Home
last modified time | relevance | path

Searched refs:newinfo (Results 1 – 6 of 6) sorted by relevance

/net/ipv4/netfilter/
Darp_tables.c301 static int mark_source_chains(const struct xt_table_info *newinfo, in mark_source_chains() argument
311 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains()
357 if (pos + size >= newinfo->size) in mark_source_chains()
369 newinfo->number)) in mark_source_chains()
374 if (newpos >= newinfo->size) in mark_source_chains()
452 struct xt_table_info *newinfo, in check_entry_size_and_hooks() argument
484 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks()
489 newinfo->underflow[h] = underflows[h]; in check_entry_size_and_hooks()
519 struct xt_table_info *newinfo, in translate_table() argument
529 newinfo->size = repl->size; in translate_table()
[all …]
Dip_tables.c368 mark_source_chains(const struct xt_table_info *newinfo, in mark_source_chains() argument
377 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains()
421 if (pos + size >= newinfo->size) in mark_source_chains()
433 newinfo->number)) in mark_source_chains()
438 if (newpos >= newinfo->size) in mark_source_chains()
589 struct xt_table_info *newinfo, in check_entry_size_and_hooks() argument
621 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks()
626 newinfo->underflow[h] = underflows[h]; in check_entry_size_and_hooks()
661 translate_table(struct net *net, struct xt_table_info *newinfo, void *entry0, in translate_table() argument
670 newinfo->size = repl->size; in translate_table()
[all …]
/net/bridge/netfilter/
Debtables.c428 struct ebt_table_info *newinfo) in ebt_verify_pointers() argument
436 newinfo->hook_entry[i] = NULL; in ebt_verify_pointers()
438 newinfo->entries_size = repl->entries_size; in ebt_verify_pointers()
439 newinfo->nentries = repl->nentries; in ebt_verify_pointers()
443 struct ebt_entry *e = (void *)newinfo->entries + offset; in ebt_verify_pointers()
464 newinfo->hook_entry[i] = (struct ebt_entries *)e; in ebt_verify_pointers()
483 if (!newinfo->hook_entry[i] && in ebt_verify_pointers()
495 const struct ebt_table_info *newinfo, in ebt_check_entry_size_and_hooks() argument
502 if ((void *)e == (void *)newinfo->hook_entry[i]) in ebt_check_entry_size_and_hooks()
555 ebt_get_udc_positions(struct ebt_entry *e, struct ebt_table_info *newinfo, in ebt_get_udc_positions() argument
[all …]
/net/ipv6/netfilter/
Dip6_tables.c387 mark_source_chains(const struct xt_table_info *newinfo, in mark_source_chains() argument
396 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains()
440 if (pos + size >= newinfo->size) in mark_source_chains()
452 newinfo->number)) in mark_source_chains()
457 if (newpos >= newinfo->size) in mark_source_chains()
608 struct xt_table_info *newinfo, in check_entry_size_and_hooks() argument
640 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks()
645 newinfo->underflow[h] = underflows[h]; in check_entry_size_and_hooks()
679 translate_table(struct net *net, struct xt_table_info *newinfo, void *entry0, in translate_table() argument
688 newinfo->size = repl->size; in translate_table()
[all …]
/net/netfilter/
Dxt_SECMARK.c121 struct xt_secmark_target_info_v1 newinfo = { in secmark_tg_check_v0() local
126 memcpy(newinfo.secctx, info->secctx, SECMARK_SECCTX_MAX); in secmark_tg_check_v0()
128 ret = secmark_tg_check(par->table, &newinfo); in secmark_tg_check_v0()
129 info->secid = newinfo.secid; in secmark_tg_check_v0()
138 struct xt_secmark_target_info_v1 newinfo = { in secmark_tg_v0() local
142 return secmark_tg(skb, &newinfo); in secmark_tg_v0()
Dx_tables.c1351 struct xt_table_info *newinfo, in xt_replace_table() argument
1358 ret = xt_jumpstack_alloc(newinfo); in xt_replace_table()
1377 newinfo->initial_entries = private->initial_entries; in xt_replace_table()
1383 table->private = newinfo; in xt_replace_table()
1418 struct xt_table_info *newinfo) in xt_register_table() argument
1443 if (!xt_replace_table(table, 0, newinfo, &ret)) in xt_register_table()