Home
last modified time | relevance | path

Searched refs:tables (Results 1 – 15 of 15) sorted by relevance

/net/ipv4/
A Dudp_tunnel_nic.c139 for (j = 0; j < info->tables[i].n_entries; j++) in udp_tunnel_nic_is_empty()
155 table = &dev->udp_tunnel_nic_info->tables[i]; in udp_tunnel_nic_should_replay()
248 for (j = 0; j < info->tables[i].n_entries; j++) in udp_tunnel_nic_device_sync_by_port()
262 for (j = 0; j < info->tables[i].n_entries; j++) in udp_tunnel_nic_device_sync_by_table()
265 if (j == info->tables[i].n_entries) in udp_tunnel_nic_device_sync_by_table()
428 table = &dev->udp_tunnel_nic_info->tables[i]; in udp_tunnel_nic_try_existing()
463 table = &dev->udp_tunnel_nic_info->tables[i]; in udp_tunnel_nic_add_new()
714 for (j = 0; j < info->tables[i].n_entries; j++) in udp_tunnel_nic_replay()
804 WARN_ON(!info->tables[0].n_entries)) in udp_tunnel_nic_register()
813 if (!info->tables[i].n_entries) in udp_tunnel_nic_register()
[all …]
A DKconfig84 Normally, the routing tables specify a single action to be taken in
/net/ethtool/
A Dtunnels.c55 if (!info->tables[i].n_entries) in ethnl_tunnel_info_reply_size()
58 ret = ethnl_udp_table_reply_size(info->tables[i].tunnel_types, in ethnl_tunnel_info_reply_size()
99 if (!info->tables[i].n_entries) in ethnl_tunnel_info_fill_reply()
107 info->tables[i].n_entries)) in ethnl_tunnel_info_fill_reply()
111 &info->tables[i].tunnel_types, NULL, in ethnl_tunnel_info_fill_reply()
/net/netfilter/
A Dxt_recent.c89 struct list_head tables; member
223 list_for_each_entry(t, &recent_net->tables, list) in recent_table_lookup()
425 list_add_tail(&t->list, &recent_net->tables); in recent_mt_check()
655 list_for_each_entry(t, &recent_net->tables, list) in recent_proc_net_exit()
678 INIT_LIST_HEAD(&recent_net->tables); in recent_net_init()
A Dx_tables.c57 struct list_head tables[NFPROTO_NUMPROTO]; member
1223 list_for_each_entry(t, &xt_net->tables[af], list) { in xt_find_table()
1244 list_for_each_entry(t, &xt_net->tables[af], list) in xt_find_table_lock()
1271 list_for_each_entry(t, &xt_net->tables[af], list) in xt_find_table_lock()
1471 list_for_each_entry(t, &xt_net->tables[table->af], list) { in xt_register_table()
1490 list_add(&table->list, &xt_net->tables[table->af]); in xt_register_table()
1530 return seq_list_start(&xt_net->tables[af], *pos); in xt_table_seq_start()
1541 return seq_list_next(v, &xt_net->tables[af], pos); in xt_table_seq_next()
1965 INIT_LIST_HEAD(&xt_net->tables[i]); in xt_net_init()
1975 WARN_ON_ONCE(!list_empty(&xt_net->tables[i])); in xt_net_exit()
A Dnft_chain_filter.c381 list_for_each_entry(table, &nft_net->tables, list) { in __nf_tables_netdev_event()
A Dnf_tables_api.c986 list_for_each_entry_rcu(table, &nft_net->tables, list, in nft_table_lookup()
1010 list_for_each_entry(table, &nft_net->tables, list) { in nft_table_lookup_byhandle()
1253 list_for_each_entry_rcu(table, &nft_net->tables, list) { in nf_tables_dump_tables()
1644 list_add_tail_rcu(&table->list, &nft_net->tables); in nf_tables_newtable()
9789 list_for_each_entry(table, &nft_net->tables, list) { in __nf_tables_flowtable_event()
10084 list_for_each_entry(table, &nft_net->tables, list) { in nf_tables_validate()
10942 list_for_each_entry(table, &nft_net->tables, list) { in nf_tables_commit()
11984 list_for_each_entry(table, &nft_net->tables, list) { in __nft_release_hooks()
12080 list_for_each_entry(table, &nft_net->tables, list) { in nft_rcv_nl_event()
12118 INIT_LIST_HEAD(&nft_net->tables); in nf_tables_init_net()
[all …]
A DKconfig487 bool "Netfilter nf_tables mixed IPv4/IPv6 tables support"
492 bool "Netfilter nf_tables netdev tables support"
762 bool "Netfilter legacy tables support"
765 Say Y here if you still require support for legacy tables. This is
925 The target allows you to create rules in the "raw" and "mangle" tables
1112 the tables, chains, rules.
A Dnf_tables_offload.c636 list_for_each_entry(table, &nft_net->tables, list) { in __nft_offload_get_chain()
/net/ipv4/netfilter/
A DKconfig15 tristate "Legacy IP tables support"
28 is required by the {ip,nf}tables socket match.
131 tristate "IP tables support (required for filtering/masq/NAT)"
326 # ARP tables
/net/ipv6/netfilter/
A DKconfig11 tristate "Legacy IP6 tables support"
24 is used by the {ip6,nf}tables socket match.
81 tristate "IP6 tables support (required for filtering)"
/net/bridge/netfilter/
A Debtables.c44 struct list_head tables; member
329 list_for_each_entry(table, &ebt_net->tables, list) { in find_inlist_lock_noload()
355 list_for_each_entry(table, &ebt_net->tables, list) { in find_inlist_lock_noload()
1240 list_for_each_entry(t, &ebt_net->tables, list) { in ebt_register_table()
1270 list_add(&table->list, &ebt_net->tables); in ebt_register_table()
1349 list_for_each_entry(t, &ebt_net->tables, list) { in __ebt_find_table()
2558 INIT_LIST_HEAD(&ebt_net->tables); in ebt_pernet_init()
A DKconfig54 tristate "Ethernet Bridge tables (ebtables) support"
65 # tables
/net/ipv6/
A DKconfig245 Support multiple routing tables.
256 avoided by defining different routing tables for the normal and
/net/
A DKconfig318 Allowing drivers for multiqueue hardware with flow filter tables to

Completed in 65 milliseconds