newinfo           773 drivers/video/fbdev/core/fbcon.c 				  struct fb_info *newinfo, int unit,
newinfo           782 drivers/video/fbdev/core/fbcon.c 		if (!found && newinfo->fbops->fb_release)
newinfo           783 drivers/video/fbdev/core/fbcon.c 			newinfo->fbops->fb_release(newinfo, 0);
newinfo           785 drivers/video/fbdev/core/fbcon.c 			module_put(newinfo->fbops->owner);
newinfo           805 drivers/video/fbdev/core/fbcon.c 		if (newinfo && newinfo->fbops->fb_set_par) {
newinfo           806 drivers/video/fbdev/core/fbcon.c 			ret = newinfo->fbops->fb_set_par(newinfo);
newinfo           311 include/linux/netfilter/x_tables.h 				   struct xt_table_info *newinfo);
newinfo           316 include/linux/netfilter/x_tables.h 				       struct xt_table_info *newinfo,
newinfo           428 net/bridge/netfilter/ebtables.c 			       struct ebt_table_info *newinfo)
newinfo           436 net/bridge/netfilter/ebtables.c 		newinfo->hook_entry[i] = NULL;
newinfo           438 net/bridge/netfilter/ebtables.c 	newinfo->entries_size = repl->entries_size;
newinfo           439 net/bridge/netfilter/ebtables.c 	newinfo->nentries = repl->nentries;
newinfo           443 net/bridge/netfilter/ebtables.c 		struct ebt_entry *e = (void *)newinfo->entries + offset;
newinfo           464 net/bridge/netfilter/ebtables.c 				newinfo->hook_entry[i] = (struct ebt_entries *)e;
newinfo           483 net/bridge/netfilter/ebtables.c 		if (!newinfo->hook_entry[i] &&
newinfo           495 net/bridge/netfilter/ebtables.c 			       const struct ebt_table_info *newinfo,
newinfo           502 net/bridge/netfilter/ebtables.c 		if ((void *)e == (void *)newinfo->hook_entry[i])
newinfo           555 net/bridge/netfilter/ebtables.c ebt_get_udc_positions(struct ebt_entry *e, struct ebt_table_info *newinfo,
newinfo           564 net/bridge/netfilter/ebtables.c 		if (newinfo->hook_entry[i] == (struct ebt_entries *)e)
newinfo           643 net/bridge/netfilter/ebtables.c 		const struct ebt_table_info *newinfo,
newinfo           670 net/bridge/netfilter/ebtables.c 		if (!newinfo->hook_entry[i])
newinfo           672 net/bridge/netfilter/ebtables.c 		if ((char *)newinfo->hook_entry[i] < (char *)e)
newinfo           829 net/bridge/netfilter/ebtables.c 			   struct ebt_table_info *newinfo)
newinfo           836 net/bridge/netfilter/ebtables.c 	while (i < NF_BR_NUMHOOKS && !newinfo->hook_entry[i])
newinfo           841 net/bridge/netfilter/ebtables.c 	if (newinfo->hook_entry[i] != (struct ebt_entries *)newinfo->entries)
newinfo           848 net/bridge/netfilter/ebtables.c 		if (!newinfo->hook_entry[j])
newinfo           850 net/bridge/netfilter/ebtables.c 		if (newinfo->hook_entry[j] <= newinfo->hook_entry[i])
newinfo           863 net/bridge/netfilter/ebtables.c 	ret = EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size,
newinfo           864 net/bridge/netfilter/ebtables.c 	   ebt_check_entry_size_and_hooks, newinfo,
newinfo           873 net/bridge/netfilter/ebtables.c 	if (k != newinfo->nentries)
newinfo           883 net/bridge/netfilter/ebtables.c 		newinfo->chainstack =
newinfo           885 net/bridge/netfilter/ebtables.c 					   sizeof(*(newinfo->chainstack))));
newinfo           886 net/bridge/netfilter/ebtables.c 		if (!newinfo->chainstack)
newinfo           889 net/bridge/netfilter/ebtables.c 			newinfo->chainstack[i] =
newinfo           890 net/bridge/netfilter/ebtables.c 			  vmalloc(array_size(udc_cnt, sizeof(*(newinfo->chainstack[0]))));
newinfo           891 net/bridge/netfilter/ebtables.c 			if (!newinfo->chainstack[i]) {
newinfo           893 net/bridge/netfilter/ebtables.c 					vfree(newinfo->chainstack[--i]);
newinfo           894 net/bridge/netfilter/ebtables.c 				vfree(newinfo->chainstack);
newinfo           895 net/bridge/netfilter/ebtables.c 				newinfo->chainstack = NULL;
newinfo           904 net/bridge/netfilter/ebtables.c 		EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size,
newinfo           905 net/bridge/netfilter/ebtables.c 		   ebt_get_udc_positions, newinfo, &i, cl_s);
newinfo           915 net/bridge/netfilter/ebtables.c 		if (newinfo->hook_entry[i])
newinfo           916 net/bridge/netfilter/ebtables.c 			if (check_chainloops(newinfo->hook_entry[i],
newinfo           917 net/bridge/netfilter/ebtables.c 			   cl_s, udc_cnt, i, newinfo->entries)) {
newinfo           935 net/bridge/netfilter/ebtables.c 	ret = EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size,
newinfo           936 net/bridge/netfilter/ebtables.c 	   ebt_check_entry, net, newinfo, name, &i, cl_s, udc_cnt);
newinfo           938 net/bridge/netfilter/ebtables.c 		EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size,
newinfo           968 net/bridge/netfilter/ebtables.c 			      struct ebt_table_info *newinfo)
newinfo           986 net/bridge/netfilter/ebtables.c 	newinfo->chainstack = NULL;
newinfo           987 net/bridge/netfilter/ebtables.c 	ret = ebt_verify_pointers(repl, newinfo);
newinfo           991 net/bridge/netfilter/ebtables.c 	ret = translate_table(net, repl->name, newinfo);
newinfo          1003 net/bridge/netfilter/ebtables.c 	if (t->check && (ret = t->check(newinfo, repl->valid_hooks)))
newinfo          1014 net/bridge/netfilter/ebtables.c 	if (!table->nentries && newinfo->nentries && !try_module_get(t->me)) {
newinfo          1017 net/bridge/netfilter/ebtables.c 	} else if (table->nentries && !newinfo->nentries)
newinfo          1025 net/bridge/netfilter/ebtables.c 	t->private = newinfo;
newinfo          1062 net/bridge/netfilter/ebtables.c 	EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size,
newinfo          1067 net/bridge/netfilter/ebtables.c 	ebt_free_table_info(newinfo);
newinfo          1076 net/bridge/netfilter/ebtables.c 	struct ebt_table_info *newinfo;
newinfo          1098 net/bridge/netfilter/ebtables.c 	newinfo = __vmalloc(sizeof(*newinfo) + countersize, GFP_KERNEL_ACCOUNT,
newinfo          1100 net/bridge/netfilter/ebtables.c 	if (!newinfo)
newinfo          1104 net/bridge/netfilter/ebtables.c 		memset(newinfo->counters, 0, countersize);
newinfo          1106 net/bridge/netfilter/ebtables.c 	newinfo->entries = __vmalloc(tmp.entries_size, GFP_KERNEL_ACCOUNT,
newinfo          1108 net/bridge/netfilter/ebtables.c 	if (!newinfo->entries) {
newinfo          1113 net/bridge/netfilter/ebtables.c 	   newinfo->entries, tmp.entries, tmp.entries_size) != 0) {
newinfo          1118 net/bridge/netfilter/ebtables.c 	ret = do_replace_finish(net, &tmp, newinfo);
newinfo          1122 net/bridge/netfilter/ebtables.c 	vfree(newinfo->entries);
newinfo          1124 net/bridge/netfilter/ebtables.c 	vfree(newinfo);
newinfo          1146 net/bridge/netfilter/ebtables.c 	struct ebt_table_info *newinfo;
newinfo          1165 net/bridge/netfilter/ebtables.c 	newinfo = vmalloc(sizeof(*newinfo) + countersize);
newinfo          1167 net/bridge/netfilter/ebtables.c 	if (!newinfo)
newinfo          1175 net/bridge/netfilter/ebtables.c 	newinfo->entries = p;
newinfo          1177 net/bridge/netfilter/ebtables.c 	newinfo->entries_size = repl->entries_size;
newinfo          1178 net/bridge/netfilter/ebtables.c 	newinfo->nentries = repl->nentries;
newinfo          1181 net/bridge/netfilter/ebtables.c 		memset(newinfo->counters, 0, countersize);
newinfo          1184 net/bridge/netfilter/ebtables.c 	newinfo->chainstack = NULL;
newinfo          1187 net/bridge/netfilter/ebtables.c 			newinfo->hook_entry[i] = NULL;
newinfo          1189 net/bridge/netfilter/ebtables.c 			newinfo->hook_entry[i] = p +
newinfo          1192 net/bridge/netfilter/ebtables.c 	ret = translate_table(net, repl->name, newinfo);
newinfo          1196 net/bridge/netfilter/ebtables.c 	if (table->check && table->check(newinfo, table->valid_hooks)) {
newinfo          1201 net/bridge/netfilter/ebtables.c 	table->private = newinfo;
newinfo          1212 net/bridge/netfilter/ebtables.c 	if (newinfo->nentries && !try_module_get(table->me)) {
newinfo          1230 net/bridge/netfilter/ebtables.c 	ebt_free_table_info(newinfo);
newinfo          1231 net/bridge/netfilter/ebtables.c 	vfree(newinfo->entries);
newinfo          1233 net/bridge/netfilter/ebtables.c 	vfree(newinfo);
newinfo          1733 net/bridge/netfilter/ebtables.c 			     struct compat_ebt_replace *newinfo)
newinfo          1753 net/bridge/netfilter/ebtables.c 	newinfo->entries_size -= off;
newinfo          1763 net/bridge/netfilter/ebtables.c 			newinfo->hook_entry[i] -= off;
newinfo          1765 net/bridge/netfilter/ebtables.c 					newinfo->hook_entry[i] + off,
newinfo          1766 net/bridge/netfilter/ebtables.c 					newinfo->hook_entry[i]);
newinfo          1785 net/bridge/netfilter/ebtables.c 			     struct compat_ebt_replace *newinfo)
newinfo          1791 net/bridge/netfilter/ebtables.c 	newinfo->entries_size = size;
newinfo          1797 net/bridge/netfilter/ebtables.c 							entries, newinfo);
newinfo          2206 net/bridge/netfilter/ebtables.c 	struct ebt_table_info *newinfo;
newinfo          2220 net/bridge/netfilter/ebtables.c 	newinfo = vmalloc(sizeof(*newinfo) + countersize);
newinfo          2221 net/bridge/netfilter/ebtables.c 	if (!newinfo)
newinfo          2225 net/bridge/netfilter/ebtables.c 		memset(newinfo->counters, 0, countersize);
newinfo          2229 net/bridge/netfilter/ebtables.c 	newinfo->entries = vmalloc(tmp.entries_size);
newinfo          2230 net/bridge/netfilter/ebtables.c 	if (!newinfo->entries) {
newinfo          2235 net/bridge/netfilter/ebtables.c 	   newinfo->entries, tmp.entries, tmp.entries_size) != 0) {
newinfo          2240 net/bridge/netfilter/ebtables.c 	entries_tmp = newinfo->entries;
newinfo          2257 net/bridge/netfilter/ebtables.c 	newinfo->entries = vmalloc(size64);
newinfo          2258 net/bridge/netfilter/ebtables.c 	if (!newinfo->entries) {
newinfo          2265 net/bridge/netfilter/ebtables.c 	state.buf_kern_start = newinfo->entries;
newinfo          2291 net/bridge/netfilter/ebtables.c 	ret = do_replace_finish(net, &tmp, newinfo);
newinfo          2295 net/bridge/netfilter/ebtables.c 	vfree(newinfo->entries);
newinfo          2297 net/bridge/netfilter/ebtables.c 	vfree(newinfo);
newinfo           301 net/ipv4/netfilter/arp_tables.c static int mark_source_chains(const struct xt_table_info *newinfo,
newinfo           311 net/ipv4/netfilter/arp_tables.c 		unsigned int pos = newinfo->hook_entry[hook];
newinfo           357 net/ipv4/netfilter/arp_tables.c 				if (pos + size >= newinfo->size)
newinfo           369 net/ipv4/netfilter/arp_tables.c 								 newinfo->number))
newinfo           374 net/ipv4/netfilter/arp_tables.c 					if (newpos >= newinfo->size)
newinfo           452 net/ipv4/netfilter/arp_tables.c 					     struct xt_table_info *newinfo,
newinfo           484 net/ipv4/netfilter/arp_tables.c 			newinfo->hook_entry[h] = hook_entries[h];
newinfo           489 net/ipv4/netfilter/arp_tables.c 			newinfo->underflow[h] = underflows[h];
newinfo           519 net/ipv4/netfilter/arp_tables.c 			   struct xt_table_info *newinfo,
newinfo           529 net/ipv4/netfilter/arp_tables.c 	newinfo->size = repl->size;
newinfo           530 net/ipv4/netfilter/arp_tables.c 	newinfo->number = repl->num_entries;
newinfo           534 net/ipv4/netfilter/arp_tables.c 		newinfo->hook_entry[i] = 0xFFFFFFFF;
newinfo           535 net/ipv4/netfilter/arp_tables.c 		newinfo->underflow[i] = 0xFFFFFFFF;
newinfo           538 net/ipv4/netfilter/arp_tables.c 	offsets = xt_alloc_entry_offsets(newinfo->number);
newinfo           544 net/ipv4/netfilter/arp_tables.c 	xt_entry_foreach(iter, entry0, newinfo->size) {
newinfo           545 net/ipv4/netfilter/arp_tables.c 		ret = check_entry_size_and_hooks(iter, newinfo, entry0,
newinfo           557 net/ipv4/netfilter/arp_tables.c 			++newinfo->stacksize;
newinfo           564 net/ipv4/netfilter/arp_tables.c 	ret = xt_check_table_hooks(newinfo, repl->valid_hooks);
newinfo           568 net/ipv4/netfilter/arp_tables.c 	if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) {
newinfo           576 net/ipv4/netfilter/arp_tables.c 	xt_entry_foreach(iter, entry0, newinfo->size) {
newinfo           585 net/ipv4/netfilter/arp_tables.c 		xt_entry_foreach(iter, entry0, newinfo->size) {
newinfo           737 net/ipv4/netfilter/arp_tables.c 			     const void *base, struct xt_table_info *newinfo)
newinfo           748 net/ipv4/netfilter/arp_tables.c 	newinfo->size -= off;
newinfo           756 net/ipv4/netfilter/arp_tables.c 			newinfo->hook_entry[i] -= off;
newinfo           759 net/ipv4/netfilter/arp_tables.c 			newinfo->underflow[i] -= off;
newinfo           765 net/ipv4/netfilter/arp_tables.c 			     struct xt_table_info *newinfo)
newinfo           771 net/ipv4/netfilter/arp_tables.c 	if (!newinfo || !info)
newinfo           775 net/ipv4/netfilter/arp_tables.c 	memcpy(newinfo, info, offsetof(struct xt_table_info, entries));
newinfo           776 net/ipv4/netfilter/arp_tables.c 	newinfo->initial_entries = 0;
newinfo           782 net/ipv4/netfilter/arp_tables.c 		ret = compat_calc_entry(iter, info, loc_cpu_entry, newinfo);
newinfo           882 net/ipv4/netfilter/arp_tables.c 			struct xt_table_info *newinfo,
newinfo           912 net/ipv4/netfilter/arp_tables.c 	oldinfo = xt_replace_table(t, num_counters, newinfo, &ret);
newinfo           918 net/ipv4/netfilter/arp_tables.c 	    (newinfo->number <= oldinfo->initial_entries))
newinfo           921 net/ipv4/netfilter/arp_tables.c 	    (newinfo->number <= oldinfo->initial_entries))
newinfo           956 net/ipv4/netfilter/arp_tables.c 	struct xt_table_info *newinfo;
newinfo           971 net/ipv4/netfilter/arp_tables.c 	newinfo = xt_alloc_table_info(tmp.size);
newinfo           972 net/ipv4/netfilter/arp_tables.c 	if (!newinfo)
newinfo           975 net/ipv4/netfilter/arp_tables.c 	loc_cpu_entry = newinfo->entries;
newinfo           982 net/ipv4/netfilter/arp_tables.c 	ret = translate_table(net, newinfo, loc_cpu_entry, &tmp);
newinfo           986 net/ipv4/netfilter/arp_tables.c 	ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo,
newinfo           993 net/ipv4/netfilter/arp_tables.c 	xt_entry_foreach(iter, loc_cpu_entry, newinfo->size)
newinfo           996 net/ipv4/netfilter/arp_tables.c 	xt_free_table_info(newinfo);
newinfo          1073 net/ipv4/netfilter/arp_tables.c 				  struct xt_table_info *newinfo,
newinfo          1129 net/ipv4/netfilter/arp_tables.c 			    struct xt_table_info *newinfo, unsigned char *base)
newinfo          1150 net/ipv4/netfilter/arp_tables.c 		if ((unsigned char *)de - base < newinfo->hook_entry[h])
newinfo          1151 net/ipv4/netfilter/arp_tables.c 			newinfo->hook_entry[h] -= origsize - *size;
newinfo          1152 net/ipv4/netfilter/arp_tables.c 		if ((unsigned char *)de - base < newinfo->underflow[h])
newinfo          1153 net/ipv4/netfilter/arp_tables.c 			newinfo->underflow[h] -= origsize - *size;
newinfo          1163 net/ipv4/netfilter/arp_tables.c 	struct xt_table_info *newinfo, *info;
newinfo          1195 net/ipv4/netfilter/arp_tables.c 	newinfo = xt_alloc_table_info(size);
newinfo          1196 net/ipv4/netfilter/arp_tables.c 	if (!newinfo)
newinfo          1199 net/ipv4/netfilter/arp_tables.c 	newinfo->number = compatr->num_entries;
newinfo          1201 net/ipv4/netfilter/arp_tables.c 		newinfo->hook_entry[i] = compatr->hook_entry[i];
newinfo          1202 net/ipv4/netfilter/arp_tables.c 		newinfo->underflow[i] = compatr->underflow[i];
newinfo          1204 net/ipv4/netfilter/arp_tables.c 	entry1 = newinfo->entries;
newinfo          1209 net/ipv4/netfilter/arp_tables.c 					    newinfo, entry1);
newinfo          1219 net/ipv4/netfilter/arp_tables.c 		repl.hook_entry[i] = newinfo->hook_entry[i];
newinfo          1220 net/ipv4/netfilter/arp_tables.c 		repl.underflow[i] = newinfo->underflow[i];
newinfo          1225 net/ipv4/netfilter/arp_tables.c 	repl.size = newinfo->size;
newinfo          1226 net/ipv4/netfilter/arp_tables.c 	ret = translate_table(net, newinfo, entry1, &repl);
newinfo          1230 net/ipv4/netfilter/arp_tables.c 	*pinfo = newinfo;
newinfo          1236 net/ipv4/netfilter/arp_tables.c 	xt_free_table_info(newinfo);
newinfo          1254 net/ipv4/netfilter/arp_tables.c 	struct xt_table_info *newinfo;
newinfo          1269 net/ipv4/netfilter/arp_tables.c 	newinfo = xt_alloc_table_info(tmp.size);
newinfo          1270 net/ipv4/netfilter/arp_tables.c 	if (!newinfo)
newinfo          1273 net/ipv4/netfilter/arp_tables.c 	loc_cpu_entry = newinfo->entries;
newinfo          1279 net/ipv4/netfilter/arp_tables.c 	ret = translate_compat_table(net, &newinfo, &loc_cpu_entry, &tmp);
newinfo          1283 net/ipv4/netfilter/arp_tables.c 	ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo,
newinfo          1290 net/ipv4/netfilter/arp_tables.c 	xt_entry_foreach(iter, loc_cpu_entry, newinfo->size)
newinfo          1293 net/ipv4/netfilter/arp_tables.c 	xt_free_table_info(newinfo);
newinfo          1543 net/ipv4/netfilter/arp_tables.c 	struct xt_table_info *newinfo;
newinfo          1548 net/ipv4/netfilter/arp_tables.c 	newinfo = xt_alloc_table_info(repl->size);
newinfo          1549 net/ipv4/netfilter/arp_tables.c 	if (!newinfo)
newinfo          1552 net/ipv4/netfilter/arp_tables.c 	loc_cpu_entry = newinfo->entries;
newinfo          1555 net/ipv4/netfilter/arp_tables.c 	ret = translate_table(net, newinfo, loc_cpu_entry, repl);
newinfo          1559 net/ipv4/netfilter/arp_tables.c 	new_table = xt_register_table(net, table, &bootstrap, newinfo);
newinfo          1577 net/ipv4/netfilter/arp_tables.c 	xt_free_table_info(newinfo);
newinfo           368 net/ipv4/netfilter/ip_tables.c mark_source_chains(const struct xt_table_info *newinfo,
newinfo           377 net/ipv4/netfilter/ip_tables.c 		unsigned int pos = newinfo->hook_entry[hook];
newinfo           421 net/ipv4/netfilter/ip_tables.c 				if (pos + size >= newinfo->size)
newinfo           433 net/ipv4/netfilter/ip_tables.c 								 newinfo->number))
newinfo           438 net/ipv4/netfilter/ip_tables.c 					if (newpos >= newinfo->size)
newinfo           589 net/ipv4/netfilter/ip_tables.c 			   struct xt_table_info *newinfo,
newinfo           621 net/ipv4/netfilter/ip_tables.c 			newinfo->hook_entry[h] = hook_entries[h];
newinfo           626 net/ipv4/netfilter/ip_tables.c 			newinfo->underflow[h] = underflows[h];
newinfo           661 net/ipv4/netfilter/ip_tables.c translate_table(struct net *net, struct xt_table_info *newinfo, void *entry0,
newinfo           670 net/ipv4/netfilter/ip_tables.c 	newinfo->size = repl->size;
newinfo           671 net/ipv4/netfilter/ip_tables.c 	newinfo->number = repl->num_entries;
newinfo           675 net/ipv4/netfilter/ip_tables.c 		newinfo->hook_entry[i] = 0xFFFFFFFF;
newinfo           676 net/ipv4/netfilter/ip_tables.c 		newinfo->underflow[i] = 0xFFFFFFFF;
newinfo           679 net/ipv4/netfilter/ip_tables.c 	offsets = xt_alloc_entry_offsets(newinfo->number);
newinfo           684 net/ipv4/netfilter/ip_tables.c 	xt_entry_foreach(iter, entry0, newinfo->size) {
newinfo           685 net/ipv4/netfilter/ip_tables.c 		ret = check_entry_size_and_hooks(iter, newinfo, entry0,
newinfo           697 net/ipv4/netfilter/ip_tables.c 			++newinfo->stacksize;
newinfo           704 net/ipv4/netfilter/ip_tables.c 	ret = xt_check_table_hooks(newinfo, repl->valid_hooks);
newinfo           708 net/ipv4/netfilter/ip_tables.c 	if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) {
newinfo           716 net/ipv4/netfilter/ip_tables.c 	xt_entry_foreach(iter, entry0, newinfo->size) {
newinfo           725 net/ipv4/netfilter/ip_tables.c 		xt_entry_foreach(iter, entry0, newinfo->size) {
newinfo           892 net/ipv4/netfilter/ip_tables.c 			     const void *base, struct xt_table_info *newinfo)
newinfo           905 net/ipv4/netfilter/ip_tables.c 	newinfo->size -= off;
newinfo           913 net/ipv4/netfilter/ip_tables.c 			newinfo->hook_entry[i] -= off;
newinfo           916 net/ipv4/netfilter/ip_tables.c 			newinfo->underflow[i] -= off;
newinfo           922 net/ipv4/netfilter/ip_tables.c 			     struct xt_table_info *newinfo)
newinfo           928 net/ipv4/netfilter/ip_tables.c 	if (!newinfo || !info)
newinfo           932 net/ipv4/netfilter/ip_tables.c 	memcpy(newinfo, info, offsetof(struct xt_table_info, entries));
newinfo           933 net/ipv4/netfilter/ip_tables.c 	newinfo->initial_entries = 0;
newinfo           939 net/ipv4/netfilter/ip_tables.c 		ret = compat_calc_entry(iter, info, loc_cpu_entry, newinfo);
newinfo          1039 net/ipv4/netfilter/ip_tables.c 	     struct xt_table_info *newinfo, unsigned int num_counters,
newinfo          1067 net/ipv4/netfilter/ip_tables.c 	oldinfo = xt_replace_table(t, num_counters, newinfo, &ret);
newinfo          1073 net/ipv4/netfilter/ip_tables.c 	    (newinfo->number <= oldinfo->initial_entries))
newinfo          1076 net/ipv4/netfilter/ip_tables.c 	    (newinfo->number <= oldinfo->initial_entries))
newinfo          1110 net/ipv4/netfilter/ip_tables.c 	struct xt_table_info *newinfo;
newinfo          1125 net/ipv4/netfilter/ip_tables.c 	newinfo = xt_alloc_table_info(tmp.size);
newinfo          1126 net/ipv4/netfilter/ip_tables.c 	if (!newinfo)
newinfo          1129 net/ipv4/netfilter/ip_tables.c 	loc_cpu_entry = newinfo->entries;
newinfo          1136 net/ipv4/netfilter/ip_tables.c 	ret = translate_table(net, newinfo, loc_cpu_entry, &tmp);
newinfo          1140 net/ipv4/netfilter/ip_tables.c 	ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo,
newinfo          1147 net/ipv4/netfilter/ip_tables.c 	xt_entry_foreach(iter, loc_cpu_entry, newinfo->size)
newinfo          1150 net/ipv4/netfilter/ip_tables.c 	xt_free_table_info(newinfo);
newinfo          1287 net/ipv4/netfilter/ip_tables.c 				  struct xt_table_info *newinfo,
newinfo          1357 net/ipv4/netfilter/ip_tables.c 			    struct xt_table_info *newinfo, unsigned char *base)
newinfo          1383 net/ipv4/netfilter/ip_tables.c 		if ((unsigned char *)de - base < newinfo->hook_entry[h])
newinfo          1384 net/ipv4/netfilter/ip_tables.c 			newinfo->hook_entry[h] -= origsize - *size;
newinfo          1385 net/ipv4/netfilter/ip_tables.c 		if ((unsigned char *)de - base < newinfo->underflow[h])
newinfo          1386 net/ipv4/netfilter/ip_tables.c 			newinfo->underflow[h] -= origsize - *size;
newinfo          1397 net/ipv4/netfilter/ip_tables.c 	struct xt_table_info *newinfo, *info;
newinfo          1429 net/ipv4/netfilter/ip_tables.c 	newinfo = xt_alloc_table_info(size);
newinfo          1430 net/ipv4/netfilter/ip_tables.c 	if (!newinfo)
newinfo          1433 net/ipv4/netfilter/ip_tables.c 	newinfo->number = compatr->num_entries;
newinfo          1435 net/ipv4/netfilter/ip_tables.c 		newinfo->hook_entry[i] = compatr->hook_entry[i];
newinfo          1436 net/ipv4/netfilter/ip_tables.c 		newinfo->underflow[i] = compatr->underflow[i];
newinfo          1438 net/ipv4/netfilter/ip_tables.c 	entry1 = newinfo->entries;
newinfo          1443 net/ipv4/netfilter/ip_tables.c 					    newinfo, entry1);
newinfo          1458 net/ipv4/netfilter/ip_tables.c 		repl.hook_entry[i] = newinfo->hook_entry[i];
newinfo          1459 net/ipv4/netfilter/ip_tables.c 		repl.underflow[i] = newinfo->underflow[i];
newinfo          1464 net/ipv4/netfilter/ip_tables.c 	repl.size = newinfo->size;
newinfo          1465 net/ipv4/netfilter/ip_tables.c 	ret = translate_table(net, newinfo, entry1, &repl);
newinfo          1469 net/ipv4/netfilter/ip_tables.c 	*pinfo = newinfo;
newinfo          1475 net/ipv4/netfilter/ip_tables.c 	xt_free_table_info(newinfo);
newinfo          1493 net/ipv4/netfilter/ip_tables.c 	struct xt_table_info *newinfo;
newinfo          1508 net/ipv4/netfilter/ip_tables.c 	newinfo = xt_alloc_table_info(tmp.size);
newinfo          1509 net/ipv4/netfilter/ip_tables.c 	if (!newinfo)
newinfo          1512 net/ipv4/netfilter/ip_tables.c 	loc_cpu_entry = newinfo->entries;
newinfo          1519 net/ipv4/netfilter/ip_tables.c 	ret = translate_compat_table(net, &newinfo, &loc_cpu_entry, &tmp);
newinfo          1523 net/ipv4/netfilter/ip_tables.c 	ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo,
newinfo          1530 net/ipv4/netfilter/ip_tables.c 	xt_entry_foreach(iter, loc_cpu_entry, newinfo->size)
newinfo          1533 net/ipv4/netfilter/ip_tables.c 	xt_free_table_info(newinfo);
newinfo          1760 net/ipv4/netfilter/ip_tables.c 	struct xt_table_info *newinfo;
newinfo          1765 net/ipv4/netfilter/ip_tables.c 	newinfo = xt_alloc_table_info(repl->size);
newinfo          1766 net/ipv4/netfilter/ip_tables.c 	if (!newinfo)
newinfo          1769 net/ipv4/netfilter/ip_tables.c 	loc_cpu_entry = newinfo->entries;
newinfo          1772 net/ipv4/netfilter/ip_tables.c 	ret = translate_table(net, newinfo, loc_cpu_entry, repl);
newinfo          1776 net/ipv4/netfilter/ip_tables.c 	new_table = xt_register_table(net, table, &bootstrap, newinfo);
newinfo          1796 net/ipv4/netfilter/ip_tables.c 	xt_free_table_info(newinfo);
newinfo           386 net/ipv6/netfilter/ip6_tables.c mark_source_chains(const struct xt_table_info *newinfo,
newinfo           395 net/ipv6/netfilter/ip6_tables.c 		unsigned int pos = newinfo->hook_entry[hook];
newinfo           439 net/ipv6/netfilter/ip6_tables.c 				if (pos + size >= newinfo->size)
newinfo           451 net/ipv6/netfilter/ip6_tables.c 								 newinfo->number))
newinfo           456 net/ipv6/netfilter/ip6_tables.c 					if (newpos >= newinfo->size)
newinfo           607 net/ipv6/netfilter/ip6_tables.c 			   struct xt_table_info *newinfo,
newinfo           639 net/ipv6/netfilter/ip6_tables.c 			newinfo->hook_entry[h] = hook_entries[h];
newinfo           644 net/ipv6/netfilter/ip6_tables.c 			newinfo->underflow[h] = underflows[h];
newinfo           678 net/ipv6/netfilter/ip6_tables.c translate_table(struct net *net, struct xt_table_info *newinfo, void *entry0,
newinfo           687 net/ipv6/netfilter/ip6_tables.c 	newinfo->size = repl->size;
newinfo           688 net/ipv6/netfilter/ip6_tables.c 	newinfo->number = repl->num_entries;
newinfo           692 net/ipv6/netfilter/ip6_tables.c 		newinfo->hook_entry[i] = 0xFFFFFFFF;
newinfo           693 net/ipv6/netfilter/ip6_tables.c 		newinfo->underflow[i] = 0xFFFFFFFF;
newinfo           696 net/ipv6/netfilter/ip6_tables.c 	offsets = xt_alloc_entry_offsets(newinfo->number);
newinfo           701 net/ipv6/netfilter/ip6_tables.c 	xt_entry_foreach(iter, entry0, newinfo->size) {
newinfo           702 net/ipv6/netfilter/ip6_tables.c 		ret = check_entry_size_and_hooks(iter, newinfo, entry0,
newinfo           714 net/ipv6/netfilter/ip6_tables.c 			++newinfo->stacksize;
newinfo           721 net/ipv6/netfilter/ip6_tables.c 	ret = xt_check_table_hooks(newinfo, repl->valid_hooks);
newinfo           725 net/ipv6/netfilter/ip6_tables.c 	if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) {
newinfo           733 net/ipv6/netfilter/ip6_tables.c 	xt_entry_foreach(iter, entry0, newinfo->size) {
newinfo           742 net/ipv6/netfilter/ip6_tables.c 		xt_entry_foreach(iter, entry0, newinfo->size) {
newinfo           908 net/ipv6/netfilter/ip6_tables.c 			     const void *base, struct xt_table_info *newinfo)
newinfo           921 net/ipv6/netfilter/ip6_tables.c 	newinfo->size -= off;
newinfo           929 net/ipv6/netfilter/ip6_tables.c 			newinfo->hook_entry[i] -= off;
newinfo           932 net/ipv6/netfilter/ip6_tables.c 			newinfo->underflow[i] -= off;
newinfo           938 net/ipv6/netfilter/ip6_tables.c 			     struct xt_table_info *newinfo)
newinfo           944 net/ipv6/netfilter/ip6_tables.c 	if (!newinfo || !info)
newinfo           948 net/ipv6/netfilter/ip6_tables.c 	memcpy(newinfo, info, offsetof(struct xt_table_info, entries));
newinfo           949 net/ipv6/netfilter/ip6_tables.c 	newinfo->initial_entries = 0;
newinfo           955 net/ipv6/netfilter/ip6_tables.c 		ret = compat_calc_entry(iter, info, loc_cpu_entry, newinfo);
newinfo          1056 net/ipv6/netfilter/ip6_tables.c 	     struct xt_table_info *newinfo, unsigned int num_counters,
newinfo          1084 net/ipv6/netfilter/ip6_tables.c 	oldinfo = xt_replace_table(t, num_counters, newinfo, &ret);
newinfo          1090 net/ipv6/netfilter/ip6_tables.c 	    (newinfo->number <= oldinfo->initial_entries))
newinfo          1093 net/ipv6/netfilter/ip6_tables.c 	    (newinfo->number <= oldinfo->initial_entries))
newinfo          1127 net/ipv6/netfilter/ip6_tables.c 	struct xt_table_info *newinfo;
newinfo          1142 net/ipv6/netfilter/ip6_tables.c 	newinfo = xt_alloc_table_info(tmp.size);
newinfo          1143 net/ipv6/netfilter/ip6_tables.c 	if (!newinfo)
newinfo          1146 net/ipv6/netfilter/ip6_tables.c 	loc_cpu_entry = newinfo->entries;
newinfo          1153 net/ipv6/netfilter/ip6_tables.c 	ret = translate_table(net, newinfo, loc_cpu_entry, &tmp);
newinfo          1157 net/ipv6/netfilter/ip6_tables.c 	ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo,
newinfo          1164 net/ipv6/netfilter/ip6_tables.c 	xt_entry_foreach(iter, loc_cpu_entry, newinfo->size)
newinfo          1167 net/ipv6/netfilter/ip6_tables.c 	xt_free_table_info(newinfo);
newinfo          1303 net/ipv6/netfilter/ip6_tables.c 				  struct xt_table_info *newinfo,
newinfo          1373 net/ipv6/netfilter/ip6_tables.c 			    struct xt_table_info *newinfo, unsigned char *base)
newinfo          1398 net/ipv6/netfilter/ip6_tables.c 		if ((unsigned char *)de - base < newinfo->hook_entry[h])
newinfo          1399 net/ipv6/netfilter/ip6_tables.c 			newinfo->hook_entry[h] -= origsize - *size;
newinfo          1400 net/ipv6/netfilter/ip6_tables.c 		if ((unsigned char *)de - base < newinfo->underflow[h])
newinfo          1401 net/ipv6/netfilter/ip6_tables.c 			newinfo->underflow[h] -= origsize - *size;
newinfo          1412 net/ipv6/netfilter/ip6_tables.c 	struct xt_table_info *newinfo, *info;
newinfo          1444 net/ipv6/netfilter/ip6_tables.c 	newinfo = xt_alloc_table_info(size);
newinfo          1445 net/ipv6/netfilter/ip6_tables.c 	if (!newinfo)
newinfo          1448 net/ipv6/netfilter/ip6_tables.c 	newinfo->number = compatr->num_entries;
newinfo          1450 net/ipv6/netfilter/ip6_tables.c 		newinfo->hook_entry[i] = compatr->hook_entry[i];
newinfo          1451 net/ipv6/netfilter/ip6_tables.c 		newinfo->underflow[i] = compatr->underflow[i];
newinfo          1453 net/ipv6/netfilter/ip6_tables.c 	entry1 = newinfo->entries;
newinfo          1458 net/ipv6/netfilter/ip6_tables.c 					    newinfo, entry1);
newinfo          1467 net/ipv6/netfilter/ip6_tables.c 		repl.hook_entry[i] = newinfo->hook_entry[i];
newinfo          1468 net/ipv6/netfilter/ip6_tables.c 		repl.underflow[i] = newinfo->underflow[i];
newinfo          1473 net/ipv6/netfilter/ip6_tables.c 	repl.size = newinfo->size;
newinfo          1474 net/ipv6/netfilter/ip6_tables.c 	ret = translate_table(net, newinfo, entry1, &repl);
newinfo          1478 net/ipv6/netfilter/ip6_tables.c 	*pinfo = newinfo;
newinfo          1484 net/ipv6/netfilter/ip6_tables.c 	xt_free_table_info(newinfo);
newinfo          1502 net/ipv6/netfilter/ip6_tables.c 	struct xt_table_info *newinfo;
newinfo          1517 net/ipv6/netfilter/ip6_tables.c 	newinfo = xt_alloc_table_info(tmp.size);
newinfo          1518 net/ipv6/netfilter/ip6_tables.c 	if (!newinfo)
newinfo          1521 net/ipv6/netfilter/ip6_tables.c 	loc_cpu_entry = newinfo->entries;
newinfo          1528 net/ipv6/netfilter/ip6_tables.c 	ret = translate_compat_table(net, &newinfo, &loc_cpu_entry, &tmp);
newinfo          1532 net/ipv6/netfilter/ip6_tables.c 	ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo,
newinfo          1539 net/ipv6/netfilter/ip6_tables.c 	xt_entry_foreach(iter, loc_cpu_entry, newinfo->size)
newinfo          1542 net/ipv6/netfilter/ip6_tables.c 	xt_free_table_info(newinfo);
newinfo          1770 net/ipv6/netfilter/ip6_tables.c 	struct xt_table_info *newinfo;
newinfo          1775 net/ipv6/netfilter/ip6_tables.c 	newinfo = xt_alloc_table_info(repl->size);
newinfo          1776 net/ipv6/netfilter/ip6_tables.c 	if (!newinfo)
newinfo          1779 net/ipv6/netfilter/ip6_tables.c 	loc_cpu_entry = newinfo->entries;
newinfo          1782 net/ipv6/netfilter/ip6_tables.c 	ret = translate_table(net, newinfo, loc_cpu_entry, repl);
newinfo          1786 net/ipv6/netfilter/ip6_tables.c 	new_table = xt_register_table(net, table, &bootstrap, newinfo);
newinfo          1806 net/ipv6/netfilter/ip6_tables.c 	xt_free_table_info(newinfo);
newinfo          1355 net/netfilter/x_tables.c 	      struct xt_table_info *newinfo,
newinfo          1362 net/netfilter/x_tables.c 	ret = xt_jumpstack_alloc(newinfo);
newinfo          1381 net/netfilter/x_tables.c 	newinfo->initial_entries = private->initial_entries;
newinfo          1387 net/netfilter/x_tables.c 	table->private = newinfo;
newinfo          1427 net/netfilter/x_tables.c 				   struct xt_table_info *newinfo)
newinfo          1452 net/netfilter/x_tables.c 	if (!xt_replace_table(table, 0, newinfo, &ret))