Home
last modified time | relevance | path

Searched refs:rules (Results 1 – 17 of 17) sorted by relevance

/net/netfilter/
A Dnft_set_pipapo.c576 if (unlikely(rules == 0)) in pipapo_realloc_mt()
580 if (rules > old_rules && f->rules_alloc > rules) in pipapo_realloc_mt()
584 if (rules < old_rules) { in pipapo_realloc_mt()
594 if (rules > extra && in pipapo_realloc_mt()
608 if (rules > old_rules) { in pipapo_realloc_mt()
941 ret = pipapo_resize(f, f->rules, f->rules + 1); in pipapo_insert()
945 f->rules++; in pipapo_insert()
1333 rulemap[i].to = f->rules;
1429 if (src->rules > 0) {
1634 if (pipapo_resize(f, f->rules, f->rules - rulemap[i].n)) {
[all …]
A Dnft_set_pipapo.h116 unsigned int rules; member
179 int pipapo_refill(unsigned long *map, unsigned int len, unsigned int rules,
253 unsigned long rules; in pipapo_estimate_size() local
262 rules = ilog2(desc->field_len[i] * BITS_PER_BYTE) * 2; in pipapo_estimate_size()
263 entry_size += rules * in pipapo_estimate_size()
266 entry_size += rules * sizeof(union nft_pipapo_map_bucket); in pipapo_estimate_size()
A Dnft_immediate.c115 list_for_each_entry(rule, &chain->rules, list) in nft_immediate_activate()
138 list_for_each_entry(rule, &chain->rules, list) in nft_immediate_chain_deactivate()
219 list_for_each_entry_safe(rule, n, &chain->rules, list) { in nft_immediate_destroy()
A DKconfig781 The target allows you to create rules in the "mangle" table which alter
897 It also adds the "TOS" target, which allows you to create rules in
925 The target allows you to create rules in the "raw" and "mangle" tables
974 This option adds a `LOG' target, which allows you to create rules in
1099 For it to work you will have to configure certain iptables rules
1112 the tables, chains, rules.
A Dnf_tables_offload.c335 list_for_each_entry(rule, &chain->rules, list) { in nft_flow_offload_unbind()
A Dnf_tables_api.c731 list_for_each_entry(rule, &ctx->chain->rules, list) { in nft_delrule_by_chain()
2719 INIT_LIST_HEAD(&chain->rules); in nf_tables_addchain()
3227 list_for_each_entry(rule, &chain->rules, list) { in nf_tables_delchain()
3604 list_for_each_entry_rcu(rule, &chain->rules, list, in __nft_rule_lookup()
3718 !list_is_last(&rule->list, &ctx->chain->rules)) { in nf_tables_rule_notify()
3774 list_for_each_entry_rcu(rule, &chain->rules, list) { in __nf_tables_dump_rules()
4084 list_for_each_entry(rule, &chain->rules, list) { in nft_chain_validate()
4395 list_add_tail_rcu(&rule->list, &chain->rules); in nf_tables_newrule()
4400 list_add_rcu(&rule->list, &chain->rules); in nf_tables_newrule()
10275 list_for_each_entry(rule, &chain->rules, list) { in nf_tables_commit_chain_prepare()
[all …]
A Dnft_set_pipapo_avx2.c1075 b = pipapo_refill(map, bsize, f->rules, fill, f->mt, last); in nft_pipapo_avx2_lookup_slow()
/net/ceph/crush/
A Dcrush.c122 if (map->rules) { in crush_destroy()
125 crush_destroy_rule(map->rules[b]); in crush_destroy()
126 kfree(map->rules); in crush_destroy()
A Dmapper.c47 if (map->rules[i] && in crush_find_rule()
48 map->rules[i]->mask.ruleset == ruleset && in crush_find_rule()
49 map->rules[i]->mask.type == type && in crush_find_rule()
50 map->rules[i]->mask.min_size <= size && in crush_find_rule()
51 map->rules[i]->mask.max_size >= size) in crush_find_rule()
938 rule = map->rules[ruleno]; in crush_do_rule()
/net/bridge/netfilter/
A DKconfig71 The ebtables broute table is used to define rules that decide between
82 The ebtables filter table is used to define frame filtering rules at
92 The ebtables nat table is used to define rules that alter the MAC
112 MAC/IP address pairs can be matched, f.e. for anti-spoofing rules.
/net/openvswitch/
A DKconfig34 translate it into packet processing rules.
/net/core/
A Dfib_rules.c1357 static void attach_rules(struct list_head *rules, struct net_device *dev) in attach_rules() argument
1361 list_for_each_entry(rule, rules, list) { in attach_rules()
1377 static void detach_rules(struct list_head *rules, struct net_device *dev) in detach_rules() argument
1381 list_for_each_entry(rule, rules, list) { in detach_rules()
/net/bridge/
A DKconfig28 take this into account when setting up your firewall rules.
/net/ipv4/netfilter/
A DKconfig190 rules for simple packet filtering at local input, forwarding and
351 rules for simple ARP packet filtering at local input and
/net/ceph/
A Dosdmap.c470 c->rules = kcalloc(c->max_rules, sizeof(*c->rules), GFP_NOFS); in crush_decode()
471 if (c->rules == NULL) in crush_decode()
566 dout("rule vec is %p\n", c->rules); in crush_decode()
575 c->rules[i] = NULL; in crush_decode()
593 c->rules[i] = r; in crush_decode()
/net/ipv6/netfilter/
A DKconfig204 rules for simple packet filtering at local input, forwarding and
/net/wireless/
A Dnl80211.c14682 rule = &rdev->coalesce->rules[i]; in nl80211_send_coalesce_rules()
14757 rule = &coalesce->rules[i]; in cfg80211_free_coalesce()
14878 new_coalesce = kzalloc(struct_size(new_coalesce, rules, n_rules), in nl80211_set_coalesce()
14889 &new_coalesce->rules[i]); in nl80211_set_coalesce()

Completed in 97 milliseconds