/Linux-v5.10/net/bridge/netfilter/ |
D | ebtable_filter.c | 36 .valid_hooks = FILTER_VALID_HOOKS, 46 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) in check() argument 48 if (valid_hooks & ~FILTER_VALID_HOOKS) in check() 56 .valid_hooks = FILTER_VALID_HOOKS,
|
D | ebtable_nat.c | 36 .valid_hooks = NAT_VALID_HOOKS, 46 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) in check() argument 48 if (valid_hooks & ~NAT_VALID_HOOKS) in check() 56 .valid_hooks = NAT_VALID_HOOKS,
|
D | ebtable_broute.c | 31 .valid_hooks = 1 << NF_BR_BROUTING, 39 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) in check() argument 41 if (valid_hooks & ~(1 << NF_BR_BROUTING)) in check() 49 .valid_hooks = 1 << NF_BR_BROUTING,
|
D | ebtables.c | 431 unsigned int valid_hooks = repl->valid_hooks; in ebt_verify_pointers() local 449 if ((valid_hooks & (1 << i)) == 0) in ebt_verify_pointers() 484 (valid_hooks & (1 << i))) in ebt_verify_pointers() 1003 if (t->check && (ret = t->check(newinfo, repl->valid_hooks))) in do_replace_finish() 1179 if ((repl->valid_hooks & (1 << i)) == 0) in ebt_register_table() 1189 if (table->check && table->check(newinfo, table->valid_hooks)) { in ebt_register_table() 1213 ret = nf_register_net_hooks(net, ops, hweight32(table->valid_hooks)); in ebt_register_table() 1238 nf_unregister_net_hooks(net, ops, hweight32(table->valid_hooks)); in ebt_unregister_table() 1455 compat_uint_t valid_hooks; member 2261 tmp.valid_hooks = t->valid_hooks; in compat_do_ebt_get_ctl() [all …]
|
/Linux-v5.10/net/netfilter/ |
D | xt_repldata.h | 18 unsigned int hook_mask = info->valid_hooks; \ 34 tbl->repl.valid_hooks = hook_mask; \
|
/Linux-v5.10/net/ipv4/netfilter/ |
D | arp_tables.c | 302 unsigned int valid_hooks, void *entry0, in mark_source_chains() argument 314 if (!(valid_hooks & (1 << hook))) in mark_source_chains() 457 unsigned int valid_hooks) in check_entry_size_and_hooks() argument 481 if (!(valid_hooks & (1 << h))) in check_entry_size_and_hooks() 549 repl->valid_hooks); in translate_table() 564 ret = xt_check_table_hooks(newinfo, repl->valid_hooks); in translate_table() 568 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) { in translate_table() 821 info.valid_hooks = t->valid_hooks; in get_info() 880 unsigned int valid_hooks, in __do_replace() argument 906 if (valid_hooks != t->valid_hooks) { in __do_replace() [all …]
|
D | ip_tables.c | 258 WARN_ON(!(table->valid_hooks & (1 << hook))); in ipt_do_table() 369 unsigned int valid_hooks, void *entry0, in mark_source_chains() argument 380 if (!(valid_hooks & (1 << hook))) in mark_source_chains() 594 unsigned int valid_hooks) in check_entry_size_and_hooks() argument 618 if (!(valid_hooks & (1 << h))) in check_entry_size_and_hooks() 689 repl->valid_hooks); in translate_table() 704 ret = xt_check_table_hooks(newinfo, repl->valid_hooks); in translate_table() 708 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) { in translate_table() 978 info.valid_hooks = t->valid_hooks; in get_info() 1037 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, in __do_replace() argument [all …]
|
D | iptable_raw.c | 23 .valid_hooks = RAW_VALID_HOOKS, 32 .valid_hooks = RAW_VALID_HOOKS,
|
D | arptable_filter.c | 25 .valid_hooks = FILTER_VALID_HOOKS,
|
D | iptable_security.c | 32 .valid_hooks = SECURITY_VALID_HOOKS,
|
D | iptable_filter.c | 26 .valid_hooks = FILTER_VALID_HOOKS,
|
D | iptable_nat.c | 20 .valid_hooks = (1 << NF_INET_PRE_ROUTING) |
|
D | iptable_mangle.c | 32 .valid_hooks = MANGLE_VALID_HOOKS,
|
/Linux-v5.10/include/uapi/linux/netfilter_arp/ |
D | arp_tables.h | 141 unsigned int valid_hooks; member 163 unsigned int valid_hooks; member
|
/Linux-v5.10/net/ipv6/netfilter/ |
D | ip6_tables.c | 279 WARN_ON(!(table->valid_hooks & (1 << hook))); in ip6t_do_table() 387 unsigned int valid_hooks, void *entry0, in mark_source_chains() argument 398 if (!(valid_hooks & (1 << hook))) in mark_source_chains() 612 unsigned int valid_hooks) in check_entry_size_and_hooks() argument 636 if (!(valid_hooks & (1 << h))) in check_entry_size_and_hooks() 706 repl->valid_hooks); in translate_table() 721 ret = xt_check_table_hooks(newinfo, repl->valid_hooks); in translate_table() 725 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) { in translate_table() 994 info.valid_hooks = t->valid_hooks; in get_info() 1054 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, in __do_replace() argument [all …]
|
D | ip6table_raw.c | 22 .valid_hooks = RAW_VALID_HOOKS, 31 .valid_hooks = RAW_VALID_HOOKS,
|
D | ip6table_security.c | 31 .valid_hooks = SECURITY_VALID_HOOKS,
|
D | ip6table_filter.c | 26 .valid_hooks = FILTER_VALID_HOOKS,
|
D | ip6table_nat.c | 22 .valid_hooks = (1 << NF_INET_PRE_ROUTING) |
|
D | ip6table_mangle.c | 27 .valid_hooks = MANGLE_VALID_HOOKS,
|
/Linux-v5.10/include/uapi/linux/netfilter_ipv4/ |
D | ip_tables.h | 163 unsigned int valid_hooks; member 185 unsigned int valid_hooks; member
|
/Linux-v5.10/include/linux/netfilter_bridge/ |
D | ebtables.h | 95 unsigned int valid_hooks; member 100 unsigned int valid_hooks);
|
/Linux-v5.10/include/uapi/linux/netfilter_ipv6/ |
D | ip6_tables.h | 203 unsigned int valid_hooks; member 225 unsigned int valid_hooks; member
|
/Linux-v5.10/include/uapi/linux/netfilter_bridge/ |
D | ebtables.h | 46 unsigned int valid_hooks; member 62 unsigned int valid_hooks; member
|
/Linux-v5.10/include/linux/netfilter/ |
D | x_tables.h | 227 unsigned int valid_hooks; member 284 int xt_check_table_hooks(const struct xt_table_info *info, unsigned int valid_hooks);
|