Searched refs:hook_entry (Results 1 – 16 of 16) sorted by relevance
/Linux-v5.10/net/bridge/netfilter/ |
D | ebtables.c | 206 chaininfo = private->hook_entry[hook]; in ebt_do_table() 207 nentries = private->hook_entry[hook]->nentries; in ebt_do_table() 208 point = (struct ebt_entry *)(private->hook_entry[hook]->data); in ebt_do_table() 209 counter_base = cb_base + private->hook_entry[hook]->counter_offset; in ebt_do_table() 436 newinfo->hook_entry[i] = NULL; in ebt_verify_pointers() 451 if ((char __user *)repl->hook_entry[i] == in ebt_verify_pointers() 464 newinfo->hook_entry[i] = (struct ebt_entries *)e; in ebt_verify_pointers() 483 if (!newinfo->hook_entry[i] && in ebt_verify_pointers() 502 if ((void *)e == (void *)newinfo->hook_entry[i]) in ebt_check_entry_size_and_hooks() 564 if (newinfo->hook_entry[i] == (struct ebt_entries *)e) in ebt_get_udc_positions() [all …]
|
D | ebtable_filter.c | 38 .hook_entry = {
|
D | ebtable_nat.c | 38 .hook_entry = {
|
D | ebtable_broute.c | 33 .hook_entry = {
|
/Linux-v5.10/net/ipv4/netfilter/ |
D | arp_tables.c | 214 e = get_entry(table_base, private->hook_entry[hook]); in arpt_do_table() 311 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 484 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 534 newinfo->hook_entry[i] = 0xFFFFFFFF; in translate_table() 547 repl->hook_entry, in translate_table() 754 if (info->hook_entry[i] && in compat_calc_entry() 755 (e < (struct arpt_entry *)(base + info->hook_entry[i]))) in compat_calc_entry() 756 newinfo->hook_entry[i] -= off; in compat_calc_entry() 822 memcpy(info.hook_entry, private->hook_entry, in get_info() 823 sizeof(info.hook_entry)); in get_info() [all …]
|
D | ip_tables.c | 201 root = get_entry(private->entries, private->hook_entry[hook]); in trace_packet() 206 xt_entry_foreach(iter, root, private->size - private->hook_entry[hook]) in trace_packet() 276 e = get_entry(table_base, private->hook_entry[hook]); in ipt_do_table() 377 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 621 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 675 newinfo->hook_entry[i] = 0xFFFFFFFF; in translate_table() 687 repl->hook_entry, in translate_table() 911 if (info->hook_entry[i] && in compat_calc_entry() 912 (e < (struct ipt_entry *)(base + info->hook_entry[i]))) in compat_calc_entry() 913 newinfo->hook_entry[i] -= off; in compat_calc_entry() [all …]
|
/Linux-v5.10/net/ipv6/netfilter/ |
D | ip6_tables.c | 226 root = get_entry(private->entries, private->hook_entry[hook]); in trace_packet() 231 xt_entry_foreach(iter, root, private->size - private->hook_entry[hook]) in trace_packet() 298 e = get_entry(table_base, private->hook_entry[hook]); in ip6t_do_table() 395 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 639 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 692 newinfo->hook_entry[i] = 0xFFFFFFFF; in translate_table() 704 repl->hook_entry, in translate_table() 927 if (info->hook_entry[i] && in compat_calc_entry() 928 (e < (struct ip6t_entry *)(base + info->hook_entry[i]))) in compat_calc_entry() 929 newinfo->hook_entry[i] -= off; in compat_calc_entry() [all …]
|
/Linux-v5.10/include/uapi/linux/netfilter_arp/ |
D | arp_tables.h | 144 unsigned int hook_entry[NF_ARP_NUMHOOKS]; member 172 unsigned int hook_entry[NF_ARP_NUMHOOKS]; member
|
/Linux-v5.10/include/uapi/linux/netfilter_ipv4/ |
D | ip_tables.h | 166 unsigned int hook_entry[NF_INET_NUMHOOKS]; member 194 unsigned int hook_entry[NF_INET_NUMHOOKS]; member
|
/Linux-v5.10/include/uapi/linux/netfilter_ipv6/ |
D | ip6_tables.h | 206 unsigned int hook_entry[NF_INET_NUMHOOKS]; member 234 unsigned int hook_entry[NF_INET_NUMHOOKS]; member
|
/Linux-v5.10/net/netfilter/ |
D | nf_queue.c | 284 const struct nf_hook_entry *hook_entry; in nf_reinject() local 304 hook_entry = &hooks->hooks[i]; in nf_reinject() 308 verdict = nf_hook_entry_hookfn(hook_entry, skb, &entry->state); in nf_reinject()
|
D | xt_repldata.h | 41 tbl->repl.hook_entry[hooknum] = bytes; \
|
D | x_tables.c | 568 BUILD_BUG_ON(ARRAY_SIZE(info->hook_entry) != ARRAY_SIZE(info->underflow)); in xt_check_table_hooks() 573 for (i = 0; i < ARRAY_SIZE(info->hook_entry); i++) { in xt_check_table_hooks() 577 if (info->hook_entry[i] == 0xFFFFFFFF) in xt_check_table_hooks() 590 if (max_entry > info->hook_entry[i]) { in xt_check_table_hooks() 594 if (max_entry == info->hook_entry[i]) { in xt_check_table_hooks() 599 max_entry = info->hook_entry[i]; in xt_check_table_hooks()
|
/Linux-v5.10/include/uapi/linux/netfilter_bridge/ |
D | ebtables.h | 52 struct ebt_entries __user *hook_entry[NF_BR_NUMHOOKS]; member 68 struct ebt_entries *hook_entry[NF_BR_NUMHOOKS]; member
|
/Linux-v5.10/include/linux/netfilter_bridge/ |
D | ebtables.h | 84 struct ebt_entries *hook_entry[NF_BR_NUMHOOKS]; member
|
/Linux-v5.10/include/linux/netfilter/ |
D | x_tables.h | 257 unsigned int hook_entry[NF_INET_NUMHOOKS]; member
|