Searched refs:match (Results 1 - 25 of 122) sorted by relevance

12345

/net/netfilter/
H A Dxt_ipvs.c2 * xt_ipvs - kernel module to match IPVS connection properties
25 MODULE_DESCRIPTION("Xtables: match IPVS connection properties");
56 bool match = true; local
59 match = skb->ipvs_property ^
66 match = false;
75 match = false;
81 match = false;
90 match = false;
102 match = false;
110 match
[all...]
H A Dxt_owner.c2 * Kernel module to match various things tied to sockets associated with
25 if ((info->match & (XT_OWNER_UID|XT_OWNER_GID)) &&
38 return (info->match ^ info->invert) == 0;
39 else if (info->match & info->invert & XT_OWNER_SOCKET)
48 return ((info->match ^ info->invert) &
51 if (info->match & XT_OWNER_UID) {
60 if (info->match & XT_OWNER_GID) {
77 .match = owner_mt,
H A Dx_tables.c50 struct list_head match; member in struct:xt_af
124 int xt_register_match(struct xt_match *match) argument
126 u_int8_t af = match->family;
129 list_add(&match->list, &xt[af].match);
136 xt_unregister_match(struct xt_match *match) argument
138 u_int8_t af = match->family;
141 list_del(&match->list);
147 xt_register_matches(struct xt_match *match, unsigned int n) argument
153 err = xt_register_match(&match[
167 xt_unregister_matches(struct xt_match *match, unsigned int n) argument
212 struct xt_match *match; local
483 xt_compat_match_offset(const struct xt_match *match) argument
493 const struct xt_match *match = m->u.kernel.match; local
520 const struct xt_match *match = m->u.kernel.match; local
1081 const struct xt_match *match; local
[all...]
H A Dxt_comment.c2 * Implements a dummy match to allow attaching comments to rules
13 MODULE_DESCRIPTION("Xtables: No-op match which can be tagged with a comment");
21 /* We always match */
29 .match = comment_mt,
H A Dxt_dscp.c20 MODULE_DESCRIPTION("Xtables: DSCP/TOS field match");
74 .match = dscp_mt,
82 .match = dscp_mt6,
90 .match = tos_mt,
98 .match = tos_mt,
H A Dnft_compat.c264 struct xt_match *match = expr->ops->data; local
268 nft_compat_set_par((struct xt_action_param *)&pkt->xt, match, info);
270 ret = match->match(skb, (struct xt_action_param *)&pkt->xt);
296 struct xt_match *match, void *info,
312 par->match = match;
341 struct xt_match *match = expr->ops->data; local
349 ret = nft_compat_chain_validate_dependency(match->table, ctx->chain);
353 match_compat_from_user(match, nla_dat
295 nft_match_set_mtchk_param(struct xt_mtchk_param *par, const struct nft_ctx *ctx, struct xt_match *match, void *info, union nft_entry *entry, u8 proto, bool inv) argument
376 struct xt_match *match = expr->ops->data; local
393 struct xt_match *match = expr->ops->data; local
410 struct xt_match *match = expr->ops->data; local
563 struct xt_match *match; local
578 struct xt_match *match = nft_match->ops.data; local
[all...]
H A Dxt_length.c1 /* Kernel module to match packet length. */
18 MODULE_DESCRIPTION("Xtables: Packet length (Layer3,4,5) match");
46 .match = length_mt,
53 .match = length_mt6,
H A Dxt_cpu.c1 /* Kernel module to match running CPU */
24 MODULE_DESCRIPTION("Xtables: CPU match");
49 .match = cpu_mt,
H A Dxt_realm.c21 MODULE_DESCRIPTION("Xtables: Routing realm match");
35 .match = realm_mt,
H A Dxt_esp.c1 /* Kernel module to match ESP parameters. */
23 MODULE_DESCRIPTION("Xtables: IPsec-ESP packet match");
80 .match = esp_mt,
89 .match = esp_mt,
H A Dxt_hl.c23 MODULE_DESCRIPTION("Xtables: Hoplimit/TTL field match");
71 .match = ttl_mt,
79 .match = hl_mt6,
H A Dxt_ipcomp.c1 /* Kernel module to match IPComp parameters for IPv4 and IPv6
28 MODULE_DESCRIPTION("Xtables: IPv4/6 IPsec-IPComp SPI match");
83 .match = comp_mt,
92 .match = comp_mt,
H A Dxt_tcpmss.c1 /* Kernel module to match TCP MSS values. */
23 MODULE_DESCRIPTION("Xtables: TCP MSS match");
84 .match = tcpmss_mt,
92 .match = tcpmss_mt,
H A Dxt_tcpudp.c14 MODULE_DESCRIPTION("Xtables: TCP, UDP and UDP-Lite match");
171 .match = tcp_mt,
180 .match = tcp_mt,
189 .match = udp_mt,
198 .match = udp_mt,
207 .match = udp_mt,
216 .match = udp_mt,
H A Dxt_bpf.c1 /* Xtables module to match packets using a BPF filter.
18 MODULE_DESCRIPTION("Xtables: BPF filter match");
57 .match = bpf_mt,
/net/openvswitch/
H A Dflow_netlink.c52 static void update_range__(struct sw_flow_match *match, argument
60 range = &match->range;
61 else if (match->mask)
62 range = &match->mask->range;
80 #define SW_FLOW_KEY_PUT(match, field, value, is_mask) \
82 update_range__(match, offsetof(struct sw_flow_key, field), \
83 sizeof((match)->key->field), is_mask); \
85 if ((match)->mask) \
86 (match)->mask->key.field = value; \
88 (match)
120 match_validate(const struct sw_flow_match *match, u64 key_attrs, u64 mask_attrs) argument
343 ipv4_tun_from_nlattr(const struct nlattr *attr, struct sw_flow_match *match, bool is_mask) argument
549 metadata_from_nlattrs(struct sw_flow_match *match, u64 *attrs, const struct nlattr **a, bool is_mask) argument
601 ovs_key_from_nlattrs(struct sw_flow_match *match, u64 attrs, const struct nlattr **a, bool is_mask) argument
862 ovs_nla_get_match(struct sw_flow_match *match, const struct nlattr *key, const struct nlattr *mask) argument
1011 struct sw_flow_match match; local
1405 ovs_match_init(struct sw_flow_match *match, struct sw_flow_key *key, struct sw_flow_mask *mask) argument
1424 struct sw_flow_match match; local
[all...]
H A Dflow_netlink.h40 void ovs_match_init(struct sw_flow_match *match,
47 int ovs_nla_get_match(struct sw_flow_match *match,
H A Dflow_table.h80 struct sw_flow_match *match);
82 struct sw_flow_match *match);
/net/wireless/
H A Dwext-spy.c198 int match = -1; local
204 /* Update all records that match */
209 match = i;
216 if (match >= 0) {
217 if (spydata->spy_thr_under[match]) {
219 spydata->spy_thr_under[match] = 0;
225 spydata->spy_thr_under[match] = 1;
/net/bridge/netfilter/
H A DKconfig81 This option adds the among match, which allows matching the MAC source
90 This option adds the ARP match, which allows ARP and RARP header field
98 This option adds the IP match, which allows basic IP header field
107 This option adds the IP6 match, which allows basic IPV6 header field
113 tristate "ebt: limit match support"
115 This option adds the limit match, which allows you to control
116 the rate at which a rule can be matched. This match is the
117 equivalent of the iptables limit match.
125 This option adds the mark match, which allows matching frames based on
127 This value is the same as the one used in the iptables mark match an
[all...]
H A Debt_pkttype.c37 .match = ebt_pkttype_mt,
55 MODULE_DESCRIPTION("Ebtables: Link layer packet type match");
H A Debt_802_3.c53 .match = ebt_802_3_mt,
/net/sched/
H A Dem_canid.c2 * em_canid.c Ematch rule to match CAN frames according to their CAN IDs
101 int match = 0; local
111 match = 1;
117 match = (test_bit(can_id, cm->match_sff) ? 1 : 0);
120 return match;
149 * We do not support filters here that match for the same can_id
211 .match = em_canid_match,
/net/ipv6/netfilter/
H A Dip6t_hbh.c1 /* Kernel module to match Hop-by-Hop and Destination parameters. */
24 MODULE_DESCRIPTION("Xtables: IPv6 Hop-By-Hop and Destination Header match");
64 (par->match == &hbh_mt6_reg[0]) ?
189 .match = hbh_mt6,
197 .match = hbh_mt6,
H A Dip6t_eui64.c1 /* Kernel module to match EUI64 address parameters. */
18 MODULE_DESCRIPTION("Xtables: IPv6 EUI64 address match");
56 .match = eui64_mt6,

Completed in 123 milliseconds

12345