| /linux-4.4.14/net/bridge/netfilter/ | 
| D | ebtable_broute.c | 28 	.valid_hooks	= 1 << NF_BR_BROUTING, 36 static int check(const struct ebt_table_info *info, unsigned int valid_hooks)  in check()  argument 38 	if (valid_hooks & ~(1 << NF_BR_BROUTING))  in check() 46 	.valid_hooks	= 1 << NF_BR_BROUTING,
  | 
| D | ebtable_nat.c | 34 	.valid_hooks	= NAT_VALID_HOOKS, 44 static int check(const struct ebt_table_info *info, unsigned int valid_hooks)  in check()  argument 46 	if (valid_hooks & ~NAT_VALID_HOOKS)  in check() 54 	.valid_hooks	= NAT_VALID_HOOKS,
  | 
| D | ebtable_filter.c | 34 	.valid_hooks	= FILTER_VALID_HOOKS, 44 static int check(const struct ebt_table_info *info, unsigned int valid_hooks)  in check()  argument 46 	if (valid_hooks & ~FILTER_VALID_HOOKS)  in check() 54 	.valid_hooks	= FILTER_VALID_HOOKS,
  | 
| D | ebtables.c | 426 	unsigned int valid_hooks = repl->valid_hooks;  in ebt_verify_pointers()  local 444 			if ((valid_hooks & (1 << i)) == 0)  in ebt_verify_pointers() 482 		   (valid_hooks & (1 << i))) {  in ebt_verify_pointers() 1014 	if (t->check && (ret = t->check(newinfo, repl->valid_hooks)))  in do_replace_finish() 1200 		if ((repl->valid_hooks & (1 << i)) == 0)  in ebt_register_table() 1212 	if (table->check && table->check(newinfo, table->valid_hooks)) {  in ebt_register_table() 1531 			tmp.valid_hooks = t->valid_hooks;  in do_ebt_get_ctl() 1535 			tmp.valid_hooks = t->table->valid_hooks;  in do_ebt_get_ctl() 1564 	compat_uint_t valid_hooks;  member 2342 		tmp.valid_hooks = t->valid_hooks;  in compat_do_ebt_get_ctl() [all …] 
 | 
| /linux-4.4.14/net/netfilter/ | 
| D | xt_repldata.h | 17 	unsigned int hook_mask = info->valid_hooks; \ 33 	tbl->repl.valid_hooks = hook_mask; \
  | 
| D | x_tables.c | 1420 	unsigned int hook_mask = table->valid_hooks;  in xt_hook_link() 1458 	nf_unregister_hooks(ops, hweight32(table->valid_hooks));  in xt_hook_unlink()
  | 
| /linux-4.4.14/include/uapi/linux/netfilter_arp/ | 
| D | arp_tables.h | 139 	unsigned int valid_hooks;  member 161 	unsigned int valid_hooks;  member
  | 
| /linux-4.4.14/net/ipv4/netfilter/ | 
| D | arp_tables.c | 386 			      unsigned int valid_hooks, void *entry0)  in mark_source_chains()  argument 398 		if (!(valid_hooks & (1 << hook)))  in mark_source_chains() 573 					     unsigned int valid_hooks)  in check_entry_size_and_hooks()  argument 602 		if (!(valid_hooks & (1 << h)))  in check_entry_size_and_hooks() 666 						 repl->valid_hooks);  in translate_table() 687 		if (!(repl->valid_hooks & (1 << i)))  in translate_table() 701 	if (!mark_source_chains(newinfo, repl->valid_hooks, entry0))  in translate_table() 935 		info.valid_hooks = t->valid_hooks;  in get_info() 1001 			unsigned int valid_hooks,  in __do_replace()  argument 1028 	if (valid_hooks != t->valid_hooks) {  in __do_replace() [all …] 
 | 
| D | ip_tables.c | 324 	IP_NF_ASSERT(table->valid_hooks & (1 << hook));  in ipt_do_table() 462 		   unsigned int valid_hooks, void *entry0)  in mark_source_chains()  argument 472 		if (!(valid_hooks & (1 << hook)))  in mark_source_chains() 735 			   unsigned int valid_hooks)  in check_entry_size_and_hooks()  argument 764 		if (!(valid_hooks & (1 << h)))  in check_entry_size_and_hooks() 834 						 repl->valid_hooks);  in translate_table() 852 		if (!(repl->valid_hooks & (1 << i)))  in translate_table() 866 	if (!mark_source_chains(newinfo, repl->valid_hooks, entry0))  in translate_table() 1120 		info.valid_hooks = t->valid_hooks;  in get_info() 1186 __do_replace(struct net *net, const char *name, unsigned int valid_hooks,  in __do_replace()  argument [all …] 
 | 
| D | arptable_filter.c | 22 	.valid_hooks	= FILTER_VALID_HOOKS,
  | 
| D | iptable_security.c | 33 	.valid_hooks	= SECURITY_VALID_HOOKS,
  | 
| D | iptable_raw.c | 15 	.valid_hooks =  RAW_VALID_HOOKS,
  | 
| D | iptable_filter.c | 29 	.valid_hooks	= FILTER_VALID_HOOKS,
  | 
| D | iptable_nat.c | 23 	.valid_hooks	= (1 << NF_INET_PRE_ROUTING) |
  | 
| D | iptable_mangle.c | 33 	.valid_hooks	= MANGLE_VALID_HOOKS,
  | 
| /linux-4.4.14/include/uapi/linux/netfilter_ipv4/ | 
| D | ip_tables.h | 161 	unsigned int valid_hooks;  member 183 	unsigned int valid_hooks;  member
  | 
| /linux-4.4.14/include/linux/netfilter_bridge/ | 
| D | ebtables.h | 98 	unsigned int valid_hooks;  member 103 	   unsigned int valid_hooks);
  | 
| /linux-4.4.14/net/ipv6/netfilter/ | 
| D | ip6_tables.c | 349 	IP_NF_ASSERT(table->valid_hooks & (1 << hook));  in ip6t_do_table() 474 		   unsigned int valid_hooks, void *entry0)  in mark_source_chains()  argument 484 		if (!(valid_hooks & (1 << hook)))  in mark_source_chains() 747 			   unsigned int valid_hooks)  in check_entry_size_and_hooks()  argument 776 		if (!(valid_hooks & (1 << h)))  in check_entry_size_and_hooks() 846 						 repl->valid_hooks);  in translate_table() 864 		if (!(repl->valid_hooks & (1 << i)))  in translate_table() 878 	if (!mark_source_chains(newinfo, repl->valid_hooks, entry0))  in translate_table() 1132 		info.valid_hooks = t->valid_hooks;  in get_info() 1198 __do_replace(struct net *net, const char *name, unsigned int valid_hooks,  in __do_replace()  argument [all …] 
 | 
| D | ip6table_raw.c | 14 	.valid_hooks = RAW_VALID_HOOKS,
  | 
| D | ip6table_security.c | 32 	.valid_hooks	= SECURITY_VALID_HOOKS,
  | 
| D | ip6table_filter.c | 27 	.valid_hooks	= FILTER_VALID_HOOKS,
  | 
| D | ip6table_nat.c | 25 	.valid_hooks	= (1 << NF_INET_PRE_ROUTING) |
  | 
| D | ip6table_mangle.c | 28 	.valid_hooks	= MANGLE_VALID_HOOKS,
  | 
| /linux-4.4.14/include/uapi/linux/netfilter_ipv6/ | 
| D | ip6_tables.h | 201 	unsigned int valid_hooks;  member 223 	unsigned int valid_hooks;  member
  | 
| /linux-4.4.14/include/uapi/linux/netfilter_bridge/ | 
| D | ebtables.h | 42 	unsigned int valid_hooks;  member 58 	unsigned int valid_hooks;  member
  | 
| /linux-4.4.14/include/linux/netfilter/ | 
| D | x_tables.h | 192 	unsigned int valid_hooks;  member
  |