Searched refs:tables (Results 1 – 11 of 11) sorted by relevance
/net/irda/ |
D | parameters.c | 473 (pi_minor > info->tables[pi_major].len-1)) in irda_param_insert() 483 pi_minor_info = &info->tables[pi_major].pi_minor_call_table[pi_minor]; in irda_param_insert() 527 (pi_minor > info->tables[pi_major].len-1)) in irda_param_extract() 537 pi_minor_info = &info->tables[pi_major].pi_minor_call_table[pi_minor]; in irda_param_extract()
|
/net/netfilter/ |
D | xt_recent.c | 87 struct list_head tables; member 212 list_for_each_entry(t, &recent_net->tables, list) in recent_table_lookup() 404 list_add_tail(&t->list, &recent_net->tables); in recent_mt_check() 634 list_for_each_entry(t, &recent_net->tables, list) in recent_proc_net_exit() 657 INIT_LIST_HEAD(&recent_net->tables); in recent_net_init()
|
D | x_tables.c | 1008 list_for_each_entry(t, &net->xt.tables[af], list) in xt_find_table_lock() 1158 list_for_each_entry(t, &net->xt.tables[table->af], list) { in xt_register_table() 1177 list_add(&table->list, &net->xt.tables[table->af]); in xt_register_table() 1215 return seq_list_start(&net->xt.tables[af], *pos); in xt_table_seq_start() 1224 return seq_list_next(v, &net->xt.tables[af], pos); in xt_table_seq_next() 1600 INIT_LIST_HEAD(&net->xt.tables[i]); in xt_net_init()
|
D | nf_tables_api.c | 36 INIT_LIST_HEAD(&afi->tables); in nft_register_afinfo() 337 list_for_each_entry(table, &afi->tables, list) { in nft_table_lookup() 485 list_for_each_entry_rcu(table, &afi->tables, list) { in nf_tables_dump_tables() 706 list_add_tail_rcu(&table->list, &afi->tables); in nf_tables_newtable() 759 list_for_each_entry_safe(table, nt, &afi->tables, list) { in nft_flush() 1031 list_for_each_entry_rcu(table, &afi->tables, list) { in nf_tables_dump_chains() 1773 list_for_each_entry_rcu(table, &afi->tables, list) { in nf_tables_dump_rules() 2431 list_for_each_entry_rcu(table, &afi->tables, list) { in nf_tables_dump_sets() 3670 &trans->ctx.afi->tables); in nf_tables_abort()
|
D | Kconfig | 438 tristate "Netfilter nf_tables mixed IPv4/IPv6 tables support" 713 The target allows you to create rules in the "raw" and "mangle" tables 881 the tables, chains, rules.
|
/net/ipv4/netfilter/ |
D | Kconfig | 151 tristate "IP tables support (required for filtering/masq/NAT)" 361 # ARP tables 363 tristate "ARP tables support"
|
/net/bridge/netfilter/ |
D | Kconfig | 29 tristate "Ethernet Bridge tables (ebtables) support" 39 # tables
|
D | ebtables.c | 354 return find_inlist_lock(&net->xt.tables[NFPROTO_BRIDGE], name, in find_table_lock() 1219 list_for_each_entry(t, &net->xt.tables[NFPROTO_BRIDGE], list) { in ebt_register_table() 1232 list_add(&table->list, &net->xt.tables[NFPROTO_BRIDGE]); in ebt_register_table()
|
/net/ipv6/ |
D | Kconfig | 217 Support multiple routing tables. 228 avoided by defining different routing tables for the normal and
|
/net/ipv6/netfilter/ |
D | Kconfig | 97 tristate "IP6 tables support (required for filtering)"
|
/net/ipv4/ |
D | Kconfig | 85 Normally, the routing tables specify a single action to be taken in
|