/net/nfc/ |
D | digital_technology.c | 165 struct nfc_target *target); 218 struct nfc_target *target = arg; in digital_in_recv_ats() local 241 rc = digital_target_found(ddev, target, NFC_PROTO_ISO14443); in digital_in_recv_ats() 245 kfree(target); in digital_in_recv_ats() 252 struct nfc_target *target) in digital_in_send_rats() argument 265 target); in digital_in_send_rats() 275 struct nfc_target *target = arg; in digital_in_recv_sel_res() local 302 rc = digital_in_send_sdd_req(ddev, target); in digital_in_recv_sel_res() 309 target->sel_res = sel_res; in digital_in_recv_sel_res() 316 rc = digital_in_send_rats(ddev, target); in digital_in_recv_sel_res() [all …]
|
/net/nfc/nci/ |
D | ntf.c | 181 struct nfc_target *target, in nci_add_new_protocol() argument 218 target->sens_res = nfca_poll->sens_res; in nci_add_new_protocol() 219 target->sel_res = nfca_poll->sel_res; in nci_add_new_protocol() 220 target->nfcid1_len = nfca_poll->nfcid1_len; in nci_add_new_protocol() 221 if (target->nfcid1_len > ARRAY_SIZE(target->nfcid1)) in nci_add_new_protocol() 223 if (target->nfcid1_len > 0) { in nci_add_new_protocol() 224 memcpy(target->nfcid1, nfca_poll->nfcid1, in nci_add_new_protocol() 225 target->nfcid1_len); in nci_add_new_protocol() 230 target->sensb_res_len = nfcb_poll->sensb_res_len; in nci_add_new_protocol() 231 if (target->sensb_res_len > ARRAY_SIZE(target->sensb_res)) in nci_add_new_protocol() [all …]
|
/net/netfilter/ |
D | nft_compat.c | 62 par->target = xt; in nft_compat_set_par() 72 struct xt_target *target = expr->ops->data; in nft_target_eval_xt() local 76 nft_compat_set_par((struct xt_action_param *)&pkt->xt, target, info); in nft_target_eval_xt() 78 ret = target->target(skb, &pkt->xt); in nft_target_eval_xt() 98 struct xt_target *target = expr->ops->data; in nft_target_eval_bridge() local 102 nft_compat_set_par((struct xt_action_param *)&pkt->xt, target, info); in nft_target_eval_bridge() 104 ret = target->target(skb, &pkt->xt); in nft_target_eval_bridge() 137 struct xt_target *target, void *info, in nft_target_set_tgchk_param() argument 162 par->target = target; in nft_target_set_tgchk_param() 239 struct xt_target *target = expr->ops->data; in nft_target_init() local [all …]
|
D | x_tables.c | 49 struct list_head target; member 69 int xt_register_target(struct xt_target *target) in xt_register_target() argument 71 u_int8_t af = target->family; in xt_register_target() 74 list_add(&target->list, &xt[af].target); in xt_register_target() 81 xt_unregister_target(struct xt_target *target) in xt_unregister_target() argument 83 u_int8_t af = target->family; in xt_unregister_target() 86 list_del(&target->list); in xt_unregister_target() 92 xt_register_targets(struct xt_target *target, unsigned int n) in xt_register_targets() argument 98 err = xt_register_target(&target[i]); in xt_register_targets() 106 xt_unregister_targets(target, i); in xt_register_targets() [all …]
|
D | xt_NFQUEUE.c | 77 if (par->target->revision == 2 && info->flags > 1) in nfqueue_tg_check() 79 if (par->target->revision == 3 && info->flags & ~NFQ_FLAG_MASK) in nfqueue_tg_check() 114 .target = nfqueue_tg, 123 .target = nfqueue_tg_v1, 132 .target = nfqueue_tg_v2, 141 .target = nfqueue_tg_v3,
|
D | nf_nat_proto.c | 355 const struct nf_conntrack_tuple *target, in nf_nat_ipv4_manip_pkt() argument 367 if (!l4proto_manip_pkt(skb, iphdroff, hdroff, target, maniptype)) in nf_nat_ipv4_manip_pkt() 372 csum_replace4(&iph->check, iph->saddr, target->src.u3.ip); in nf_nat_ipv4_manip_pkt() 373 iph->saddr = target->src.u3.ip; in nf_nat_ipv4_manip_pkt() 375 csum_replace4(&iph->check, iph->daddr, target->dst.u3.ip); in nf_nat_ipv4_manip_pkt() 376 iph->daddr = target->dst.u3.ip; in nf_nat_ipv4_manip_pkt() 383 const struct nf_conntrack_tuple *target, in nf_nat_ipv6_manip_pkt() argument 403 !l4proto_manip_pkt(skb, iphdroff, hdroff, target, maniptype)) in nf_nat_ipv6_manip_pkt() 411 ipv6h->saddr = target->src.u3.in6; in nf_nat_ipv6_manip_pkt() 413 ipv6h->daddr = target->dst.u3.in6; in nf_nat_ipv6_manip_pkt() [all …]
|
D | Kconfig | 90 `CONNMARK' target and `connmark' match. Similar to the mark value 101 packets using the CONNSECMARK target and copied back from 102 connections to packets with the same target, with the packets 145 via the CT target. 597 x_tables match/target extensions over the nf_tables 726 tristate 'nfmark target and match support' 729 This option adds the "MARK" target and "mark" match. 733 The target allows you to create rules in the "mangle" table which alter 740 tristate 'ctmark target and match support' 745 This option adds the "CONNMARK" target and "connmark" match. [all …]
|
D | xt_nat.c | 156 .target = xt_snat_target_v0, 169 .target = xt_dnat_target_v0, 182 .target = xt_snat_target_v1, 194 .target = xt_dnat_target_v1, 206 .target = xt_snat_target_v2, 218 .target = xt_dnat_target_v2,
|
/net/bridge/netfilter/ |
D | ebt_mark.c | 26 int action = info->target & -16; in ebt_mark_tg() 37 return info->target | ~EBT_VERDICT_BITS; in ebt_mark_tg() 45 tmp = info->target | ~EBT_VERDICT_BITS; in ebt_mark_tg_check() 50 tmp = info->target & ~EBT_VERDICT_BITS; in ebt_mark_tg_check() 59 compat_uint_t target; member 68 kern->target = user->target; in mark_tg_compat_from_user() 77 put_user(kern->target, &user->target)) in mark_tg_compat_to_user() 87 .target = ebt_mark_tg,
|
D | ebt_snat.c | 29 if (!(info->target & NAT_ARP_BIT) && in ebt_snat_tg() 43 return info->target | ~EBT_VERDICT_BITS; in ebt_snat_tg() 51 tmp = info->target | ~EBT_VERDICT_BITS; in ebt_snat_tg_check() 57 tmp = info->target | EBT_VERDICT_BITS; in ebt_snat_tg_check() 69 .target = ebt_snat_tg,
|
D | ebt_dnat.c | 50 return info->target; in ebt_dnat_tg() 58 return info->target; in ebt_dnat_tg() 66 if (BASE_CHAIN && info->target == EBT_RETURN) in ebt_dnat_tg_check() 76 if (ebt_invalid_target(info->target)) in ebt_dnat_tg_check() 87 .target = ebt_dnat_tg,
|
D | Kconfig | 143 the 'nfmark' value in the frame. This can be set by the mark target. 145 target. 178 tristate "ebt: arp reply target support" 181 This option adds the arp reply target, which allows 187 tristate "ebt: dnat target support" 189 This option adds the MAC DNAT target, which allows altering the MAC 195 tristate "ebt: mark target support" 197 This option adds the mark target, which allows marking frames by 200 target. 205 tristate "ebt: redirect target support" [all …]
|
D | ebtables.c | 83 par->target = w->u.watcher; in ebt_do_watcher() 85 w->u.watcher->target(skb, par); in ebt_do_watcher() 233 if (!t->u.target->target) in ebt_do_table() 236 acpar.target = t->u.target; in ebt_do_table() 238 verdict = t->u.target->target(skb, &acpar); in ebt_do_table() 414 par->target = watcher; in ebt_check_watcher() 607 par.target = w->u.watcher; in ebt_cleanup_watcher() 610 if (par.target->destroy != NULL) in ebt_cleanup_watcher() 611 par.target->destroy(&par); in ebt_cleanup_watcher() 612 module_put(par.target->me); in ebt_cleanup_watcher() [all …]
|
D | ebt_redirect.c | 34 return info->target; in ebt_redirect_tg() 42 if (BASE_CHAIN && info->target == EBT_RETURN) in ebt_redirect_tg_check() 51 if (ebt_invalid_target(info->target)) in ebt_redirect_tg_check() 62 .target = ebt_redirect_tg,
|
D | ebt_arpreply.c | 59 return info->target; in ebt_arpreply_tg() 67 if (BASE_CHAIN && info->target == EBT_RETURN) in ebt_arpreply_tg_check() 72 if (ebt_invalid_target(info->target)) in ebt_arpreply_tg_check() 84 .target = ebt_arpreply_tg,
|
/net/sched/ |
D | act_ipt.c | 37 struct xt_target *target; in ipt_init_target() local 41 target = xt_request_find_target(AF_INET, t->u.user.name, in ipt_init_target() 43 if (IS_ERR(target)) in ipt_init_target() 44 return PTR_ERR(target); in ipt_init_target() 46 t->u.kernel.target = target; in ipt_init_target() 51 par.target = target; in ipt_init_target() 58 module_put(t->u.kernel.target->me); in ipt_init_target() 67 .target = t->u.kernel.target, in ipt_destroy_target() 72 if (par.target->destroy != NULL) in ipt_destroy_target() 73 par.target->destroy(&par); in ipt_destroy_target() [all …]
|
D | sch_pie.c | 30 psched_time_t target; /* user specified target delay in pschedtime */ member 77 params->target = PSCHED_NS2TICKS(15 * NSEC_PER_MSEC); /* 15 ms */ in pie_params_init() 106 if ((q->vars.qdelay < q->params.target / 2) && in drop_early() 220 u32 target = nla_get_u32(tb[TCA_PIE_TARGET]); in pie_change() local 223 q->params.target = PSCHED_NS2TICKS((u64)target * NSEC_PER_USEC); in pie_change() 382 delta += alpha * (u64)(qdelay - q->params.target); in calculate_probability() 436 if ((q->vars.qdelay < q->params.target / 2) && in calculate_probability() 437 (q->vars.qdelay_old < q->params.target / 2) && in calculate_probability() 492 ((u32)PSCHED_TICKS2NS(q->params.target)) / in pie_dump()
|
/net/ipv4/netfilter/ |
D | arpt_mangle.c | 13 target(struct sk_buff *skb, const struct xt_action_param *par) in target() function 55 return mangle->target; in target() 66 if (mangle->target != NF_DROP && mangle->target != NF_ACCEPT && in checkentry() 67 mangle->target != XT_CONTINUE) in checkentry() 75 .target = target,
|
D | ip_tables.c | 164 if (strcmp(t->target.u.kernel.target->name, XT_ERROR_TARGET) == 0) { in get_chainname_rulenum() 166 *chainname = t->target.data; in get_chainname_rulenum() 172 strcmp(t->target.u.kernel.target->name, in get_chainname_rulenum() 302 WARN_ON(!t->u.kernel.target); in ipt_do_table() 311 if (!t->u.kernel.target->target) { in ipt_do_table() 343 acpar.target = t->u.kernel.target; in ipt_do_table() 346 verdict = t->u.kernel.target->target(skb, &acpar); in ipt_do_table() 398 (strcmp(t->target.u.user.name, in mark_source_chains() 428 if (strcmp(t->target.u.user.name, in mark_source_chains() 505 .target = t->u.kernel.target, in check_target() [all …]
|
D | arp_tables.c | 235 if (!t->u.kernel.target->target) { in arpt_do_table() 267 acpar.target = t->u.kernel.target; in arpt_do_table() 269 verdict = t->u.kernel.target->target(skb, &acpar); in arpt_do_table() 333 (strcmp(t->target.u.user.name, in mark_source_chains() 364 if (strcmp(t->target.u.user.name, in mark_source_chains() 394 .target = t->u.kernel.target, in check_target() 409 struct xt_target *target; in find_check_entry() local 416 target = xt_request_find_target(NFPROTO_ARP, t->u.user.name, in find_check_entry() 418 if (IS_ERR(target)) { in find_check_entry() 419 ret = PTR_ERR(target); in find_check_entry() [all …]
|
/net/vmw_vsock/ |
D | vmci_transport_notify.h | 42 int (*poll_in) (struct sock *sk, size_t target, 44 int (*poll_out) (struct sock *sk, size_t target, 51 int (*recv_init) (struct sock *sk, size_t target, 53 int (*recv_pre_block) (struct sock *sk, size_t target, 55 int (*recv_pre_dequeue) (struct sock *sk, size_t target, 57 int (*recv_post_dequeue) (struct sock *sk, size_t target,
|
D | vmci_transport_notify_qstate.c | 160 size_t target, bool *data_ready_now) in vmci_transport_notify_pkt_poll_in() argument 181 size_t target, bool *space_avail_now) in vmci_transport_notify_pkt_poll_out() argument 203 size_t target, in vmci_transport_notify_pkt_recv_init() argument 212 if (PKT_FIELD(vsk, write_notify_min_window) < target + 1) { in vmci_transport_notify_pkt_recv_init() 213 PKT_FIELD(vsk, write_notify_min_window) = target + 1; in vmci_transport_notify_pkt_recv_init() 235 size_t target, in vmci_transport_notify_pkt_recv_pre_block() argument 255 size_t target, in vmci_transport_notify_pkt_recv_post_dequeue() argument 391 size_t target, in vmci_transport_notify_pkt_recv_pre_dequeue() argument
|
D | vmci_transport_notify.c | 339 size_t target, bool *data_ready_now) in vmci_transport_notify_pkt_poll_in() argument 363 size_t target, bool *space_avail_now) in vmci_transport_notify_pkt_poll_out() argument 393 size_t target, in vmci_transport_notify_pkt_recv_init() argument 404 if (PKT_FIELD(vsk, write_notify_min_window) < target + 1) { in vmci_transport_notify_pkt_recv_init() 405 PKT_FIELD(vsk, write_notify_min_window) = target + 1; in vmci_transport_notify_pkt_recv_init() 429 size_t target, in vmci_transport_notify_pkt_recv_pre_block() argument 435 if (!send_waiting_read(sk, target)) { in vmci_transport_notify_pkt_recv_pre_block() 455 size_t target, in vmci_transport_notify_pkt_recv_pre_dequeue() argument 475 size_t target, in vmci_transport_notify_pkt_recv_post_dequeue() argument
|
/net/ipv6/netfilter/ |
D | ip6_tables.c | 189 if (strcmp(t->target.u.kernel.target->name, XT_ERROR_TARGET) == 0) { in get_chainname_rulenum() 191 *chainname = t->target.data; in get_chainname_rulenum() 197 strcmp(t->target.u.kernel.target->name, in get_chainname_rulenum() 326 WARN_ON(!t->u.kernel.target); in ip6t_do_table() 335 if (!t->u.kernel.target->target) { in ip6t_do_table() 365 acpar.target = t->u.kernel.target; in ip6t_do_table() 368 verdict = t->u.kernel.target->target(skb, &acpar); in ip6t_do_table() 417 (strcmp(t->target.u.user.name, in mark_source_chains() 447 if (strcmp(t->target.u.user.name, in mark_source_chains() 524 .target = t->u.kernel.target, in check_target() [all …]
|
/net/ipv6/ |
D | exthdrs_core.c | 189 int target, unsigned short *fragoff, int *flags) in ipv6_find_hdr() argument 211 found = (nexthdr == target); in ipv6_find_hdr() 214 if (target < 0 || found) in ipv6_find_hdr() 252 if (target < 0 && in ipv6_find_hdr() 267 if (flags && (*flags & IP6_FH_F_AUTH) && (target < 0)) in ipv6_find_hdr()
|