Searched refs:hook_entry (Results 1 – 16 of 16) sorted by relevance
/Linux-v4.19/net/bridge/netfilter/ |
D | ebtables.c | 214 chaininfo = private->hook_entry[hook]; in ebt_do_table() 215 nentries = private->hook_entry[hook]->nentries; in ebt_do_table() 216 point = (struct ebt_entry *)(private->hook_entry[hook]->data); in ebt_do_table() 217 counter_base = cb_base + private->hook_entry[hook]->counter_offset; in ebt_do_table() 444 newinfo->hook_entry[i] = NULL; in ebt_verify_pointers() 459 if ((char __user *)repl->hook_entry[i] == in ebt_verify_pointers() 474 newinfo->hook_entry[i] = (struct ebt_entries *)e; in ebt_verify_pointers() 495 if (!newinfo->hook_entry[i] && in ebt_verify_pointers() 516 if ((void *)e == (void *)newinfo->hook_entry[i]) in ebt_check_entry_size_and_hooks() 586 if (newinfo->hook_entry[i] == (struct ebt_entries *)e) in ebt_get_udc_positions() [all …]
|
D | ebtable_broute.c | 30 .hook_entry = {
|
D | ebtable_filter.c | 37 .hook_entry = {
|
D | ebtable_nat.c | 37 .hook_entry = {
|
/Linux-v4.19/net/ipv4/netfilter/ |
D | arp_tables.c | 213 e = get_entry(table_base, private->hook_entry[hook]); in arpt_do_table() 310 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 481 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 528 newinfo->hook_entry[i] = 0xFFFFFFFF; in translate_table() 541 repl->hook_entry, in translate_table() 748 if (info->hook_entry[i] && in compat_calc_entry() 749 (e < (struct arpt_entry *)(base + info->hook_entry[i]))) in compat_calc_entry() 750 newinfo->hook_entry[i] -= off; in compat_calc_entry() 817 memcpy(info.hook_entry, private->hook_entry, in get_info() 818 sizeof(info.hook_entry)); in get_info() [all …]
|
D | ip_tables.c | 204 root = get_entry(private->entries, private->hook_entry[hook]); in trace_packet() 209 xt_entry_foreach(iter, root, private->size - private->hook_entry[hook]) in trace_packet() 279 e = get_entry(table_base, private->hook_entry[hook]); in ipt_do_table() 380 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 624 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 678 newinfo->hook_entry[i] = 0xFFFFFFFF; in translate_table() 690 repl->hook_entry, in translate_table() 914 if (info->hook_entry[i] && in compat_calc_entry() 915 (e < (struct ipt_entry *)(base + info->hook_entry[i]))) in compat_calc_entry() 916 newinfo->hook_entry[i] -= off; in compat_calc_entry() [all …]
|
/Linux-v4.19/net/ipv6/netfilter/ |
D | ip6_tables.c | 229 root = get_entry(private->entries, private->hook_entry[hook]); in trace_packet() 234 xt_entry_foreach(iter, root, private->size - private->hook_entry[hook]) in trace_packet() 301 e = get_entry(table_base, private->hook_entry[hook]); in ip6t_do_table() 398 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 642 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 695 newinfo->hook_entry[i] = 0xFFFFFFFF; in translate_table() 707 repl->hook_entry, in translate_table() 930 if (info->hook_entry[i] && in compat_calc_entry() 931 (e < (struct ip6t_entry *)(base + info->hook_entry[i]))) in compat_calc_entry() 932 newinfo->hook_entry[i] -= off; in compat_calc_entry() [all …]
|
/Linux-v4.19/include/uapi/linux/netfilter_arp/ |
D | arp_tables.h | 144 unsigned int hook_entry[NF_ARP_NUMHOOKS]; member 172 unsigned int hook_entry[NF_ARP_NUMHOOKS]; member
|
/Linux-v4.19/include/uapi/linux/netfilter_ipv4/ |
D | ip_tables.h | 166 unsigned int hook_entry[NF_INET_NUMHOOKS]; member 194 unsigned int hook_entry[NF_INET_NUMHOOKS]; member
|
/Linux-v4.19/include/uapi/linux/netfilter_ipv6/ |
D | ip6_tables.h | 206 unsigned int hook_entry[NF_INET_NUMHOOKS]; member 234 unsigned int hook_entry[NF_INET_NUMHOOKS]; member
|
/Linux-v4.19/net/netfilter/ |
D | nf_queue.c | 274 const struct nf_hook_entry *hook_entry; in nf_reinject() local 296 hook_entry = &hooks->hooks[i]; in nf_reinject() 300 verdict = nf_hook_entry_hookfn(hook_entry, skb, &entry->state); in nf_reinject()
|
D | xt_repldata.h | 41 tbl->repl.hook_entry[hooknum] = bytes; \
|
D | x_tables.c | 573 BUILD_BUG_ON(ARRAY_SIZE(info->hook_entry) != ARRAY_SIZE(info->underflow)); in xt_check_table_hooks() 578 for (i = 0; i < ARRAY_SIZE(info->hook_entry); i++) { in xt_check_table_hooks() 582 if (info->hook_entry[i] == 0xFFFFFFFF) in xt_check_table_hooks() 595 if (max_entry > info->hook_entry[i]) { in xt_check_table_hooks() 599 if (max_entry == info->hook_entry[i]) { in xt_check_table_hooks() 604 max_entry = info->hook_entry[i]; in xt_check_table_hooks()
|
/Linux-v4.19/include/uapi/linux/netfilter_bridge/ |
D | ebtables.h | 52 struct ebt_entries __user *hook_entry[NF_BR_NUMHOOKS]; member 68 struct ebt_entries *hook_entry[NF_BR_NUMHOOKS]; member
|
/Linux-v4.19/include/linux/netfilter_bridge/ |
D | ebtables.h | 84 struct ebt_entries *hook_entry[NF_BR_NUMHOOKS]; member
|
/Linux-v4.19/include/linux/netfilter/ |
D | x_tables.h | 257 unsigned int hook_entry[NF_INET_NUMHOOKS]; member
|