/kernel/linux/linux-6.6/net/bridge/netfilter/ |
H A D | ebtables.c | 467 struct ebt_table_info *newinfo) in ebt_verify_pointers() 475 newinfo->hook_entry[i] = NULL; in ebt_verify_pointers() 477 newinfo->entries_size = repl->entries_size; in ebt_verify_pointers() 478 newinfo->nentries = repl->nentries; in ebt_verify_pointers() 482 struct ebt_entry *e = (void *)newinfo->entries + offset; in ebt_verify_pointers() 503 newinfo->hook_entry[i] = (struct ebt_entries *)e; in ebt_verify_pointers() 522 if (!newinfo->hook_entry[i] && in ebt_verify_pointers() 534 const struct ebt_table_info *newinfo, in ebt_check_entry_size_and_hooks() 541 if ((void *)e == (void *)newinfo->hook_entry[i]) in ebt_check_entry_size_and_hooks() 594 ebt_get_udc_positions(struct ebt_entry *e, struct ebt_table_info *newinfo, in ebt_get_udc_positions() argument 466 ebt_verify_pointers(const struct ebt_replace *repl, struct ebt_table_info *newinfo) ebt_verify_pointers() argument 533 ebt_check_entry_size_and_hooks(const struct ebt_entry *e, const struct ebt_table_info *newinfo, unsigned int *n, unsigned int *cnt, unsigned int *totalcnt, unsigned int *udc_cnt) ebt_check_entry_size_and_hooks() argument 681 ebt_check_entry(struct ebt_entry *e, struct net *net, const struct ebt_table_info *newinfo, const char *name, unsigned int *cnt, struct ebt_cl_stack *cl_s, unsigned int udc_cnt) ebt_check_entry() argument 867 translate_table(struct net *net, const char *name, struct ebt_table_info *newinfo) translate_table() argument 1008 do_replace_finish(struct net *net, struct ebt_replace *repl, struct ebt_table_info *newinfo) do_replace_finish() argument 1111 struct ebt_table_info *newinfo; do_replace() local 1183 struct ebt_table_info *newinfo; ebt_register_table() local 1777 compat_calc_entry(const struct ebt_entry *e, const struct ebt_table_info *info, const void *base, struct compat_ebt_replace *newinfo) compat_calc_entry() argument 1831 compat_table_info(const struct ebt_table_info *info, struct compat_ebt_replace *newinfo) compat_table_info() argument 2251 struct ebt_table_info *newinfo; compat_do_replace() local [all...] |
/kernel/linux/linux-5.10/net/bridge/netfilter/ |
H A D | ebtables.c | 428 struct ebt_table_info *newinfo) in ebt_verify_pointers() 436 newinfo->hook_entry[i] = NULL; in ebt_verify_pointers() 438 newinfo->entries_size = repl->entries_size; in ebt_verify_pointers() 439 newinfo->nentries = repl->nentries; in ebt_verify_pointers() 443 struct ebt_entry *e = (void *)newinfo->entries + offset; in ebt_verify_pointers() 464 newinfo->hook_entry[i] = (struct ebt_entries *)e; in ebt_verify_pointers() 483 if (!newinfo->hook_entry[i] && in ebt_verify_pointers() 495 const struct ebt_table_info *newinfo, in ebt_check_entry_size_and_hooks() 502 if ((void *)e == (void *)newinfo->hook_entry[i]) in ebt_check_entry_size_and_hooks() 555 ebt_get_udc_positions(struct ebt_entry *e, struct ebt_table_info *newinfo, in ebt_get_udc_positions() argument 427 ebt_verify_pointers(const struct ebt_replace *repl, struct ebt_table_info *newinfo) ebt_verify_pointers() argument 494 ebt_check_entry_size_and_hooks(const struct ebt_entry *e, const struct ebt_table_info *newinfo, unsigned int *n, unsigned int *cnt, unsigned int *totalcnt, unsigned int *udc_cnt) ebt_check_entry_size_and_hooks() argument 642 ebt_check_entry(struct ebt_entry *e, struct net *net, const struct ebt_table_info *newinfo, const char *name, unsigned int *cnt, struct ebt_cl_stack *cl_s, unsigned int udc_cnt) ebt_check_entry() argument 828 translate_table(struct net *net, const char *name, struct ebt_table_info *newinfo) translate_table() argument 967 do_replace_finish(struct net *net, struct ebt_replace *repl, struct ebt_table_info *newinfo) do_replace_finish() argument 1070 struct ebt_table_info *newinfo; do_replace() local 1142 struct ebt_table_info *newinfo; ebt_register_table() local 1667 compat_calc_entry(const struct ebt_entry *e, const struct ebt_table_info *info, const void *base, struct compat_ebt_replace *newinfo) compat_calc_entry() argument 1721 compat_table_info(const struct ebt_table_info *info, struct compat_ebt_replace *newinfo) compat_table_info() argument 2141 struct ebt_table_info *newinfo; compat_do_replace() local [all...] |
/kernel/linux/linux-6.6/net/ipv4/netfilter/ |
H A D | ip_tables.c | 367 mark_source_chains(const struct xt_table_info *newinfo, in mark_source_chains() argument 376 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 420 if (pos + size >= newinfo->size) in mark_source_chains() 432 newinfo->number)) in mark_source_chains() 437 if (newpos >= newinfo->size) in mark_source_chains() 588 struct xt_table_info *newinfo, in check_entry_size_and_hooks() 620 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 625 newinfo->underflow[h] = underflows[h]; in check_entry_size_and_hooks() 658 newinfo) */ 660 translate_table(struct net *net, struct xt_table_info *newinfo, voi argument 587 check_entry_size_and_hooks(struct ipt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) check_entry_size_and_hooks() argument 889 compat_calc_entry(const struct ipt_entry *e, const struct xt_table_info *info, const void *base, struct xt_table_info *newinfo) compat_calc_entry() argument 920 compat_table_info(const struct xt_table_info *info, struct xt_table_info *newinfo) compat_table_info() argument 1036 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) __do_replace() argument 1107 struct xt_table_info *newinfo; do_replace() local 1282 check_compat_entry_size_and_hooks(struct compat_ipt_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit) check_compat_entry_size_and_hooks() argument 1351 compat_copy_entry_from_user(struct compat_ipt_entry *e, void **dstptr, unsigned int *size, struct xt_table_info *newinfo, unsigned char *base) compat_copy_entry_from_user() argument 1393 struct xt_table_info *newinfo, *info; translate_compat_table() local 1491 struct xt_table_info *newinfo; compat_do_replace() local 1722 struct xt_table_info *newinfo; ipt_register_table() local [all...] |
H A D | arp_tables.c | 302 static int mark_source_chains(const struct xt_table_info *newinfo, in mark_source_chains() argument 312 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 358 if (pos + size >= newinfo->size) in mark_source_chains() 370 newinfo->number)) in mark_source_chains() 375 if (newpos >= newinfo->size) in mark_source_chains() 453 struct xt_table_info *newinfo, in check_entry_size_and_hooks() 485 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 490 newinfo->underflow[h] = underflows[h]; in check_entry_size_and_hooks() 517 * newinfo). 520 struct xt_table_info *newinfo, in translate_table() 452 check_entry_size_and_hooks(struct arpt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) check_entry_size_and_hooks() argument 519 translate_table(struct net *net, struct xt_table_info *newinfo, void *entry0, const struct arpt_replace *repl) translate_table() argument 736 compat_calc_entry(const struct arpt_entry *e, const struct xt_table_info *info, const void *base, struct xt_table_info *newinfo) compat_calc_entry() argument 765 compat_table_info(const struct xt_table_info *info, struct xt_table_info *newinfo) compat_table_info() argument 880 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) __do_replace() argument 955 struct xt_table_info *newinfo; do_replace() local 1070 check_compat_entry_size_and_hooks(struct compat_arpt_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit) check_compat_entry_size_and_hooks() argument 1125 compat_copy_entry_from_user(struct compat_arpt_entry *e, void **dstptr, unsigned int *size, struct xt_table_info *newinfo, unsigned char *base) compat_copy_entry_from_user() argument 1161 struct xt_table_info *newinfo, *info; translate_compat_table() local 1253 struct xt_table_info *newinfo; compat_do_replace() local 1508 struct xt_table_info *newinfo; arpt_register_table() local [all...] |
/kernel/linux/linux-6.6/net/ipv6/netfilter/ |
H A D | ip6_tables.c | 385 mark_source_chains(const struct xt_table_info *newinfo, in mark_source_chains() argument 394 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 438 if (pos + size >= newinfo->size) in mark_source_chains() 450 newinfo->number)) in mark_source_chains() 455 if (newpos >= newinfo->size) in mark_source_chains() 606 struct xt_table_info *newinfo, in check_entry_size_and_hooks() 638 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 643 newinfo->underflow[h] = underflows[h]; in check_entry_size_and_hooks() 675 newinfo) */ 677 translate_table(struct net *net, struct xt_table_info *newinfo, voi argument 605 check_entry_size_and_hooks(struct ip6t_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) check_entry_size_and_hooks() argument 905 compat_calc_entry(const struct ip6t_entry *e, const struct xt_table_info *info, const void *base, struct xt_table_info *newinfo) compat_calc_entry() argument 936 compat_table_info(const struct xt_table_info *info, struct xt_table_info *newinfo) compat_table_info() argument 1053 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) __do_replace() argument 1124 struct xt_table_info *newinfo; do_replace() local 1298 check_compat_entry_size_and_hooks(struct compat_ip6t_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit) check_compat_entry_size_and_hooks() argument 1367 compat_copy_entry_from_user(struct compat_ip6t_entry *e, void **dstptr, unsigned int *size, struct xt_table_info *newinfo, unsigned char *base) compat_copy_entry_from_user() argument 1408 struct xt_table_info *newinfo, *info; translate_compat_table() local 1500 struct xt_table_info *newinfo; compat_do_replace() local 1731 struct xt_table_info *newinfo; ip6t_register_table() local [all...] |
/kernel/linux/linux-5.10/net/ipv4/netfilter/ |
H A D | ip_tables.c | 368 mark_source_chains(const struct xt_table_info *newinfo, in mark_source_chains() argument 377 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 421 if (pos + size >= newinfo->size) in mark_source_chains() 433 newinfo->number)) in mark_source_chains() 438 if (newpos >= newinfo->size) in mark_source_chains() 589 struct xt_table_info *newinfo, in check_entry_size_and_hooks() 621 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 626 newinfo->underflow[h] = underflows[h]; in check_entry_size_and_hooks() 659 newinfo) */ 661 translate_table(struct net *net, struct xt_table_info *newinfo, voi argument 588 check_entry_size_and_hooks(struct ipt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) check_entry_size_and_hooks() argument 890 compat_calc_entry(const struct ipt_entry *e, const struct xt_table_info *info, const void *base, struct xt_table_info *newinfo) compat_calc_entry() argument 921 compat_table_info(const struct xt_table_info *info, struct xt_table_info *newinfo) compat_table_info() argument 1037 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) __do_replace() argument 1108 struct xt_table_info *newinfo; do_replace() local 1287 check_compat_entry_size_and_hooks(struct compat_ipt_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit) check_compat_entry_size_and_hooks() argument 1356 compat_copy_entry_from_user(struct compat_ipt_entry *e, void **dstptr, unsigned int *size, struct xt_table_info *newinfo, unsigned char *base) compat_copy_entry_from_user() argument 1398 struct xt_table_info *newinfo, *info; translate_compat_table() local 1496 struct xt_table_info *newinfo; compat_do_replace() local 1729 struct xt_table_info *newinfo; ipt_register_table() local [all...] |
H A D | arp_tables.c | 301 static int mark_source_chains(const struct xt_table_info *newinfo, in mark_source_chains() argument 311 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 357 if (pos + size >= newinfo->size) in mark_source_chains() 369 newinfo->number)) in mark_source_chains() 374 if (newpos >= newinfo->size) in mark_source_chains() 452 struct xt_table_info *newinfo, in check_entry_size_and_hooks() 484 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 489 newinfo->underflow[h] = underflows[h]; in check_entry_size_and_hooks() 516 * newinfo). 519 struct xt_table_info *newinfo, in translate_table() 451 check_entry_size_and_hooks(struct arpt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) check_entry_size_and_hooks() argument 518 translate_table(struct net *net, struct xt_table_info *newinfo, void *entry0, const struct arpt_replace *repl) translate_table() argument 735 compat_calc_entry(const struct arpt_entry *e, const struct xt_table_info *info, const void *base, struct xt_table_info *newinfo) compat_calc_entry() argument 764 compat_table_info(const struct xt_table_info *info, struct xt_table_info *newinfo) compat_table_info() argument 879 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) __do_replace() argument 954 struct xt_table_info *newinfo; do_replace() local 1073 check_compat_entry_size_and_hooks(struct compat_arpt_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit) check_compat_entry_size_and_hooks() argument 1128 compat_copy_entry_from_user(struct compat_arpt_entry *e, void **dstptr, unsigned int *size, struct xt_table_info *newinfo, unsigned char *base) compat_copy_entry_from_user() argument 1164 struct xt_table_info *newinfo, *info; translate_compat_table() local 1256 struct xt_table_info *newinfo; compat_do_replace() local 1514 struct xt_table_info *newinfo; arpt_register_table() local [all...] |
/kernel/linux/linux-5.10/net/ipv6/netfilter/ |
H A D | ip6_tables.c | 387 mark_source_chains(const struct xt_table_info *newinfo, in mark_source_chains() argument 396 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 440 if (pos + size >= newinfo->size) in mark_source_chains() 452 newinfo->number)) in mark_source_chains() 457 if (newpos >= newinfo->size) in mark_source_chains() 608 struct xt_table_info *newinfo, in check_entry_size_and_hooks() 640 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 645 newinfo->underflow[h] = underflows[h]; in check_entry_size_and_hooks() 677 newinfo) */ 679 translate_table(struct net *net, struct xt_table_info *newinfo, voi argument 607 check_entry_size_and_hooks(struct ip6t_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) check_entry_size_and_hooks() argument 907 compat_calc_entry(const struct ip6t_entry *e, const struct xt_table_info *info, const void *base, struct xt_table_info *newinfo) compat_calc_entry() argument 938 compat_table_info(const struct xt_table_info *info, struct xt_table_info *newinfo) compat_table_info() argument 1055 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) __do_replace() argument 1126 struct xt_table_info *newinfo; do_replace() local 1304 check_compat_entry_size_and_hooks(struct compat_ip6t_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit) check_compat_entry_size_and_hooks() argument 1373 compat_copy_entry_from_user(struct compat_ip6t_entry *e, void **dstptr, unsigned int *size, struct xt_table_info *newinfo, unsigned char *base) compat_copy_entry_from_user() argument 1414 struct xt_table_info *newinfo, *info; translate_compat_table() local 1506 struct xt_table_info *newinfo; compat_do_replace() local 1740 struct xt_table_info *newinfo; ip6t_register_table() local [all...] |
/kernel/linux/linux-5.10/net/netfilter/ |
H A D | xt_SECMARK.c | 121 struct xt_secmark_target_info_v1 newinfo = { in secmark_tg_check_v0() local 126 memcpy(newinfo.secctx, info->secctx, SECMARK_SECCTX_MAX); in secmark_tg_check_v0() 128 ret = secmark_tg_check(par->table, &newinfo); in secmark_tg_check_v0() 129 info->secid = newinfo.secid; in secmark_tg_check_v0() 138 struct xt_secmark_target_info_v1 newinfo = { in secmark_tg_v0() local 142 return secmark_tg(skb, &newinfo); in secmark_tg_v0()
|
H A D | x_tables.c | 1351 struct xt_table_info *newinfo, in xt_replace_table() 1358 ret = xt_jumpstack_alloc(newinfo); in xt_replace_table() 1377 newinfo->initial_entries = private->initial_entries; in xt_replace_table() 1379 * Ensure contents of newinfo are visible before assigning to in xt_replace_table() 1383 table->private = newinfo; in xt_replace_table() 1418 struct xt_table_info *newinfo) in xt_register_table() 1443 if (!xt_replace_table(table, 0, newinfo, &ret)) in xt_register_table() 1349 xt_replace_table(struct xt_table *table, unsigned int num_counters, struct xt_table_info *newinfo, int *error) xt_replace_table() argument 1415 xt_register_table(struct net *net, const struct xt_table *input_table, struct xt_table_info *bootstrap, struct xt_table_info *newinfo) xt_register_table() argument
|
/kernel/linux/linux-6.6/net/netfilter/ |
H A D | xt_SECMARK.c | 121 struct xt_secmark_target_info_v1 newinfo = { in secmark_tg_check_v0() local 126 memcpy(newinfo.secctx, info->secctx, SECMARK_SECCTX_MAX); in secmark_tg_check_v0() 128 ret = secmark_tg_check(par->table, &newinfo); in secmark_tg_check_v0() 129 info->secid = newinfo.secid; in secmark_tg_check_v0() 138 struct xt_secmark_target_info_v1 newinfo = { in secmark_tg_v0() local 142 return secmark_tg(skb, &newinfo); in secmark_tg_v0()
|
H A D | x_tables.c | 1386 struct xt_table_info *newinfo, in xt_replace_table() 1393 ret = xt_jumpstack_alloc(newinfo); in xt_replace_table() 1412 newinfo->initial_entries = private->initial_entries; in xt_replace_table() 1414 * Ensure contents of newinfo are visible before assigning to in xt_replace_table() 1418 table->private = newinfo; in xt_replace_table() 1453 struct xt_table_info *newinfo) in xt_register_table() 1479 if (!xt_replace_table(table, 0, newinfo, &ret)) in xt_register_table() 1384 xt_replace_table(struct xt_table *table, unsigned int num_counters, struct xt_table_info *newinfo, int *error) xt_replace_table() argument 1450 xt_register_table(struct net *net, const struct xt_table *input_table, struct xt_table_info *bootstrap, struct xt_table_info *newinfo) xt_register_table() argument
|
/kernel/linux/linux-6.6/sound/soc/intel/avs/ |
H A D | utils.c | 113 avs_module_ida_alloc(struct avs_dev *adev, struct avs_mods_info *newinfo, bool purge) in avs_module_ida_alloc() argument 121 if (oldinfo->count >= newinfo->count) in avs_module_ida_alloc() 123 oldinfo->count, newinfo->count); in avs_module_ida_alloc() 127 ida_ptrs = kcalloc(newinfo->count, sizeof(*ida_ptrs), GFP_KERNEL); in avs_module_ida_alloc() 134 for (i = tocopy_count; i < newinfo->count; i++) { in avs_module_ida_alloc()
|
/kernel/linux/linux-5.10/include/linux/netfilter/ |
H A D | x_tables.h | 311 struct xt_table_info *newinfo); 316 struct xt_table_info *newinfo,
|
/kernel/linux/linux-6.6/include/linux/netfilter/ |
H A D | x_tables.h | 311 struct xt_table_info *newinfo); 316 struct xt_table_info *newinfo,
|
/kernel/linux/linux-5.10/drivers/video/fbdev/core/ |
H A D | fbcon.c | 754 struct fb_info *newinfo, int unit, in con2fb_release_oldinfo() 763 if (!found && newinfo->fbops->fb_release) in con2fb_release_oldinfo() 764 newinfo->fbops->fb_release(newinfo, 0); in con2fb_release_oldinfo() 766 module_put(newinfo->fbops->owner); in con2fb_release_oldinfo() 780 If oldinfo and newinfo are driving the same hardware, in con2fb_release_oldinfo() 783 newinfo in an undefined state. Thus, a call to in con2fb_release_oldinfo() 784 fb_set_par() may be needed for the newinfo. in con2fb_release_oldinfo() 786 if (newinfo && newinfo in con2fb_release_oldinfo() 753 con2fb_release_oldinfo(struct vc_data *vc, struct fb_info *oldinfo, struct fb_info *newinfo, int unit, int oldidx, int found) con2fb_release_oldinfo() argument [all...] |
/kernel/linux/linux-6.6/drivers/video/fbdev/core/ |
H A D | fbcon.c | 752 struct fb_info *newinfo) in con2fb_release_oldinfo() 759 If oldinfo and newinfo are driving the same hardware, in con2fb_release_oldinfo() 762 newinfo in an undefined state. Thus, a call to in con2fb_release_oldinfo() 763 fb_set_par() may be needed for the newinfo. in con2fb_release_oldinfo() 765 if (newinfo && newinfo->fbops->fb_set_par) { in con2fb_release_oldinfo() 766 ret = newinfo->fbops->fb_set_par(newinfo); in con2fb_release_oldinfo() 751 con2fb_release_oldinfo(struct vc_data *vc, struct fb_info *oldinfo, struct fb_info *newinfo) con2fb_release_oldinfo() argument
|