Searched refs:tables (Results 1 – 15 of 15) sorted by relevance
| /net/ipv4/ |
| A D | udp_tunnel_nic.c | 139 for (j = 0; j < info->tables[i].n_entries; j++) in udp_tunnel_nic_is_empty() 155 table = &dev->udp_tunnel_nic_info->tables[i]; in udp_tunnel_nic_should_replay() 248 for (j = 0; j < info->tables[i].n_entries; j++) in udp_tunnel_nic_device_sync_by_port() 262 for (j = 0; j < info->tables[i].n_entries; j++) in udp_tunnel_nic_device_sync_by_table() 265 if (j == info->tables[i].n_entries) in udp_tunnel_nic_device_sync_by_table() 428 table = &dev->udp_tunnel_nic_info->tables[i]; in udp_tunnel_nic_try_existing() 463 table = &dev->udp_tunnel_nic_info->tables[i]; in udp_tunnel_nic_add_new() 714 for (j = 0; j < info->tables[i].n_entries; j++) in udp_tunnel_nic_replay() 804 WARN_ON(!info->tables[0].n_entries)) in udp_tunnel_nic_register() 813 if (!info->tables[i].n_entries) in udp_tunnel_nic_register() [all …]
|
| A D | Kconfig | 84 Normally, the routing tables specify a single action to be taken in
|
| /net/ethtool/ |
| A D | tunnels.c | 55 if (!info->tables[i].n_entries) in ethnl_tunnel_info_reply_size() 58 ret = ethnl_udp_table_reply_size(info->tables[i].tunnel_types, in ethnl_tunnel_info_reply_size() 99 if (!info->tables[i].n_entries) in ethnl_tunnel_info_fill_reply() 107 info->tables[i].n_entries)) in ethnl_tunnel_info_fill_reply() 111 &info->tables[i].tunnel_types, NULL, in ethnl_tunnel_info_fill_reply()
|
| /net/netfilter/ |
| A D | xt_recent.c | 89 struct list_head tables; member 223 list_for_each_entry(t, &recent_net->tables, list) in recent_table_lookup() 425 list_add_tail(&t->list, &recent_net->tables); in recent_mt_check() 655 list_for_each_entry(t, &recent_net->tables, list) in recent_proc_net_exit() 678 INIT_LIST_HEAD(&recent_net->tables); in recent_net_init()
|
| A D | x_tables.c | 57 struct list_head tables[NFPROTO_NUMPROTO]; member 1223 list_for_each_entry(t, &xt_net->tables[af], list) { in xt_find_table() 1244 list_for_each_entry(t, &xt_net->tables[af], list) in xt_find_table_lock() 1271 list_for_each_entry(t, &xt_net->tables[af], list) in xt_find_table_lock() 1471 list_for_each_entry(t, &xt_net->tables[table->af], list) { in xt_register_table() 1490 list_add(&table->list, &xt_net->tables[table->af]); in xt_register_table() 1530 return seq_list_start(&xt_net->tables[af], *pos); in xt_table_seq_start() 1541 return seq_list_next(v, &xt_net->tables[af], pos); in xt_table_seq_next() 1965 INIT_LIST_HEAD(&xt_net->tables[i]); in xt_net_init() 1975 WARN_ON_ONCE(!list_empty(&xt_net->tables[i])); in xt_net_exit()
|
| A D | nft_chain_filter.c | 381 list_for_each_entry(table, &nft_net->tables, list) { in __nf_tables_netdev_event()
|
| A D | nf_tables_api.c | 986 list_for_each_entry_rcu(table, &nft_net->tables, list, in nft_table_lookup() 1010 list_for_each_entry(table, &nft_net->tables, list) { in nft_table_lookup_byhandle() 1253 list_for_each_entry_rcu(table, &nft_net->tables, list) { in nf_tables_dump_tables() 1644 list_add_tail_rcu(&table->list, &nft_net->tables); in nf_tables_newtable() 9789 list_for_each_entry(table, &nft_net->tables, list) { in __nf_tables_flowtable_event() 10084 list_for_each_entry(table, &nft_net->tables, list) { in nf_tables_validate() 10942 list_for_each_entry(table, &nft_net->tables, list) { in nf_tables_commit() 11984 list_for_each_entry(table, &nft_net->tables, list) { in __nft_release_hooks() 12080 list_for_each_entry(table, &nft_net->tables, list) { in nft_rcv_nl_event() 12118 INIT_LIST_HEAD(&nft_net->tables); in nf_tables_init_net() [all …]
|
| A D | Kconfig | 487 bool "Netfilter nf_tables mixed IPv4/IPv6 tables support" 492 bool "Netfilter nf_tables netdev tables support" 762 bool "Netfilter legacy tables support" 765 Say Y here if you still require support for legacy tables. This is 925 The target allows you to create rules in the "raw" and "mangle" tables 1112 the tables, chains, rules.
|
| A D | nf_tables_offload.c | 636 list_for_each_entry(table, &nft_net->tables, list) { in __nft_offload_get_chain()
|
| /net/ipv4/netfilter/ |
| A D | Kconfig | 15 tristate "Legacy IP tables support" 28 is required by the {ip,nf}tables socket match. 131 tristate "IP tables support (required for filtering/masq/NAT)" 326 # ARP tables
|
| /net/ipv6/netfilter/ |
| A D | Kconfig | 11 tristate "Legacy IP6 tables support" 24 is used by the {ip6,nf}tables socket match. 81 tristate "IP6 tables support (required for filtering)"
|
| /net/bridge/netfilter/ |
| A D | ebtables.c | 44 struct list_head tables; member 329 list_for_each_entry(table, &ebt_net->tables, list) { in find_inlist_lock_noload() 355 list_for_each_entry(table, &ebt_net->tables, list) { in find_inlist_lock_noload() 1240 list_for_each_entry(t, &ebt_net->tables, list) { in ebt_register_table() 1270 list_add(&table->list, &ebt_net->tables); in ebt_register_table() 1349 list_for_each_entry(t, &ebt_net->tables, list) { in __ebt_find_table() 2558 INIT_LIST_HEAD(&ebt_net->tables); in ebt_pernet_init()
|
| A D | Kconfig | 54 tristate "Ethernet Bridge tables (ebtables) support" 65 # tables
|
| /net/ipv6/ |
| A D | Kconfig | 245 Support multiple routing tables. 256 avoided by defining different routing tables for the normal and
|
| /net/ |
| A D | Kconfig | 318 Allowing drivers for multiqueue hardware with flow filter tables to
|
Completed in 65 milliseconds