/net/bridge/netfilter/ |
H A D | ebtable_broute.c | 29 .valid_hooks = 1 << NF_BR_BROUTING, 37 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) argument 39 if (valid_hooks & ~(1 << NF_BR_BROUTING)) 48 .valid_hooks = 1 << NF_BR_BROUTING,
|
H A D | ebtable_nat.c | 36 .valid_hooks = NAT_VALID_HOOKS, 46 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) argument 48 if (valid_hooks & ~NAT_VALID_HOOKS) 57 .valid_hooks = NAT_VALID_HOOKS,
|
H A D | ebtable_filter.c | 36 .valid_hooks = FILTER_VALID_HOOKS, 46 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) argument 48 if (valid_hooks & ~FILTER_VALID_HOOKS) 57 .valid_hooks = FILTER_VALID_HOOKS,
|
H A D | ebtables.c | 426 unsigned int valid_hooks = repl->valid_hooks; local 444 if ((valid_hooks & (1 << i)) == 0) 482 (valid_hooks & (1 << i))) { 1014 if (t->check && (ret = t->check(newinfo, repl->valid_hooks))) 1187 if ((repl->valid_hooks & (1 << i)) == 0) 1199 if (table->check && table->check(newinfo, table->valid_hooks)) { 1521 tmp.valid_hooks = t->valid_hooks; 1525 tmp.valid_hooks 1554 compat_uint_t valid_hooks; member in struct:compat_ebt_replace [all...] |
/net/ipv4/netfilter/ |
H A D | arp_tables.c | 364 unsigned int valid_hooks, void *entry0) 376 if (!(valid_hooks & (1 << hook))) 561 unsigned int valid_hooks) 580 if (!(valid_hooks & (1 << h))) 643 repl->valid_hooks); 664 if (!(repl->valid_hooks & (1 << i))) 678 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0)) { 918 info.valid_hooks = t->valid_hooks; 984 unsigned int valid_hooks, 363 mark_source_chains(const struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) argument 555 check_entry_size_and_hooks(struct arpt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument 983 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument 1311 translate_compat_table(const char *name, unsigned int valid_hooks, struct xt_table_info **pinfo, void **pentry0, unsigned int total_size, unsigned int number, unsigned int *hook_entries, unsigned int *underflows) argument 1469 u32 valid_hooks; member in struct:compat_arpt_replace [all...] |
H A D | ip_tables.c | 325 IP_NF_ASSERT(table->valid_hooks & (1 << hook)); 441 unsigned int valid_hooks, void *entry0) 451 if (!(valid_hooks & (1 << hook))) 724 unsigned int valid_hooks) 743 if (!(valid_hooks & (1 << h))) 812 repl->valid_hooks); 830 if (!(repl->valid_hooks & (1 << i))) 844 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0)) 1106 info.valid_hooks = t->valid_hooks; 440 mark_source_chains(const struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) argument 718 check_entry_size_and_hooks(struct ipt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument 1172 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument 1385 u32 valid_hooks; member in struct:compat_ipt_replace 1632 translate_compat_table(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info **pinfo, void **pentry0, unsigned int total_size, unsigned int number, unsigned int *hook_entries, unsigned int *underflows) argument [all...] |
/net/ipv6/netfilter/ |
H A D | ip6_tables.c | 347 IP_NF_ASSERT(table->valid_hooks & (1 << hook)); 451 unsigned int valid_hooks, void *entry0) 461 if (!(valid_hooks & (1 << hook))) 735 unsigned int valid_hooks) 754 if (!(valid_hooks & (1 << h))) 822 repl->valid_hooks); 840 if (!(repl->valid_hooks & (1 << i))) 854 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0)) 1116 info.valid_hooks = t->valid_hooks; 450 mark_source_chains(const struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) argument 729 check_entry_size_and_hooks(struct ip6t_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument 1182 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument 1397 u32 valid_hooks; member in struct:compat_ip6t_replace 1642 translate_compat_table(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info **pinfo, void **pentry0, unsigned int total_size, unsigned int number, unsigned int *hook_entries, unsigned int *underflows) argument [all...] |