/openbmc/linux/net/netfilter/ |
H A D | xt_repldata.h | 22 struct type##_replace repl; \ 32 strscpy_pad(tbl->repl.name, info->name, sizeof(tbl->repl.name)); \ 34 tbl->repl.valid_hooks = hook_mask; \ 35 tbl->repl.num_entries = nhooks + 1; \ 36 tbl->repl.size = nhooks * sizeof(struct type##_standard) + \ 41 tbl->repl.hook_entry[hooknum] = bytes; \ 42 tbl->repl.underflow[hooknum] = bytes; \
|
H A D | nf_conntrack_sane.c | 74 struct sane_reply_net_start repl; in help() member 130 reply = skb_header_pointer(skb, dataoff, datalen, &buf.repl); in help()
|
/openbmc/linux/net/ipv6/netfilter/ |
H A D | ip6table_filter.c | 38 struct ip6t_replace *repl; in ip6table_filter_table_init() local 41 repl = ip6t_alloc_initial_table(&packet_filter); in ip6table_filter_table_init() 42 if (repl == NULL) in ip6table_filter_table_init() 45 ((struct ip6t_standard *)repl->entries)[1].target.verdict = in ip6table_filter_table_init() 48 err = ip6t_register_table(net, &packet_filter, repl, filter_ops); in ip6table_filter_table_init() 49 kfree(repl); in ip6table_filter_table_init()
|
H A D | ip6table_security.c | 39 struct ip6t_replace *repl; in ip6table_security_table_init() local 42 repl = ip6t_alloc_initial_table(&security_table); in ip6table_security_table_init() 43 if (repl == NULL) in ip6table_security_table_init() 45 ret = ip6t_register_table(net, &security_table, repl, sectbl_ops); in ip6table_security_table_init() 46 kfree(repl); in ip6table_security_table_init()
|
H A D | ip6table_nat.c | 110 struct ip6t_replace *repl; in ip6table_nat_table_init() local 113 repl = ip6t_alloc_initial_table(&nf_nat_ipv6_table); in ip6table_nat_table_init() 114 if (repl == NULL) in ip6table_nat_table_init() 116 ret = ip6t_register_table(net, &nf_nat_ipv6_table, repl, in ip6table_nat_table_init() 119 kfree(repl); in ip6table_nat_table_init() 127 kfree(repl); in ip6table_nat_table_init()
|
H A D | ip6table_raw.c | 38 struct ip6t_replace *repl; in ip6table_raw_table_init() local 45 repl = ip6t_alloc_initial_table(table); in ip6table_raw_table_init() 46 if (repl == NULL) in ip6table_raw_table_init() 48 ret = ip6t_register_table(net, table, repl, rawtable_ops); in ip6table_raw_table_init() 49 kfree(repl); in ip6table_raw_table_init()
|
H A D | ip6table_mangle.c | 78 struct ip6t_replace *repl; in ip6table_mangle_table_init() local 81 repl = ip6t_alloc_initial_table(&packet_mangler); in ip6table_mangle_table_init() 82 if (repl == NULL) in ip6table_mangle_table_init() 84 ret = ip6t_register_table(net, &packet_mangler, repl, mangle_ops); in ip6table_mangle_table_init() 85 kfree(repl); in ip6table_mangle_table_init()
|
H A D | ip6_tables.c | 678 const struct ip6t_replace *repl) in translate_table() argument 686 newinfo->size = repl->size; in translate_table() 687 newinfo->number = repl->num_entries; in translate_table() 702 entry0 + repl->size, in translate_table() 703 repl->hook_entry, in translate_table() 704 repl->underflow, in translate_table() 705 repl->valid_hooks); in translate_table() 708 if (i < repl->num_entries) in translate_table() 717 if (i != repl->num_entries) in translate_table() 720 ret = xt_check_table_hooks(newinfo, repl->valid_hooks); in translate_table() [all …]
|
/openbmc/linux/net/ipv4/netfilter/ |
H A D | iptable_filter.c | 39 struct ipt_replace *repl; in iptable_filter_table_init() local 42 repl = ipt_alloc_initial_table(&packet_filter); in iptable_filter_table_init() 43 if (repl == NULL) in iptable_filter_table_init() 46 ((struct ipt_standard *)repl->entries)[1].target.verdict = in iptable_filter_table_init() 49 err = ipt_register_table(net, &packet_filter, repl, filter_ops); in iptable_filter_table_init() 50 kfree(repl); in iptable_filter_table_init()
|
H A D | arptable_filter.c | 33 struct arpt_replace *repl; in arptable_filter_table_init() local 36 repl = arpt_alloc_initial_table(&packet_filter); in arptable_filter_table_init() 37 if (repl == NULL) in arptable_filter_table_init() 39 err = arpt_register_table(net, &packet_filter, repl, arpfilter_ops); in arptable_filter_table_init() 40 kfree(repl); in arptable_filter_table_init()
|
H A D | iptable_security.c | 40 struct ipt_replace *repl; in iptable_security_table_init() local 43 repl = ipt_alloc_initial_table(&security_table); in iptable_security_table_init() 44 if (repl == NULL) in iptable_security_table_init() 46 ret = ipt_register_table(net, &security_table, repl, sectbl_ops); in iptable_security_table_init() 47 kfree(repl); in iptable_security_table_init()
|
H A D | iptable_nat.c | 108 struct ipt_replace *repl; in iptable_nat_table_init() local 111 repl = ipt_alloc_initial_table(&nf_nat_ipv4_table); in iptable_nat_table_init() 112 if (repl == NULL) in iptable_nat_table_init() 115 ret = ipt_register_table(net, &nf_nat_ipv4_table, repl, NULL); in iptable_nat_table_init() 117 kfree(repl); in iptable_nat_table_init() 125 kfree(repl); in iptable_nat_table_init()
|
H A D | iptable_raw.c | 39 struct ipt_replace *repl; in iptable_raw_table_init() local 46 repl = ipt_alloc_initial_table(table); in iptable_raw_table_init() 47 if (repl == NULL) in iptable_raw_table_init() 49 ret = ipt_register_table(net, table, repl, rawtable_ops); in iptable_raw_table_init() 50 kfree(repl); in iptable_raw_table_init()
|
H A D | iptable_mangle.c | 85 struct ipt_replace *repl; in iptable_mangle_table_init() local 88 repl = ipt_alloc_initial_table(&packet_mangler); in iptable_mangle_table_init() 89 if (repl == NULL) in iptable_mangle_table_init() 91 ret = ipt_register_table(net, &packet_mangler, repl, mangle_ops); in iptable_mangle_table_init() 92 kfree(repl); in iptable_mangle_table_init()
|
H A D | arp_tables.c | 522 const struct arpt_replace *repl) in translate_table() argument 530 newinfo->size = repl->size; in translate_table() 531 newinfo->number = repl->num_entries; in translate_table() 547 entry0 + repl->size, in translate_table() 548 repl->hook_entry, in translate_table() 549 repl->underflow, in translate_table() 550 repl->valid_hooks); in translate_table() 553 if (i < repl->num_entries) in translate_table() 562 if (i != repl->num_entries) in translate_table() 565 ret = xt_check_table_hooks(newinfo, repl->valid_hooks); in translate_table() [all …]
|
H A D | ip_tables.c | 661 const struct ipt_replace *repl) in translate_table() argument 669 newinfo->size = repl->size; in translate_table() 670 newinfo->number = repl->num_entries; in translate_table() 685 entry0 + repl->size, in translate_table() 686 repl->hook_entry, in translate_table() 687 repl->underflow, in translate_table() 688 repl->valid_hooks); in translate_table() 691 if (i < repl->num_entries) in translate_table() 700 if (i != repl->num_entries) in translate_table() 703 ret = xt_check_table_hooks(newinfo, repl->valid_hooks); in translate_table() [all …]
|
/openbmc/linux/net/bridge/netfilter/ |
H A D | ebtables.c | 466 static int ebt_verify_pointers(const struct ebt_replace *repl, in ebt_verify_pointers() argument 469 unsigned int limit = repl->entries_size; in ebt_verify_pointers() 470 unsigned int valid_hooks = repl->valid_hooks; in ebt_verify_pointers() 477 newinfo->entries_size = repl->entries_size; in ebt_verify_pointers() 478 newinfo->nentries = repl->nentries; in ebt_verify_pointers() 490 if ((char __user *)repl->hook_entry[i] == in ebt_verify_pointers() 491 repl->entries + offset) in ebt_verify_pointers() 1008 static int do_replace_finish(struct net *net, struct ebt_replace *repl, in do_replace_finish() argument 1020 if (repl->num_counters) { in do_replace_finish() 1021 unsigned long size = repl->num_counters * sizeof(*counterstmp); in do_replace_finish() [all …]
|
/openbmc/linux/Documentation/sphinx/ |
H A D | automarkup.py | 80 repl = [ ] 110 repl.append(nodes.Text(t[done:m.start()])) 116 repl.append(markup_func[m.re](docname, app, m)) 120 repl.append(nodes.Text(t[done:])) 121 return repl
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/valkey/valkey/ |
H A D | valkey.conf | 355 repl-diskless-sync no 367 repl-diskless-sync-delay 5 400 repl-disable-tcp-nodelay no
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/redis/redis/ |
H A D | redis.conf | 355 repl-diskless-sync no 367 repl-diskless-sync-delay 5 400 repl-disable-tcp-nodelay no
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/redis/redis-7.2.7/ |
H A D | redis.conf | 355 repl-diskless-sync no 367 repl-diskless-sync-delay 5 400 repl-disable-tcp-nodelay no
|
/openbmc/linux/net/sctp/ |
H A D | sm_statefuns.c | 323 struct sctp_chunk *chunk = arg, *repl, *err_chunk; in sctp_sf_do_5_1B_init() local 440 repl = sctp_make_init_ack(new_asoc, chunk, GFP_ATOMIC, len); in sctp_sf_do_5_1B_init() 441 if (!repl) in sctp_sf_do_5_1B_init() 462 sctp_addto_chunk(repl, len, unk_param); in sctp_sf_do_5_1B_init() 468 sctp_add_cmd_sf(commands, SCTP_CMD_REPLY, SCTP_CHUNK(repl)); in sctp_sf_do_5_1B_init() 710 struct sctp_chunk *repl; in sctp_sf_do_5_1D_ce() local 816 repl = sctp_make_cookie_ack(new_asoc, chunk); in sctp_sf_do_5_1D_ce() 817 if (!repl) in sctp_sf_do_5_1D_ce() 870 sctp_add_cmd_sf(commands, SCTP_CMD_REPLY, SCTP_CHUNK(repl)); in sctp_sf_do_5_1D_ce() 891 sctp_chunk_free(repl); in sctp_sf_do_5_1D_ce() [all …]
|
/openbmc/openbmc/poky/meta/lib/oe/ |
H A D | types.py | 69 def sub(pattern, repl, string, count=0): argument 72 def subn(pattern, repl, string, count=0): argument
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/ |
H A D | python3-click-repl_0.3.0.bb | 2 HOMEPAGE = "https://github.com/untitaker/click-repl"
|
/openbmc/linux/include/linux/netfilter_ipv6/ |
H A D | ip6_tables.h | 28 const struct ip6t_replace *repl,
|