| /linux/net/ipv4/netfilter/ |
| H A D | arp_tables.c | 314 static int mark_source_chains(const struct xt_table_info *newinfo, in mark_source_chains() argument 324 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 370 if (pos + size >= newinfo->size) in mark_source_chains() 382 newinfo->number)) in mark_source_chains() 387 if (newpos >= newinfo->size) in mark_source_chains() 465 struct xt_table_info *newinfo, in check_entry_size_and_hooks() argument 497 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 502 newinfo->underflow[h] = underflows[h]; in check_entry_size_and_hooks() 532 struct xt_table_info *newinfo, in translate_table() argument 542 newinfo->size = repl->size; in translate_table() [all …]
|
| H A D | ip_tables.c | 367 mark_source_chains(const struct xt_table_info *newinfo, in mark_source_chains() argument 376 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 420 if (pos + size >= newinfo->size) in mark_source_chains() 432 newinfo->number)) in mark_source_chains() 437 if (newpos >= newinfo->size) in mark_source_chains() 588 struct xt_table_info *newinfo, in check_entry_size_and_hooks() argument 620 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 625 newinfo->underflow[h] = underflows[h]; in check_entry_size_and_hooks() 658 newinfo) */ 660 translate_table(struct net *net, struct xt_table_info *newinfo, voi argument 891 compat_calc_entry(const struct ipt_entry * e,const struct xt_table_info * info,const void * base,struct xt_table_info * newinfo) compat_calc_entry() argument 921 compat_table_info(const struct xt_table_info * info,struct xt_table_info * newinfo) compat_table_info() argument 1037 __do_replace(struct net * net,const char * name,unsigned int valid_hooks,struct xt_table_info * newinfo,unsigned int num_counters,void __user * counters_ptr) __do_replace() argument 1107 struct xt_table_info *newinfo; do_replace() local 1287 check_compat_entry_size_and_hooks(struct compat_ipt_entry * e,struct xt_table_info * newinfo,unsigned int * size,const unsigned char * base,const unsigned char * limit) check_compat_entry_size_and_hooks() argument 1357 compat_copy_entry_from_user(struct compat_ipt_entry * e,void ** dstptr,unsigned int * size,struct xt_table_info * newinfo,unsigned char * base) compat_copy_entry_from_user() argument 1397 struct xt_table_info *newinfo, *info; translate_compat_table() local 1495 struct xt_table_info *newinfo; compat_do_replace() local 1730 struct xt_table_info *newinfo; ipt_register_table() local [all...] |
| /linux/net/bridge/netfilter/ |
| H A D | ebtables.c | 467 struct ebt_table_info *newinfo) in ebt_verify_pointers() argument 475 newinfo->hook_entry[i] = NULL; in ebt_verify_pointers() 477 newinfo->entries_size = repl->entries_size; in ebt_verify_pointers() 478 newinfo->nentries = repl->nentries; in ebt_verify_pointers() 482 struct ebt_entry *e = (void *)newinfo->entries + offset; in ebt_verify_pointers() 503 newinfo->hook_entry[i] = (struct ebt_entries *)e; in ebt_verify_pointers() 522 if (!newinfo->hook_entry[i] && in ebt_verify_pointers() 534 const struct ebt_table_info *newinfo, in ebt_check_entry_size_and_hooks() argument 541 if ((void *)e == (void *)newinfo->hook_entry[i]) in ebt_check_entry_size_and_hooks() 594 ebt_get_udc_positions(struct ebt_entry *e, struct ebt_table_info *newinfo, in ebt_get_udc_positions() argument [all …]
|
| /linux/net/ipv6/netfilter/ |
| H A D | ip6_tables.c | 385 mark_source_chains(const struct xt_table_info *newinfo, in mark_source_chains() argument 394 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 438 if (pos + size >= newinfo->size) in mark_source_chains() 450 newinfo->number)) in mark_source_chains() 455 if (newpos >= newinfo->size) in mark_source_chains() 606 struct xt_table_info *newinfo, in check_entry_size_and_hooks() argument 638 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 643 newinfo->underflow[h] = underflows[h]; in check_entry_size_and_hooks() 675 newinfo) */ 677 translate_table(struct net *net, struct xt_table_info *newinfo, voi argument 907 compat_calc_entry(const struct ip6t_entry * e,const struct xt_table_info * info,const void * base,struct xt_table_info * newinfo) compat_calc_entry() argument 937 compat_table_info(const struct xt_table_info * info,struct xt_table_info * newinfo) compat_table_info() argument 1054 __do_replace(struct net * net,const char * name,unsigned int valid_hooks,struct xt_table_info * newinfo,unsigned int num_counters,void __user * counters_ptr) __do_replace() argument 1124 struct xt_table_info *newinfo; do_replace() local 1303 check_compat_entry_size_and_hooks(struct compat_ip6t_entry * e,struct xt_table_info * newinfo,unsigned int * size,const unsigned char * base,const unsigned char * limit) check_compat_entry_size_and_hooks() argument 1373 compat_copy_entry_from_user(struct compat_ip6t_entry * e,void ** dstptr,unsigned int * size,struct xt_table_info * newinfo,unsigned char * base) compat_copy_entry_from_user() argument 1412 struct xt_table_info *newinfo, *info; translate_compat_table() local 1504 struct xt_table_info *newinfo; compat_do_replace() local 1739 struct xt_table_info *newinfo; ip6t_register_table() local [all...] |
| /linux/net/netfilter/ |
| H A D | xt_SECMARK.c | 121 struct xt_secmark_target_info_v1 newinfo = { in secmark_tg_check_v0() local 126 memcpy(newinfo.secctx, info->secctx, SECMARK_SECCTX_MAX); in secmark_tg_check_v0() 128 ret = secmark_tg_check(par->table, &newinfo); in secmark_tg_check_v0() 129 info->secid = newinfo.secid; in secmark_tg_check_v0() 138 struct xt_secmark_target_info_v1 newinfo = { in secmark_tg_v0() local 142 return secmark_tg(skb, &newinfo); in secmark_tg_v0()
|
| H A D | x_tables.c | 1478 struct xt_table_info *newinfo, in xt_replace_table() argument 1485 ret = xt_jumpstack_alloc(newinfo); in xt_replace_table() 1504 newinfo->initial_entries = private->initial_entries; in xt_replace_table() 1510 table->private = newinfo; in xt_replace_table() 1545 struct xt_table_info *newinfo) in xt_register_table() argument 1571 if (!xt_replace_table(table, 0, newinfo, &ret)) in xt_register_table()
|
| /linux/sound/soc/intel/avs/ |
| H A D | utils.c | 113 avs_module_ida_alloc(struct avs_dev *adev, struct avs_mods_info *newinfo, bool purge) in avs_module_ida_alloc() argument 121 if (oldinfo->count >= newinfo->count) in avs_module_ida_alloc() 123 oldinfo->count, newinfo->count); in avs_module_ida_alloc() 127 ida_ptrs = kzalloc_objs(*ida_ptrs, newinfo->count); in avs_module_ida_alloc() 134 for (i = tocopy_count; i < newinfo->count; i++) { in avs_module_ida_alloc()
|
| /linux/include/linux/netfilter/ |
| H A D | x_tables.h | 309 struct xt_table_info *newinfo); 314 struct xt_table_info *newinfo,
|