newinfo 773 drivers/video/fbdev/core/fbcon.c struct fb_info *newinfo, int unit, newinfo 782 drivers/video/fbdev/core/fbcon.c if (!found && newinfo->fbops->fb_release) newinfo 783 drivers/video/fbdev/core/fbcon.c newinfo->fbops->fb_release(newinfo, 0); newinfo 785 drivers/video/fbdev/core/fbcon.c module_put(newinfo->fbops->owner); newinfo 805 drivers/video/fbdev/core/fbcon.c if (newinfo && newinfo->fbops->fb_set_par) { newinfo 806 drivers/video/fbdev/core/fbcon.c ret = newinfo->fbops->fb_set_par(newinfo); newinfo 311 include/linux/netfilter/x_tables.h struct xt_table_info *newinfo); newinfo 316 include/linux/netfilter/x_tables.h struct xt_table_info *newinfo, newinfo 428 net/bridge/netfilter/ebtables.c struct ebt_table_info *newinfo) newinfo 436 net/bridge/netfilter/ebtables.c newinfo->hook_entry[i] = NULL; newinfo 438 net/bridge/netfilter/ebtables.c newinfo->entries_size = repl->entries_size; newinfo 439 net/bridge/netfilter/ebtables.c newinfo->nentries = repl->nentries; newinfo 443 net/bridge/netfilter/ebtables.c struct ebt_entry *e = (void *)newinfo->entries + offset; newinfo 464 net/bridge/netfilter/ebtables.c newinfo->hook_entry[i] = (struct ebt_entries *)e; newinfo 483 net/bridge/netfilter/ebtables.c if (!newinfo->hook_entry[i] && newinfo 495 net/bridge/netfilter/ebtables.c const struct ebt_table_info *newinfo, newinfo 502 net/bridge/netfilter/ebtables.c if ((void *)e == (void *)newinfo->hook_entry[i]) newinfo 555 net/bridge/netfilter/ebtables.c ebt_get_udc_positions(struct ebt_entry *e, struct ebt_table_info *newinfo, newinfo 564 net/bridge/netfilter/ebtables.c if (newinfo->hook_entry[i] == (struct ebt_entries *)e) newinfo 643 net/bridge/netfilter/ebtables.c const struct ebt_table_info *newinfo, newinfo 670 net/bridge/netfilter/ebtables.c if (!newinfo->hook_entry[i]) newinfo 672 net/bridge/netfilter/ebtables.c if ((char *)newinfo->hook_entry[i] < (char *)e) newinfo 829 net/bridge/netfilter/ebtables.c struct ebt_table_info *newinfo) newinfo 836 net/bridge/netfilter/ebtables.c while (i < NF_BR_NUMHOOKS && !newinfo->hook_entry[i]) newinfo 841 net/bridge/netfilter/ebtables.c if (newinfo->hook_entry[i] != (struct ebt_entries *)newinfo->entries) newinfo 848 net/bridge/netfilter/ebtables.c if (!newinfo->hook_entry[j]) newinfo 850 net/bridge/netfilter/ebtables.c if (newinfo->hook_entry[j] <= newinfo->hook_entry[i]) newinfo 863 net/bridge/netfilter/ebtables.c ret = EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size, newinfo 864 net/bridge/netfilter/ebtables.c ebt_check_entry_size_and_hooks, newinfo, newinfo 873 net/bridge/netfilter/ebtables.c if (k != newinfo->nentries) newinfo 883 net/bridge/netfilter/ebtables.c newinfo->chainstack = newinfo 885 net/bridge/netfilter/ebtables.c sizeof(*(newinfo->chainstack)))); newinfo 886 net/bridge/netfilter/ebtables.c if (!newinfo->chainstack) newinfo 889 net/bridge/netfilter/ebtables.c newinfo->chainstack[i] = newinfo 890 net/bridge/netfilter/ebtables.c vmalloc(array_size(udc_cnt, sizeof(*(newinfo->chainstack[0])))); newinfo 891 net/bridge/netfilter/ebtables.c if (!newinfo->chainstack[i]) { newinfo 893 net/bridge/netfilter/ebtables.c vfree(newinfo->chainstack[--i]); newinfo 894 net/bridge/netfilter/ebtables.c vfree(newinfo->chainstack); newinfo 895 net/bridge/netfilter/ebtables.c newinfo->chainstack = NULL; newinfo 904 net/bridge/netfilter/ebtables.c EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size, newinfo 905 net/bridge/netfilter/ebtables.c ebt_get_udc_positions, newinfo, &i, cl_s); newinfo 915 net/bridge/netfilter/ebtables.c if (newinfo->hook_entry[i]) newinfo 916 net/bridge/netfilter/ebtables.c if (check_chainloops(newinfo->hook_entry[i], newinfo 917 net/bridge/netfilter/ebtables.c cl_s, udc_cnt, i, newinfo->entries)) { newinfo 935 net/bridge/netfilter/ebtables.c ret = EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size, newinfo 936 net/bridge/netfilter/ebtables.c ebt_check_entry, net, newinfo, name, &i, cl_s, udc_cnt); newinfo 938 net/bridge/netfilter/ebtables.c EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size, newinfo 968 net/bridge/netfilter/ebtables.c struct ebt_table_info *newinfo) newinfo 986 net/bridge/netfilter/ebtables.c newinfo->chainstack = NULL; newinfo 987 net/bridge/netfilter/ebtables.c ret = ebt_verify_pointers(repl, newinfo); newinfo 991 net/bridge/netfilter/ebtables.c ret = translate_table(net, repl->name, newinfo); newinfo 1003 net/bridge/netfilter/ebtables.c if (t->check && (ret = t->check(newinfo, repl->valid_hooks))) newinfo 1014 net/bridge/netfilter/ebtables.c if (!table->nentries && newinfo->nentries && !try_module_get(t->me)) { newinfo 1017 net/bridge/netfilter/ebtables.c } else if (table->nentries && !newinfo->nentries) newinfo 1025 net/bridge/netfilter/ebtables.c t->private = newinfo; newinfo 1062 net/bridge/netfilter/ebtables.c EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size, newinfo 1067 net/bridge/netfilter/ebtables.c ebt_free_table_info(newinfo); newinfo 1076 net/bridge/netfilter/ebtables.c struct ebt_table_info *newinfo; newinfo 1098 net/bridge/netfilter/ebtables.c newinfo = __vmalloc(sizeof(*newinfo) + countersize, GFP_KERNEL_ACCOUNT, newinfo 1100 net/bridge/netfilter/ebtables.c if (!newinfo) newinfo 1104 net/bridge/netfilter/ebtables.c memset(newinfo->counters, 0, countersize); newinfo 1106 net/bridge/netfilter/ebtables.c newinfo->entries = __vmalloc(tmp.entries_size, GFP_KERNEL_ACCOUNT, newinfo 1108 net/bridge/netfilter/ebtables.c if (!newinfo->entries) { newinfo 1113 net/bridge/netfilter/ebtables.c newinfo->entries, tmp.entries, tmp.entries_size) != 0) { newinfo 1118 net/bridge/netfilter/ebtables.c ret = do_replace_finish(net, &tmp, newinfo); newinfo 1122 net/bridge/netfilter/ebtables.c vfree(newinfo->entries); newinfo 1124 net/bridge/netfilter/ebtables.c vfree(newinfo); newinfo 1146 net/bridge/netfilter/ebtables.c struct ebt_table_info *newinfo; newinfo 1165 net/bridge/netfilter/ebtables.c newinfo = vmalloc(sizeof(*newinfo) + countersize); newinfo 1167 net/bridge/netfilter/ebtables.c if (!newinfo) newinfo 1175 net/bridge/netfilter/ebtables.c newinfo->entries = p; newinfo 1177 net/bridge/netfilter/ebtables.c newinfo->entries_size = repl->entries_size; newinfo 1178 net/bridge/netfilter/ebtables.c newinfo->nentries = repl->nentries; newinfo 1181 net/bridge/netfilter/ebtables.c memset(newinfo->counters, 0, countersize); newinfo 1184 net/bridge/netfilter/ebtables.c newinfo->chainstack = NULL; newinfo 1187 net/bridge/netfilter/ebtables.c newinfo->hook_entry[i] = NULL; newinfo 1189 net/bridge/netfilter/ebtables.c newinfo->hook_entry[i] = p + newinfo 1192 net/bridge/netfilter/ebtables.c ret = translate_table(net, repl->name, newinfo); newinfo 1196 net/bridge/netfilter/ebtables.c if (table->check && table->check(newinfo, table->valid_hooks)) { newinfo 1201 net/bridge/netfilter/ebtables.c table->private = newinfo; newinfo 1212 net/bridge/netfilter/ebtables.c if (newinfo->nentries && !try_module_get(table->me)) { newinfo 1230 net/bridge/netfilter/ebtables.c ebt_free_table_info(newinfo); newinfo 1231 net/bridge/netfilter/ebtables.c vfree(newinfo->entries); newinfo 1233 net/bridge/netfilter/ebtables.c vfree(newinfo); newinfo 1733 net/bridge/netfilter/ebtables.c struct compat_ebt_replace *newinfo) newinfo 1753 net/bridge/netfilter/ebtables.c newinfo->entries_size -= off; newinfo 1763 net/bridge/netfilter/ebtables.c newinfo->hook_entry[i] -= off; newinfo 1765 net/bridge/netfilter/ebtables.c newinfo->hook_entry[i] + off, newinfo 1766 net/bridge/netfilter/ebtables.c newinfo->hook_entry[i]); newinfo 1785 net/bridge/netfilter/ebtables.c struct compat_ebt_replace *newinfo) newinfo 1791 net/bridge/netfilter/ebtables.c newinfo->entries_size = size; newinfo 1797 net/bridge/netfilter/ebtables.c entries, newinfo); newinfo 2206 net/bridge/netfilter/ebtables.c struct ebt_table_info *newinfo; newinfo 2220 net/bridge/netfilter/ebtables.c newinfo = vmalloc(sizeof(*newinfo) + countersize); newinfo 2221 net/bridge/netfilter/ebtables.c if (!newinfo) newinfo 2225 net/bridge/netfilter/ebtables.c memset(newinfo->counters, 0, countersize); newinfo 2229 net/bridge/netfilter/ebtables.c newinfo->entries = vmalloc(tmp.entries_size); newinfo 2230 net/bridge/netfilter/ebtables.c if (!newinfo->entries) { newinfo 2235 net/bridge/netfilter/ebtables.c newinfo->entries, tmp.entries, tmp.entries_size) != 0) { newinfo 2240 net/bridge/netfilter/ebtables.c entries_tmp = newinfo->entries; newinfo 2257 net/bridge/netfilter/ebtables.c newinfo->entries = vmalloc(size64); newinfo 2258 net/bridge/netfilter/ebtables.c if (!newinfo->entries) { newinfo 2265 net/bridge/netfilter/ebtables.c state.buf_kern_start = newinfo->entries; newinfo 2291 net/bridge/netfilter/ebtables.c ret = do_replace_finish(net, &tmp, newinfo); newinfo 2295 net/bridge/netfilter/ebtables.c vfree(newinfo->entries); newinfo 2297 net/bridge/netfilter/ebtables.c vfree(newinfo); newinfo 301 net/ipv4/netfilter/arp_tables.c static int mark_source_chains(const struct xt_table_info *newinfo, newinfo 311 net/ipv4/netfilter/arp_tables.c unsigned int pos = newinfo->hook_entry[hook]; newinfo 357 net/ipv4/netfilter/arp_tables.c if (pos + size >= newinfo->size) newinfo 369 net/ipv4/netfilter/arp_tables.c newinfo->number)) newinfo 374 net/ipv4/netfilter/arp_tables.c if (newpos >= newinfo->size) newinfo 452 net/ipv4/netfilter/arp_tables.c struct xt_table_info *newinfo, newinfo 484 net/ipv4/netfilter/arp_tables.c newinfo->hook_entry[h] = hook_entries[h]; newinfo 489 net/ipv4/netfilter/arp_tables.c newinfo->underflow[h] = underflows[h]; newinfo 519 net/ipv4/netfilter/arp_tables.c struct xt_table_info *newinfo, newinfo 529 net/ipv4/netfilter/arp_tables.c newinfo->size = repl->size; newinfo 530 net/ipv4/netfilter/arp_tables.c newinfo->number = repl->num_entries; newinfo 534 net/ipv4/netfilter/arp_tables.c newinfo->hook_entry[i] = 0xFFFFFFFF; newinfo 535 net/ipv4/netfilter/arp_tables.c newinfo->underflow[i] = 0xFFFFFFFF; newinfo 538 net/ipv4/netfilter/arp_tables.c offsets = xt_alloc_entry_offsets(newinfo->number); newinfo 544 net/ipv4/netfilter/arp_tables.c xt_entry_foreach(iter, entry0, newinfo->size) { newinfo 545 net/ipv4/netfilter/arp_tables.c ret = check_entry_size_and_hooks(iter, newinfo, entry0, newinfo 557 net/ipv4/netfilter/arp_tables.c ++newinfo->stacksize; newinfo 564 net/ipv4/netfilter/arp_tables.c ret = xt_check_table_hooks(newinfo, repl->valid_hooks); newinfo 568 net/ipv4/netfilter/arp_tables.c if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) { newinfo 576 net/ipv4/netfilter/arp_tables.c xt_entry_foreach(iter, entry0, newinfo->size) { newinfo 585 net/ipv4/netfilter/arp_tables.c xt_entry_foreach(iter, entry0, newinfo->size) { newinfo 737 net/ipv4/netfilter/arp_tables.c const void *base, struct xt_table_info *newinfo) newinfo 748 net/ipv4/netfilter/arp_tables.c newinfo->size -= off; newinfo 756 net/ipv4/netfilter/arp_tables.c newinfo->hook_entry[i] -= off; newinfo 759 net/ipv4/netfilter/arp_tables.c newinfo->underflow[i] -= off; newinfo 765 net/ipv4/netfilter/arp_tables.c struct xt_table_info *newinfo) newinfo 771 net/ipv4/netfilter/arp_tables.c if (!newinfo || !info) newinfo 775 net/ipv4/netfilter/arp_tables.c memcpy(newinfo, info, offsetof(struct xt_table_info, entries)); newinfo 776 net/ipv4/netfilter/arp_tables.c newinfo->initial_entries = 0; newinfo 782 net/ipv4/netfilter/arp_tables.c ret = compat_calc_entry(iter, info, loc_cpu_entry, newinfo); newinfo 882 net/ipv4/netfilter/arp_tables.c struct xt_table_info *newinfo, newinfo 912 net/ipv4/netfilter/arp_tables.c oldinfo = xt_replace_table(t, num_counters, newinfo, &ret); newinfo 918 net/ipv4/netfilter/arp_tables.c (newinfo->number <= oldinfo->initial_entries)) newinfo 921 net/ipv4/netfilter/arp_tables.c (newinfo->number <= oldinfo->initial_entries)) newinfo 956 net/ipv4/netfilter/arp_tables.c struct xt_table_info *newinfo; newinfo 971 net/ipv4/netfilter/arp_tables.c newinfo = xt_alloc_table_info(tmp.size); newinfo 972 net/ipv4/netfilter/arp_tables.c if (!newinfo) newinfo 975 net/ipv4/netfilter/arp_tables.c loc_cpu_entry = newinfo->entries; newinfo 982 net/ipv4/netfilter/arp_tables.c ret = translate_table(net, newinfo, loc_cpu_entry, &tmp); newinfo 986 net/ipv4/netfilter/arp_tables.c ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, newinfo 993 net/ipv4/netfilter/arp_tables.c xt_entry_foreach(iter, loc_cpu_entry, newinfo->size) newinfo 996 net/ipv4/netfilter/arp_tables.c xt_free_table_info(newinfo); newinfo 1073 net/ipv4/netfilter/arp_tables.c struct xt_table_info *newinfo, newinfo 1129 net/ipv4/netfilter/arp_tables.c struct xt_table_info *newinfo, unsigned char *base) newinfo 1150 net/ipv4/netfilter/arp_tables.c if ((unsigned char *)de - base < newinfo->hook_entry[h]) newinfo 1151 net/ipv4/netfilter/arp_tables.c newinfo->hook_entry[h] -= origsize - *size; newinfo 1152 net/ipv4/netfilter/arp_tables.c if ((unsigned char *)de - base < newinfo->underflow[h]) newinfo 1153 net/ipv4/netfilter/arp_tables.c newinfo->underflow[h] -= origsize - *size; newinfo 1163 net/ipv4/netfilter/arp_tables.c struct xt_table_info *newinfo, *info; newinfo 1195 net/ipv4/netfilter/arp_tables.c newinfo = xt_alloc_table_info(size); newinfo 1196 net/ipv4/netfilter/arp_tables.c if (!newinfo) newinfo 1199 net/ipv4/netfilter/arp_tables.c newinfo->number = compatr->num_entries; newinfo 1201 net/ipv4/netfilter/arp_tables.c newinfo->hook_entry[i] = compatr->hook_entry[i]; newinfo 1202 net/ipv4/netfilter/arp_tables.c newinfo->underflow[i] = compatr->underflow[i]; newinfo 1204 net/ipv4/netfilter/arp_tables.c entry1 = newinfo->entries; newinfo 1209 net/ipv4/netfilter/arp_tables.c newinfo, entry1); newinfo 1219 net/ipv4/netfilter/arp_tables.c repl.hook_entry[i] = newinfo->hook_entry[i]; newinfo 1220 net/ipv4/netfilter/arp_tables.c repl.underflow[i] = newinfo->underflow[i]; newinfo 1225 net/ipv4/netfilter/arp_tables.c repl.size = newinfo->size; newinfo 1226 net/ipv4/netfilter/arp_tables.c ret = translate_table(net, newinfo, entry1, &repl); newinfo 1230 net/ipv4/netfilter/arp_tables.c *pinfo = newinfo; newinfo 1236 net/ipv4/netfilter/arp_tables.c xt_free_table_info(newinfo); newinfo 1254 net/ipv4/netfilter/arp_tables.c struct xt_table_info *newinfo; newinfo 1269 net/ipv4/netfilter/arp_tables.c newinfo = xt_alloc_table_info(tmp.size); newinfo 1270 net/ipv4/netfilter/arp_tables.c if (!newinfo) newinfo 1273 net/ipv4/netfilter/arp_tables.c loc_cpu_entry = newinfo->entries; newinfo 1279 net/ipv4/netfilter/arp_tables.c ret = translate_compat_table(net, &newinfo, &loc_cpu_entry, &tmp); newinfo 1283 net/ipv4/netfilter/arp_tables.c ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, newinfo 1290 net/ipv4/netfilter/arp_tables.c xt_entry_foreach(iter, loc_cpu_entry, newinfo->size) newinfo 1293 net/ipv4/netfilter/arp_tables.c xt_free_table_info(newinfo); newinfo 1543 net/ipv4/netfilter/arp_tables.c struct xt_table_info *newinfo; newinfo 1548 net/ipv4/netfilter/arp_tables.c newinfo = xt_alloc_table_info(repl->size); newinfo 1549 net/ipv4/netfilter/arp_tables.c if (!newinfo) newinfo 1552 net/ipv4/netfilter/arp_tables.c loc_cpu_entry = newinfo->entries; newinfo 1555 net/ipv4/netfilter/arp_tables.c ret = translate_table(net, newinfo, loc_cpu_entry, repl); newinfo 1559 net/ipv4/netfilter/arp_tables.c new_table = xt_register_table(net, table, &bootstrap, newinfo); newinfo 1577 net/ipv4/netfilter/arp_tables.c xt_free_table_info(newinfo); newinfo 368 net/ipv4/netfilter/ip_tables.c mark_source_chains(const struct xt_table_info *newinfo, newinfo 377 net/ipv4/netfilter/ip_tables.c unsigned int pos = newinfo->hook_entry[hook]; newinfo 421 net/ipv4/netfilter/ip_tables.c if (pos + size >= newinfo->size) newinfo 433 net/ipv4/netfilter/ip_tables.c newinfo->number)) newinfo 438 net/ipv4/netfilter/ip_tables.c if (newpos >= newinfo->size) newinfo 589 net/ipv4/netfilter/ip_tables.c struct xt_table_info *newinfo, newinfo 621 net/ipv4/netfilter/ip_tables.c newinfo->hook_entry[h] = hook_entries[h]; newinfo 626 net/ipv4/netfilter/ip_tables.c newinfo->underflow[h] = underflows[h]; newinfo 661 net/ipv4/netfilter/ip_tables.c translate_table(struct net *net, struct xt_table_info *newinfo, void *entry0, newinfo 670 net/ipv4/netfilter/ip_tables.c newinfo->size = repl->size; newinfo 671 net/ipv4/netfilter/ip_tables.c newinfo->number = repl->num_entries; newinfo 675 net/ipv4/netfilter/ip_tables.c newinfo->hook_entry[i] = 0xFFFFFFFF; newinfo 676 net/ipv4/netfilter/ip_tables.c newinfo->underflow[i] = 0xFFFFFFFF; newinfo 679 net/ipv4/netfilter/ip_tables.c offsets = xt_alloc_entry_offsets(newinfo->number); newinfo 684 net/ipv4/netfilter/ip_tables.c xt_entry_foreach(iter, entry0, newinfo->size) { newinfo 685 net/ipv4/netfilter/ip_tables.c ret = check_entry_size_and_hooks(iter, newinfo, entry0, newinfo 697 net/ipv4/netfilter/ip_tables.c ++newinfo->stacksize; newinfo 704 net/ipv4/netfilter/ip_tables.c ret = xt_check_table_hooks(newinfo, repl->valid_hooks); newinfo 708 net/ipv4/netfilter/ip_tables.c if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) { newinfo 716 net/ipv4/netfilter/ip_tables.c xt_entry_foreach(iter, entry0, newinfo->size) { newinfo 725 net/ipv4/netfilter/ip_tables.c xt_entry_foreach(iter, entry0, newinfo->size) { newinfo 892 net/ipv4/netfilter/ip_tables.c const void *base, struct xt_table_info *newinfo) newinfo 905 net/ipv4/netfilter/ip_tables.c newinfo->size -= off; newinfo 913 net/ipv4/netfilter/ip_tables.c newinfo->hook_entry[i] -= off; newinfo 916 net/ipv4/netfilter/ip_tables.c newinfo->underflow[i] -= off; newinfo 922 net/ipv4/netfilter/ip_tables.c struct xt_table_info *newinfo) newinfo 928 net/ipv4/netfilter/ip_tables.c if (!newinfo || !info) newinfo 932 net/ipv4/netfilter/ip_tables.c memcpy(newinfo, info, offsetof(struct xt_table_info, entries)); newinfo 933 net/ipv4/netfilter/ip_tables.c newinfo->initial_entries = 0; newinfo 939 net/ipv4/netfilter/ip_tables.c ret = compat_calc_entry(iter, info, loc_cpu_entry, newinfo); newinfo 1039 net/ipv4/netfilter/ip_tables.c struct xt_table_info *newinfo, unsigned int num_counters, newinfo 1067 net/ipv4/netfilter/ip_tables.c oldinfo = xt_replace_table(t, num_counters, newinfo, &ret); newinfo 1073 net/ipv4/netfilter/ip_tables.c (newinfo->number <= oldinfo->initial_entries)) newinfo 1076 net/ipv4/netfilter/ip_tables.c (newinfo->number <= oldinfo->initial_entries)) newinfo 1110 net/ipv4/netfilter/ip_tables.c struct xt_table_info *newinfo; newinfo 1125 net/ipv4/netfilter/ip_tables.c newinfo = xt_alloc_table_info(tmp.size); newinfo 1126 net/ipv4/netfilter/ip_tables.c if (!newinfo) newinfo 1129 net/ipv4/netfilter/ip_tables.c loc_cpu_entry = newinfo->entries; newinfo 1136 net/ipv4/netfilter/ip_tables.c ret = translate_table(net, newinfo, loc_cpu_entry, &tmp); newinfo 1140 net/ipv4/netfilter/ip_tables.c ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, newinfo 1147 net/ipv4/netfilter/ip_tables.c xt_entry_foreach(iter, loc_cpu_entry, newinfo->size) newinfo 1150 net/ipv4/netfilter/ip_tables.c xt_free_table_info(newinfo); newinfo 1287 net/ipv4/netfilter/ip_tables.c struct xt_table_info *newinfo, newinfo 1357 net/ipv4/netfilter/ip_tables.c struct xt_table_info *newinfo, unsigned char *base) newinfo 1383 net/ipv4/netfilter/ip_tables.c if ((unsigned char *)de - base < newinfo->hook_entry[h]) newinfo 1384 net/ipv4/netfilter/ip_tables.c newinfo->hook_entry[h] -= origsize - *size; newinfo 1385 net/ipv4/netfilter/ip_tables.c if ((unsigned char *)de - base < newinfo->underflow[h]) newinfo 1386 net/ipv4/netfilter/ip_tables.c newinfo->underflow[h] -= origsize - *size; newinfo 1397 net/ipv4/netfilter/ip_tables.c struct xt_table_info *newinfo, *info; newinfo 1429 net/ipv4/netfilter/ip_tables.c newinfo = xt_alloc_table_info(size); newinfo 1430 net/ipv4/netfilter/ip_tables.c if (!newinfo) newinfo 1433 net/ipv4/netfilter/ip_tables.c newinfo->number = compatr->num_entries; newinfo 1435 net/ipv4/netfilter/ip_tables.c newinfo->hook_entry[i] = compatr->hook_entry[i]; newinfo 1436 net/ipv4/netfilter/ip_tables.c newinfo->underflow[i] = compatr->underflow[i]; newinfo 1438 net/ipv4/netfilter/ip_tables.c entry1 = newinfo->entries; newinfo 1443 net/ipv4/netfilter/ip_tables.c newinfo, entry1); newinfo 1458 net/ipv4/netfilter/ip_tables.c repl.hook_entry[i] = newinfo->hook_entry[i]; newinfo 1459 net/ipv4/netfilter/ip_tables.c repl.underflow[i] = newinfo->underflow[i]; newinfo 1464 net/ipv4/netfilter/ip_tables.c repl.size = newinfo->size; newinfo 1465 net/ipv4/netfilter/ip_tables.c ret = translate_table(net, newinfo, entry1, &repl); newinfo 1469 net/ipv4/netfilter/ip_tables.c *pinfo = newinfo; newinfo 1475 net/ipv4/netfilter/ip_tables.c xt_free_table_info(newinfo); newinfo 1493 net/ipv4/netfilter/ip_tables.c struct xt_table_info *newinfo; newinfo 1508 net/ipv4/netfilter/ip_tables.c newinfo = xt_alloc_table_info(tmp.size); newinfo 1509 net/ipv4/netfilter/ip_tables.c if (!newinfo) newinfo 1512 net/ipv4/netfilter/ip_tables.c loc_cpu_entry = newinfo->entries; newinfo 1519 net/ipv4/netfilter/ip_tables.c ret = translate_compat_table(net, &newinfo, &loc_cpu_entry, &tmp); newinfo 1523 net/ipv4/netfilter/ip_tables.c ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, newinfo 1530 net/ipv4/netfilter/ip_tables.c xt_entry_foreach(iter, loc_cpu_entry, newinfo->size) newinfo 1533 net/ipv4/netfilter/ip_tables.c xt_free_table_info(newinfo); newinfo 1760 net/ipv4/netfilter/ip_tables.c struct xt_table_info *newinfo; newinfo 1765 net/ipv4/netfilter/ip_tables.c newinfo = xt_alloc_table_info(repl->size); newinfo 1766 net/ipv4/netfilter/ip_tables.c if (!newinfo) newinfo 1769 net/ipv4/netfilter/ip_tables.c loc_cpu_entry = newinfo->entries; newinfo 1772 net/ipv4/netfilter/ip_tables.c ret = translate_table(net, newinfo, loc_cpu_entry, repl); newinfo 1776 net/ipv4/netfilter/ip_tables.c new_table = xt_register_table(net, table, &bootstrap, newinfo); newinfo 1796 net/ipv4/netfilter/ip_tables.c xt_free_table_info(newinfo); newinfo 386 net/ipv6/netfilter/ip6_tables.c mark_source_chains(const struct xt_table_info *newinfo, newinfo 395 net/ipv6/netfilter/ip6_tables.c unsigned int pos = newinfo->hook_entry[hook]; newinfo 439 net/ipv6/netfilter/ip6_tables.c if (pos + size >= newinfo->size) newinfo 451 net/ipv6/netfilter/ip6_tables.c newinfo->number)) newinfo 456 net/ipv6/netfilter/ip6_tables.c if (newpos >= newinfo->size) newinfo 607 net/ipv6/netfilter/ip6_tables.c struct xt_table_info *newinfo, newinfo 639 net/ipv6/netfilter/ip6_tables.c newinfo->hook_entry[h] = hook_entries[h]; newinfo 644 net/ipv6/netfilter/ip6_tables.c newinfo->underflow[h] = underflows[h]; newinfo 678 net/ipv6/netfilter/ip6_tables.c translate_table(struct net *net, struct xt_table_info *newinfo, void *entry0, newinfo 687 net/ipv6/netfilter/ip6_tables.c newinfo->size = repl->size; newinfo 688 net/ipv6/netfilter/ip6_tables.c newinfo->number = repl->num_entries; newinfo 692 net/ipv6/netfilter/ip6_tables.c newinfo->hook_entry[i] = 0xFFFFFFFF; newinfo 693 net/ipv6/netfilter/ip6_tables.c newinfo->underflow[i] = 0xFFFFFFFF; newinfo 696 net/ipv6/netfilter/ip6_tables.c offsets = xt_alloc_entry_offsets(newinfo->number); newinfo 701 net/ipv6/netfilter/ip6_tables.c xt_entry_foreach(iter, entry0, newinfo->size) { newinfo 702 net/ipv6/netfilter/ip6_tables.c ret = check_entry_size_and_hooks(iter, newinfo, entry0, newinfo 714 net/ipv6/netfilter/ip6_tables.c ++newinfo->stacksize; newinfo 721 net/ipv6/netfilter/ip6_tables.c ret = xt_check_table_hooks(newinfo, repl->valid_hooks); newinfo 725 net/ipv6/netfilter/ip6_tables.c if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) { newinfo 733 net/ipv6/netfilter/ip6_tables.c xt_entry_foreach(iter, entry0, newinfo->size) { newinfo 742 net/ipv6/netfilter/ip6_tables.c xt_entry_foreach(iter, entry0, newinfo->size) { newinfo 908 net/ipv6/netfilter/ip6_tables.c const void *base, struct xt_table_info *newinfo) newinfo 921 net/ipv6/netfilter/ip6_tables.c newinfo->size -= off; newinfo 929 net/ipv6/netfilter/ip6_tables.c newinfo->hook_entry[i] -= off; newinfo 932 net/ipv6/netfilter/ip6_tables.c newinfo->underflow[i] -= off; newinfo 938 net/ipv6/netfilter/ip6_tables.c struct xt_table_info *newinfo) newinfo 944 net/ipv6/netfilter/ip6_tables.c if (!newinfo || !info) newinfo 948 net/ipv6/netfilter/ip6_tables.c memcpy(newinfo, info, offsetof(struct xt_table_info, entries)); newinfo 949 net/ipv6/netfilter/ip6_tables.c newinfo->initial_entries = 0; newinfo 955 net/ipv6/netfilter/ip6_tables.c ret = compat_calc_entry(iter, info, loc_cpu_entry, newinfo); newinfo 1056 net/ipv6/netfilter/ip6_tables.c struct xt_table_info *newinfo, unsigned int num_counters, newinfo 1084 net/ipv6/netfilter/ip6_tables.c oldinfo = xt_replace_table(t, num_counters, newinfo, &ret); newinfo 1090 net/ipv6/netfilter/ip6_tables.c (newinfo->number <= oldinfo->initial_entries)) newinfo 1093 net/ipv6/netfilter/ip6_tables.c (newinfo->number <= oldinfo->initial_entries)) newinfo 1127 net/ipv6/netfilter/ip6_tables.c struct xt_table_info *newinfo; newinfo 1142 net/ipv6/netfilter/ip6_tables.c newinfo = xt_alloc_table_info(tmp.size); newinfo 1143 net/ipv6/netfilter/ip6_tables.c if (!newinfo) newinfo 1146 net/ipv6/netfilter/ip6_tables.c loc_cpu_entry = newinfo->entries; newinfo 1153 net/ipv6/netfilter/ip6_tables.c ret = translate_table(net, newinfo, loc_cpu_entry, &tmp); newinfo 1157 net/ipv6/netfilter/ip6_tables.c ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, newinfo 1164 net/ipv6/netfilter/ip6_tables.c xt_entry_foreach(iter, loc_cpu_entry, newinfo->size) newinfo 1167 net/ipv6/netfilter/ip6_tables.c xt_free_table_info(newinfo); newinfo 1303 net/ipv6/netfilter/ip6_tables.c struct xt_table_info *newinfo, newinfo 1373 net/ipv6/netfilter/ip6_tables.c struct xt_table_info *newinfo, unsigned char *base) newinfo 1398 net/ipv6/netfilter/ip6_tables.c if ((unsigned char *)de - base < newinfo->hook_entry[h]) newinfo 1399 net/ipv6/netfilter/ip6_tables.c newinfo->hook_entry[h] -= origsize - *size; newinfo 1400 net/ipv6/netfilter/ip6_tables.c if ((unsigned char *)de - base < newinfo->underflow[h]) newinfo 1401 net/ipv6/netfilter/ip6_tables.c newinfo->underflow[h] -= origsize - *size; newinfo 1412 net/ipv6/netfilter/ip6_tables.c struct xt_table_info *newinfo, *info; newinfo 1444 net/ipv6/netfilter/ip6_tables.c newinfo = xt_alloc_table_info(size); newinfo 1445 net/ipv6/netfilter/ip6_tables.c if (!newinfo) newinfo 1448 net/ipv6/netfilter/ip6_tables.c newinfo->number = compatr->num_entries; newinfo 1450 net/ipv6/netfilter/ip6_tables.c newinfo->hook_entry[i] = compatr->hook_entry[i]; newinfo 1451 net/ipv6/netfilter/ip6_tables.c newinfo->underflow[i] = compatr->underflow[i]; newinfo 1453 net/ipv6/netfilter/ip6_tables.c entry1 = newinfo->entries; newinfo 1458 net/ipv6/netfilter/ip6_tables.c newinfo, entry1); newinfo 1467 net/ipv6/netfilter/ip6_tables.c repl.hook_entry[i] = newinfo->hook_entry[i]; newinfo 1468 net/ipv6/netfilter/ip6_tables.c repl.underflow[i] = newinfo->underflow[i]; newinfo 1473 net/ipv6/netfilter/ip6_tables.c repl.size = newinfo->size; newinfo 1474 net/ipv6/netfilter/ip6_tables.c ret = translate_table(net, newinfo, entry1, &repl); newinfo 1478 net/ipv6/netfilter/ip6_tables.c *pinfo = newinfo; newinfo 1484 net/ipv6/netfilter/ip6_tables.c xt_free_table_info(newinfo); newinfo 1502 net/ipv6/netfilter/ip6_tables.c struct xt_table_info *newinfo; newinfo 1517 net/ipv6/netfilter/ip6_tables.c newinfo = xt_alloc_table_info(tmp.size); newinfo 1518 net/ipv6/netfilter/ip6_tables.c if (!newinfo) newinfo 1521 net/ipv6/netfilter/ip6_tables.c loc_cpu_entry = newinfo->entries; newinfo 1528 net/ipv6/netfilter/ip6_tables.c ret = translate_compat_table(net, &newinfo, &loc_cpu_entry, &tmp); newinfo 1532 net/ipv6/netfilter/ip6_tables.c ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, newinfo 1539 net/ipv6/netfilter/ip6_tables.c xt_entry_foreach(iter, loc_cpu_entry, newinfo->size) newinfo 1542 net/ipv6/netfilter/ip6_tables.c xt_free_table_info(newinfo); newinfo 1770 net/ipv6/netfilter/ip6_tables.c struct xt_table_info *newinfo; newinfo 1775 net/ipv6/netfilter/ip6_tables.c newinfo = xt_alloc_table_info(repl->size); newinfo 1776 net/ipv6/netfilter/ip6_tables.c if (!newinfo) newinfo 1779 net/ipv6/netfilter/ip6_tables.c loc_cpu_entry = newinfo->entries; newinfo 1782 net/ipv6/netfilter/ip6_tables.c ret = translate_table(net, newinfo, loc_cpu_entry, repl); newinfo 1786 net/ipv6/netfilter/ip6_tables.c new_table = xt_register_table(net, table, &bootstrap, newinfo); newinfo 1806 net/ipv6/netfilter/ip6_tables.c xt_free_table_info(newinfo); newinfo 1355 net/netfilter/x_tables.c struct xt_table_info *newinfo, newinfo 1362 net/netfilter/x_tables.c ret = xt_jumpstack_alloc(newinfo); newinfo 1381 net/netfilter/x_tables.c newinfo->initial_entries = private->initial_entries; newinfo 1387 net/netfilter/x_tables.c table->private = newinfo; newinfo 1427 net/netfilter/x_tables.c struct xt_table_info *newinfo) newinfo 1452 net/netfilter/x_tables.c if (!xt_replace_table(table, 0, newinfo, &ret))