Searched refs:hook_entry (Results 1 – 16 of 16) sorted by relevance
/Linux-v6.6/net/bridge/netfilter/ |
D | ebtables.c | 219 chaininfo = private->hook_entry[hook]; in ebt_do_table() 220 nentries = private->hook_entry[hook]->nentries; in ebt_do_table() 221 point = (struct ebt_entry *)(private->hook_entry[hook]->data); in ebt_do_table() 222 counter_base = cb_base + private->hook_entry[hook]->counter_offset; in ebt_do_table() 475 newinfo->hook_entry[i] = NULL; in ebt_verify_pointers() 490 if ((char __user *)repl->hook_entry[i] == in ebt_verify_pointers() 503 newinfo->hook_entry[i] = (struct ebt_entries *)e; in ebt_verify_pointers() 522 if (!newinfo->hook_entry[i] && in ebt_verify_pointers() 541 if ((void *)e == (void *)newinfo->hook_entry[i]) in ebt_check_entry_size_and_hooks() 603 if (newinfo->hook_entry[i] == (struct ebt_entries *)e) in ebt_get_udc_positions() [all …]
|
D | ebtable_filter.c | 38 .hook_entry = {
|
D | ebtable_nat.c | 38 .hook_entry = {
|
D | ebtable_broute.c | 33 .hook_entry = {
|
/Linux-v6.6/net/ipv4/netfilter/ |
D | arp_tables.c | 215 e = get_entry(table_base, private->hook_entry[hook]); in arpt_do_table() 312 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 485 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 535 newinfo->hook_entry[i] = 0xFFFFFFFF; in translate_table() 548 repl->hook_entry, in translate_table() 755 if (info->hook_entry[i] && in compat_calc_entry() 756 (e < (struct arpt_entry *)(base + info->hook_entry[i]))) in compat_calc_entry() 757 newinfo->hook_entry[i] -= off; in compat_calc_entry() 823 memcpy(info.hook_entry, private->hook_entry, in get_info() 824 sizeof(info.hook_entry)); in get_info() [all …]
|
D | ip_tables.c | 199 root = get_entry(private->entries, private->hook_entry[hook]); in trace_packet() 204 xt_entry_foreach(iter, root, private->size - private->hook_entry[hook]) in trace_packet() 275 e = get_entry(table_base, private->hook_entry[hook]); in ipt_do_table() 376 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 620 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 674 newinfo->hook_entry[i] = 0xFFFFFFFF; in translate_table() 686 repl->hook_entry, in translate_table() 910 if (info->hook_entry[i] && in compat_calc_entry() 911 (e < (struct ipt_entry *)(base + info->hook_entry[i]))) in compat_calc_entry() 912 newinfo->hook_entry[i] -= off; in compat_calc_entry() [all …]
|
/Linux-v6.6/net/ipv6/netfilter/ |
D | ip6_tables.c | 224 root = get_entry(private->entries, private->hook_entry[hook]); in trace_packet() 229 xt_entry_foreach(iter, root, private->size - private->hook_entry[hook]) in trace_packet() 297 e = get_entry(table_base, private->hook_entry[hook]); in ip6t_do_table() 394 unsigned int pos = newinfo->hook_entry[hook]; in mark_source_chains() 638 newinfo->hook_entry[h] = hook_entries[h]; in check_entry_size_and_hooks() 691 newinfo->hook_entry[i] = 0xFFFFFFFF; in translate_table() 703 repl->hook_entry, in translate_table() 926 if (info->hook_entry[i] && in compat_calc_entry() 927 (e < (struct ip6t_entry *)(base + info->hook_entry[i]))) in compat_calc_entry() 928 newinfo->hook_entry[i] -= off; in compat_calc_entry() [all …]
|
/Linux-v6.6/include/uapi/linux/netfilter_arp/ |
D | arp_tables.h | 144 unsigned int hook_entry[NF_ARP_NUMHOOKS]; member 172 unsigned int hook_entry[NF_ARP_NUMHOOKS]; member
|
/Linux-v6.6/include/uapi/linux/netfilter_ipv4/ |
D | ip_tables.h | 166 unsigned int hook_entry[NF_INET_NUMHOOKS]; member 194 unsigned int hook_entry[NF_INET_NUMHOOKS]; member
|
/Linux-v6.6/include/uapi/linux/netfilter_ipv6/ |
D | ip6_tables.h | 206 unsigned int hook_entry[NF_INET_NUMHOOKS]; member 234 unsigned int hook_entry[NF_INET_NUMHOOKS]; member
|
/Linux-v6.6/net/netfilter/ |
D | nf_queue.c | 301 const struct nf_hook_entry *hook_entry; in nf_reinject() local 321 hook_entry = &hooks->hooks[i]; in nf_reinject() 325 verdict = nf_hook_entry_hookfn(hook_entry, skb, &entry->state); in nf_reinject()
|
D | xt_repldata.h | 41 tbl->repl.hook_entry[hooknum] = bytes; \
|
D | x_tables.c | 590 BUILD_BUG_ON(ARRAY_SIZE(info->hook_entry) != ARRAY_SIZE(info->underflow)); in xt_check_table_hooks() 595 for (i = 0; i < ARRAY_SIZE(info->hook_entry); i++) { in xt_check_table_hooks() 599 if (info->hook_entry[i] == 0xFFFFFFFF) in xt_check_table_hooks() 612 if (max_entry > info->hook_entry[i]) { in xt_check_table_hooks() 616 if (max_entry == info->hook_entry[i]) { in xt_check_table_hooks() 621 max_entry = info->hook_entry[i]; in xt_check_table_hooks()
|
/Linux-v6.6/include/uapi/linux/netfilter_bridge/ |
D | ebtables.h | 52 struct ebt_entries __user *hook_entry[NF_BR_NUMHOOKS]; member 68 struct ebt_entries *hook_entry[NF_BR_NUMHOOKS]; member
|
/Linux-v6.6/include/linux/netfilter_bridge/ |
D | ebtables.h | 84 struct ebt_entries *hook_entry[NF_BR_NUMHOOKS]; member
|
/Linux-v6.6/include/linux/netfilter/ |
D | x_tables.h | 257 unsigned int hook_entry[NF_INET_NUMHOOKS]; member
|