Searched refs:hook (Results 26 - 39 of 39) sorted by relevance
12
/net/ipv6/netfilter/ |
H A D | nf_conntrack_l3proto_ipv6.c | 199 * POST_ROUTING hook. In case of unconfirmed connections NAT 250 .hook = ipv6_conntrack_in, 257 .hook = ipv6_conntrack_local, 264 .hook = ipv6_helper, 271 .hook = ipv6_confirm, 278 .hook = ipv6_helper, 285 .hook = ipv6_confirm, 479 "hook.\n");
|
H A D | ip6_tables.c | 276 unsigned int hook, 291 root = get_entry(table_base, private->hook_entry[hook]); 293 hookname = chainname = hooknames[hook]; 296 xt_entry_foreach(iter, root, private->size - private->hook_entry[hook]) 301 nf_log_packet(net, AF_INET6, hook, skb, in, out, &trace_loginfo, 316 unsigned int hook, 345 acpar.hooknum = hook; 347 IP_NF_ASSERT(table->valid_hooks & (1 << hook)); 358 e = get_entry(table_base, private->hook_entry[hook]); 388 trace_packet(skb, hook, i 275 trace_packet(const struct sk_buff *skb, unsigned int hook, const struct net_device *in, const struct net_device *out, const char *tablename, const struct xt_table_info *private, const struct ip6t_entry *e) argument 315 ip6t_do_table(struct sk_buff *skb, unsigned int hook, const struct net_device *in, const struct net_device *out, struct xt_table *table) argument 453 unsigned int hook; local [all...] |
/net/ipv4/netfilter/ |
H A D | ipt_REJECT.c | 36 static void send_reset(struct sk_buff *oldskb, int hook) argument 61 if (nf_ip_checksum(oldskb, hook, ip_hdrlen(oldskb), IPPROTO_TCP))
|
H A D | arp_tables.c | 250 unsigned int hook, 276 e = get_entry(table_base, private->hook_entry[hook]); 277 back = get_entry(table_base, private->underflow[hook]); 281 acpar.hooknum = hook; 360 /* Figures out from what hook each rule can be called: returns 0 if 361 * there are loops. Puts hook bitmask in comefrom. 366 unsigned int hook; local 369 * to 0 as we leave), and comefrom to save source hook bitmask. 371 for (hook = 0; hook < NF_ARP_NUMHOOK 249 arpt_do_table(struct sk_buff *skb, unsigned int hook, const struct net_device *in, const struct net_device *out, struct xt_table *table) argument [all...] |
H A D | ipt_CLUSTERIP.c | 486 arp_mangle(unsigned int hook, argument 541 .hook = arp_mangle,
|
H A D | ipt_ULOG.c | 228 /* copy hook, prefix, timestamp, payload, etc. */ 234 pm->hook = hooknum;
|
/net/netfilter/ipvs/ |
H A D | ip_vs_core.c | 1584 " ignored in hook %u\n", 1869 .hook = ip_vs_reply4, 1879 .hook = ip_vs_remote_request4, 1887 .hook = ip_vs_local_reply4, 1895 .hook = ip_vs_local_request4, 1904 .hook = ip_vs_forward_icmp, 1912 .hook = ip_vs_reply4, 1921 .hook = ip_vs_preroute_frag6, 1929 .hook = ip_vs_reply6, 1939 .hook [all...] |
/net/bridge/netfilter/ |
H A D | ebtables.c | 185 unsigned int ebt_do_table (unsigned int hook, struct sk_buff *skb, argument 204 acpar.hooknum = hook; 214 chaininfo = private->hook_entry[hook]; 215 nentries = private->hook_entry[hook]->nentries; 216 point = (struct ebt_entry *)(private->hook_entry[hook]->data); 217 counter_base = cb_base + private->hook_entry[hook]->counter_offset; 483 BUGPRINT("Valid hook without chain\n"); 658 unsigned int i, j, hook = 0, hookmask = 0; local 680 /* what hook do we belong to? */ 685 hook [all...] |
H A D | ebt_ulog.c | 193 pm->hook = hooknr;
|
/net/netfilter/ |
H A D | xt_quota2.c | 96 pm->hook = hooknum;
|
H A D | nfnetlink_queue_core.c | 376 pmsg->hook = entry->hook; 658 * mean 'ignore this hook'.
|
H A D | nfnetlink_log.c | 423 pmsg.hook = hooknum;
|
H A D | x_tables.c | 1257 ops[i].hook = fn;
|
/net/ |
H A D | socket.c | 985 void brioctl_set(int (*hook) (struct net *, unsigned int, void __user *)) 988 br_ioctl_hook = hook; 996 void vlan_ioctl_set(int (*hook) (struct net *, void __user *)) 999 vlan_ioctl_hook = hook; 1007 void dlci_ioctl_set(int (*hook) (unsigned int, void __user *)) 1010 dlci_ioctl_hook = hook;
|
Completed in 1677 milliseconds
12