/net/netfilter/ |
D | xt_repldata.h | 22 struct type##_replace repl; \ 32 strncpy(tbl->repl.name, info->name, sizeof(tbl->repl.name)); \ 34 tbl->repl.valid_hooks = hook_mask; \ 35 tbl->repl.num_entries = nhooks + 1; \ 36 tbl->repl.size = nhooks * sizeof(struct type##_standard) + \ 41 tbl->repl.hook_entry[hooknum] = bytes; \ 42 tbl->repl.underflow[hooknum] = bytes; \
|
D | nf_conntrack_core.c | 1457 const struct nf_conntrack_tuple *repl, in __nf_conntrack_alloc() argument 1487 ct->tuplehash[IP_CT_DIR_REPLY].tuple = *repl; in __nf_conntrack_alloc() 1512 const struct nf_conntrack_tuple *repl, in nf_conntrack_alloc() argument 1515 return __nf_conntrack_alloc(net, zone, orig, repl, gfp, 0); in nf_conntrack_alloc()
|
/net/ipv6/netfilter/ |
D | ip6table_filter.c | 49 struct ip6t_replace *repl; in ip6table_filter_table_init() local 55 repl = ip6t_alloc_initial_table(&packet_filter); in ip6table_filter_table_init() 56 if (repl == NULL) in ip6table_filter_table_init() 59 ((struct ip6t_standard *)repl->entries)[1].target.verdict = in ip6table_filter_table_init() 62 err = ip6t_register_table(net, &packet_filter, repl, filter_ops, in ip6table_filter_table_init() 64 kfree(repl); in ip6table_filter_table_init()
|
D | ip6table_nat.c | 92 struct ip6t_replace *repl; in ip6table_nat_table_init() local 98 repl = ip6t_alloc_initial_table(&nf_nat_ipv6_table); in ip6table_nat_table_init() 99 if (repl == NULL) in ip6table_nat_table_init() 101 ret = ip6t_register_table(net, &nf_nat_ipv6_table, repl, in ip6table_nat_table_init() 104 kfree(repl); in ip6table_nat_table_init() 113 kfree(repl); in ip6table_nat_table_init()
|
D | ip6table_security.c | 49 struct ip6t_replace *repl; in ip6table_security_table_init() local 55 repl = ip6t_alloc_initial_table(&security_table); in ip6table_security_table_init() 56 if (repl == NULL) in ip6table_security_table_init() 58 ret = ip6t_register_table(net, &security_table, repl, sectbl_ops, in ip6table_security_table_init() 60 kfree(repl); in ip6table_security_table_init()
|
D | ip6table_raw.c | 50 struct ip6t_replace *repl; in ip6table_raw_table_init() local 60 repl = ip6t_alloc_initial_table(table); in ip6table_raw_table_init() 61 if (repl == NULL) in ip6table_raw_table_init() 63 ret = ip6t_register_table(net, table, repl, rawtable_ops, in ip6table_raw_table_init() 65 kfree(repl); in ip6table_raw_table_init()
|
D | ip6table_mangle.c | 81 struct ip6t_replace *repl; in ip6table_mangle_table_init() local 87 repl = ip6t_alloc_initial_table(&packet_mangler); in ip6table_mangle_table_init() 88 if (repl == NULL) in ip6table_mangle_table_init() 90 ret = ip6t_register_table(net, &packet_mangler, repl, mangle_ops, in ip6table_mangle_table_init() 92 kfree(repl); in ip6table_mangle_table_init()
|
D | ip6_tables.c | 680 const struct ip6t_replace *repl) in translate_table() argument 688 newinfo->size = repl->size; in translate_table() 689 newinfo->number = repl->num_entries; in translate_table() 704 entry0 + repl->size, in translate_table() 705 repl->hook_entry, in translate_table() 706 repl->underflow, in translate_table() 707 repl->valid_hooks); in translate_table() 710 if (i < repl->num_entries) in translate_table() 719 if (i != repl->num_entries) in translate_table() 722 ret = xt_check_table_hooks(newinfo, repl->valid_hooks); in translate_table() [all …]
|
/net/ipv4/netfilter/ |
D | iptable_filter.c | 48 struct ipt_replace *repl; in iptable_filter_table_init() local 54 repl = ipt_alloc_initial_table(&packet_filter); in iptable_filter_table_init() 55 if (repl == NULL) in iptable_filter_table_init() 58 ((struct ipt_standard *)repl->entries)[1].target.verdict = in iptable_filter_table_init() 61 err = ipt_register_table(net, &packet_filter, repl, filter_ops, in iptable_filter_table_init() 63 kfree(repl); in iptable_filter_table_init()
|
D | iptable_nat.c | 90 struct ipt_replace *repl; in iptable_nat_table_init() local 96 repl = ipt_alloc_initial_table(&nf_nat_ipv4_table); in iptable_nat_table_init() 97 if (repl == NULL) in iptable_nat_table_init() 99 ret = ipt_register_table(net, &nf_nat_ipv4_table, repl, in iptable_nat_table_init() 102 kfree(repl); in iptable_nat_table_init() 112 kfree(repl); in iptable_nat_table_init()
|
D | arptable_filter.c | 44 struct arpt_replace *repl; in arptable_filter_table_init() local 50 repl = arpt_alloc_initial_table(&packet_filter); in arptable_filter_table_init() 51 if (repl == NULL) in arptable_filter_table_init() 53 err = arpt_register_table(net, &packet_filter, repl, arpfilter_ops, in arptable_filter_table_init() 55 kfree(repl); in arptable_filter_table_init()
|
D | iptable_security.c | 50 struct ipt_replace *repl; in iptable_security_table_init() local 56 repl = ipt_alloc_initial_table(&security_table); in iptable_security_table_init() 57 if (repl == NULL) in iptable_security_table_init() 59 ret = ipt_register_table(net, &security_table, repl, sectbl_ops, in iptable_security_table_init() 61 kfree(repl); in iptable_security_table_init()
|
D | iptable_raw.c | 51 struct ipt_replace *repl; in iptable_raw_table_init() local 61 repl = ipt_alloc_initial_table(table); in iptable_raw_table_init() 62 if (repl == NULL) in iptable_raw_table_init() 64 ret = ipt_register_table(net, table, repl, rawtable_ops, in iptable_raw_table_init() 66 kfree(repl); in iptable_raw_table_init()
|
D | iptable_mangle.c | 88 struct ipt_replace *repl; in iptable_mangle_table_init() local 94 repl = ipt_alloc_initial_table(&packet_mangler); in iptable_mangle_table_init() 95 if (repl == NULL) in iptable_mangle_table_init() 97 ret = ipt_register_table(net, &packet_mangler, repl, mangle_ops, in iptable_mangle_table_init() 99 kfree(repl); in iptable_mangle_table_init()
|
D | arp_tables.c | 521 const struct arpt_replace *repl) in translate_table() argument 529 newinfo->size = repl->size; in translate_table() 530 newinfo->number = repl->num_entries; in translate_table() 546 entry0 + repl->size, in translate_table() 547 repl->hook_entry, in translate_table() 548 repl->underflow, in translate_table() 549 repl->valid_hooks); in translate_table() 552 if (i < repl->num_entries) in translate_table() 561 if (i != repl->num_entries) in translate_table() 564 ret = xt_check_table_hooks(newinfo, repl->valid_hooks); in translate_table() [all …]
|
D | ip_tables.c | 662 const struct ipt_replace *repl) in translate_table() argument 670 newinfo->size = repl->size; in translate_table() 671 newinfo->number = repl->num_entries; in translate_table() 686 entry0 + repl->size, in translate_table() 687 repl->hook_entry, in translate_table() 688 repl->underflow, in translate_table() 689 repl->valid_hooks); in translate_table() 692 if (i < repl->num_entries) in translate_table() 701 if (i != repl->num_entries) in translate_table() 704 ret = xt_check_table_hooks(newinfo, repl->valid_hooks); in translate_table() [all …]
|
/net/bridge/netfilter/ |
D | ebtables.c | 427 static int ebt_verify_pointers(const struct ebt_replace *repl, in ebt_verify_pointers() argument 430 unsigned int limit = repl->entries_size; in ebt_verify_pointers() 431 unsigned int valid_hooks = repl->valid_hooks; in ebt_verify_pointers() 438 newinfo->entries_size = repl->entries_size; in ebt_verify_pointers() 439 newinfo->nentries = repl->nentries; in ebt_verify_pointers() 451 if ((char __user *)repl->hook_entry[i] == in ebt_verify_pointers() 452 repl->entries + offset) in ebt_verify_pointers() 967 static int do_replace_finish(struct net *net, struct ebt_replace *repl, in do_replace_finish() argument 979 if (repl->num_counters) { in do_replace_finish() 980 unsigned long size = repl->num_counters * sizeof(*counterstmp); in do_replace_finish() [all …]
|
/net/xfrm/ |
D | xfrm_replay.c | 101 x->repl->notify(x, XFRM_REPLAY_UPDATE); in xfrm_replay_overflow() 160 x->repl->notify(x, XFRM_REPLAY_UPDATE); in xfrm_replay_advance() 181 x->repl->notify(x, XFRM_REPLAY_UPDATE); in xfrm_replay_overflow_bmp() 276 x->repl->notify(x, XFRM_REPLAY_UPDATE); in xfrm_replay_advance_bmp() 419 x->repl->notify(x, XFRM_REPLAY_UPDATE); in xfrm_replay_overflow_esn() 551 x->repl->notify(x, XFRM_REPLAY_UPDATE); in xfrm_replay_advance_esn() 588 x->repl->notify(x, XFRM_REPLAY_UPDATE); in xfrm_replay_overflow_offload() 628 x->repl->notify(x, XFRM_REPLAY_UPDATE); in xfrm_replay_overflow_offload_bmp() 677 x->repl->notify(x, XFRM_REPLAY_UPDATE); in xfrm_replay_overflow_offload_esn() 744 x->repl = &xfrm_replay_esn; in xfrm_init_replay() [all …]
|
D | xfrm_input.c | 615 if (x->repl->check(x, skb, seq)) { in xfrm_input() 663 if (x->repl->recheck(x, skb, seq)) { in xfrm_input() 668 x->repl->advance(x, seq); in xfrm_input()
|
D | xfrm_output.c | 449 err = x->repl->overflow(x, skb); in xfrm_output_one()
|
D | xfrm_state.c | 2156 x->repl->notify(x, XFRM_REPLAY_TIMEOUT); in xfrm_replay_timer_handler()
|
/net/sctp/ |
D | sm_statefuns.c | 316 struct sctp_chunk *chunk = arg, *repl, *err_chunk; in sctp_sf_do_5_1B_init() local 432 repl = sctp_make_init_ack(new_asoc, chunk, GFP_ATOMIC, len); in sctp_sf_do_5_1B_init() 433 if (!repl) in sctp_sf_do_5_1B_init() 454 sctp_addto_chunk(repl, len, unk_param); in sctp_sf_do_5_1B_init() 460 sctp_add_cmd_sf(commands, SCTP_CMD_REPLY, SCTP_CHUNK(repl)); in sctp_sf_do_5_1B_init() 702 struct sctp_chunk *repl; in sctp_sf_do_5_1D_ce() local 805 repl = sctp_make_cookie_ack(new_asoc, chunk); in sctp_sf_do_5_1D_ce() 806 if (!repl) in sctp_sf_do_5_1D_ce() 859 sctp_add_cmd_sf(commands, SCTP_CMD_REPLY, SCTP_CHUNK(repl)); in sctp_sf_do_5_1D_ce() 880 sctp_chunk_free(repl); in sctp_sf_do_5_1D_ce() [all …]
|
D | sm_sideeffect.c | 89 struct sctp_chunk *repl; in sctp_do_ecn_ecne_work() local 119 repl = sctp_make_cwr(asoc, asoc->last_cwr_tsn, chunk); in sctp_do_ecn_ecne_work() 124 return repl; in sctp_do_ecn_ecne_work()
|