/linux-4.4.14/net/bridge/netfilter/ |
D | ebtable_broute.c | 28 .valid_hooks = 1 << NF_BR_BROUTING, 36 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) in check() argument 38 if (valid_hooks & ~(1 << NF_BR_BROUTING)) in check() 46 .valid_hooks = 1 << NF_BR_BROUTING,
|
D | ebtable_nat.c | 34 .valid_hooks = NAT_VALID_HOOKS, 44 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) in check() argument 46 if (valid_hooks & ~NAT_VALID_HOOKS) in check() 54 .valid_hooks = NAT_VALID_HOOKS,
|
D | ebtable_filter.c | 34 .valid_hooks = FILTER_VALID_HOOKS, 44 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) in check() argument 46 if (valid_hooks & ~FILTER_VALID_HOOKS) in check() 54 .valid_hooks = FILTER_VALID_HOOKS,
|
D | ebtables.c | 426 unsigned int valid_hooks = repl->valid_hooks; in ebt_verify_pointers() local 444 if ((valid_hooks & (1 << i)) == 0) in ebt_verify_pointers() 482 (valid_hooks & (1 << i))) { in ebt_verify_pointers() 1014 if (t->check && (ret = t->check(newinfo, repl->valid_hooks))) in do_replace_finish() 1200 if ((repl->valid_hooks & (1 << i)) == 0) in ebt_register_table() 1212 if (table->check && table->check(newinfo, table->valid_hooks)) { in ebt_register_table() 1531 tmp.valid_hooks = t->valid_hooks; in do_ebt_get_ctl() 1535 tmp.valid_hooks = t->table->valid_hooks; in do_ebt_get_ctl() 1564 compat_uint_t valid_hooks; member 2342 tmp.valid_hooks = t->valid_hooks; in compat_do_ebt_get_ctl() [all …]
|
/linux-4.4.14/net/netfilter/ |
D | xt_repldata.h | 17 unsigned int hook_mask = info->valid_hooks; \ 33 tbl->repl.valid_hooks = hook_mask; \
|
D | x_tables.c | 1420 unsigned int hook_mask = table->valid_hooks; in xt_hook_link() 1458 nf_unregister_hooks(ops, hweight32(table->valid_hooks)); in xt_hook_unlink()
|
/linux-4.4.14/include/uapi/linux/netfilter_arp/ |
D | arp_tables.h | 139 unsigned int valid_hooks; member 161 unsigned int valid_hooks; member
|
/linux-4.4.14/net/ipv4/netfilter/ |
D | arp_tables.c | 386 unsigned int valid_hooks, void *entry0) in mark_source_chains() argument 398 if (!(valid_hooks & (1 << hook))) in mark_source_chains() 573 unsigned int valid_hooks) in check_entry_size_and_hooks() argument 602 if (!(valid_hooks & (1 << h))) in check_entry_size_and_hooks() 666 repl->valid_hooks); in translate_table() 687 if (!(repl->valid_hooks & (1 << i))) in translate_table() 701 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0)) in translate_table() 935 info.valid_hooks = t->valid_hooks; in get_info() 1001 unsigned int valid_hooks, in __do_replace() argument 1028 if (valid_hooks != t->valid_hooks) { in __do_replace() [all …]
|
D | ip_tables.c | 324 IP_NF_ASSERT(table->valid_hooks & (1 << hook)); in ipt_do_table() 462 unsigned int valid_hooks, void *entry0) in mark_source_chains() argument 472 if (!(valid_hooks & (1 << hook))) in mark_source_chains() 735 unsigned int valid_hooks) in check_entry_size_and_hooks() argument 764 if (!(valid_hooks & (1 << h))) in check_entry_size_and_hooks() 834 repl->valid_hooks); in translate_table() 852 if (!(repl->valid_hooks & (1 << i))) in translate_table() 866 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0)) in translate_table() 1120 info.valid_hooks = t->valid_hooks; in get_info() 1186 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, in __do_replace() argument [all …]
|
D | arptable_filter.c | 22 .valid_hooks = FILTER_VALID_HOOKS,
|
D | iptable_security.c | 33 .valid_hooks = SECURITY_VALID_HOOKS,
|
D | iptable_raw.c | 15 .valid_hooks = RAW_VALID_HOOKS,
|
D | iptable_filter.c | 29 .valid_hooks = FILTER_VALID_HOOKS,
|
D | iptable_nat.c | 23 .valid_hooks = (1 << NF_INET_PRE_ROUTING) |
|
D | iptable_mangle.c | 33 .valid_hooks = MANGLE_VALID_HOOKS,
|
/linux-4.4.14/include/uapi/linux/netfilter_ipv4/ |
D | ip_tables.h | 161 unsigned int valid_hooks; member 183 unsigned int valid_hooks; member
|
/linux-4.4.14/include/linux/netfilter_bridge/ |
D | ebtables.h | 98 unsigned int valid_hooks; member 103 unsigned int valid_hooks);
|
/linux-4.4.14/net/ipv6/netfilter/ |
D | ip6_tables.c | 349 IP_NF_ASSERT(table->valid_hooks & (1 << hook)); in ip6t_do_table() 474 unsigned int valid_hooks, void *entry0) in mark_source_chains() argument 484 if (!(valid_hooks & (1 << hook))) in mark_source_chains() 747 unsigned int valid_hooks) in check_entry_size_and_hooks() argument 776 if (!(valid_hooks & (1 << h))) in check_entry_size_and_hooks() 846 repl->valid_hooks); in translate_table() 864 if (!(repl->valid_hooks & (1 << i))) in translate_table() 878 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0)) in translate_table() 1132 info.valid_hooks = t->valid_hooks; in get_info() 1198 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, in __do_replace() argument [all …]
|
D | ip6table_raw.c | 14 .valid_hooks = RAW_VALID_HOOKS,
|
D | ip6table_security.c | 32 .valid_hooks = SECURITY_VALID_HOOKS,
|
D | ip6table_filter.c | 27 .valid_hooks = FILTER_VALID_HOOKS,
|
D | ip6table_nat.c | 25 .valid_hooks = (1 << NF_INET_PRE_ROUTING) |
|
D | ip6table_mangle.c | 28 .valid_hooks = MANGLE_VALID_HOOKS,
|
/linux-4.4.14/include/uapi/linux/netfilter_ipv6/ |
D | ip6_tables.h | 201 unsigned int valid_hooks; member 223 unsigned int valid_hooks; member
|
/linux-4.4.14/include/uapi/linux/netfilter_bridge/ |
D | ebtables.h | 42 unsigned int valid_hooks; member 58 unsigned int valid_hooks; member
|
/linux-4.4.14/include/linux/netfilter/ |
D | x_tables.h | 192 unsigned int valid_hooks; member
|