/net/netfilter/ |
H A D | xt_ipvs.c | 2 * xt_ipvs - kernel module to match IPVS connection properties 25 MODULE_DESCRIPTION("Xtables: match IPVS connection properties"); 56 bool match = true; local 59 match = skb->ipvs_property ^ 66 match = false; 75 match = false; 81 match = false; 90 match = false; 102 match = false; 110 match [all...] |
H A D | xt_owner.c | 2 * Kernel module to match various things tied to sockets associated with 25 if ((info->match & (XT_OWNER_UID|XT_OWNER_GID)) && 38 return (info->match ^ info->invert) == 0; 39 else if (info->match & info->invert & XT_OWNER_SOCKET) 48 return ((info->match ^ info->invert) & 51 if (info->match & XT_OWNER_UID) { 60 if (info->match & XT_OWNER_GID) { 77 .match = owner_mt,
|
H A D | x_tables.c | 50 struct list_head match; member in struct:xt_af 124 int xt_register_match(struct xt_match *match) argument 126 u_int8_t af = match->family; 129 list_add(&match->list, &xt[af].match); 136 xt_unregister_match(struct xt_match *match) argument 138 u_int8_t af = match->family; 141 list_del(&match->list); 147 xt_register_matches(struct xt_match *match, unsigned int n) argument 153 err = xt_register_match(&match[ 167 xt_unregister_matches(struct xt_match *match, unsigned int n) argument 212 struct xt_match *match; local 483 xt_compat_match_offset(const struct xt_match *match) argument 493 const struct xt_match *match = m->u.kernel.match; local 520 const struct xt_match *match = m->u.kernel.match; local 1081 const struct xt_match *match; local [all...] |
H A D | xt_comment.c | 2 * Implements a dummy match to allow attaching comments to rules 13 MODULE_DESCRIPTION("Xtables: No-op match which can be tagged with a comment"); 21 /* We always match */ 29 .match = comment_mt,
|
H A D | xt_dscp.c | 20 MODULE_DESCRIPTION("Xtables: DSCP/TOS field match"); 74 .match = dscp_mt, 82 .match = dscp_mt6, 90 .match = tos_mt, 98 .match = tos_mt,
|
H A D | nft_compat.c | 264 struct xt_match *match = expr->ops->data; local 268 nft_compat_set_par((struct xt_action_param *)&pkt->xt, match, info); 270 ret = match->match(skb, (struct xt_action_param *)&pkt->xt); 296 struct xt_match *match, void *info, 312 par->match = match; 341 struct xt_match *match = expr->ops->data; local 349 ret = nft_compat_chain_validate_dependency(match->table, ctx->chain); 353 match_compat_from_user(match, nla_dat 295 nft_match_set_mtchk_param(struct xt_mtchk_param *par, const struct nft_ctx *ctx, struct xt_match *match, void *info, union nft_entry *entry, u8 proto, bool inv) argument 376 struct xt_match *match = expr->ops->data; local 393 struct xt_match *match = expr->ops->data; local 410 struct xt_match *match = expr->ops->data; local 563 struct xt_match *match; local 578 struct xt_match *match = nft_match->ops.data; local [all...] |
H A D | xt_length.c | 1 /* Kernel module to match packet length. */ 18 MODULE_DESCRIPTION("Xtables: Packet length (Layer3,4,5) match"); 46 .match = length_mt, 53 .match = length_mt6,
|
H A D | xt_cpu.c | 1 /* Kernel module to match running CPU */ 24 MODULE_DESCRIPTION("Xtables: CPU match"); 49 .match = cpu_mt,
|
H A D | xt_realm.c | 21 MODULE_DESCRIPTION("Xtables: Routing realm match"); 35 .match = realm_mt,
|
H A D | xt_esp.c | 1 /* Kernel module to match ESP parameters. */ 23 MODULE_DESCRIPTION("Xtables: IPsec-ESP packet match"); 80 .match = esp_mt, 89 .match = esp_mt,
|
H A D | xt_hl.c | 23 MODULE_DESCRIPTION("Xtables: Hoplimit/TTL field match"); 71 .match = ttl_mt, 79 .match = hl_mt6,
|
H A D | xt_ipcomp.c | 1 /* Kernel module to match IPComp parameters for IPv4 and IPv6 28 MODULE_DESCRIPTION("Xtables: IPv4/6 IPsec-IPComp SPI match"); 83 .match = comp_mt, 92 .match = comp_mt,
|
H A D | xt_tcpmss.c | 1 /* Kernel module to match TCP MSS values. */ 23 MODULE_DESCRIPTION("Xtables: TCP MSS match"); 84 .match = tcpmss_mt, 92 .match = tcpmss_mt,
|
H A D | xt_tcpudp.c | 14 MODULE_DESCRIPTION("Xtables: TCP, UDP and UDP-Lite match"); 171 .match = tcp_mt, 180 .match = tcp_mt, 189 .match = udp_mt, 198 .match = udp_mt, 207 .match = udp_mt, 216 .match = udp_mt,
|
H A D | xt_bpf.c | 1 /* Xtables module to match packets using a BPF filter. 18 MODULE_DESCRIPTION("Xtables: BPF filter match"); 57 .match = bpf_mt,
|
/net/openvswitch/ |
H A D | flow_netlink.c | 52 static void update_range__(struct sw_flow_match *match, argument 60 range = &match->range; 61 else if (match->mask) 62 range = &match->mask->range; 80 #define SW_FLOW_KEY_PUT(match, field, value, is_mask) \ 82 update_range__(match, offsetof(struct sw_flow_key, field), \ 83 sizeof((match)->key->field), is_mask); \ 85 if ((match)->mask) \ 86 (match)->mask->key.field = value; \ 88 (match) 120 match_validate(const struct sw_flow_match *match, u64 key_attrs, u64 mask_attrs) argument 343 ipv4_tun_from_nlattr(const struct nlattr *attr, struct sw_flow_match *match, bool is_mask) argument 549 metadata_from_nlattrs(struct sw_flow_match *match, u64 *attrs, const struct nlattr **a, bool is_mask) argument 601 ovs_key_from_nlattrs(struct sw_flow_match *match, u64 attrs, const struct nlattr **a, bool is_mask) argument 862 ovs_nla_get_match(struct sw_flow_match *match, const struct nlattr *key, const struct nlattr *mask) argument 1011 struct sw_flow_match match; local 1405 ovs_match_init(struct sw_flow_match *match, struct sw_flow_key *key, struct sw_flow_mask *mask) argument 1424 struct sw_flow_match match; local [all...] |
H A D | flow_netlink.h | 40 void ovs_match_init(struct sw_flow_match *match, 47 int ovs_nla_get_match(struct sw_flow_match *match,
|
H A D | flow_table.h | 80 struct sw_flow_match *match); 82 struct sw_flow_match *match);
|
/net/wireless/ |
H A D | wext-spy.c | 198 int match = -1; local 204 /* Update all records that match */ 209 match = i; 216 if (match >= 0) { 217 if (spydata->spy_thr_under[match]) { 219 spydata->spy_thr_under[match] = 0; 225 spydata->spy_thr_under[match] = 1;
|
/net/bridge/netfilter/ |
H A D | Kconfig | 81 This option adds the among match, which allows matching the MAC source 90 This option adds the ARP match, which allows ARP and RARP header field 98 This option adds the IP match, which allows basic IP header field 107 This option adds the IP6 match, which allows basic IPV6 header field 113 tristate "ebt: limit match support" 115 This option adds the limit match, which allows you to control 116 the rate at which a rule can be matched. This match is the 117 equivalent of the iptables limit match. 125 This option adds the mark match, which allows matching frames based on 127 This value is the same as the one used in the iptables mark match an [all...] |
H A D | ebt_pkttype.c | 37 .match = ebt_pkttype_mt, 55 MODULE_DESCRIPTION("Ebtables: Link layer packet type match");
|
H A D | ebt_802_3.c | 53 .match = ebt_802_3_mt,
|
/net/sched/ |
H A D | em_canid.c | 2 * em_canid.c Ematch rule to match CAN frames according to their CAN IDs 101 int match = 0; local 111 match = 1; 117 match = (test_bit(can_id, cm->match_sff) ? 1 : 0); 120 return match; 149 * We do not support filters here that match for the same can_id 211 .match = em_canid_match,
|
/net/ipv6/netfilter/ |
H A D | ip6t_hbh.c | 1 /* Kernel module to match Hop-by-Hop and Destination parameters. */ 24 MODULE_DESCRIPTION("Xtables: IPv6 Hop-By-Hop and Destination Header match"); 64 (par->match == &hbh_mt6_reg[0]) ? 189 .match = hbh_mt6, 197 .match = hbh_mt6,
|
H A D | ip6t_eui64.c | 1 /* Kernel module to match EUI64 address parameters. */ 18 MODULE_DESCRIPTION("Xtables: IPv6 EUI64 address match"); 56 .match = eui64_mt6,
|