/net/netfilter/ |
H A D | nf_internals.h | 18 unsigned int hook, 28 u_int8_t pf, unsigned int hook,
|
H A D | core.c | 129 unsigned int hook, 149 verdict = (*elemp)->hook(hook, skb, indev, outdev, okfn); 155 (*elemp)->hook, hook); 170 int nf_hook_slow(u_int8_t pf, unsigned int hook, struct sk_buff *skb, argument 183 elem = list_entry_rcu(&nf_hooks[pf][hook], struct nf_hook_ops, list); 185 verdict = nf_iterate(&nf_hooks[pf][hook], skb, hook, indev, 195 int err = nf_queue(skb, elem, pf, hook, inde 127 nf_iterate(struct list_head *head, struct sk_buff *skb, unsigned int hook, const struct net_device *indev, const struct net_device *outdev, struct nf_hook_ops **elemp, int (*okfn)(struct sk_buff *), int hook_thresh) argument [all...] |
H A D | nf_queue.c | 65 /* Drop reference to owner of hook which queued us. */ 104 u_int8_t pf, unsigned int hook, 138 .hook = hook, 194 verdict = nf_iterate(&nf_hooks[entry->pf][entry->hook], 195 skb, entry->hook, 208 err = nf_queue(skb, elem, entry->pf, entry->hook, 102 nf_queue(struct sk_buff *skb, struct nf_hook_ops *elem, u_int8_t pf, unsigned int hook, struct net_device *indev, struct net_device *outdev, int (*okfn)(struct sk_buff *), unsigned int queuenum) argument
|
/net/bridge/netfilter/ |
H A D | ebtable_filter.c | 63 ebt_in_hook(unsigned int hook, struct sk_buff *skb, const struct net_device *in, argument 66 return ebt_do_table(hook, skb, in, out, dev_net(in)->xt.frame_filter); 70 ebt_out_hook(unsigned int hook, struct sk_buff *skb, const struct net_device *in, argument 73 return ebt_do_table(hook, skb, in, out, dev_net(out)->xt.frame_filter); 78 .hook = ebt_in_hook, 85 .hook = ebt_in_hook, 92 .hook = ebt_out_hook,
|
H A D | ebtable_nat.c | 63 ebt_nat_in(unsigned int hook, struct sk_buff *skb, const struct net_device *in argument 66 return ebt_do_table(hook, skb, in, out, dev_net(in)->xt.frame_nat); 70 ebt_nat_out(unsigned int hook, struct sk_buff *skb, const struct net_device *in argument 73 return ebt_do_table(hook, skb, in, out, dev_net(out)->xt.frame_nat); 78 .hook = ebt_nat_out, 85 .hook = ebt_nat_out, 92 .hook = ebt_nat_in,
|
/net/ipv4/netfilter/ |
H A D | iptable_filter.c | 36 iptable_filter_hook(unsigned int hook, struct sk_buff *skb, argument 42 if (hook == NF_INET_LOCAL_OUT && 49 return ipt_do_table(skb, hook, in, out, net->ipv4.iptable_filter); 65 /* Entry 1 is the FORWARD hook */
|
H A D | iptable_raw.c | 23 iptable_raw_hook(unsigned int hook, struct sk_buff *skb, argument 29 if (hook == NF_INET_LOCAL_OUT && 36 return ipt_do_table(skb, hook, in, out, net->ipv4.iptable_raw);
|
H A D | iptable_security.c | 40 iptable_security_hook(unsigned int hook, struct sk_buff *skb, argument 47 if (hook == NF_INET_LOCAL_OUT && 54 return ipt_do_table(skb, hook, in, out, net->ipv4.iptable_security);
|
H A D | iptable_mangle.c | 82 iptable_mangle_hook(unsigned int hook, argument 88 if (hook == NF_INET_LOCAL_OUT) 90 if (hook == NF_INET_POST_ROUTING) 91 return ipt_do_table(skb, hook, in, out, 94 return ipt_do_table(skb, hook, in, out,
|
H A D | arptable_filter.c | 30 arptable_filter_hook(unsigned int hook, struct sk_buff *skb, argument 36 return arpt_do_table(skb, hook, in, out, net->ipv4.arptable_filter);
|
H A D | nf_defrag_ipv4.c | 95 .hook = ipv4_conntrack_defrag, 102 .hook = ipv4_conntrack_defrag,
|
H A D | nf_conntrack_l3proto_ipv4.c | 176 make it the first hook. */ 179 .hook = ipv4_conntrack_in, 186 .hook = ipv4_conntrack_local, 193 .hook = ipv4_helper, 200 .hook = ipv4_confirm, 207 .hook = ipv4_helper, 214 .hook = ipv4_confirm,
|
H A D | iptable_nat.c | 254 .hook = nf_nat_ipv4_in, 262 .hook = nf_nat_ipv4_out, 270 .hook = nf_nat_ipv4_local_fn, 278 .hook = nf_nat_ipv4_fn,
|
H A D | ip_tables.c | 250 unsigned int hook, 265 root = get_entry(table_base, private->hook_entry[hook]); 267 hookname = chainname = hooknames[hook]; 270 xt_entry_foreach(iter, root, private->size - private->hook_entry[hook]) 275 nf_log_packet(net, AF_INET, hook, skb, in, out, &trace_loginfo, 290 unsigned int hook, 323 acpar.hooknum = hook; 325 IP_NF_ASSERT(table->valid_hooks & (1 << hook)); 335 e = get_entry(table_base, private->hook_entry[hook]); 337 pr_debug("Entering %s(hook 249 trace_packet(const struct sk_buff *skb, unsigned int hook, const struct net_device *in, const struct net_device *out, const char *tablename, const struct xt_table_info *private, const struct ipt_entry *e) argument 289 ipt_do_table(struct sk_buff *skb, unsigned int hook, const struct net_device *in, const struct net_device *out, struct xt_table *table) argument 443 unsigned int hook; local [all...] |
/net/ipv6/netfilter/ |
H A D | ip6table_raw.c | 22 ip6table_raw_hook(unsigned int hook, struct sk_buff *skb, argument 28 return ip6t_do_table(skb, hook, in, out, net->ipv6.ip6table_raw);
|
H A D | ip6table_mangle.c | 79 ip6table_mangle_hook(unsigned int hook, struct sk_buff *skb, argument 83 if (hook == NF_INET_LOCAL_OUT) 85 if (hook == NF_INET_POST_ROUTING) 86 return ip6t_do_table(skb, hook, in, out, 89 return ip6t_do_table(skb, hook, in, out,
|
H A D | ip6table_filter.c | 35 ip6table_filter_hook(unsigned int hook, struct sk_buff *skb, argument 41 return ip6t_do_table(skb, hook, in, out, net->ipv6.ip6table_filter); 57 /* Entry 1 is the FORWARD hook */
|
H A D | ip6table_security.c | 39 ip6table_security_hook(unsigned int hook, struct sk_buff *skb, argument 46 return ip6t_do_table(skb, hook, in, out, net->ipv6.ip6table_security);
|
H A D | nf_defrag_ipv6_hooks.c | 86 .hook = ipv6_defrag, 93 .hook = ipv6_defrag,
|
H A D | ip6table_nat.c | 255 .hook = nf_nat_ipv6_in, 263 .hook = nf_nat_ipv6_out, 271 .hook = nf_nat_ipv6_local_fn, 279 .hook = nf_nat_ipv6_fn,
|
/net/ipv4/ |
H A D | netfilter.c | 38 * packets with foreign saddr to appear on the NF_INET_LOCAL_OUT hook. 97 if (entry->hook == NF_INET_LOCAL_OUT) { 112 if (entry->hook == NF_INET_LOCAL_OUT) { 124 __sum16 nf_ip_checksum(struct sk_buff *skb, unsigned int hook, argument 132 if (hook != NF_INET_PRE_ROUTING && hook != NF_INET_LOCAL_IN) 155 static __sum16 nf_ip_checksum_partial(struct sk_buff *skb, unsigned int hook, argument 165 return nf_ip_checksum(skb, hook, dataoff, protocol);
|
/net/ipv6/ |
H A D | netfilter.c | 85 if (entry->hook == NF_INET_LOCAL_OUT) { 99 if (entry->hook == NF_INET_LOCAL_OUT) { 131 __sum16 nf_ip6_checksum(struct sk_buff *skb, unsigned int hook, argument 139 if (hook != NF_INET_PRE_ROUTING && hook != NF_INET_LOCAL_IN) 164 static __sum16 nf_ip6_checksum_partial(struct sk_buff *skb, unsigned int hook, argument 175 return nf_ip6_checksum(skb, hook, dataoff, protocol);
|
/net/bridge/ |
H A D | br_netfilter.c | 345 * bridge PRE_ROUTING hook. */ 622 static unsigned int br_nf_pre_routing_ipv6(unsigned int hook, argument 672 static unsigned int br_nf_pre_routing(unsigned int hook, struct sk_buff *skb, argument 694 return br_nf_pre_routing_ipv6(hook, skb, in, out, okfn); 728 * register an IPv4 PRE_ROUTING 'sabotage' hook that will 730 static unsigned int br_nf_local_in(unsigned int hook, struct sk_buff *skb, argument 768 static unsigned int br_nf_forward_ip(unsigned int hook, struct sk_buff *skb, argument 821 static unsigned int br_nf_forward_arp(unsigned int hook, struct sk_buff *skb, argument 881 static unsigned int br_nf_post_routing(unsigned int hook, struct sk_buff *skb, argument 926 static unsigned int ip_sabotage_in(unsigned int hook, struc argument [all...] |
/net/sched/ |
H A D | act_ipt.c | 42 static int ipt_init_target(struct xt_entry_target *t, char *table, unsigned int hook) argument 58 par.hook_mask = hook; 114 u32 hook = 0; local 151 hook = nla_get_u32(tb[TCA_IPT_HOOK]); 165 err = ipt_init_target(t, tname, hook); 177 ipt->tcfi_hook = hook;
|
/net/decnet/netfilter/ |
H A D | dn_rtmsg.c | 90 static unsigned int dnrmg_hook(unsigned int hook, argument 119 .hook = dnrmg_hook,
|