/net/bridge/netfilter/ |
H A D | ebtable_broute.c | 28 .valid_hooks = 1 << NF_BR_BROUTING, 36 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) argument 38 if (valid_hooks & ~(1 << NF_BR_BROUTING)) 46 .valid_hooks = 1 << NF_BR_BROUTING,
|
H A D | ebtable_filter.c | 34 .valid_hooks = FILTER_VALID_HOOKS, 44 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) argument 46 if (valid_hooks & ~FILTER_VALID_HOOKS) 54 .valid_hooks = FILTER_VALID_HOOKS,
|
H A D | ebtable_nat.c | 34 .valid_hooks = NAT_VALID_HOOKS, 44 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) argument 46 if (valid_hooks & ~NAT_VALID_HOOKS) 54 .valid_hooks = NAT_VALID_HOOKS,
|
H A D | ebtables.c | 424 unsigned int valid_hooks = repl->valid_hooks; local 442 if ((valid_hooks & (1 << i)) == 0) 480 (valid_hooks & (1 << i))) { 1012 if (t->check && (ret = t->check(newinfo, repl->valid_hooks))) 1198 if ((repl->valid_hooks & (1 << i)) == 0) 1210 if (table->check && table->check(newinfo, table->valid_hooks)) { 1529 tmp.valid_hooks = t->valid_hooks; 1533 tmp.valid_hooks 1562 compat_uint_t valid_hooks; member in struct:compat_ebt_replace [all...] |
/net/ipv4/netfilter/ |
H A D | arp_tables.c | 369 unsigned int valid_hooks, void *entry0) 381 if (!(valid_hooks & (1 << hook))) 566 unsigned int valid_hooks) 585 if (!(valid_hooks & (1 << h))) 648 repl->valid_hooks); 669 if (!(repl->valid_hooks & (1 << i))) 683 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0)) { 923 info.valid_hooks = t->valid_hooks; 989 unsigned int valid_hooks, 368 mark_source_chains(const struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) argument 560 check_entry_size_and_hooks(struct arpt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument 988 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument 1318 translate_compat_table(const char *name, unsigned int valid_hooks, struct xt_table_info **pinfo, void **pentry0, unsigned int total_size, unsigned int number, unsigned int *hook_entries, unsigned int *underflows) argument 1476 u32 valid_hooks; member in struct:compat_arpt_replace [all...] |
H A D | ip_tables.c | 325 IP_NF_ASSERT(table->valid_hooks & (1 << hook)); 446 unsigned int valid_hooks, void *entry0) 456 if (!(valid_hooks & (1 << hook))) 729 unsigned int valid_hooks) 748 if (!(valid_hooks & (1 << h))) 817 repl->valid_hooks); 835 if (!(repl->valid_hooks & (1 << i))) 849 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0)) 1111 info.valid_hooks = t->valid_hooks; 445 mark_source_chains(const struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) argument 723 check_entry_size_and_hooks(struct ipt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument 1177 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument 1392 u32 valid_hooks; member in struct:compat_ipt_replace 1639 translate_compat_table(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info **pinfo, void **pentry0, unsigned int total_size, unsigned int number, unsigned int *hook_entries, unsigned int *underflows) argument [all...] |
/net/ipv6/netfilter/ |
H A D | ip6_tables.c | 347 IP_NF_ASSERT(table->valid_hooks & (1 << hook)); 456 unsigned int valid_hooks, void *entry0) 466 if (!(valid_hooks & (1 << hook))) 740 unsigned int valid_hooks) 759 if (!(valid_hooks & (1 << h))) 827 repl->valid_hooks); 845 if (!(repl->valid_hooks & (1 << i))) 859 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0)) 1121 info.valid_hooks = t->valid_hooks; 455 mark_source_chains(const struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) argument 734 check_entry_size_and_hooks(struct ip6t_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument 1187 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument 1404 u32 valid_hooks; member in struct:compat_ip6t_replace 1649 translate_compat_table(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info **pinfo, void **pentry0, unsigned int total_size, unsigned int number, unsigned int *hook_entries, unsigned int *underflows) argument [all...] |