/linux-6.1.9/net/netfilter/ |
D | xt_repldata.h | 18 unsigned int hook_mask = info->valid_hooks; \ 34 tbl->repl.valid_hooks = hook_mask; \
|
/linux-6.1.9/net/ipv4/netfilter/ |
D | arp_tables.c | 303 unsigned int valid_hooks, void *entry0, in mark_source_chains() argument 315 if (!(valid_hooks & (1 << hook))) in mark_source_chains() 458 unsigned int valid_hooks) in check_entry_size_and_hooks() argument 482 if (!(valid_hooks & (1 << h))) in check_entry_size_and_hooks() 550 repl->valid_hooks); in translate_table() 565 ret = xt_check_table_hooks(newinfo, repl->valid_hooks); in translate_table() 569 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) { in translate_table() 822 info.valid_hooks = t->valid_hooks; in get_info() 881 unsigned int valid_hooks, in __do_replace() argument 907 if (valid_hooks != t->valid_hooks) { in __do_replace() [all …]
|
D | iptable_raw.c | 21 .valid_hooks = RAW_VALID_HOOKS, 29 .valid_hooks = RAW_VALID_HOOKS,
|
D | ip_tables.c | 259 WARN_ON(!(table->valid_hooks & (1 << hook))); in ipt_do_table() 370 unsigned int valid_hooks, void *entry0, in mark_source_chains() argument 381 if (!(valid_hooks & (1 << hook))) in mark_source_chains() 595 unsigned int valid_hooks) in check_entry_size_and_hooks() argument 619 if (!(valid_hooks & (1 << h))) in check_entry_size_and_hooks() 690 repl->valid_hooks); in translate_table() 705 ret = xt_check_table_hooks(newinfo, repl->valid_hooks); in translate_table() 709 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) { in translate_table() 979 info.valid_hooks = t->valid_hooks; in get_info() 1038 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, in __do_replace() argument [all …]
|
D | iptable_security.c | 30 .valid_hooks = SECURITY_VALID_HOOKS,
|
D | arptable_filter.c | 23 .valid_hooks = FILTER_VALID_HOOKS,
|
D | iptable_filter.c | 25 .valid_hooks = FILTER_VALID_HOOKS,
|
D | iptable_mangle.c | 30 .valid_hooks = MANGLE_VALID_HOOKS,
|
D | iptable_nat.c | 24 .valid_hooks = (1 << NF_INET_PRE_ROUTING) |
|
/linux-6.1.9/net/bridge/netfilter/ |
D | ebtable_filter.c | 36 .valid_hooks = FILTER_VALID_HOOKS, 49 .valid_hooks = FILTER_VALID_HOOKS,
|
D | ebtable_nat.c | 36 .valid_hooks = NAT_VALID_HOOKS, 49 .valid_hooks = NAT_VALID_HOOKS,
|
D | ebtable_broute.c | 31 .valid_hooks = 1 << NF_BR_BROUTING, 42 .valid_hooks = 1 << NF_BR_BROUTING,
|
D | ebtables.c | 470 unsigned int valid_hooks = repl->valid_hooks; in ebt_verify_pointers() local 488 if ((valid_hooks & (1 << i)) == 0) in ebt_verify_pointers() 523 (valid_hooks & (1 << i))) in ebt_verify_pointers() 1043 if (repl->valid_hooks != t->valid_hooks) { in do_replace_finish() 1225 if ((repl->valid_hooks & (1 << i)) == 0) in ebt_register_table() 1251 num_ops = hweight32(table->valid_hooks); in ebt_register_table() 1363 nf_unregister_net_hooks(net, table->ops, hweight32(table->valid_hooks)); in ebt_unregister_table_pre_exit() 1589 compat_uint_t valid_hooks; member 2395 tmp.valid_hooks = t->valid_hooks; in compat_do_ebt_get_ctl() 2406 tmp.valid_hooks = t->table->valid_hooks; in compat_do_ebt_get_ctl() [all …]
|
/linux-6.1.9/net/ipv6/netfilter/ |
D | ip6table_raw.c | 20 .valid_hooks = RAW_VALID_HOOKS, 28 .valid_hooks = RAW_VALID_HOOKS,
|
D | ip6_tables.c | 280 WARN_ON(!(table->valid_hooks & (1 << hook))); in ip6t_do_table() 388 unsigned int valid_hooks, void *entry0, in mark_source_chains() argument 399 if (!(valid_hooks & (1 << hook))) in mark_source_chains() 613 unsigned int valid_hooks) in check_entry_size_and_hooks() argument 637 if (!(valid_hooks & (1 << h))) in check_entry_size_and_hooks() 707 repl->valid_hooks); in translate_table() 722 ret = xt_check_table_hooks(newinfo, repl->valid_hooks); in translate_table() 726 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) { in translate_table() 995 info.valid_hooks = t->valid_hooks; in get_info() 1055 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, in __do_replace() argument [all …]
|
D | ip6table_security.c | 29 .valid_hooks = SECURITY_VALID_HOOKS,
|
D | ip6table_filter.c | 24 .valid_hooks = FILTER_VALID_HOOKS,
|
D | ip6table_mangle.c | 25 .valid_hooks = MANGLE_VALID_HOOKS,
|
D | ip6table_nat.c | 26 .valid_hooks = (1 << NF_INET_PRE_ROUTING) |
|
/linux-6.1.9/include/uapi/linux/netfilter_arp/ |
D | arp_tables.h | 141 unsigned int valid_hooks; member 163 unsigned int valid_hooks; member
|
/linux-6.1.9/include/uapi/linux/netfilter_ipv4/ |
D | ip_tables.h | 163 unsigned int valid_hooks; member 185 unsigned int valid_hooks; member
|
/linux-6.1.9/include/uapi/linux/netfilter_ipv6/ |
D | ip6_tables.h | 203 unsigned int valid_hooks; member 225 unsigned int valid_hooks; member
|
/linux-6.1.9/include/uapi/linux/netfilter_bridge/ |
D | ebtables.h | 46 unsigned int valid_hooks; member 62 unsigned int valid_hooks; member
|
/linux-6.1.9/include/linux/netfilter_bridge/ |
D | ebtables.h | 95 unsigned int valid_hooks; member
|
/linux-6.1.9/include/linux/netfilter/ |
D | x_tables.h | 227 unsigned int valid_hooks; member 284 int xt_check_table_hooks(const struct xt_table_info *info, unsigned int valid_hooks);
|