| /net/netfilter/ |
| A D | nft_set_pipapo.c | 576 if (unlikely(rules == 0)) in pipapo_realloc_mt() 580 if (rules > old_rules && f->rules_alloc > rules) in pipapo_realloc_mt() 584 if (rules < old_rules) { in pipapo_realloc_mt() 594 if (rules > extra && in pipapo_realloc_mt() 608 if (rules > old_rules) { in pipapo_realloc_mt() 941 ret = pipapo_resize(f, f->rules, f->rules + 1); in pipapo_insert() 945 f->rules++; in pipapo_insert() 1333 rulemap[i].to = f->rules; 1429 if (src->rules > 0) { 1634 if (pipapo_resize(f, f->rules, f->rules - rulemap[i].n)) { [all …]
|
| A D | nft_set_pipapo.h | 116 unsigned int rules; member 179 int pipapo_refill(unsigned long *map, unsigned int len, unsigned int rules, 253 unsigned long rules; in pipapo_estimate_size() local 262 rules = ilog2(desc->field_len[i] * BITS_PER_BYTE) * 2; in pipapo_estimate_size() 263 entry_size += rules * in pipapo_estimate_size() 266 entry_size += rules * sizeof(union nft_pipapo_map_bucket); in pipapo_estimate_size()
|
| A D | nft_immediate.c | 115 list_for_each_entry(rule, &chain->rules, list) in nft_immediate_activate() 138 list_for_each_entry(rule, &chain->rules, list) in nft_immediate_chain_deactivate() 219 list_for_each_entry_safe(rule, n, &chain->rules, list) { in nft_immediate_destroy()
|
| A D | Kconfig | 781 The target allows you to create rules in the "mangle" table which alter 897 It also adds the "TOS" target, which allows you to create rules in 925 The target allows you to create rules in the "raw" and "mangle" tables 974 This option adds a `LOG' target, which allows you to create rules in 1099 For it to work you will have to configure certain iptables rules 1112 the tables, chains, rules.
|
| A D | nf_tables_offload.c | 335 list_for_each_entry(rule, &chain->rules, list) { in nft_flow_offload_unbind()
|
| A D | nf_tables_api.c | 731 list_for_each_entry(rule, &ctx->chain->rules, list) { in nft_delrule_by_chain() 2719 INIT_LIST_HEAD(&chain->rules); in nf_tables_addchain() 3227 list_for_each_entry(rule, &chain->rules, list) { in nf_tables_delchain() 3604 list_for_each_entry_rcu(rule, &chain->rules, list, in __nft_rule_lookup() 3718 !list_is_last(&rule->list, &ctx->chain->rules)) { in nf_tables_rule_notify() 3774 list_for_each_entry_rcu(rule, &chain->rules, list) { in __nf_tables_dump_rules() 4084 list_for_each_entry(rule, &chain->rules, list) { in nft_chain_validate() 4395 list_add_tail_rcu(&rule->list, &chain->rules); in nf_tables_newrule() 4400 list_add_rcu(&rule->list, &chain->rules); in nf_tables_newrule() 10275 list_for_each_entry(rule, &chain->rules, list) { in nf_tables_commit_chain_prepare() [all …]
|
| A D | nft_set_pipapo_avx2.c | 1075 b = pipapo_refill(map, bsize, f->rules, fill, f->mt, last); in nft_pipapo_avx2_lookup_slow()
|
| /net/ceph/crush/ |
| A D | crush.c | 122 if (map->rules) { in crush_destroy() 125 crush_destroy_rule(map->rules[b]); in crush_destroy() 126 kfree(map->rules); in crush_destroy()
|
| A D | mapper.c | 47 if (map->rules[i] && in crush_find_rule() 48 map->rules[i]->mask.ruleset == ruleset && in crush_find_rule() 49 map->rules[i]->mask.type == type && in crush_find_rule() 50 map->rules[i]->mask.min_size <= size && in crush_find_rule() 51 map->rules[i]->mask.max_size >= size) in crush_find_rule() 938 rule = map->rules[ruleno]; in crush_do_rule()
|
| /net/bridge/netfilter/ |
| A D | Kconfig | 71 The ebtables broute table is used to define rules that decide between 82 The ebtables filter table is used to define frame filtering rules at 92 The ebtables nat table is used to define rules that alter the MAC 112 MAC/IP address pairs can be matched, f.e. for anti-spoofing rules.
|
| /net/openvswitch/ |
| A D | Kconfig | 34 translate it into packet processing rules.
|
| /net/core/ |
| A D | fib_rules.c | 1357 static void attach_rules(struct list_head *rules, struct net_device *dev) in attach_rules() argument 1361 list_for_each_entry(rule, rules, list) { in attach_rules() 1377 static void detach_rules(struct list_head *rules, struct net_device *dev) in detach_rules() argument 1381 list_for_each_entry(rule, rules, list) { in detach_rules()
|
| /net/bridge/ |
| A D | Kconfig | 28 take this into account when setting up your firewall rules.
|
| /net/ipv4/netfilter/ |
| A D | Kconfig | 190 rules for simple packet filtering at local input, forwarding and 351 rules for simple ARP packet filtering at local input and
|
| /net/ceph/ |
| A D | osdmap.c | 470 c->rules = kcalloc(c->max_rules, sizeof(*c->rules), GFP_NOFS); in crush_decode() 471 if (c->rules == NULL) in crush_decode() 566 dout("rule vec is %p\n", c->rules); in crush_decode() 575 c->rules[i] = NULL; in crush_decode() 593 c->rules[i] = r; in crush_decode()
|
| /net/ipv6/netfilter/ |
| A D | Kconfig | 204 rules for simple packet filtering at local input, forwarding and
|
| /net/wireless/ |
| A D | nl80211.c | 14682 rule = &rdev->coalesce->rules[i]; in nl80211_send_coalesce_rules() 14757 rule = &coalesce->rules[i]; in cfg80211_free_coalesce() 14878 new_coalesce = kzalloc(struct_size(new_coalesce, rules, n_rules), in nl80211_set_coalesce() 14889 &new_coalesce->rules[i]); in nl80211_set_coalesce()
|