.c | 88 struct tcf_proto *filter; local 97 filter = rcu_dereference(q->filter_list); 98 if (!filter) 102 result = tc_classify(skb, filter, &res);
|
/net/can/ |
H A D | raw.c | 71 * the CAN frames matching that filter. If the filter list is empty, 73 * opening the socket, is to have one filter which receives all frames. 74 * The filter list is allocated dynamically with the exception of the 76 * storing the single filter in dfilter, to avoid using dynamic memory. 88 struct can_filter dfilter; /* default/single filter */ 89 struct can_filter *filter; /* pointer to filter(s) */ member in struct:raw_sock 159 struct can_filter *filter, int count) 165 err = can_rx_register(dev, filter[ 158 raw_enable_filters(struct net_device *dev, struct sock *sk, struct can_filter *filter, int count) argument 193 raw_disable_filters(struct net_device *dev, struct sock *sk, struct can_filter *filter, int count) argument 453 struct can_filter *filter = NULL; /* dyn. alloc'ed filters */ local [all...] |
H A D | gw.c | 123 struct can_filter filter; member in struct:can_can_gw 442 return can_rx_register(gwj->src.dev, gwj->ccgw.filter.can_id, 443 gwj->ccgw.filter.can_mask, can_can_gw_rcv, 449 can_rx_unregister(gwj->src.dev, gwj->ccgw.filter.can_id, 450 gwj->ccgw.filter.can_mask, can_can_gw_rcv, gwj); 565 if (gwj->ccgw.filter.can_id || gwj->ccgw.filter.can_mask) { 567 &gwj->ccgw.filter) < 0) 774 nla_memcpy(&ccgw->filter, tb[CGW_FILTER],
|
/net/atm/ |
H A D | br2684.c | 76 struct br2684_filter filter; member in struct:br2684_vcc 385 memcpy(&brvcc->filter, &fs.filter, sizeof(brvcc->filter)); 393 if (brvcc->filter.netmask == 0) 394 return 0; /* no filter in place */ 396 (((struct iphdr *)(skb->data))->daddr & brvcc->filter. 397 netmask) == brvcc->filter.prefix) 402 * TODO: we should probably filter ARPs too.. don't want to have 805 #define b1(var, byte) ((u8 *) &brvcc->filter [all...] |
/net/bluetooth/ |
H A D | hci_sock.c | 44 struct hci_filter filter; member in struct:hci_pinfo 54 /* Security filter */ 93 /* Apply filter */ 94 flt = &hci_pi(sk)->filter; 104 /* Extra filter for event packets only */ 113 /* Check filter only when opcode is set */ 1062 struct hci_filter *f = &hci_pi(sk)->filter; 1083 struct hci_filter *f = &hci_pi(sk)->filter; 1144 struct hci_filter *f = &hci_pi(sk)->filter;
|
/net/ipv6/ |
H A D | raw.c | 121 const __u32 *data = &raw6_sk(sk)->filter.data[0]; 134 int rawv6_mh_filter_register(mh_filter_t filter) argument 136 rcu_assign_pointer(mh_filter, filter); 141 int rawv6_mh_filter_unregister(mh_filter_t filter) argument 199 mh_filter_t *filter; local 201 filter = rcu_dereference(mh_filter); 202 filtered = filter ? (*filter)(sk, skb) : 0; 922 if (copy_from_user(&raw6_sk(sk)->filter, optval, optlen)) 947 if (copy_to_user(optval, &raw6_sk(sk)->filter, le [all...] |
/net/xfrm/ |
H A D | xfrm_state.c | 1598 struct xfrm_address_filter *filter) 1600 if (filter) { 1601 if ((filter->family == AF_INET || 1602 filter->family == AF_INET6) && 1603 x->props.family != filter->family) 1606 return addr_match(&x->props.saddr, &filter->saddr, 1607 filter->splen) && 1608 addr_match(&x->id.daddr, &filter->daddr, 1609 filter->dplen); 1636 if (!__xfrm_state_filter_match(state, walk->filter)) 1597 __xfrm_state_filter_match(struct xfrm_state *x, struct xfrm_address_filter *filter) argument 1656 xfrm_state_walk_init(struct xfrm_state_walk *walk, u8 proto, struct xfrm_address_filter *filter) argument [all...] |
H A D | xfrm_user.c | 892 struct xfrm_address_filter *filter = NULL; local 904 filter = kmalloc(sizeof(*filter), GFP_KERNEL); 905 if (filter == NULL) 908 memcpy(filter, nla_data(attrs[XFRMA_ADDRESS_FILTER]), 909 sizeof(*filter)); 915 xfrm_state_walk_init(walk, proto, filter);
|
/net/key/ |
H A D | af_key.c | 1792 struct xfrm_address_filter *filter = NULL; local 1805 filter = kmalloc(sizeof(*filter), GFP_KERNEL); 1806 if (filter == NULL) 1809 memcpy(&filter->saddr, &xfilter->sadb_x_filter_saddr, 1811 memcpy(&filter->daddr, &xfilter->sadb_x_filter_daddr, 1813 filter->family = xfilter->sadb_x_filter_family; 1814 filter->splen = xfilter->sadb_x_filter_splen; 1815 filter->dplen = xfilter->sadb_x_filter_dplen; 1822 xfrm_state_walk_init(&pfk->dump.u.state, proto, filter); [all...] |
/net/mac80211/ |
H A D | util.c | 749 u64 filter, u32 crc) 753 bool calc_crc = filter != 0; 819 if (calc_crc && id < 64 && (filter & (1ULL << id))) 747 ieee802_11_parse_elems_crc(const u8 *start, size_t len, bool action, struct ieee802_11_elems *elems, u64 filter, u32 crc) argument
|
/net/packet/ |
H A D | af_packet.c | 1726 struct sk_filter *filter; local 1729 filter = rcu_dereference(sk->sk_filter); 1730 if (filter != NULL) 1731 res = SK_RUN_FILTER(filter, skb);
|