/linux/net/netfilter/ |
H A D | xt_repldata.h | 22 struct type##_replace repl; \ 32 strscpy_pad(tbl->repl.name, info->name, sizeof(tbl->repl.name)); \ 34 tbl->repl.valid_hooks = hook_mask; \ 35 tbl->repl.num_entries = nhooks + 1; \ 36 tbl->repl.size = nhooks * sizeof(struct type##_standard) + \ 41 tbl->repl.hook_entry[hooknum] = bytes; \ 42 tbl->repl.underflow[hooknum] = bytes; \
|
H A D | nf_conntrack_sane.c | 74 struct sane_reply_net_start repl; in help() member 130 reply = skb_header_pointer(skb, dataoff, datalen, &buf.repl); in help()
|
/linux/fs/xfs/scrub/ |
H A D | cow_repair.c | 411 struct xrep_cow_extent *repl) in xrep_cow_alloc() argument 438 repl->fsbno = args.fsbno; in xrep_cow_alloc() 439 repl->len = args.len; in xrep_cow_alloc() 451 struct xrep_cow_extent *repl) in xrep_cow_alloc_rt() argument 461 false, &repl->fsbno, &repl->len); in xrep_cow_alloc_rt() 465 xfs_refcount_alloc_cow_extent(sc->tp, true, repl->fsbno, repl->len); in xrep_cow_alloc_rt() 518 const struct xrep_cow_extent *repl) in xrep_cow_replace_mapping() argument 522 ASSERT(repl->len > 0); in xrep_cow_replace_mapping() 525 trace_xrep_cow_replace_mapping(ip, got, repl->fsbno, repl->len); in xrep_cow_replace_mapping() 527 if (got->br_blockcount == repl->len) { in xrep_cow_replace_mapping() [all …]
|
/linux/net/ipv6/netfilter/ |
H A D | ip6table_filter.c | 38 struct ip6t_replace *repl; in ip6table_filter_table_init() local 41 repl = ip6t_alloc_initial_table(&packet_filter); in ip6table_filter_table_init() 42 if (repl == NULL) in ip6table_filter_table_init() 45 ((struct ip6t_standard *)repl->entries)[1].target.verdict = in ip6table_filter_table_init() 48 err = ip6t_register_table(net, &packet_filter, repl, filter_ops); in ip6table_filter_table_init() 49 kfree(repl); in ip6table_filter_table_init()
|
H A D | ip6table_security.c | 39 struct ip6t_replace *repl; in ip6table_security_table_init() local 42 repl = ip6t_alloc_initial_table(&security_table); in ip6table_security_table_init() 43 if (repl == NULL) in ip6table_security_table_init() 45 ret = ip6t_register_table(net, &security_table, repl, sectbl_ops); in ip6table_security_table_init() 46 kfree(repl); in ip6table_security_table_init()
|
H A D | ip6table_nat.c | 110 struct ip6t_replace *repl; in ip6table_nat_table_init() local 113 repl = ip6t_alloc_initial_table(&nf_nat_ipv6_table); in ip6table_nat_table_init() 114 if (repl == NULL) in ip6table_nat_table_init() 116 ret = ip6t_register_table(net, &nf_nat_ipv6_table, repl, in ip6table_nat_table_init() 119 kfree(repl); in ip6table_nat_table_init() 127 kfree(repl); in ip6table_nat_table_init()
|
H A D | ip6table_raw.c | 38 struct ip6t_replace *repl; in ip6table_raw_table_init() local 45 repl = ip6t_alloc_initial_table(table); in ip6table_raw_table_init() 46 if (repl == NULL) in ip6table_raw_table_init() 48 ret = ip6t_register_table(net, table, repl, rawtable_ops); in ip6table_raw_table_init() 49 kfree(repl); in ip6table_raw_table_init()
|
H A D | ip6table_mangle.c | 79 struct ip6t_replace *repl; in ip6table_mangle_table_init() local 82 repl = ip6t_alloc_initial_table(&packet_mangler); in ip6table_mangle_table_init() 83 if (repl == NULL) in ip6table_mangle_table_init() 85 ret = ip6t_register_table(net, &packet_mangler, repl, mangle_ops); in ip6table_mangle_table_init() 86 kfree(repl); in ip6table_mangle_table_init()
|
H A D | ip6_tables.c | 678 const struct ip6t_replace *repl) in translate_table() argument 686 newinfo->size = repl->size; in translate_table() 687 newinfo->number = repl->num_entries; in translate_table() 702 entry0 + repl->size, in translate_table() 703 repl->hook_entry, in translate_table() 704 repl->underflow, in translate_table() 705 repl->valid_hooks); in translate_table() 708 if (i < repl->num_entries) in translate_table() 717 if (i != repl->num_entries) in translate_table() 720 ret = xt_check_table_hooks(newinfo, repl->valid_hooks); in translate_table() [all …]
|
/linux/net/ipv4/netfilter/ |
H A D | iptable_filter.c | 39 struct ipt_replace *repl; in iptable_filter_table_init() local 42 repl = ipt_alloc_initial_table(&packet_filter); in iptable_filter_table_init() 43 if (repl == NULL) in iptable_filter_table_init() 46 ((struct ipt_standard *)repl->entries)[1].target.verdict = in iptable_filter_table_init() 49 err = ipt_register_table(net, &packet_filter, repl, filter_ops); in iptable_filter_table_init() 50 kfree(repl); in iptable_filter_table_init()
|
H A D | iptable_security.c | 40 struct ipt_replace *repl; in iptable_security_table_init() local 43 repl = ipt_alloc_initial_table(&security_table); in iptable_security_table_init() 44 if (repl == NULL) in iptable_security_table_init() 46 ret = ipt_register_table(net, &security_table, repl, sectbl_ops); in iptable_security_table_init() 47 kfree(repl); in iptable_security_table_init()
|
H A D | arptable_filter.c | 33 struct arpt_replace *repl; in arptable_filter_table_init() local 36 repl = arpt_alloc_initial_table(&packet_filter); in arptable_filter_table_init() 37 if (repl == NULL) in arptable_filter_table_init() 39 err = arpt_register_table(net, &packet_filter, repl, arpfilter_ops); in arptable_filter_table_init() 40 kfree(repl); in arptable_filter_table_init()
|
H A D | iptable_nat.c | 108 struct ipt_replace *repl; in iptable_nat_table_init() local 111 repl = ipt_alloc_initial_table(&nf_nat_ipv4_table); in iptable_nat_table_init() 112 if (repl == NULL) in iptable_nat_table_init() 115 ret = ipt_register_table(net, &nf_nat_ipv4_table, repl, NULL); in iptable_nat_table_init() 117 kfree(repl); in iptable_nat_table_init() 125 kfree(repl); in iptable_nat_table_init()
|
H A D | iptable_raw.c | 39 struct ipt_replace *repl; in iptable_raw_table_init() local 46 repl = ipt_alloc_initial_table(table); in iptable_raw_table_init() 47 if (repl == NULL) in iptable_raw_table_init() 49 ret = ipt_register_table(net, table, repl, rawtable_ops); in iptable_raw_table_init() 50 kfree(repl); in iptable_raw_table_init()
|
H A D | iptable_mangle.c | 86 struct ipt_replace *repl; in iptable_mangle_table_init() local 89 repl = ipt_alloc_initial_table(&packet_mangler); in iptable_mangle_table_init() 90 if (repl == NULL) in iptable_mangle_table_init() 92 ret = ipt_register_table(net, &packet_mangler, repl, mangle_ops); in iptable_mangle_table_init() 93 kfree(repl); in iptable_mangle_table_init()
|
H A D | arp_tables.c | 522 const struct arpt_replace *repl) in translate_table() argument 530 newinfo->size = repl->size; in translate_table() 531 newinfo->number = repl->num_entries; in translate_table() 547 entry0 + repl->size, in translate_table() 548 repl->hook_entry, in translate_table() 549 repl->underflow, in translate_table() 550 repl->valid_hooks); in translate_table() 553 if (i < repl->num_entries) in translate_table() 562 if (i != repl->num_entries) in translate_table() 565 ret = xt_check_table_hooks(newinfo, repl->valid_hooks); in translate_table() [all …]
|
H A D | ip_tables.c | 661 const struct ipt_replace *repl) in translate_table() argument 669 newinfo->size = repl->size; in translate_table() 670 newinfo->number = repl->num_entries; in translate_table() 685 entry0 + repl->size, in translate_table() 686 repl->hook_entry, in translate_table() 687 repl->underflow, in translate_table() 688 repl->valid_hooks); in translate_table() 691 if (i < repl->num_entries) in translate_table() 700 if (i != repl->num_entries) in translate_table() 703 ret = xt_check_table_hooks(newinfo, repl->valid_hooks); in translate_table() [all …]
|
/linux/net/bridge/netfilter/ |
H A D | ebtables.c | 466 static int ebt_verify_pointers(const struct ebt_replace *repl, in ebt_verify_pointers() argument 469 unsigned int limit = repl->entries_size; in ebt_verify_pointers() 470 unsigned int valid_hooks = repl->valid_hooks; in ebt_verify_pointers() 477 newinfo->entries_size = repl->entries_size; in ebt_verify_pointers() 478 newinfo->nentries = repl->nentries; in ebt_verify_pointers() 490 if ((char __user *)repl->hook_entry[i] == in ebt_verify_pointers() 491 repl->entries + offset) in ebt_verify_pointers() 1008 static int do_replace_finish(struct net *net, struct ebt_replace *repl, in do_replace_finish() argument 1020 if (repl->num_counters) { in do_replace_finish() 1021 unsigned long size = repl->num_counters * sizeof(*counterstmp); in do_replace_finish() [all …]
|
/linux/Documentation/sphinx/ |
H A D | automarkup.py | 82 repl = [ ] 113 repl.append(nodes.Text(t[done:m.start()])) 119 repl.append(markup_func[m.re](docname, app, m)) 123 repl.append(nodes.Text(t[done:])) 124 return repl
|
/linux/net/sctp/ |
H A D | sm_statefuns.c | 324 struct sctp_chunk *chunk = arg, *repl, *err_chunk; in sctp_sf_do_5_1B_init() local 441 repl = sctp_make_init_ack(new_asoc, chunk, GFP_ATOMIC, len); in sctp_sf_do_5_1B_init() 442 if (!repl) in sctp_sf_do_5_1B_init() 463 sctp_addto_chunk(repl, len, unk_param); in sctp_sf_do_5_1B_init() 469 sctp_add_cmd_sf(commands, SCTP_CMD_REPLY, SCTP_CHUNK(repl)); in sctp_sf_do_5_1B_init() 711 struct sctp_chunk *repl; in sctp_sf_do_5_1D_ce() local 817 repl = sctp_make_cookie_ack(new_asoc, chunk); in sctp_sf_do_5_1D_ce() 818 if (!repl) in sctp_sf_do_5_1D_ce() 871 sctp_add_cmd_sf(commands, SCTP_CMD_REPLY, SCTP_CHUNK(repl)); in sctp_sf_do_5_1D_ce() 892 sctp_chunk_free(repl); in sctp_sf_do_5_1D_ce() [all …]
|
/linux/include/linux/netfilter_ipv6/ |
H A D | ip6_tables.h | 28 const struct ip6t_replace *repl,
|
/linux/include/linux/netfilter_ipv4/ |
H A D | ip_tables.h | 26 const struct ipt_replace *repl,
|
/linux/include/linux/netfilter_arp/ |
H A D | arp_tables.h | 53 const struct arpt_replace *repl,
|
/linux/drivers/md/ |
H A D | raid10.c | 355 int repl = 0; in find_bio_disk() local 361 repl = 1; in find_bio_disk() 371 *replp = repl; in find_bio_disk() 455 int slot, repl; in raid10_end_write_request() local 462 dev = find_bio_disk(conf, r10_bio, bio, &slot, &repl); in raid10_end_write_request() 464 if (repl) in raid10_end_write_request() 468 repl = 0; in raid10_end_write_request() 475 if (repl) in raid10_end_write_request() 531 if (repl) in raid10_end_write_request() 1588 int slot, repl; in raid10_end_discard_request() local [all …]
|
/linux/tools/testing/selftests/net/netfilter/ |
H A D | nft_flowtable.sh | 234 local orig repl 236 repl=$(ip netns exec "$nsr1" nft reset counter inet filter routed_repl | grep packets) 239 local repl_cnt=${repl#*bytes}
|