/linux-3.4.99/net/netfilter/ |
D | xt_repldata.h | 13 struct type##_replace repl; \ 19 strncpy(tbl->repl.name, info->name, sizeof(tbl->repl.name)); \ 21 tbl->repl.valid_hooks = hook_mask; \ 22 tbl->repl.num_entries = nhooks + 1; \ 23 tbl->repl.size = nhooks * sizeof(struct type##_standard) + \ 28 tbl->repl.hook_entry[hooknum] = bytes; \ 29 tbl->repl.underflow[hooknum] = bytes; \
|
/linux-3.4.99/net/ipv6/netfilter/ |
D | ip6table_filter.c | 52 struct ip6t_replace *repl; in ip6table_filter_net_init() local 54 repl = ip6t_alloc_initial_table(&packet_filter); in ip6table_filter_net_init() 55 if (repl == NULL) in ip6table_filter_net_init() 58 ((struct ip6t_standard *)repl->entries)[1].target.verdict = in ip6table_filter_net_init() 62 ip6t_register_table(net, &packet_filter, repl); in ip6table_filter_net_init() 63 kfree(repl); in ip6table_filter_net_init()
|
D | ip6table_security.c | 53 struct ip6t_replace *repl; in ip6table_security_net_init() local 55 repl = ip6t_alloc_initial_table(&security_table); in ip6table_security_net_init() 56 if (repl == NULL) in ip6table_security_net_init() 59 ip6t_register_table(net, &security_table, repl); in ip6table_security_net_init() 60 kfree(repl); in ip6table_security_net_init()
|
D | ip6table_raw.c | 35 struct ip6t_replace *repl; in ip6table_raw_net_init() local 37 repl = ip6t_alloc_initial_table(&packet_raw); in ip6table_raw_net_init() 38 if (repl == NULL) in ip6table_raw_net_init() 41 ip6t_register_table(net, &packet_raw, repl); in ip6table_raw_net_init() 42 kfree(repl); in ip6table_raw_net_init()
|
D | ip6table_mangle.c | 93 struct ip6t_replace *repl; in ip6table_mangle_net_init() local 95 repl = ip6t_alloc_initial_table(&packet_mangler); in ip6table_mangle_net_init() 96 if (repl == NULL) in ip6table_mangle_net_init() 99 ip6t_register_table(net, &packet_mangler, repl); in ip6table_mangle_net_init() 100 kfree(repl); in ip6table_mangle_net_init()
|
D | ip6_tables.c | 799 const struct ip6t_replace *repl) in translate_table() argument 805 newinfo->size = repl->size; in translate_table() 806 newinfo->number = repl->num_entries; in translate_table() 819 entry0 + repl->size, in translate_table() 820 repl->hook_entry, in translate_table() 821 repl->underflow, in translate_table() 822 repl->valid_hooks); in translate_table() 831 if (i != repl->num_entries) { in translate_table() 833 i, repl->num_entries); in translate_table() 840 if (!(repl->valid_hooks & (1 << i))) in translate_table() [all …]
|
/linux-3.4.99/net/ipv4/netfilter/ |
D | iptable_filter.c | 60 struct ipt_replace *repl; in iptable_filter_net_init() local 62 repl = ipt_alloc_initial_table(&packet_filter); in iptable_filter_net_init() 63 if (repl == NULL) in iptable_filter_net_init() 66 ((struct ipt_standard *)repl->entries)[1].target.verdict = in iptable_filter_net_init() 70 ipt_register_table(net, &packet_filter, repl); in iptable_filter_net_init() 71 kfree(repl); in iptable_filter_net_init()
|
D | arptable_filter.c | 43 struct arpt_replace *repl; in arptable_filter_net_init() local 45 repl = arpt_alloc_initial_table(&packet_filter); in arptable_filter_net_init() 46 if (repl == NULL) in arptable_filter_net_init() 49 arpt_register_table(net, &packet_filter, repl); in arptable_filter_net_init() 50 kfree(repl); in arptable_filter_net_init()
|
D | iptable_raw.c | 43 struct ipt_replace *repl; in iptable_raw_net_init() local 45 repl = ipt_alloc_initial_table(&packet_raw); in iptable_raw_net_init() 46 if (repl == NULL) in iptable_raw_net_init() 49 ipt_register_table(net, &packet_raw, repl); in iptable_raw_net_init() 50 kfree(repl); in iptable_raw_net_init()
|
D | iptable_security.c | 61 struct ipt_replace *repl; in iptable_security_net_init() local 63 repl = ipt_alloc_initial_table(&security_table); in iptable_security_net_init() 64 if (repl == NULL) in iptable_security_net_init() 67 ipt_register_table(net, &security_table, repl); in iptable_security_net_init() 68 kfree(repl); in iptable_security_net_init()
|
D | iptable_mangle.c | 99 struct ipt_replace *repl; in iptable_mangle_net_init() local 101 repl = ipt_alloc_initial_table(&packet_mangler); in iptable_mangle_net_init() 102 if (repl == NULL) in iptable_mangle_net_init() 105 ipt_register_table(net, &packet_mangler, repl); in iptable_mangle_net_init() 106 kfree(repl); in iptable_mangle_net_init()
|
D | nf_nat_rule.c | 162 struct ipt_replace *repl; in nf_nat_rule_net_init() local 164 repl = ipt_alloc_initial_table(&nat_table); in nf_nat_rule_net_init() 165 if (repl == NULL) in nf_nat_rule_net_init() 167 net->ipv4.nat_table = ipt_register_table(net, &nat_table, repl); in nf_nat_rule_net_init() 168 kfree(repl); in nf_nat_rule_net_init()
|
D | arp_tables.c | 619 const struct arpt_replace *repl) in translate_table() argument 625 newinfo->size = repl->size; in translate_table() 626 newinfo->number = repl->num_entries; in translate_table() 640 entry0 + repl->size, in translate_table() 641 repl->hook_entry, in translate_table() 642 repl->underflow, in translate_table() 643 repl->valid_hooks); in translate_table() 655 if (i != repl->num_entries) { in translate_table() 657 i, repl->num_entries); in translate_table() 664 if (!(repl->valid_hooks & (1 << i))) in translate_table() [all …]
|
D | ip_tables.c | 790 const struct ipt_replace *repl) in translate_table() argument 796 newinfo->size = repl->size; in translate_table() 797 newinfo->number = repl->num_entries; in translate_table() 810 entry0 + repl->size, in translate_table() 811 repl->hook_entry, in translate_table() 812 repl->underflow, in translate_table() 813 repl->valid_hooks); in translate_table() 822 if (i != repl->num_entries) { in translate_table() 824 i, repl->num_entries); in translate_table() 831 if (!(repl->valid_hooks & (1 << i))) in translate_table() [all …]
|
/linux-3.4.99/net/bridge/netfilter/ |
D | ebtables.c | 422 static int ebt_verify_pointers(const struct ebt_replace *repl, in ebt_verify_pointers() argument 425 unsigned int limit = repl->entries_size; in ebt_verify_pointers() 426 unsigned int valid_hooks = repl->valid_hooks; in ebt_verify_pointers() 433 newinfo->entries_size = repl->entries_size; in ebt_verify_pointers() 434 newinfo->nentries = repl->nentries; in ebt_verify_pointers() 446 if ((char __user *)repl->hook_entry[i] == in ebt_verify_pointers() 447 repl->entries + offset) in ebt_verify_pointers() 979 static int do_replace_finish(struct net *net, struct ebt_replace *repl, in do_replace_finish() argument 990 if (repl->num_counters) { in do_replace_finish() 991 unsigned long size = repl->num_counters * sizeof(*counterstmp); in do_replace_finish() [all …]
|
/linux-3.4.99/net/xfrm/ |
D | xfrm_replay.c | 110 x->repl->notify(x, XFRM_REPLAY_UPDATE); in xfrm_replay_overflow() 170 x->repl->notify(x, XFRM_REPLAY_UPDATE); in xfrm_replay_advance() 189 x->repl->notify(x, XFRM_REPLAY_UPDATE); in xfrm_replay_overflow_bmp() 282 x->repl->notify(x, XFRM_REPLAY_UPDATE); in xfrm_replay_advance_bmp() 358 x->repl->notify(x, XFRM_REPLAY_UPDATE); in xfrm_replay_overflow_esn() 488 x->repl->notify(x, XFRM_REPLAY_UPDATE); in xfrm_replay_advance_esn() 528 x->repl = &xfrm_replay_esn; in xfrm_init_replay() 530 x->repl = &xfrm_replay_bmp; in xfrm_init_replay() 532 x->repl = &xfrm_replay_legacy; in xfrm_init_replay()
|
D | xfrm_input.c | 176 if (x->repl->check(x, skb, seq)) { in xfrm_input() 215 if (async && x->repl->recheck(x, skb, seq)) { in xfrm_input() 220 x->repl->advance(x, seq); in xfrm_input()
|
D | xfrm_output.c | 70 err = x->repl->overflow(x, skb); in xfrm_output_one()
|
/linux-3.4.99/net/sctp/ |
D | sm_statefuns.c | 299 struct sctp_chunk *repl; in sctp_sf_do_5_1B_init() local 411 repl = sctp_make_init_ack(new_asoc, chunk, GFP_ATOMIC, len); in sctp_sf_do_5_1B_init() 412 if (!repl) in sctp_sf_do_5_1B_init() 433 sctp_addto_chunk(repl, len, unk_param); in sctp_sf_do_5_1B_init() 439 sctp_add_cmd_sf(commands, SCTP_CMD_REPLY, SCTP_CHUNK(repl)); in sctp_sf_do_5_1B_init() 644 struct sctp_chunk *repl; in sctp_sf_do_5_1D_ce() local 772 repl = sctp_make_cookie_ack(new_asoc, chunk); in sctp_sf_do_5_1D_ce() 773 if (!repl) in sctp_sf_do_5_1D_ce() 818 sctp_add_cmd_sf(commands, SCTP_CMD_REPLY, SCTP_CHUNK(repl)); in sctp_sf_do_5_1D_ce() 833 sctp_chunk_free(repl); in sctp_sf_do_5_1D_ce() [all …]
|
/linux-3.4.99/include/linux/netfilter_arp/ |
D | arp_tables.h | 250 const struct arpt_replace *repl);
|
/linux-3.4.99/include/linux/netfilter_ipv4/ |
D | ip_tables.h | 242 const struct ipt_replace *repl);
|
/linux-3.4.99/include/linux/netfilter_ipv6/ |
D | ip6_tables.h | 281 const struct ip6t_replace *repl);
|
/linux-3.4.99/drivers/md/ |
D | raid10.c | 302 int repl = 0; in find_bio_disk() local 308 repl = 1; in find_bio_disk() 319 *replp = repl; in find_bio_disk() 413 int slot, repl; in raid10_end_write_request() local 416 dev = find_bio_disk(conf, r10_bio, bio, &slot, &repl); in raid10_end_write_request() 418 if (repl) in raid10_end_write_request() 422 repl = 0; in raid10_end_write_request() 429 if (repl) in raid10_end_write_request() 473 if (repl) in raid10_end_write_request() 1763 int repl; in end_sync_write() local [all …]
|
D | raid1.c | 1340 struct md_rdev *repl = conf->mirrors[conf->raid_disks + i].rdev; in raid1_spare_active() local 1341 if (repl in raid1_spare_active() 1342 && repl->recovery_offset == MaxSector in raid1_spare_active() 1343 && !test_bit(Faulty, &repl->flags) in raid1_spare_active() 1344 && !test_and_set_bit(In_sync, &repl->flags)) { in raid1_spare_active() 1483 struct md_rdev *repl = in raid1_remove_disk() local 1486 clear_bit(Replacement, &repl->flags); in raid1_remove_disk() 1487 p->rdev = repl; in raid1_remove_disk()
|
/linux-3.4.99/include/net/netfilter/ |
D | nf_conntrack.h | 286 const struct nf_conntrack_tuple *repl,
|