/linux-4.1.27/net/bridge/netfilter/ |
H A D | ebtable_broute.c | 28 .valid_hooks = 1 << NF_BR_BROUTING, 36 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) check() argument 38 if (valid_hooks & ~(1 << NF_BR_BROUTING)) check() 46 .valid_hooks = 1 << NF_BR_BROUTING,
|
H A D | ebtable_filter.c | 34 .valid_hooks = FILTER_VALID_HOOKS, 44 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) check() argument 46 if (valid_hooks & ~FILTER_VALID_HOOKS) check() 54 .valid_hooks = FILTER_VALID_HOOKS,
|
H A D | ebtable_nat.c | 34 .valid_hooks = NAT_VALID_HOOKS, 44 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) check() argument 46 if (valid_hooks & ~NAT_VALID_HOOKS) check() 54 .valid_hooks = NAT_VALID_HOOKS,
|
H A D | ebtables.c | 424 unsigned int valid_hooks = repl->valid_hooks; ebt_verify_pointers() local 442 if ((valid_hooks & (1 << i)) == 0) ebt_verify_pointers() 480 (valid_hooks & (1 << i))) { ebt_verify_pointers() 1012 if (t->check && (ret = t->check(newinfo, repl->valid_hooks))) do_replace_finish() 1198 if ((repl->valid_hooks & (1 << i)) == 0) ebt_register_table() 1210 if (table->check && table->check(newinfo, table->valid_hooks)) { ebt_register_table() 1529 tmp.valid_hooks = t->valid_hooks; do_ebt_get_ctl() 1533 tmp.valid_hooks = t->table->valid_hooks; do_ebt_get_ctl() 1562 compat_uint_t valid_hooks; member in struct:compat_ebt_replace 2340 tmp.valid_hooks = t->valid_hooks; compat_do_ebt_get_ctl() 2351 tmp.valid_hooks = t->table->valid_hooks; compat_do_ebt_get_ctl()
|
/linux-4.1.27/net/netfilter/ |
H A D | xt_repldata.h | 17 unsigned int hook_mask = info->valid_hooks; \ 33 tbl->repl.valid_hooks = hook_mask; \
|
H A D | x_tables.c | 1195 unsigned int hook_mask = table->valid_hooks; xt_hook_link() 1234 nf_unregister_hooks(ops, hweight32(table->valid_hooks)); xt_hook_unlink()
|
/linux-4.1.27/net/ipv4/netfilter/ |
H A D | arp_tables.c | 368 unsigned int valid_hooks, void *entry0) mark_source_chains() 380 if (!(valid_hooks & (1 << hook))) mark_source_chains() 565 unsigned int valid_hooks) check_entry_size_and_hooks() 584 if (!(valid_hooks & (1 << h))) check_entry_size_and_hooks() 647 repl->valid_hooks); translate_table() 668 if (!(repl->valid_hooks & (1 << i))) translate_table() 682 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0)) { translate_table() 922 info.valid_hooks = t->valid_hooks; get_info() 988 unsigned int valid_hooks, __do_replace() 1015 if (valid_hooks != t->valid_hooks) { __do_replace() 1017 valid_hooks, t->valid_hooks); __do_replace() 1101 ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, do_replace() 1321 unsigned int valid_hooks, translate_compat_table() 1375 if (!(valid_hooks & (1 << i))) 1414 if (!mark_source_chains(newinfo, valid_hooks, entry1)) 1478 u32 valid_hooks; member in struct:compat_arpt_replace 1521 ret = translate_compat_table(tmp.name, tmp.valid_hooks, compat_do_replace() 1530 ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, compat_do_replace() 367 mark_source_chains(const struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) mark_source_chains() argument 559 check_entry_size_and_hooks(struct arpt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) check_entry_size_and_hooks() argument 987 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) __do_replace() argument 1320 translate_compat_table(const char *name, unsigned int valid_hooks, struct xt_table_info **pinfo, void **pentry0, unsigned int total_size, unsigned int number, unsigned int *hook_entries, unsigned int *underflows) translate_compat_table() argument
|
H A D | arptable_filter.c | 22 .valid_hooks = FILTER_VALID_HOOKS,
|
H A D | iptable_raw.c | 15 .valid_hooks = RAW_VALID_HOOKS,
|
H A D | ip_tables.c | 324 IP_NF_ASSERT(table->valid_hooks & (1 << hook)); ipt_do_table() 445 unsigned int valid_hooks, void *entry0) mark_source_chains() 455 if (!(valid_hooks & (1 << hook))) mark_source_chains() 728 unsigned int valid_hooks) check_entry_size_and_hooks() 747 if (!(valid_hooks & (1 << h))) check_entry_size_and_hooks() 816 repl->valid_hooks); translate_table() 834 if (!(repl->valid_hooks & (1 << i))) translate_table() 848 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0)) translate_table() 1110 info.valid_hooks = t->valid_hooks; get_info() 1176 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, __do_replace() argument 1202 if (valid_hooks != t->valid_hooks) { __do_replace() 1204 valid_hooks, t->valid_hooks); __do_replace() 1288 ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, do_replace() 1394 u32 valid_hooks; member in struct:compat_ipt_replace 1643 unsigned int valid_hooks, translate_compat_table() 1697 if (!(valid_hooks & (1 << i))) 1736 if (!mark_source_chains(newinfo, valid_hooks, entry1)) 1832 ret = translate_compat_table(net, tmp.name, tmp.valid_hooks, compat_do_replace() 1841 ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, compat_do_replace() 444 mark_source_chains(const struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) mark_source_chains() argument 722 check_entry_size_and_hooks(struct ipt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) check_entry_size_and_hooks() argument 1641 translate_compat_table(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info **pinfo, void **pentry0, unsigned int total_size, unsigned int number, unsigned int *hook_entries, unsigned int *underflows) translate_compat_table() argument
|
H A D | iptable_filter.c | 29 .valid_hooks = FILTER_VALID_HOOKS,
|
H A D | iptable_security.c | 33 .valid_hooks = SECURITY_VALID_HOOKS,
|
H A D | iptable_mangle.c | 33 .valid_hooks = MANGLE_VALID_HOOKS,
|
H A D | iptable_nat.c | 23 .valid_hooks = (1 << NF_INET_PRE_ROUTING) |
|
/linux-4.1.27/net/ipv6/netfilter/ |
H A D | ip6table_raw.c | 14 .valid_hooks = RAW_VALID_HOOKS,
|
H A D | ip6_tables.c | 349 IP_NF_ASSERT(table->valid_hooks & (1 << hook)); ip6t_do_table() 458 unsigned int valid_hooks, void *entry0) mark_source_chains() 468 if (!(valid_hooks & (1 << hook))) mark_source_chains() 742 unsigned int valid_hooks) check_entry_size_and_hooks() 761 if (!(valid_hooks & (1 << h))) check_entry_size_and_hooks() 829 repl->valid_hooks); translate_table() 847 if (!(repl->valid_hooks & (1 << i))) translate_table() 861 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0)) translate_table() 1123 info.valid_hooks = t->valid_hooks; get_info() 1189 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, __do_replace() argument 1215 if (valid_hooks != t->valid_hooks) { __do_replace() 1217 valid_hooks, t->valid_hooks); __do_replace() 1301 ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, do_replace() 1409 u32 valid_hooks; member in struct:compat_ip6t_replace 1656 unsigned int valid_hooks, translate_compat_table() 1710 if (!(valid_hooks & (1 << i))) 1749 if (!mark_source_chains(newinfo, valid_hooks, entry1)) 1845 ret = translate_compat_table(net, tmp.name, tmp.valid_hooks, compat_do_replace() 1854 ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, compat_do_replace() 457 mark_source_chains(const struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) mark_source_chains() argument 736 check_entry_size_and_hooks(struct ip6t_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) check_entry_size_and_hooks() argument 1654 translate_compat_table(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info **pinfo, void **pentry0, unsigned int total_size, unsigned int number, unsigned int *hook_entries, unsigned int *underflows) translate_compat_table() argument
|
H A D | ip6table_filter.c | 27 .valid_hooks = FILTER_VALID_HOOKS,
|
H A D | ip6table_security.c | 32 .valid_hooks = SECURITY_VALID_HOOKS,
|
H A D | ip6table_mangle.c | 28 .valid_hooks = MANGLE_VALID_HOOKS,
|
H A D | ip6table_nat.c | 25 .valid_hooks = (1 << NF_INET_PRE_ROUTING) |
|
/linux-4.1.27/include/linux/netfilter_bridge/ |
H A D | ebtables.h | 98 unsigned int valid_hooks; member in struct:ebt_table 103 unsigned int valid_hooks);
|
/linux-4.1.27/include/uapi/linux/netfilter_arp/ |
H A D | arp_tables.h | 139 unsigned int valid_hooks; member in struct:arpt_getinfo 161 unsigned int valid_hooks; member in struct:arpt_replace
|
/linux-4.1.27/include/uapi/linux/netfilter_bridge/ |
H A D | ebtables.h | 42 unsigned int valid_hooks; member in struct:ebt_replace 58 unsigned int valid_hooks; member in struct:ebt_replace_kernel
|
/linux-4.1.27/include/uapi/linux/netfilter_ipv4/ |
H A D | ip_tables.h | 161 unsigned int valid_hooks; member in struct:ipt_getinfo 183 unsigned int valid_hooks; member in struct:ipt_replace
|
/linux-4.1.27/include/uapi/linux/netfilter_ipv6/ |
H A D | ip6_tables.h | 201 unsigned int valid_hooks; member in struct:ip6t_getinfo 223 unsigned int valid_hooks; member in struct:ip6t_replace
|
/linux-4.1.27/include/linux/netfilter/ |
H A D | x_tables.h | 188 unsigned int valid_hooks; member in struct:xt_table
|