valid_hooks 227 include/linux/netfilter/x_tables.h unsigned int valid_hooks; valid_hooks 284 include/linux/netfilter/x_tables.h int xt_check_table_hooks(const struct xt_table_info *info, unsigned int valid_hooks); valid_hooks 95 include/linux/netfilter_bridge/ebtables.h unsigned int valid_hooks; valid_hooks 100 include/linux/netfilter_bridge/ebtables.h unsigned int valid_hooks); valid_hooks 141 include/uapi/linux/netfilter_arp/arp_tables.h unsigned int valid_hooks; valid_hooks 163 include/uapi/linux/netfilter_arp/arp_tables.h unsigned int valid_hooks; valid_hooks 46 include/uapi/linux/netfilter_bridge/ebtables.h unsigned int valid_hooks; valid_hooks 62 include/uapi/linux/netfilter_bridge/ebtables.h unsigned int valid_hooks; valid_hooks 163 include/uapi/linux/netfilter_ipv4/ip_tables.h unsigned int valid_hooks; valid_hooks 185 include/uapi/linux/netfilter_ipv4/ip_tables.h unsigned int valid_hooks; valid_hooks 203 include/uapi/linux/netfilter_ipv6/ip6_tables.h unsigned int valid_hooks; valid_hooks 225 include/uapi/linux/netfilter_ipv6/ip6_tables.h unsigned int valid_hooks; valid_hooks 31 net/bridge/netfilter/ebtable_broute.c .valid_hooks = 1 << NF_BR_BROUTING, valid_hooks 39 net/bridge/netfilter/ebtable_broute.c static int check(const struct ebt_table_info *info, unsigned int valid_hooks) valid_hooks 41 net/bridge/netfilter/ebtable_broute.c if (valid_hooks & ~(1 << NF_BR_BROUTING)) valid_hooks 49 net/bridge/netfilter/ebtable_broute.c .valid_hooks = 1 << NF_BR_BROUTING, valid_hooks 36 net/bridge/netfilter/ebtable_filter.c .valid_hooks = FILTER_VALID_HOOKS, valid_hooks 46 net/bridge/netfilter/ebtable_filter.c static int check(const struct ebt_table_info *info, unsigned int valid_hooks) valid_hooks 48 net/bridge/netfilter/ebtable_filter.c if (valid_hooks & ~FILTER_VALID_HOOKS) valid_hooks 56 net/bridge/netfilter/ebtable_filter.c .valid_hooks = FILTER_VALID_HOOKS, valid_hooks 36 net/bridge/netfilter/ebtable_nat.c .valid_hooks = NAT_VALID_HOOKS, valid_hooks 46 net/bridge/netfilter/ebtable_nat.c static int check(const struct ebt_table_info *info, unsigned int valid_hooks) valid_hooks 48 net/bridge/netfilter/ebtable_nat.c if (valid_hooks & ~NAT_VALID_HOOKS) valid_hooks 56 net/bridge/netfilter/ebtable_nat.c .valid_hooks = NAT_VALID_HOOKS, valid_hooks 431 net/bridge/netfilter/ebtables.c unsigned int valid_hooks = repl->valid_hooks; valid_hooks 449 net/bridge/netfilter/ebtables.c if ((valid_hooks & (1 << i)) == 0) valid_hooks 484 net/bridge/netfilter/ebtables.c (valid_hooks & (1 << i))) valid_hooks 1003 net/bridge/netfilter/ebtables.c if (t->check && (ret = t->check(newinfo, repl->valid_hooks))) valid_hooks 1186 net/bridge/netfilter/ebtables.c if ((repl->valid_hooks & (1 << i)) == 0) valid_hooks 1196 net/bridge/netfilter/ebtables.c if (table->check && table->check(newinfo, table->valid_hooks)) { valid_hooks 1220 net/bridge/netfilter/ebtables.c ret = nf_register_net_hooks(net, ops, hweight32(table->valid_hooks)); valid_hooks 1243 net/bridge/netfilter/ebtables.c nf_unregister_net_hooks(net, ops, hweight32(table->valid_hooks)); valid_hooks 1510 net/bridge/netfilter/ebtables.c tmp.valid_hooks = t->valid_hooks; valid_hooks 1514 net/bridge/netfilter/ebtables.c tmp.valid_hooks = t->table->valid_hooks; valid_hooks 1542 net/bridge/netfilter/ebtables.c compat_uint_t valid_hooks; valid_hooks 2375 net/bridge/netfilter/ebtables.c tmp.valid_hooks = t->valid_hooks; valid_hooks 2386 net/bridge/netfilter/ebtables.c tmp.valid_hooks = t->table->valid_hooks; valid_hooks 302 net/ipv4/netfilter/arp_tables.c unsigned int valid_hooks, void *entry0, valid_hooks 314 net/ipv4/netfilter/arp_tables.c if (!(valid_hooks & (1 << hook))) valid_hooks 457 net/ipv4/netfilter/arp_tables.c unsigned int valid_hooks) valid_hooks 481 net/ipv4/netfilter/arp_tables.c if (!(valid_hooks & (1 << h))) valid_hooks 549 net/ipv4/netfilter/arp_tables.c repl->valid_hooks); valid_hooks 564 net/ipv4/netfilter/arp_tables.c ret = xt_check_table_hooks(newinfo, repl->valid_hooks); valid_hooks 568 net/ipv4/netfilter/arp_tables.c if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) { valid_hooks 822 net/ipv4/netfilter/arp_tables.c info.valid_hooks = t->valid_hooks; valid_hooks 881 net/ipv4/netfilter/arp_tables.c unsigned int valid_hooks, valid_hooks 907 net/ipv4/netfilter/arp_tables.c if (valid_hooks != t->valid_hooks) { valid_hooks 986 net/ipv4/netfilter/arp_tables.c ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, valid_hooks 1053 net/ipv4/netfilter/arp_tables.c u32 valid_hooks; valid_hooks 1283 net/ipv4/netfilter/arp_tables.c ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, valid_hooks 1568 net/ipv4/netfilter/arp_tables.c ret = nf_register_net_hooks(net, ops, hweight32(table->valid_hooks)); valid_hooks 1584 net/ipv4/netfilter/arp_tables.c nf_unregister_net_hooks(net, ops, hweight32(table->valid_hooks)); valid_hooks 25 net/ipv4/netfilter/arptable_filter.c .valid_hooks = FILTER_VALID_HOOKS, valid_hooks 258 net/ipv4/netfilter/ip_tables.c WARN_ON(!(table->valid_hooks & (1 << hook))); valid_hooks 369 net/ipv4/netfilter/ip_tables.c unsigned int valid_hooks, void *entry0, valid_hooks 380 net/ipv4/netfilter/ip_tables.c if (!(valid_hooks & (1 << hook))) valid_hooks 594 net/ipv4/netfilter/ip_tables.c unsigned int valid_hooks) valid_hooks 618 net/ipv4/netfilter/ip_tables.c if (!(valid_hooks & (1 << h))) valid_hooks 689 net/ipv4/netfilter/ip_tables.c repl->valid_hooks); valid_hooks 704 net/ipv4/netfilter/ip_tables.c ret = xt_check_table_hooks(newinfo, repl->valid_hooks); valid_hooks 708 net/ipv4/netfilter/ip_tables.c if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) { valid_hooks 979 net/ipv4/netfilter/ip_tables.c info.valid_hooks = t->valid_hooks; valid_hooks 1038 net/ipv4/netfilter/ip_tables.c __do_replace(struct net *net, const char *name, unsigned int valid_hooks, valid_hooks 1062 net/ipv4/netfilter/ip_tables.c if (valid_hooks != t->valid_hooks) { valid_hooks 1140 net/ipv4/netfilter/ip_tables.c ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, valid_hooks 1207 net/ipv4/netfilter/ip_tables.c u32 valid_hooks; valid_hooks 1523 net/ipv4/netfilter/ip_tables.c ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, valid_hooks 1787 net/ipv4/netfilter/ip_tables.c ret = nf_register_net_hooks(net, ops, hweight32(table->valid_hooks)); valid_hooks 1804 net/ipv4/netfilter/ip_tables.c nf_unregister_net_hooks(net, ops, hweight32(table->valid_hooks)); valid_hooks 26 net/ipv4/netfilter/iptable_filter.c .valid_hooks = FILTER_VALID_HOOKS, valid_hooks 32 net/ipv4/netfilter/iptable_mangle.c .valid_hooks = MANGLE_VALID_HOOKS, valid_hooks 20 net/ipv4/netfilter/iptable_nat.c .valid_hooks = (1 << NF_INET_PRE_ROUTING) | valid_hooks 23 net/ipv4/netfilter/iptable_raw.c .valid_hooks = RAW_VALID_HOOKS, valid_hooks 32 net/ipv4/netfilter/iptable_raw.c .valid_hooks = RAW_VALID_HOOKS, valid_hooks 32 net/ipv4/netfilter/iptable_security.c .valid_hooks = SECURITY_VALID_HOOKS, valid_hooks 279 net/ipv6/netfilter/ip6_tables.c WARN_ON(!(table->valid_hooks & (1 << hook))); valid_hooks 387 net/ipv6/netfilter/ip6_tables.c unsigned int valid_hooks, void *entry0, valid_hooks 398 net/ipv6/netfilter/ip6_tables.c if (!(valid_hooks & (1 << hook))) valid_hooks 612 net/ipv6/netfilter/ip6_tables.c unsigned int valid_hooks) valid_hooks 636 net/ipv6/netfilter/ip6_tables.c if (!(valid_hooks & (1 << h))) valid_hooks 706 net/ipv6/netfilter/ip6_tables.c repl->valid_hooks); valid_hooks 721 net/ipv6/netfilter/ip6_tables.c ret = xt_check_table_hooks(newinfo, repl->valid_hooks); valid_hooks 725 net/ipv6/netfilter/ip6_tables.c if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) { valid_hooks 995 net/ipv6/netfilter/ip6_tables.c info.valid_hooks = t->valid_hooks; valid_hooks 1055 net/ipv6/netfilter/ip6_tables.c __do_replace(struct net *net, const char *name, unsigned int valid_hooks, valid_hooks 1079 net/ipv6/netfilter/ip6_tables.c if (valid_hooks != t->valid_hooks) { valid_hooks 1157 net/ipv6/netfilter/ip6_tables.c ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, valid_hooks 1223 net/ipv6/netfilter/ip6_tables.c u32 valid_hooks; valid_hooks 1532 net/ipv6/netfilter/ip6_tables.c ret = __do_replace(net, tmp.name, tmp.valid_hooks, newinfo, valid_hooks 1797 net/ipv6/netfilter/ip6_tables.c ret = nf_register_net_hooks(net, ops, hweight32(table->valid_hooks)); valid_hooks 1814 net/ipv6/netfilter/ip6_tables.c nf_unregister_net_hooks(net, ops, hweight32(table->valid_hooks)); valid_hooks 26 net/ipv6/netfilter/ip6table_filter.c .valid_hooks = FILTER_VALID_HOOKS, valid_hooks 27 net/ipv6/netfilter/ip6table_mangle.c .valid_hooks = MANGLE_VALID_HOOKS, valid_hooks 22 net/ipv6/netfilter/ip6table_nat.c .valid_hooks = (1 << NF_INET_PRE_ROUTING) | valid_hooks 22 net/ipv6/netfilter/ip6table_raw.c .valid_hooks = RAW_VALID_HOOKS, valid_hooks 31 net/ipv6/netfilter/ip6table_raw.c .valid_hooks = RAW_VALID_HOOKS, valid_hooks 31 net/ipv6/netfilter/ip6table_security.c .valid_hooks = SECURITY_VALID_HOOKS, valid_hooks 562 net/netfilter/x_tables.c int xt_check_table_hooks(const struct xt_table_info *info, unsigned int valid_hooks) valid_hooks 574 net/netfilter/x_tables.c if (!(valid_hooks & (1 << i))) valid_hooks 1698 net/netfilter/x_tables.c unsigned int hook_mask = table->valid_hooks; valid_hooks 18 net/netfilter/xt_repldata.h unsigned int hook_mask = info->valid_hooks; \ valid_hooks 34 net/netfilter/xt_repldata.h tbl->repl.valid_hooks = hook_mask; \