/net/bridge/netfilter/ |
H A D | ebtables.c | 421 struct ebt_table_info *newinfo) 429 newinfo->hook_entry[i] = NULL; 431 newinfo->entries_size = repl->entries_size; 432 newinfo->nentries = repl->nentries; 436 struct ebt_entry *e = (void *)newinfo->entries + offset; 458 newinfo->hook_entry[i] = (struct ebt_entries *)e; 479 if (!newinfo->hook_entry[i] && 494 const struct ebt_table_info *newinfo, 501 if ((void *)e == (void *)newinfo->hook_entry[i]) 562 ebt_get_udc_positions(struct ebt_entry *e, struct ebt_table_info *newinfo, argument 420 ebt_verify_pointers(const struct ebt_replace *repl, struct ebt_table_info *newinfo) argument 493 ebt_check_entry_size_and_hooks(const struct ebt_entry *e, const struct ebt_table_info *newinfo, unsigned int *n, unsigned int *cnt, unsigned int *totalcnt, unsigned int *udc_cnt) argument 649 ebt_check_entry(struct ebt_entry *e, struct net *net, const struct ebt_table_info *newinfo, const char *name, unsigned int *cnt, struct ebt_cl_stack *cl_s, unsigned int udc_cnt) argument 835 translate_table(struct net *net, const char *name, struct ebt_table_info *newinfo) argument 977 do_replace_finish(struct net *net, struct ebt_replace *repl, struct ebt_table_info *newinfo) argument 1099 struct ebt_table_info *newinfo; local 1156 struct ebt_table_info *newinfo; local 1738 compat_calc_entry(const struct ebt_entry *e, const struct ebt_table_info *info, const void *base, struct compat_ebt_replace *newinfo) argument 1782 compat_table_info(const struct ebt_table_info *info, struct compat_ebt_replace *newinfo) argument 2179 struct ebt_table_info *newinfo; local [all...] |
/net/ipv4/netfilter/ |
H A D | arp_tables.c | 368 static int mark_source_chains(const struct xt_table_info *newinfo, argument 377 unsigned int pos = newinfo->hook_entry[hook]; 446 if (newpos > newinfo->size - 561 struct xt_table_info *newinfo, 588 newinfo->hook_entry[h] = hook_entries[h]; 596 newinfo->underflow[h] = underflows[h]; 621 * newinfo). 623 static int translate_table(struct xt_table_info *newinfo, void *entry0, argument 630 newinfo->size = repl->size; 631 newinfo 560 check_entry_size_and_hooks(struct arpt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument 834 compat_calc_entry(const struct arpt_entry *e, const struct xt_table_info *info, const void *base, struct xt_table_info *newinfo) argument 863 compat_table_info(const struct xt_table_info *info, struct xt_table_info *newinfo) argument 988 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument 1069 struct xt_table_info *newinfo; local 1211 check_compat_entry_size_and_hooks(struct compat_arpt_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, const char *name) argument 1284 compat_copy_entry_from_user(struct compat_arpt_entry *e, void **dstptr, unsigned int *size, const char *name, struct xt_table_info *newinfo, unsigned char *base) argument 1328 struct xt_table_info *newinfo, *info; local 1491 struct xt_table_info *newinfo; local 1777 struct xt_table_info *newinfo; local [all...] |
H A D | ip_tables.c | 445 mark_source_chains(const struct xt_table_info *newinfo, argument 453 unsigned int pos = newinfo->hook_entry[hook]; 528 if (newpos > newinfo->size - 724 struct xt_table_info *newinfo, 751 newinfo->hook_entry[h] = hook_entries[h]; 759 newinfo->underflow[h] = underflows[h]; 791 newinfo) */ 793 translate_table(struct net *net, struct xt_table_info *newinfo, void *entry0, argument 800 newinfo->size = repl->size; 801 newinfo 723 check_entry_size_and_hooks(struct ipt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument 1020 compat_calc_entry(const struct ipt_entry *e, const struct xt_table_info *info, const void *base, struct xt_table_info *newinfo) argument 1051 compat_table_info(const struct xt_table_info *info, struct xt_table_info *newinfo) argument 1177 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument 1256 struct xt_table_info *newinfo; local 1475 check_compat_entry_size_and_hooks(struct compat_ipt_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, const char *name) argument 1563 compat_copy_entry_from_user(struct compat_ipt_entry *e, void **dstptr, unsigned int *size, const char *name, struct xt_table_info *newinfo, unsigned char *base) argument 1650 struct xt_table_info *newinfo, *info; local 1801 struct xt_table_info *newinfo; local 2070 struct xt_table_info *newinfo; local [all...] |
/net/ipv6/netfilter/ |
H A D | ip6_tables.c | 455 mark_source_chains(const struct xt_table_info *newinfo, argument 463 unsigned int pos = newinfo->hook_entry[hook]; 538 if (newpos > newinfo->size - 735 struct xt_table_info *newinfo, 762 newinfo->hook_entry[h] = hook_entries[h]; 770 newinfo->underflow[h] = underflows[h]; 801 newinfo) */ 803 translate_table(struct net *net, struct xt_table_info *newinfo, void *entry0, argument 810 newinfo->size = repl->size; 811 newinfo 734 check_entry_size_and_hooks(struct ip6t_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument 1030 compat_calc_entry(const struct ip6t_entry *e, const struct xt_table_info *info, const void *base, struct xt_table_info *newinfo) argument 1061 compat_table_info(const struct xt_table_info *info, struct xt_table_info *newinfo) argument 1187 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument 1266 struct xt_table_info *newinfo; local 1487 check_compat_entry_size_and_hooks(struct compat_ip6t_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, const char *name) argument 1575 compat_copy_entry_from_user(struct compat_ip6t_entry *e, void **dstptr, unsigned int *size, const char *name, struct xt_table_info *newinfo, unsigned char *base) argument 1660 struct xt_table_info *newinfo, *info; local 1811 struct xt_table_info *newinfo; local 2080 struct xt_table_info *newinfo; local [all...] |
/net/netfilter/ |
H A D | x_tables.c | 661 struct xt_table_info *newinfo; local 668 newinfo = kzalloc(XT_TABLE_INFO_SZ, GFP_KERNEL); 669 if (!newinfo) 672 newinfo->size = size; 676 newinfo->entries[cpu] = kmalloc_node(size, 680 newinfo->entries[cpu] = vmalloc_node(size, 683 if (newinfo->entries[cpu] == NULL) { 684 xt_free_table_info(newinfo); 689 return newinfo; 791 struct xt_table_info *newinfo, 789 xt_replace_table(struct xt_table *table, unsigned int num_counters, struct xt_table_info *newinfo, int *error) argument 851 xt_register_table(struct net *net, const struct xt_table *input_table, struct xt_table_info *bootstrap, struct xt_table_info *newinfo) argument [all...] |