/linux/net/netfilter/ |
H A D | xt_repldata.h | 6 * they serve as the hanging-off data accessed through repl.data[]. 11 * struct type##_replace repl; 22 struct type##_replace repl; \ 32 strscpy(tbl->repl.name, info->name); \ 34 tbl->repl.valid_hooks = hook_mask; \ 35 tbl->repl.num_entries = nhooks + 1; \ 36 tbl->repl.size = nhooks * sizeof(struct type##_standard) + \ 41 tbl->repl.hook_entry[hooknum] = bytes; \ 42 tbl->repl.underflow[hooknum] = bytes; \
|
H A D | nf_conntrack_sane.c | 74 struct sane_reply_net_start repl; in help() member 130 reply = skb_header_pointer(skb, dataoff, datalen, &buf.repl); in help()
|
/linux/fs/xfs/scrub/ |
H A D | cow_repair.c | 411 struct xrep_cow_extent *repl) in xrep_cow_alloc() argument 438 repl->fsbno = args.fsbno; in xrep_cow_alloc() 439 repl->len = args.len; in xrep_cow_alloc() 451 struct xrep_cow_extent *repl) in xrep_cow_alloc_rt() argument 461 false, &repl->fsbno, &repl->len); in xrep_cow_alloc_rt() 465 xfs_refcount_alloc_cow_extent(sc->tp, true, repl->fsbno, repl->len); in xrep_cow_alloc_rt() 510 * Given a CoW fork mapping @got and a replacement mapping @repl, remap the 518 const struct xrep_cow_extent *repl) in xrep_cow_replace_mapping() argument 522 ASSERT(repl->len > 0); in xrep_cow_replace_mapping() 525 trace_xrep_cow_replace_mapping(ip, got, repl->fsbno, repl->len); in xrep_cow_replace_mapping() [all …]
|
/linux/net/ipv6/netfilter/ |
H A D | ip6table_filter.c | 38 struct ip6t_replace *repl; in ip6table_filter_table_init() local 41 repl = ip6t_alloc_initial_table(&packet_filter); in ip6table_filter_table_init() 42 if (repl == NULL) in ip6table_filter_table_init() 45 ((struct ip6t_standard *)repl->entries)[1].target.verdict = in ip6table_filter_table_init() 48 err = ip6t_register_table(net, &packet_filter, repl, filter_ops); in ip6table_filter_table_init() 49 kfree(repl); in ip6table_filter_table_init()
|
H A D | ip6table_security.c | 39 struct ip6t_replace *repl; in ip6table_security_table_init() local 42 repl = ip6t_alloc_initial_table(&security_table); in ip6table_security_table_init() 43 if (repl == NULL) in ip6table_security_table_init() 45 ret = ip6t_register_table(net, &security_table, repl, sectbl_ops); in ip6table_security_table_init() 46 kfree(repl); in ip6table_security_table_init()
|
H A D | ip6table_nat.c | 110 struct ip6t_replace *repl; in ip6table_nat_table_init() local 113 repl = ip6t_alloc_initial_table(&nf_nat_ipv6_table); in ip6table_nat_table_init() 114 if (repl == NULL) in ip6table_nat_table_init() 116 ret = ip6t_register_table(net, &nf_nat_ipv6_table, repl, in ip6table_nat_table_init() 119 kfree(repl); in ip6table_nat_table_init() 127 kfree(repl); in ip6table_nat_table_init()
|
H A D | ip6table_raw.c | 38 struct ip6t_replace *repl; in ip6table_raw_table_init() local 45 repl = ip6t_alloc_initial_table(table); in ip6table_raw_table_init() 46 if (repl == NULL) in ip6table_raw_table_init() 48 ret = ip6t_register_table(net, table, repl, rawtable_ops); in ip6table_raw_table_init() 49 kfree(repl); in ip6table_raw_table_init()
|
H A D | ip6table_mangle.c | 79 struct ip6t_replace *repl; in ip6table_mangle_table_init() local 82 repl = ip6t_alloc_initial_table(&packet_mangler); in ip6table_mangle_table_init() 83 if (repl == NULL) in ip6table_mangle_table_init() 85 ret = ip6t_register_table(net, &packet_mangler, repl, mangle_ops); in ip6table_mangle_table_init() 86 kfree(repl); in ip6table_mangle_table_init()
|
H A D | ip6_tables.c | 678 const struct ip6t_replace *repl) in translate_table() argument 686 newinfo->size = repl->size; in translate_table() 687 newinfo->number = repl->num_entries; in translate_table() 702 entry0 + repl->size, in translate_table() 703 repl->hook_entry, in translate_table() 704 repl->underflow, in translate_table() 705 repl->valid_hooks); in translate_table() 708 if (i < repl->num_entries) in translate_table() 717 if (i != repl->num_entries) in translate_table() 720 ret = xt_check_table_hooks(newinfo, repl in translate_table() 1415 struct ip6t_replace repl; translate_compat_table() local 1733 ip6t_register_table(struct net * net,const struct xt_table * table,const struct ip6t_replace * repl,const struct nf_hook_ops * template_ops) ip6t_register_table() argument [all...] |
/linux/net/ipv4/netfilter/ |
H A D | iptable_filter.c | 39 struct ipt_replace *repl; in iptable_filter_table_init() local 42 repl = ipt_alloc_initial_table(&packet_filter); in iptable_filter_table_init() 43 if (repl == NULL) in iptable_filter_table_init() 46 ((struct ipt_standard *)repl->entries)[1].target.verdict = in iptable_filter_table_init() 49 err = ipt_register_table(net, &packet_filter, repl, filter_ops); in iptable_filter_table_init() 50 kfree(repl); in iptable_filter_table_init()
|
H A D | arptable_filter.c | 33 struct arpt_replace *repl; in arptable_filter_table_init() local 36 repl = arpt_alloc_initial_table(&packet_filter); in arptable_filter_table_init() 37 if (repl == NULL) in arptable_filter_table_init() 39 err = arpt_register_table(net, &packet_filter, repl, arpfilter_ops); in arptable_filter_table_init() 40 kfree(repl); in arptable_filter_table_init()
|
H A D | iptable_security.c | 40 struct ipt_replace *repl; in iptable_security_table_init() local 43 repl = ipt_alloc_initial_table(&security_table); in iptable_security_table_init() 44 if (repl == NULL) in iptable_security_table_init() 46 ret = ipt_register_table(net, &security_table, repl, sectbl_ops); in iptable_security_table_init() 47 kfree(repl); in iptable_security_table_init()
|
H A D | iptable_nat.c | 108 struct ipt_replace *repl; in iptable_nat_table_init() local 111 repl = ipt_alloc_initial_table(&nf_nat_ipv4_table); in iptable_nat_table_init() 112 if (repl == NULL) in iptable_nat_table_init() 115 ret = ipt_register_table(net, &nf_nat_ipv4_table, repl, NULL); in iptable_nat_table_init() 117 kfree(repl); in iptable_nat_table_init() 125 kfree(repl); in iptable_nat_table_init()
|
H A D | iptable_raw.c | 39 struct ipt_replace *repl; in iptable_raw_table_init() local 46 repl = ipt_alloc_initial_table(table); in iptable_raw_table_init() 47 if (repl == NULL) in iptable_raw_table_init() 49 ret = ipt_register_table(net, table, repl, rawtable_ops); in iptable_raw_table_init() 50 kfree(repl); in iptable_raw_table_init()
|
H A D | iptable_mangle.c | 86 struct ipt_replace *repl; in iptable_mangle_table_init() local 89 repl = ipt_alloc_initial_table(&packet_mangler); in iptable_mangle_table_init() 90 if (repl == NULL) in iptable_mangle_table_init() 92 ret = ipt_register_table(net, &packet_mangler, repl, mangle_ops); in iptable_mangle_table_init() 93 kfree(repl); in iptable_mangle_table_init()
|
H A D | arp_tables.c | 522 const struct arpt_replace *repl) in translate_table() argument 530 newinfo->size = repl->size; in translate_table() 531 newinfo->number = repl->num_entries; in translate_table() 547 entry0 + repl->size, in translate_table() 548 repl->hook_entry, in translate_table() 549 repl->underflow, in translate_table() 550 repl->valid_hooks); in translate_table() 553 if (i < repl->num_entries) in translate_table() 562 if (i != repl->num_entries) in translate_table() 565 ret = xt_check_table_hooks(newinfo, repl->valid_hooks); in translate_table() [all …]
|
H A D | ip_tables.c | 661 const struct ipt_replace *repl) in translate_table() argument 669 newinfo->size = repl->size; in translate_table() 670 newinfo->number = repl->num_entries; in translate_table() 685 entry0 + repl->size, in translate_table() 686 repl->hook_entry, in translate_table() 687 repl->underflow, in translate_table() 688 repl->valid_hooks); in translate_table() 691 if (i < repl->num_entries) in translate_table() 700 if (i != repl->num_entries) in translate_table() 703 ret = xt_check_table_hooks(newinfo, repl in translate_table() 1400 struct ipt_replace repl; translate_compat_table() local 1724 ipt_register_table(struct net * net,const struct xt_table * table,const struct ipt_replace * repl,const struct nf_hook_ops * template_ops) ipt_register_table() argument [all...] |
/linux/net/bridge/netfilter/ |
H A D | ebtables.c | 466 static int ebt_verify_pointers(const struct ebt_replace *repl, in ebt_verify_pointers() argument 469 unsigned int limit = repl->entries_size; in ebt_verify_pointers() 470 unsigned int valid_hooks = repl->valid_hooks; in ebt_verify_pointers() 477 newinfo->entries_size = repl->entries_size; in ebt_verify_pointers() 478 newinfo->nentries = repl->nentries; in ebt_verify_pointers() 490 if ((char __user *)repl->hook_entry[i] == in ebt_verify_pointers() 491 repl->entries + offset) in ebt_verify_pointers() 1008 static int do_replace_finish(struct net *net, struct ebt_replace *repl, in do_replace_finish() argument 1020 if (repl->num_counters) { in do_replace_finish() 1021 unsigned long size = repl->num_counters * sizeof(*counterstmp); in do_replace_finish() [all …]
|
/linux/tools/testing/selftests/net/netfilter/ |
H A D | udpclash.c | 84 char repl[512]; in run_test() local 87 ret = recvfrom(fd, repl, sizeof(repl), MSG_NOSIGNAL, in run_test()
|
/linux/arch/um/include/asm/ |
H A D | cpufeature.h | 84 " .long 4f - .\n" /* repl offset */ in _static_cpu_has() 87 " .byte 5f - 4f\n" /* repl len */ in _static_cpu_has() 99 " .byte 0\n" /* repl len */ in _static_cpu_has()
|
/linux/net/sctp/ |
H A D | sm_statefuns.c | 324 struct sctp_chunk *chunk = arg, *repl, *err_chunk; in sctp_sf_do_5_1B_init() local 441 repl = sctp_make_init_ack(new_asoc, chunk, GFP_ATOMIC, len); in sctp_sf_do_5_1B_init() 442 if (!repl) in sctp_sf_do_5_1B_init() 463 sctp_addto_chunk(repl, len, unk_param); in sctp_sf_do_5_1B_init() 469 sctp_add_cmd_sf(commands, SCTP_CMD_REPLY, SCTP_CHUNK(repl)); in sctp_sf_do_5_1B_init() 711 struct sctp_chunk *repl; in sctp_sf_do_5_1D_ce() local 817 repl = sctp_make_cookie_ack(new_asoc, chunk); in sctp_sf_do_5_1D_ce() 818 if (!repl) in sctp_sf_do_5_1D_ce() 871 sctp_add_cmd_sf(commands, SCTP_CMD_REPLY, SCTP_CHUNK(repl)); in sctp_sf_do_5_1D_ce() 892 sctp_chunk_free(repl); in sctp_sf_do_5_1D_ce() [all …]
|
/linux/drivers/net/fddi/skfp/h/ |
H A D | fddimib.h | 304 Counter fddiPRIVECF_Reply_Rx ; /* ECF repl received */ 306 Counter fddiPRIVECF_Reply_Tx ; /* ECF repl transm */
|
/linux/arch/loongarch/kernel/ |
H A D | alternative.c | 215 DPRINTK("feat not exist: %d, old: (%px len: %d), repl: (%px, len: %d)", in apply_alternatives() 222 DPRINTK("feat: %d, old: (%px len: %d), repl: (%px, len: %d)", in apply_alternatives()
|
/linux/arch/x86/kernel/ |
H A D | alternative.c | 311 * @replacement/@repl: pointer to the opcodes which are replacing @instr, located 485 static void __apply_relocation(u8 *buf, const u8 * const instr, size_t instrlen, u8 *repl, size_t r… in __apply_relocation() argument 506 if (need_reloc(next + insn.immediate.value, repl, repl_len)) { in __apply_relocation() 509 repl - instr); in __apply_relocation() 517 imm += repl - instr; in __apply_relocation() 530 if (need_reloc(next + insn.displacement.value, repl, repl_len)) { in __apply_relocation() 533 repl - instr); in __apply_relocation() 539 void text_poke_apply_relocation(u8 *buf, const u8 * const instr, size_t instrlen, u8 *repl, size_t … in text_poke_apply_relocation() argument 541 __apply_relocation(buf, instr, instrlen, repl, repl_len); in text_poke_apply_relocation() 677 DPRINTK(ALT, "feat: %d*32+%d, old: (%pS (%px) len: %d), repl: (%px, len: %d) flags: 0x%x", in apply_alternatives() [all …]
|
/linux/include/linux/netfilter_ipv6/ |
H A D | ip6_tables.h | 28 const struct ip6t_replace *repl,
|