| /Linux-v5.15/net/bridge/netfilter/ | 
| D | ebtable_nat.c | 36 	.valid_hooks	= NAT_VALID_HOOKS,46 static int check(const struct ebt_table_info *info, unsigned int valid_hooks)  in check()  argument
 48 	if (valid_hooks & ~NAT_VALID_HOOKS)  in check()
 56 	.valid_hooks	= NAT_VALID_HOOKS,
 
 | 
| D | ebtable_filter.c | 36 	.valid_hooks	= FILTER_VALID_HOOKS,46 static int check(const struct ebt_table_info *info, unsigned int valid_hooks)  in check()  argument
 48 	if (valid_hooks & ~FILTER_VALID_HOOKS)  in check()
 56 	.valid_hooks	= FILTER_VALID_HOOKS,
 
 | 
| D | ebtable_broute.c | 31 	.valid_hooks	= 1 << NF_BR_BROUTING,39 static int check(const struct ebt_table_info *info, unsigned int valid_hooks)  in check()  argument
 41 	if (valid_hooks & ~(1 << NF_BR_BROUTING))  in check()
 49 	.valid_hooks	= 1 << NF_BR_BROUTING,
 
 | 
| D | ebtables.c | 470 	unsigned int valid_hooks = repl->valid_hooks;  in ebt_verify_pointers()  local488 			if ((valid_hooks & (1 << i)) == 0)  in ebt_verify_pointers()
 523 		   (valid_hooks & (1 << i)))  in ebt_verify_pointers()
 1044 	if (t->check && (ret = t->check(newinfo, repl->valid_hooks)))  in do_replace_finish()
 1224 		if ((repl->valid_hooks & (1 << i)) == 0)  in ebt_register_table()
 1234 	if (table->check && table->check(newinfo, table->valid_hooks)) {  in ebt_register_table()
 1255 	num_ops = hweight32(table->valid_hooks);  in ebt_register_table()
 1367 		nf_unregister_net_hooks(net, table->ops, hweight32(table->valid_hooks));  in ebt_unregister_table_pre_exit()
 1592 	compat_uint_t valid_hooks;  member
 2398 		tmp.valid_hooks = t->valid_hooks;  in compat_do_ebt_get_ctl()
 [all …]
 
 | 
| /Linux-v5.15/net/netfilter/ | 
| D | xt_repldata.h | 18 	unsigned int hook_mask = info->valid_hooks; \34 	tbl->repl.valid_hooks = hook_mask; \
 
 | 
| /Linux-v5.15/net/ipv4/netfilter/ | 
| D | arp_tables.c | 302 			      unsigned int valid_hooks, void *entry0,  in mark_source_chains()  argument314 		if (!(valid_hooks & (1 << hook)))  in mark_source_chains()
 457 					     unsigned int valid_hooks)  in check_entry_size_and_hooks()  argument
 481 		if (!(valid_hooks & (1 << h)))  in check_entry_size_and_hooks()
 549 						 repl->valid_hooks);  in translate_table()
 564 	ret = xt_check_table_hooks(newinfo, repl->valid_hooks);  in translate_table()
 568 	if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) {  in translate_table()
 821 		info.valid_hooks = t->valid_hooks;  in get_info()
 880 			unsigned int valid_hooks,  in __do_replace()  argument
 906 	if (valid_hooks != t->valid_hooks) {  in __do_replace()
 [all …]
 
 | 
| D | iptable_raw.c | 21 	.valid_hooks =  RAW_VALID_HOOKS,29 	.valid_hooks =  RAW_VALID_HOOKS,
 
 | 
| D | ip_tables.c | 258 	WARN_ON(!(table->valid_hooks & (1 << hook)));  in ipt_do_table()369 		   unsigned int valid_hooks, void *entry0,  in mark_source_chains()  argument
 380 		if (!(valid_hooks & (1 << hook)))  in mark_source_chains()
 594 			   unsigned int valid_hooks)  in check_entry_size_and_hooks()  argument
 618 		if (!(valid_hooks & (1 << h)))  in check_entry_size_and_hooks()
 689 						 repl->valid_hooks);  in translate_table()
 704 	ret = xt_check_table_hooks(newinfo, repl->valid_hooks);  in translate_table()
 708 	if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) {  in translate_table()
 978 		info.valid_hooks = t->valid_hooks;  in get_info()
 1037 __do_replace(struct net *net, const char *name, unsigned int valid_hooks,  in __do_replace()  argument
 [all …]
 
 | 
| D | arptable_filter.c | 23 	.valid_hooks	= FILTER_VALID_HOOKS,
 | 
| D | iptable_security.c | 30 	.valid_hooks	= SECURITY_VALID_HOOKS,
 | 
| D | iptable_filter.c | 25 	.valid_hooks	= FILTER_VALID_HOOKS,
 | 
| D | iptable_mangle.c | 30 	.valid_hooks	= MANGLE_VALID_HOOKS,
 | 
| D | iptable_nat.c | 24 	.valid_hooks	= (1 << NF_INET_PRE_ROUTING) |
 | 
| /Linux-v5.15/net/ipv6/netfilter/ | 
| D | ip6table_raw.c | 20 	.valid_hooks = RAW_VALID_HOOKS,28 	.valid_hooks = RAW_VALID_HOOKS,
 
 | 
| D | ip6_tables.c | 280 	WARN_ON(!(table->valid_hooks & (1 << hook)));  in ip6t_do_table()388 		   unsigned int valid_hooks, void *entry0,  in mark_source_chains()  argument
 399 		if (!(valid_hooks & (1 << hook)))  in mark_source_chains()
 613 			   unsigned int valid_hooks)  in check_entry_size_and_hooks()  argument
 637 		if (!(valid_hooks & (1 << h)))  in check_entry_size_and_hooks()
 707 						 repl->valid_hooks);  in translate_table()
 722 	ret = xt_check_table_hooks(newinfo, repl->valid_hooks);  in translate_table()
 726 	if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) {  in translate_table()
 995 		info.valid_hooks = t->valid_hooks;  in get_info()
 1055 __do_replace(struct net *net, const char *name, unsigned int valid_hooks,  in __do_replace()  argument
 [all …]
 
 | 
| D | ip6table_security.c | 29 	.valid_hooks	= SECURITY_VALID_HOOKS,
 | 
| D | ip6table_filter.c | 24 	.valid_hooks	= FILTER_VALID_HOOKS,
 | 
| D | ip6table_mangle.c | 25 	.valid_hooks	= MANGLE_VALID_HOOKS,
 | 
| D | ip6table_nat.c | 26 	.valid_hooks	= (1 << NF_INET_PRE_ROUTING) |
 | 
| /Linux-v5.15/include/uapi/linux/netfilter_arp/ | 
| D | arp_tables.h | 141 	unsigned int valid_hooks;  member163 	unsigned int valid_hooks;  member
 
 | 
| /Linux-v5.15/include/uapi/linux/netfilter_ipv4/ | 
| D | ip_tables.h | 163 	unsigned int valid_hooks;  member185 	unsigned int valid_hooks;  member
 
 | 
| /Linux-v5.15/include/linux/netfilter_bridge/ | 
| D | ebtables.h | 95 	unsigned int valid_hooks;  member100 	   unsigned int valid_hooks);
 
 | 
| /Linux-v5.15/include/uapi/linux/netfilter_ipv6/ | 
| D | ip6_tables.h | 203 	unsigned int valid_hooks;  member225 	unsigned int valid_hooks;  member
 
 | 
| /Linux-v5.15/include/uapi/linux/netfilter_bridge/ | 
| D | ebtables.h | 46 	unsigned int valid_hooks;  member62 	unsigned int valid_hooks;  member
 
 | 
| /Linux-v5.15/include/linux/netfilter/ | 
| D | x_tables.h | 227 	unsigned int valid_hooks;  member284 int xt_check_table_hooks(const struct xt_table_info *info, unsigned int valid_hooks);
 
 |