Searched refs:newinfo (Results 1 - 5 of 5) sorted by relevance

/net/ipv4/netfilter/
H A Darp_tables.c368 static int mark_source_chains(const struct xt_table_info *newinfo, argument
377 unsigned int pos = newinfo->hook_entry[hook];
446 if (newpos > newinfo->size -
561 struct xt_table_info *newinfo,
588 newinfo->hook_entry[h] = hook_entries[h];
596 newinfo->underflow[h] = underflows[h];
621 * newinfo).
623 static int translate_table(struct xt_table_info *newinfo, void *entry0, argument
630 newinfo->size = repl->size;
631 newinfo
560 check_entry_size_and_hooks(struct arpt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument
834 compat_calc_entry(const struct arpt_entry *e, const struct xt_table_info *info, const void *base, struct xt_table_info *newinfo) argument
863 compat_table_info(const struct xt_table_info *info, struct xt_table_info *newinfo) argument
988 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument
1069 struct xt_table_info *newinfo; local
1211 check_compat_entry_size_and_hooks(struct compat_arpt_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, const char *name) argument
1284 compat_copy_entry_from_user(struct compat_arpt_entry *e, void **dstptr, unsigned int *size, const char *name, struct xt_table_info *newinfo, unsigned char *base) argument
1328 struct xt_table_info *newinfo, *info; local
1491 struct xt_table_info *newinfo; local
1777 struct xt_table_info *newinfo; local
[all...]
H A Dip_tables.c445 mark_source_chains(const struct xt_table_info *newinfo, argument
453 unsigned int pos = newinfo->hook_entry[hook];
528 if (newpos > newinfo->size -
724 struct xt_table_info *newinfo,
751 newinfo->hook_entry[h] = hook_entries[h];
759 newinfo->underflow[h] = underflows[h];
791 newinfo) */
793 translate_table(struct net *net, struct xt_table_info *newinfo, void *entry0, argument
800 newinfo->size = repl->size;
801 newinfo
723 check_entry_size_and_hooks(struct ipt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument
1020 compat_calc_entry(const struct ipt_entry *e, const struct xt_table_info *info, const void *base, struct xt_table_info *newinfo) argument
1051 compat_table_info(const struct xt_table_info *info, struct xt_table_info *newinfo) argument
1177 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument
1256 struct xt_table_info *newinfo; local
1475 check_compat_entry_size_and_hooks(struct compat_ipt_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, const char *name) argument
1563 compat_copy_entry_from_user(struct compat_ipt_entry *e, void **dstptr, unsigned int *size, const char *name, struct xt_table_info *newinfo, unsigned char *base) argument
1650 struct xt_table_info *newinfo, *info; local
1801 struct xt_table_info *newinfo; local
2070 struct xt_table_info *newinfo; local
[all...]
/net/bridge/netfilter/
H A Debtables.c421 struct ebt_table_info *newinfo)
429 newinfo->hook_entry[i] = NULL;
431 newinfo->entries_size = repl->entries_size;
432 newinfo->nentries = repl->nentries;
436 struct ebt_entry *e = (void *)newinfo->entries + offset;
458 newinfo->hook_entry[i] = (struct ebt_entries *)e;
479 if (!newinfo->hook_entry[i] &&
494 const struct ebt_table_info *newinfo,
501 if ((void *)e == (void *)newinfo->hook_entry[i])
562 ebt_get_udc_positions(struct ebt_entry *e, struct ebt_table_info *newinfo, argument
420 ebt_verify_pointers(const struct ebt_replace *repl, struct ebt_table_info *newinfo) argument
493 ebt_check_entry_size_and_hooks(const struct ebt_entry *e, const struct ebt_table_info *newinfo, unsigned int *n, unsigned int *cnt, unsigned int *totalcnt, unsigned int *udc_cnt) argument
649 ebt_check_entry(struct ebt_entry *e, struct net *net, const struct ebt_table_info *newinfo, const char *name, unsigned int *cnt, struct ebt_cl_stack *cl_s, unsigned int udc_cnt) argument
835 translate_table(struct net *net, const char *name, struct ebt_table_info *newinfo) argument
977 do_replace_finish(struct net *net, struct ebt_replace *repl, struct ebt_table_info *newinfo) argument
1099 struct ebt_table_info *newinfo; local
1156 struct ebt_table_info *newinfo; local
1738 compat_calc_entry(const struct ebt_entry *e, const struct ebt_table_info *info, const void *base, struct compat_ebt_replace *newinfo) argument
1782 compat_table_info(const struct ebt_table_info *info, struct compat_ebt_replace *newinfo) argument
2179 struct ebt_table_info *newinfo; local
[all...]
/net/ipv6/netfilter/
H A Dip6_tables.c455 mark_source_chains(const struct xt_table_info *newinfo, argument
463 unsigned int pos = newinfo->hook_entry[hook];
538 if (newpos > newinfo->size -
735 struct xt_table_info *newinfo,
762 newinfo->hook_entry[h] = hook_entries[h];
770 newinfo->underflow[h] = underflows[h];
801 newinfo) */
803 translate_table(struct net *net, struct xt_table_info *newinfo, void *entry0, argument
810 newinfo->size = repl->size;
811 newinfo
734 check_entry_size_and_hooks(struct ip6t_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument
1030 compat_calc_entry(const struct ip6t_entry *e, const struct xt_table_info *info, const void *base, struct xt_table_info *newinfo) argument
1061 compat_table_info(const struct xt_table_info *info, struct xt_table_info *newinfo) argument
1187 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument
1266 struct xt_table_info *newinfo; local
1487 check_compat_entry_size_and_hooks(struct compat_ip6t_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, const char *name) argument
1575 compat_copy_entry_from_user(struct compat_ip6t_entry *e, void **dstptr, unsigned int *size, const char *name, struct xt_table_info *newinfo, unsigned char *base) argument
1660 struct xt_table_info *newinfo, *info; local
1811 struct xt_table_info *newinfo; local
2080 struct xt_table_info *newinfo; local
[all...]
/net/netfilter/
H A Dx_tables.c661 struct xt_table_info *newinfo; local
668 newinfo = kzalloc(XT_TABLE_INFO_SZ, GFP_KERNEL);
669 if (!newinfo)
672 newinfo->size = size;
676 newinfo->entries[cpu] = kmalloc_node(size,
680 newinfo->entries[cpu] = vmalloc_node(size,
683 if (newinfo->entries[cpu] == NULL) {
684 xt_free_table_info(newinfo);
689 return newinfo;
791 struct xt_table_info *newinfo,
789 xt_replace_table(struct xt_table *table, unsigned int num_counters, struct xt_table_info *newinfo, int *error) argument
851 xt_register_table(struct net *net, const struct xt_table *input_table, struct xt_table_info *bootstrap, struct xt_table_info *newinfo) argument
[all...]

Completed in 61 milliseconds