/net/wireless/ |
H A D | wext-spy.c | 198 int match = -1; local 204 /* Update all records that match */ 209 match = i; 216 if (match >= 0) { 217 if (spydata->spy_thr_under[match]) { 219 spydata->spy_thr_under[match] = 0; 225 spydata->spy_thr_under[match] = 1;
|
H A D | mlme.c | 397 u8 match[]; member in struct:cfg80211_mgmt_registration 435 if (memcmp(reg->match, match_data, mlen) == 0) { 446 memcpy(nreg->match, match_data, match_len); 643 if (memcmp(reg->match, data, reg->match_len)) 646 /* found match! */
|
H A D | wext-compat.c | 1231 bool match = false; local 1256 match = true; 1261 match = true; 1266 if (!match)
|
/net/netfilter/ |
H A D | xt_ipvs.c | 2 * xt_ipvs - kernel module to match IPVS connection properties 25 MODULE_DESCRIPTION("Xtables: match IPVS connection properties"); 56 bool match = true; local 59 match = skb->ipvs_property ^ 66 match = false; 75 match = false; 81 match = false; 90 match = false; 102 match = false; 110 match [all...] |
H A D | nft_compat.c | 264 struct xt_match *match = expr->ops->data; local 268 nft_compat_set_par((struct xt_action_param *)&pkt->xt, match, info); 270 ret = match->match(skb, (struct xt_action_param *)&pkt->xt); 296 struct xt_match *match, void *info, 312 par->match = match; 341 struct xt_match *match = expr->ops->data; local 349 ret = nft_compat_chain_validate_dependency(match->table, ctx->chain); 353 match_compat_from_user(match, nla_dat 295 nft_match_set_mtchk_param(struct xt_mtchk_param *par, const struct nft_ctx *ctx, struct xt_match *match, void *info, union nft_entry *entry, u8 proto, bool inv) argument 376 struct xt_match *match = expr->ops->data; local 393 struct xt_match *match = expr->ops->data; local 410 struct xt_match *match = expr->ops->data; local 563 struct xt_match *match; local 578 struct xt_match *match = nft_match->ops.data; local [all...] |
H A D | x_tables.c | 50 struct list_head match; member in struct:xt_af 124 int xt_register_match(struct xt_match *match) argument 126 u_int8_t af = match->family; 129 list_add(&match->list, &xt[af].match); 136 xt_unregister_match(struct xt_match *match) argument 138 u_int8_t af = match->family; 141 list_del(&match->list); 147 xt_register_matches(struct xt_match *match, unsigned int n) argument 153 err = xt_register_match(&match[ 167 xt_unregister_matches(struct xt_match *match, unsigned int n) argument 212 struct xt_match *match; local 483 xt_compat_match_offset(const struct xt_match *match) argument 493 const struct xt_match *match = m->u.kernel.match; local 520 const struct xt_match *match = m->u.kernel.match; local 1081 const struct xt_match *match; local [all...] |
/net/sched/ |
H A D | em_canid.c | 2 * em_canid.c Ematch rule to match CAN frames according to their CAN IDs 101 int match = 0; local 111 match = 1; 117 match = (test_bit(can_id, cm->match_sff) ? 1 : 0); 120 return match; 149 * We do not support filters here that match for the same can_id 211 .match = em_canid_match,
|
/net/sctp/ |
H A D | bind_addr.c | 197 /* Found the exact match. */ 319 int match = 0; local 326 match = 1; 332 return match;
|
H A D | associola.c | 509 /* Update any entries that match the peer to be deleted. */ 881 /* Compare two addresses to see if they match. Wildcard addresses 882 * only match themselves. 918 struct sctp_transport *match; local 923 match = NULL; 946 match = active; 960 match = transport; 966 return match;
|
/net/openvswitch/ |
H A D | flow_table.c | 401 struct sw_flow_match *match) 403 struct sw_flow_key *key = match->key; 405 int key_end = match->range.end; 460 struct sw_flow_match *match) 468 flow = masked_flow_lookup(ti, match->key, mask); 469 if (flow && ovs_flow_cmp_unmasked_key(flow, match)) /* Found */ 400 ovs_flow_cmp_unmasked_key(const struct sw_flow *flow, struct sw_flow_match *match) argument 459 ovs_flow_tbl_lookup_exact(struct flow_table *tbl, struct sw_flow_match *match) argument
|
H A D | datapath.c | 812 struct sw_flow_match match; local 832 ovs_match_init(&match, &new_flow->unmasked_key, &mask); 833 error = ovs_nla_get_match(&match, 901 if (unlikely(!ovs_flow_cmp_unmasked_key(flow, &match))) { 902 flow = ovs_flow_tbl_lookup_exact(&dp->table, &match); 974 struct sw_flow_match match; local 982 ovs_match_init(&match, &key, &mask); 983 error = ovs_nla_get_match(&match, 1013 flow = ovs_flow_tbl_lookup_exact(&dp->table, &match); 1071 struct sw_flow_match match; local 1119 struct sw_flow_match match; local [all...] |
H A D | flow_netlink.c | 52 static void update_range__(struct sw_flow_match *match, argument 60 range = &match->range; 61 else if (match->mask) 62 range = &match->mask->range; 80 #define SW_FLOW_KEY_PUT(match, field, value, is_mask) \ 82 update_range__(match, offsetof(struct sw_flow_key, field), \ 83 sizeof((match)->key->field), is_mask); \ 85 if ((match)->mask) \ 86 (match)->mask->key.field = value; \ 88 (match) 120 match_validate(const struct sw_flow_match *match, u64 key_attrs, u64 mask_attrs) argument 343 ipv4_tun_from_nlattr(const struct nlattr *attr, struct sw_flow_match *match, bool is_mask) argument 549 metadata_from_nlattrs(struct sw_flow_match *match, u64 *attrs, const struct nlattr **a, bool is_mask) argument 601 ovs_key_from_nlattrs(struct sw_flow_match *match, u64 attrs, const struct nlattr **a, bool is_mask) argument 862 ovs_nla_get_match(struct sw_flow_match *match, const struct nlattr *key, const struct nlattr *mask) argument 1011 struct sw_flow_match match; local 1405 ovs_match_init(struct sw_flow_match *match, struct sw_flow_key *key, struct sw_flow_mask *mask) argument 1424 struct sw_flow_match match; local [all...] |
/net/phonet/ |
H A D | socket.c | 74 * Find address based on socket address, match only certain fields. 710 unsigned int res, match = 0; local 716 match++; 721 while (match > 0) { 723 match--;
|
/net/bluetooth/ |
H A D | hci_event.c | 3764 * necessarily match conn->auth_type. 4352 bool match; local 4427 match = (!bacmp(bdaddr, &d->last_adv_addr) && 4430 /* If the pending data doesn't match this report or this isn't a 4434 if (type != LE_ADV_SCAN_RSP || !match) { 4436 if (!match)
|
H A D | mgmt.c | 1450 struct cmd_lookup *match = data; local 1452 send_settings_rsp(cmd->sk, cmd->opcode, match->hdev); 1456 if (match->sk == NULL) { 1457 match->sk = cmd->sk; 1458 sock_hold(match->sk); 2171 struct cmd_lookup match = { NULL, hdev }; local 2181 mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, settings_rsp, &match); 2183 new_settings(hdev, match.sk); 2185 if (match.sk) 2186 sock_put(match 2450 struct bt_uuid *match, *tmp; local 4084 struct cmd_lookup match = { NULL, hdev }; local 4884 struct cmd_conn_lookup *match = data; local 4923 struct cmd_conn_lookup match; local 5856 struct cmd_lookup match = { NULL, hdev }; local 5936 struct cmd_lookup match = { NULL, hdev }; local 6509 struct cmd_lookup match = { NULL, hdev }; local 6553 struct cmd_lookup match = { NULL, hdev }; local 6606 struct cmd_lookup match = { NULL, hdev }; local 6643 struct cmd_lookup *match = data; local 6654 struct cmd_lookup match = { NULL, hdev, mgmt_status(status) }; local [all...] |
/net/bridge/netfilter/ |
H A D | ebtables.c | 103 par->match = m->u.match; 105 return m->u.match->match(skb, par) ? EBT_MATCH : EBT_NOMATCH; 363 struct xt_match *match; local 371 match = xt_request_find_match(NFPROTO_BRIDGE, m->u.name, 0); 372 if (IS_ERR(match)) 373 return PTR_ERR(match); 374 m->u.match = match; 1593 ebt_compat_match_offset(const struct xt_match *match, unsigned int userlen) argument 1610 const struct xt_match *match = m->u.match; local 1903 struct xt_match *match; local [all...] |
/net/decnet/ |
H A D | dn_route.c | 920 int match = 16; local 923 match--; 925 return match;
|
/net/ipv4/netfilter/ |
H A D | ip_tables.c | 121 dprintf("Packet protocol %hi does not match %hi.%s\n", 313 * normally, except that they will NEVER match rules that ask 316 * match it. */ 359 acpar.match = ematch->u.kernel.match; 361 if (!acpar.match->match(skb, &acpar)) 559 par.match = m->u.kernel.match; 562 if (par.match 609 struct xt_match *match; local 1448 struct xt_match *match; local [all...] |
/net/ipv6/netfilter/ |
H A D | ip6_tables.c | 157 /* We need match for the '-p all', too! */ 337 * normally, except that they will NEVER match rules that ask 340 * match it. */ 379 acpar.match = ematch->u.kernel.match; 381 if (!acpar.match->match(skb, &acpar)) 569 par.match = m->u.kernel.match; 572 if (par.match 619 struct xt_match *match; local 1460 struct xt_match *match; local [all...] |
/net/ipv6/ |
H A D | route.c | 409 static struct rt6_info *rt6_multipath_select(struct rt6_info *match, argument 416 route_choosen = rt6_info_hash_nhsfn(match->rt6i_nsiblings + 1, fl6); 422 &match->rt6i_siblings, rt6i_siblings) { 427 match = sibling; 431 return match; 621 int *mpri, struct rt6_info *match, 645 match = rt; 648 return match; 656 struct rt6_info *rt, *match; local 659 match 620 find_match(struct rt6_info *rt, int oif, int strict, int *mpri, struct rt6_info *match, bool *do_rr) argument 672 struct rt6_info *match, *rt0; local [all...] |
/net/mac80211/ |
H A D | mlme.c | 273 "AP VHT information doesn't match HT, disable VHT\n"); 4326 bool match; local 4329 match = ether_addr_equal(ifmgd->bssid, req->bss->bssid); 4330 ieee80211_destroy_auth_data(sdata, match);
|
/net/packet/ |
H A D | af_packet.c | 1428 struct packet_fanout *f, *match; local 1454 match = NULL; 1458 match = f; 1463 if (match && match->flags != flags) 1465 if (!match) { 1467 match = kzalloc(sizeof(*match), GFP_KERNEL); 1468 if (!match) 1470 write_pnet(&match [all...] |
/net/xfrm/ |
H A D | xfrm_policy.c | 1074 bool match; local 1081 match = xfrm_selector_match(sel, fl, family); 1082 if (match) 1221 bool match = xfrm_selector_match(&pol->selector, fl, local 1225 if (match) { 3224 int match = 0; local 3235 match = 1; 3242 match = 1; 3248 return match;
|