/net/netfilter/ |
H A D | nf_internals.h | 17 unsigned int hook, const struct net_device *indev, 24 unsigned int hook, struct net_device *indev,
|
H A D | core.c | 122 unsigned int hook, 142 verdict = (*elemp)->hook(*elemp, skb, indev, outdev, okfn); 148 (*elemp)->hook, hook); 163 int nf_hook_slow(u_int8_t pf, unsigned int hook, struct sk_buff *skb, argument 176 elem = list_entry_rcu(&nf_hooks[pf][hook], struct nf_hook_ops, list); 178 verdict = nf_iterate(&nf_hooks[pf][hook], skb, hook, indev, 188 int err = nf_queue(skb, elem, pf, hook, indev, outdev, okfn, 120 nf_iterate(struct list_head *head, struct sk_buff *skb, unsigned int hook, const struct net_device *indev, const struct net_device *outdev, struct nf_hook_ops **elemp, int (*okfn)(struct sk_buff *), int hook_thresh) argument
|
H A D | nf_queue.c | 65 /* Drop reference to owner of hook which queued us. */ 104 u_int8_t pf, unsigned int hook, 138 .hook = hook, 194 verdict = nf_iterate(&nf_hooks[entry->pf][entry->hook], 195 skb, entry->hook, 208 err = nf_queue(skb, elem, entry->pf, entry->hook, 102 nf_queue(struct sk_buff *skb, struct nf_hook_ops *elem, u_int8_t pf, unsigned int hook, struct net_device *indev, struct net_device *outdev, int (*okfn)(struct sk_buff *), unsigned int queuenum) argument
|
H A D | nf_tables_inet.c | 30 ops->hook = afi->hooks[ops->hooknum];
|
/net/ipv4/ |
H A D | netfilter.c | 38 * packets with foreign saddr to appear on the NF_INET_LOCAL_OUT hook. 97 if (entry->hook == NF_INET_LOCAL_OUT) { 112 if (entry->hook == NF_INET_LOCAL_OUT) { 124 __sum16 nf_ip_checksum(struct sk_buff *skb, unsigned int hook, argument 132 if (hook != NF_INET_PRE_ROUTING && hook != NF_INET_LOCAL_IN) 155 static __sum16 nf_ip_checksum_partial(struct sk_buff *skb, unsigned int hook, argument 165 return nf_ip_checksum(skb, hook, dataoff, protocol);
|
/net/ipv6/ |
H A D | netfilter.c | 87 if (entry->hook == NF_INET_LOCAL_OUT) { 101 if (entry->hook == NF_INET_LOCAL_OUT) { 133 __sum16 nf_ip6_checksum(struct sk_buff *skb, unsigned int hook, argument 141 if (hook != NF_INET_PRE_ROUTING && hook != NF_INET_LOCAL_IN) 166 static __sum16 nf_ip6_checksum_partial(struct sk_buff *skb, unsigned int hook, argument 177 return nf_ip6_checksum(skb, hook, dataoff, protocol);
|
/net/bridge/netfilter/ |
H A D | ebtable_filter.c | 79 .hook = ebt_in_hook, 86 .hook = ebt_in_hook, 93 .hook = ebt_out_hook,
|
H A D | ebtable_nat.c | 79 .hook = ebt_nat_out, 86 .hook = ebt_nat_out, 93 .hook = ebt_nat_in,
|
H A D | nft_reject_bridge.c | 62 static void nft_reject_br_send_v4_tcp_reset(struct sk_buff *oldskb, int hook) argument 72 oth = nf_reject_ip_tcphdr_get(oldskb, &_oth, hook); 94 static void nft_reject_br_send_v4_unreach(struct sk_buff *oldskb, int hook, argument 117 if (nf_ip_checksum(oldskb, hook, ip_hdrlen(oldskb), 0)) 169 struct sk_buff *oldskb, int hook) 180 oth = nf_reject_ip6_tcphdr_get(oldskb, &_oth, &otcplen, hook); 201 struct sk_buff *oldskb, int hook, 168 nft_reject_br_send_v6_tcp_reset(struct net *net, struct sk_buff *oldskb, int hook) argument 200 nft_reject_br_send_v6_unreach(struct net *net, struct sk_buff *oldskb, int hook, u8 code) argument
|
H A D | ebtables.c | 186 unsigned int ebt_do_table (unsigned int hook, struct sk_buff *skb, argument 205 acpar.hooknum = hook; 215 chaininfo = private->hook_entry[hook]; 216 nentries = private->hook_entry[hook]->nentries; 217 point = (struct ebt_entry *)(private->hook_entry[hook]->data); 218 counter_base = cb_base + private->hook_entry[hook]->counter_offset; 481 BUGPRINT("Valid hook without chain\n"); 656 unsigned int i, j, hook = 0, hookmask = 0; local 678 /* what hook do we belong to? */ 683 hook [all...] |
/net/ipv4/netfilter/ |
H A D | iptable_nat.c | 81 .hook = iptable_nat_ipv4_in, 89 .hook = iptable_nat_ipv4_out, 97 .hook = iptable_nat_ipv4_local_fn, 105 .hook = iptable_nat_ipv4_fn,
|
H A D | nf_reject_ipv4.c | 18 struct tcphdr *_oth, int hook) 36 if (nf_ip_checksum(oldskb, hook, ip_hdrlen(oldskb), IPPROTO_TCP)) 100 void nf_send_reset(struct sk_buff *oldskb, int hook) argument 108 oth = nf_reject_ip_tcphdr_get(oldskb, &_oth, hook); 17 nf_reject_ip_tcphdr_get(struct sk_buff *oldskb, struct tcphdr *_oth, int hook) argument
|
H A D | nf_defrag_ipv4.c | 98 .hook = ipv4_conntrack_defrag, 105 .hook = ipv4_conntrack_defrag,
|
H A D | nf_conntrack_l3proto_ipv4.c | 173 make it the first hook. */ 176 .hook = ipv4_conntrack_in, 183 .hook = ipv4_conntrack_local, 190 .hook = ipv4_helper, 197 .hook = ipv4_confirm, 204 .hook = ipv4_helper, 211 .hook = ipv4_confirm,
|
H A D | ip_tables.c | 250 unsigned int hook, 265 root = get_entry(table_base, private->hook_entry[hook]); 267 hookname = chainname = hooknames[hook]; 270 xt_entry_foreach(iter, root, private->size - private->hook_entry[hook]) 275 nf_log_packet(net, AF_INET, hook, skb, in, out, &trace_loginfo, 290 unsigned int hook, 323 acpar.hooknum = hook; 325 IP_NF_ASSERT(table->valid_hooks & (1 << hook)); 340 e = get_entry(table_base, private->hook_entry[hook]); 342 pr_debug("Entering %s(hook 249 trace_packet(const struct sk_buff *skb, unsigned int hook, const struct net_device *in, const struct net_device *out, const char *tablename, const struct xt_table_info *private, const struct ipt_entry *e) argument 289 ipt_do_table(struct sk_buff *skb, unsigned int hook, const struct net_device *in, const struct net_device *out, struct xt_table *table) argument 448 unsigned int hook; local [all...] |
H A D | arp_tables.c | 250 unsigned int hook, 281 e = get_entry(table_base, private->hook_entry[hook]); 282 back = get_entry(table_base, private->underflow[hook]); 286 acpar.hooknum = hook; 365 /* Figures out from what hook each rule can be called: returns 0 if 366 * there are loops. Puts hook bitmask in comefrom. 371 unsigned int hook; local 374 * to 0 as we leave), and comefrom to save source hook bitmask. 376 for (hook = 0; hook < NF_ARP_NUMHOOK 249 arpt_do_table(struct sk_buff *skb, unsigned int hook, const struct net_device *in, const struct net_device *out, struct xt_table *table) argument [all...] |
/net/ipv6/netfilter/ |
H A D | ip6table_nat.c | 83 .hook = ip6table_nat_in, 91 .hook = ip6table_nat_out, 99 .hook = ip6table_nat_local_fn, 107 .hook = ip6table_nat_fn,
|
H A D | nf_defrag_ipv6_hooks.c | 89 .hook = ipv6_defrag, 96 .hook = ipv6_defrag,
|
H A D | nf_reject_ipv6.c | 19 unsigned int *otcplen, int hook) 56 if (nf_ip6_checksum(oldskb, hook, tcphoff, IPPROTO_TCP)) { 131 void nf_send_reset6(struct net *net, struct sk_buff *oldskb, int hook) argument 148 otcph = nf_reject_ip6_tcphdr_get(oldskb, &_otcph, &otcplen, hook); 17 nf_reject_ip6_tcphdr_get(struct sk_buff *oldskb, struct tcphdr *otcph, unsigned int *otcplen, int hook) argument
|
H A D | nf_conntrack_l3proto_ipv6.c | 197 .hook = ipv6_conntrack_in, 204 .hook = ipv6_conntrack_local, 211 .hook = ipv6_helper, 218 .hook = ipv6_confirm, 225 .hook = ipv6_helper, 232 .hook = ipv6_confirm, 426 "hook.\n");
|
H A D | ip6_tables.c | 276 unsigned int hook, 291 root = get_entry(table_base, private->hook_entry[hook]); 293 hookname = chainname = hooknames[hook]; 296 xt_entry_foreach(iter, root, private->size - private->hook_entry[hook]) 301 nf_log_packet(net, AF_INET6, hook, skb, in, out, &trace_loginfo, 316 unsigned int hook, 345 acpar.hooknum = hook; 347 IP_NF_ASSERT(table->valid_hooks & (1 << hook)); 363 e = get_entry(table_base, private->hook_entry[hook]); 393 trace_packet(skb, hook, i 275 trace_packet(const struct sk_buff *skb, unsigned int hook, const struct net_device *in, const struct net_device *out, const char *tablename, const struct xt_table_info *private, const struct ip6t_entry *e) argument 315 ip6t_do_table(struct sk_buff *skb, unsigned int hook, const struct net_device *in, const struct net_device *out, struct xt_table *table) argument 458 unsigned int hook; local [all...] |
/net/sched/ |
H A D | act_ipt.c | 33 static int ipt_init_target(struct xt_entry_target *t, char *table, unsigned int hook) argument 49 par.hook_mask = hook; 94 u32 hook = 0; local 131 hook = nla_get_u32(tb[TCA_IPT_HOOK]); 145 err = ipt_init_target(t, tname, hook); 157 ipt->tcfi_hook = hook;
|
/net/bridge/ |
H A D | br_netfilter.c | 243 * bridge PRE_ROUTING hook. */ 634 * register an IPv4 PRE_ROUTING 'sabotage' hook that will 865 .hook = br_nf_pre_routing, 872 .hook = br_nf_local_in, 879 .hook = br_nf_forward_ip, 886 .hook = br_nf_forward_arp, 893 .hook = br_nf_post_routing, 900 .hook = ip_sabotage_in, 907 .hook = ip_sabotage_in,
|
/net/netfilter/ipvs/ |
H A D | ip_vs_core.c | 1592 " ignored in hook %u\n", 1838 .hook = ip_vs_reply4, 1848 .hook = ip_vs_remote_request4, 1856 .hook = ip_vs_local_reply4, 1864 .hook = ip_vs_local_request4, 1873 .hook = ip_vs_forward_icmp, 1881 .hook = ip_vs_reply4, 1890 .hook = ip_vs_reply6, 1900 .hook = ip_vs_remote_request6, 1908 .hook [all...] |
/net/decnet/netfilter/ |
H A D | dn_rtmsg.c | 119 .hook = dnrmg_hook,
|