| /net/openvswitch/ |
| A D | flow_netlink.c | 195 if (match->mask && (match->mask->key.eth.type == htons(0xffff))) in match_validate() 215 if (match->mask && (match->mask->key.ip.proto == 0xff)) in match_validate() 221 if (match->mask && (match->mask->key.ip.proto == 0xff)) in match_validate() 228 if (match->mask && (match->mask->key.ip.proto == 0xff)) { in match_validate() 236 if (match->mask && (match->mask->key.ip.proto == 0xff)) in match_validate() 252 if (match->mask && (match->mask->key.ip.proto == 0xff)) in match_validate() 258 if (match->mask && (match->mask->key.ip.proto == 0xff)) in match_validate() 265 if (match->mask && (match->mask->key.ip.proto == 0xff)) { in match_validate() 273 if (match->mask && (match->mask->key.ip.proto == 0xff)) in match_validate() 1970 memset(&match, 0, sizeof(match)); in ovs_nla_get_flow_metadata() [all …]
|
| /net/sched/ |
| A D | em_ipt.c | 22 const struct xt_match *match; member 54 mtpar.match = im->match; in check_match() 131 struct xt_match *match; in em_ipt_change() local 154 if (IS_ERR(match)) { in em_ipt_change() 156 return PTR_ERR(match); in em_ipt_change() 166 im->match = match; in em_ipt_change() 181 module_put(match->me); in em_ipt_change() 195 .match = im->match, in em_ipt_destroy() 240 acpar.match = im->match; in em_ipt_match() 244 ret = im->match->match(skb, &acpar); in em_ipt_match() [all …]
|
| A D | em_canid.c | 98 int match = 0; in em_canid_match() local 108 match = 1; in em_canid_match() 114 match = (test_bit(can_id, cm->match_sff) ? 1 : 0); in em_canid_match() 117 return match; in em_canid_match() 208 .match = em_canid_match,
|
| /net/netfilter/ |
| A D | nf_tables_offload.c | 24 flow->rule->match.dissector = &flow->match.dissector; in nft_flow_rule_alloc() 25 flow->rule->match.mask = &flow->match.mask; in nft_flow_rule_alloc() 26 flow->rule->match.key = &flow->match.key; in nft_flow_rule_alloc() 34 struct nft_flow_match *match = &flow->match; in nft_flow_rule_set_addr_type() local 56 struct nft_flow_match *match = &flow->match; in nft_flow_rule_transfer_vlan() local 65 match->key.basic.n_proto = match->key.cvlan.vlan_tpid; in nft_flow_rule_transfer_vlan() 66 match->mask.basic.n_proto = match->mask.cvlan.vlan_tpid; in nft_flow_rule_transfer_vlan() 67 match->key.cvlan.vlan_tpid = match->key.vlan.vlan_tpid; in nft_flow_rule_transfer_vlan() 68 match->mask.cvlan.vlan_tpid = match->mask.vlan.vlan_tpid; in nft_flow_rule_transfer_vlan() 78 match->key.basic.n_proto = match->key.vlan.vlan_tpid; in nft_flow_rule_transfer_vlan() [all …]
|
| A D | xt_owner.c | 25 if (info->match & ~XT_OWNER_MASK) in owner_check() 36 if (info->match & XT_OWNER_UID) { in owner_check() 48 if (info->match & XT_OWNER_GID) { in owner_check() 83 return ((info->match ^ info->invert) & in owner_mt() 87 if (info->match & XT_OWNER_UID) { in owner_mt() 98 if (info->match & XT_OWNER_GID) { in owner_mt() 99 unsigned int i, match = false; in owner_mt() local 106 match = true; in owner_mt() 108 if (!match && (info->match & XT_OWNER_SUPPL_GROUPS) && gi) { in owner_mt() 114 match = true; in owner_mt() [all …]
|
| A D | xt_ipvs.c | 68 match = false; in ipvs_mt() 77 match = false; in ipvs_mt() 83 match = false; in ipvs_mt() 92 match = false; in ipvs_mt() 104 match = false; in ipvs_mt() 112 match = false; in ipvs_mt() 121 match = false; in ipvs_mt() 127 match = false; in ipvs_mt() 135 match = false; in ipvs_mt() 143 match = false; in ipvs_mt() [all …]
|
| A D | x_tables.c | 67 struct list_head match; member 144 list_add(&match->list, &xt[af].match); in xt_register_match() 156 list_del(&match->list); in xt_unregister_match() 236 if (IS_ERR(match)) { in xt_request_find_match() 241 return match; in xt_request_find_match() 504 if (par->match->hooks && (par->hook_mask & ~par->match->hooks) != 0) { in xt_check_match() 516 if (par->match->proto && (par->match->proto != proto || inv_proto)) { in xt_check_match() 746 u_int16_t csize = match->compatsize ? : match->matchsize; in xt_compat_match_offset() 754 const struct xt_match *match = m->u.kernel.match; in xt_compat_match_from_user() local 787 const struct xt_match *match = m->u.kernel.match; in xt_compat_match_to_user() local [all …]
|
| A D | nft_compat.c | 403 ret = match->match(skb, &xt); in __nft_match_eval() 470 par->match = match; in nft_match_set_mtchk_param() 557 par.match = match; in __nft_match_destroy() 561 par.match->destroy(&par); in __nft_match_destroy() 589 match->matchsize, match->usersize)) in __nft_match_dump() 641 if (match->hooks && !(hook_mask & match->hooks)) in nft_match_validate() 787 struct xt_match *match; in nft_match_select_ops() local 803 if (IS_ERR(match)) in nft_match_select_ops() 823 ops->data = match; in nft_match_select_ops() 840 module_put(match->me); in nft_match_select_ops() [all …]
|
| A D | Kconfig | 797 target and match, you can set and match on this mark. 806 Using this target and match, you can add/delete and match 1251 This match allows you to match against the number of parallel 1292 `dccp' match in order to match on DCCP source/destination ports 1326 This option adds an "ECN" match, which allows you to match against 1335 This match extension allows you to match a range of SPIs 1528 This option adds a `quota' match, which allows to match on a 1539 This option adds a `rateest' match, which allows to match on the 1574 `sctp' match in order to match on SCTP source/destination ports 1591 This option adds a `socket' match, which can be used to match [all …]
|
| A D | nf_flow_table_offload.c | 35 struct nf_flow_key *mask = &match->mask; in nf_flow_rule_lwt_match() 36 struct nf_flow_key *key = &match->key; in nf_flow_rule_lwt_match() 77 match->dissector.used_keys |= enc_keys; in nf_flow_rule_lwt_match() 94 struct nf_flow_key *mask = &match->mask; in nf_flow_rule_match() 95 struct nf_flow_key *key = &match->key; in nf_flow_rule_match() 109 nf_flow_rule_lwt_match(match, tun_info); in nf_flow_rule_match() 131 NF_FLOW_DISSECTOR(match, FLOW_DISSECTOR_KEY_CVLAN, in nf_flow_rule_match() 137 NF_FLOW_DISSECTOR(match, FLOW_DISSECTOR_KEY_VLAN, in nf_flow_rule_match() 751 flow_rule->rule->match.dissector = &flow_rule->match.dissector; in nf_flow_offload_rule_alloc() 752 flow_rule->rule->match.mask = &flow_rule->match.mask; in nf_flow_offload_rule_alloc() [all …]
|
| A D | xt_tcpudp.c | 261 .match = tcp_mt, 270 .match = tcp_mt, 279 .match = udp_mt, 288 .match = udp_mt, 297 .match = udp_mt, 306 .match = udp_mt, 313 .match = icmp_match, 322 .match = icmp6_match,
|
| A D | xt_socket.c | 234 .match = socket_mt4_v0, 243 .match = socket_mt4_v1_v2_v3, 256 .match = socket_mt6_v1_v2_v3, 269 .match = socket_mt4_v1_v2_v3, 282 .match = socket_mt6_v1_v2_v3, 295 .match = socket_mt4_v1_v2_v3, 308 .match = socket_mt6_v1_v2_v3,
|
| A D | xt_dscp.c | 69 .match = dscp_mt, 77 .match = dscp_mt6, 85 .match = tos_mt, 93 .match = tos_mt,
|
| A D | xt_policy.c | 38 #define MATCH_ADDR(x,y,z) (!e->match.x || \ in match_xfrm_state() 41 #define MATCH(x,y) (!e->match.x || ((e->x == (y)) ^ e->invert.x)) in match_xfrm_state() 162 .match = policy_mt, 170 .match = policy_mt,
|
| A D | nft_set_pipapo.h | 78 #define nft_pipapo_for_each_field(field, index, match) \ argument 79 for ((field) = (match)->f, (index) = 0; \ 80 (index) < (match)->field_count; \ 161 struct nft_pipapo_match __rcu *match; member
|
| A D | xt_set.c | 525 .match = set_match_v0, 535 .match = set_match_v1, 545 .match = set_match_v1, 556 .match = set_match_v1, 566 .match = set_match_v1, 577 .match = set_match_v3, 587 .match = set_match_v3, 598 .match = set_match_v4, 608 .match = set_match_v4,
|
| /net/ipv6/netfilter/ |
| A D | Kconfig | 24 is used by the {ip6,nf}tables socket match. 97 tristate '"ah" match support' 100 This module allows one to match AH packets. 115 tristate '"frag" Fragmentation header match support' 133 tristate '"hl" hoplimit match support' 145 This module allows one to match packets based upon 151 tristate '"mh" match support' 154 This module allows one to match MH packets. 159 tristate '"rpfilter" reverse path filter match support' 170 tristate '"rt" Routing header match support' [all …]
|
| A D | ip6_tables.c | 314 acpar.match = ematch->u.kernel.match; in ip6t_do_table() 316 if (!acpar.match->match(skb, &acpar)) in ip6t_do_table() 473 par.match = m->u.kernel.match; in cleanup_match() 485 par->match = m->u.kernel.match; in check_match() 495 struct xt_match *match; in find_check_match() local 500 if (IS_ERR(match)) in find_check_match() 501 return PTR_ERR(match); in find_check_match() 503 m->u.kernel.match = match; in find_check_match() 1277 struct xt_match *match; in compat_find_calc_match() local 1281 if (IS_ERR(match)) in compat_find_calc_match() [all …]
|
| A D | ip6t_hbh.c | 61 (par->match == &hbh_mt6_reg[0]) ? in hbh_mt6() 185 .match = hbh_mt6, 193 .match = hbh_mt6,
|
| /net/bridge/netfilter/ |
| A D | ebtables.c | 107 par->match = m->u.match; in ebt_do_match() 109 return !m->u.match->match(skb, par); in ebt_do_match() 406 if (IS_ERR(match) || match->family != NFPROTO_BRIDGE) { in ebt_check_match() 407 if (!IS_ERR(match)) in ebt_check_match() 412 if (IS_ERR(match)) in ebt_check_match() 414 m->u.match = match; in ebt_check_match() 416 par->match = match; in ebt_check_match() 628 par.match = m->u.match; in ebt_cleanup_match() 1643 const struct xt_match *match = m->u.match; in compat_match_to_user() local 1651 if (copy_to_user(cm->u.name, match->name, strlen(match->name) + 1) || in compat_match_to_user() [all …]
|
| A D | Kconfig | 110 This option adds the among match, which allows matching the MAC source 119 This option adds the ARP match, which allows ARP and RARP header field 127 This option adds the IP match, which allows basic IP header field 136 This option adds the IP6 match, which allows basic IPV6 header field 142 tristate "ebt: limit match support" 144 This option adds the limit match, which allows you to control 145 the rate at which a rule can be matched. This match is the 146 equivalent of the iptables limit match. 156 This value is the same as the one used in the iptables mark match and 164 This option adds the packet type match, which allows matching on the [all …]
|
| /net/ethtool/ |
| A D | ioctl.c | 3571 flow->rule->match.dissector = &match->dissector; in ethtool_rx_flow_rule_create() 3572 flow->rule->match.mask = &match->mask; in ethtool_rx_flow_rule_create() 3573 flow->rule->match.key = &match->key; in ethtool_rx_flow_rule_create() 3621 match->dissector.used_keys |= in ethtool_rx_flow_rule_create() 3636 match->dissector.used_keys |= in ethtool_rx_flow_rule_create() 3644 match->dissector.used_keys |= in ethtool_rx_flow_rule_create() 3735 match->key.vlan.vlan_id = in ethtool_rx_flow_rule_create() 3737 match->mask.vlan.vlan_id = in ethtool_rx_flow_rule_create() 3740 match->key.vlan.vlan_dei = in ethtool_rx_flow_rule_create() 3742 match->mask.vlan.vlan_dei = in ethtool_rx_flow_rule_create() [all …]
|
| /net/ipv4/netfilter/ |
| A D | ip_tables.c | 291 acpar.match = ematch->u.kernel.match; in ipt_do_table() 293 if (!acpar.match->match(skb, &acpar)) in ipt_do_table() 455 par.match = m->u.kernel.match; in cleanup_match() 468 par->match = m->u.kernel.match; in check_match() 478 struct xt_match *match; in find_check_match() local 483 if (IS_ERR(match)) in find_check_match() 484 return PTR_ERR(match); in find_check_match() 485 m->u.kernel.match = match; in find_check_match() 1261 struct xt_match *match; in compat_find_calc_match() local 1265 if (IS_ERR(match)) in compat_find_calc_match() [all …]
|
| A D | Kconfig | 28 is required by the {ip,nf}tables socket match. 112 inside SNMP payloads to match IP-layer NAT mapping. 146 tristate '"ah" match support' 149 This match extension allows you to match a range of SPIs 155 tristate '"ecn" match support' 164 tristate '"rpfilter" reverse path filter match support' 168 This option allows you to match packets whose replies would 175 tristate '"ttl" match support'
|
| /net/packet/ |
| A D | af_packet.c | 1788 match = NULL; in fanout_add() 1792 match = f; in fanout_add() 1797 if (match) { in fanout_add() 1810 match = kvzalloc(struct_size(match, arr, args->max_num_members), in fanout_add() 1812 if (!match) in fanout_add() 1815 match->id = id; in fanout_add() 1825 match->prot_hook.af_packet_priv = match; in fanout_add() 1826 match->prot_hook.af_packet_net = read_pnet(&match->net); in fanout_add() 1840 if (refcount_read(&match->sk_ref) < match->max_num_members) { in fanout_add() 1846 refcount_set(&match->sk_ref, refcount_read(&match->sk_ref) + 1); in fanout_add() [all …]
|