Home
last modified time | relevance | path

Searched refs:tables (Results 1 – 11 of 11) sorted by relevance

/net/irda/
Dparameters.c473 (pi_minor > info->tables[pi_major].len-1)) in irda_param_insert()
483 pi_minor_info = &info->tables[pi_major].pi_minor_call_table[pi_minor]; in irda_param_insert()
527 (pi_minor > info->tables[pi_major].len-1)) in irda_param_extract()
537 pi_minor_info = &info->tables[pi_major].pi_minor_call_table[pi_minor]; in irda_param_extract()
/net/netfilter/
Dxt_recent.c87 struct list_head tables; member
212 list_for_each_entry(t, &recent_net->tables, list) in recent_table_lookup()
404 list_add_tail(&t->list, &recent_net->tables); in recent_mt_check()
634 list_for_each_entry(t, &recent_net->tables, list) in recent_proc_net_exit()
657 INIT_LIST_HEAD(&recent_net->tables); in recent_net_init()
Dx_tables.c1008 list_for_each_entry(t, &net->xt.tables[af], list) in xt_find_table_lock()
1158 list_for_each_entry(t, &net->xt.tables[table->af], list) { in xt_register_table()
1177 list_add(&table->list, &net->xt.tables[table->af]); in xt_register_table()
1215 return seq_list_start(&net->xt.tables[af], *pos); in xt_table_seq_start()
1224 return seq_list_next(v, &net->xt.tables[af], pos); in xt_table_seq_next()
1600 INIT_LIST_HEAD(&net->xt.tables[i]); in xt_net_init()
Dnf_tables_api.c36 INIT_LIST_HEAD(&afi->tables); in nft_register_afinfo()
337 list_for_each_entry(table, &afi->tables, list) { in nft_table_lookup()
485 list_for_each_entry_rcu(table, &afi->tables, list) { in nf_tables_dump_tables()
706 list_add_tail_rcu(&table->list, &afi->tables); in nf_tables_newtable()
759 list_for_each_entry_safe(table, nt, &afi->tables, list) { in nft_flush()
1031 list_for_each_entry_rcu(table, &afi->tables, list) { in nf_tables_dump_chains()
1773 list_for_each_entry_rcu(table, &afi->tables, list) { in nf_tables_dump_rules()
2431 list_for_each_entry_rcu(table, &afi->tables, list) { in nf_tables_dump_sets()
3670 &trans->ctx.afi->tables); in nf_tables_abort()
DKconfig438 tristate "Netfilter nf_tables mixed IPv4/IPv6 tables support"
713 The target allows you to create rules in the "raw" and "mangle" tables
881 the tables, chains, rules.
/net/ipv4/netfilter/
DKconfig151 tristate "IP tables support (required for filtering/masq/NAT)"
361 # ARP tables
363 tristate "ARP tables support"
/net/bridge/netfilter/
DKconfig29 tristate "Ethernet Bridge tables (ebtables) support"
39 # tables
Debtables.c354 return find_inlist_lock(&net->xt.tables[NFPROTO_BRIDGE], name, in find_table_lock()
1219 list_for_each_entry(t, &net->xt.tables[NFPROTO_BRIDGE], list) { in ebt_register_table()
1232 list_add(&table->list, &net->xt.tables[NFPROTO_BRIDGE]); in ebt_register_table()
/net/ipv6/
DKconfig217 Support multiple routing tables.
228 avoided by defining different routing tables for the normal and
/net/ipv6/netfilter/
DKconfig97 tristate "IP6 tables support (required for filtering)"
/net/ipv4/
DKconfig85 Normally, the routing tables specify a single action to be taken in