Searched refs:xt_family (Results 1 – 17 of 17) sorted by relevance
/linux-6.6.21/net/netfilter/ |
D | xt_set.c | 58 ADT_OPT(opt, xt_family(par), info->match_set.u.compat.dim, in set_match_v0() 122 ADT_OPT(opt, xt_family(par), info->match_set.dim, in set_match_v1() 170 ADT_OPT(opt, xt_family(par), info->match_set.dim, in set_match_v3() 193 ADT_OPT(opt, xt_family(par), info->match_set.dim, in set_match_v4() 216 ADT_OPT(add_opt, xt_family(par), info->add_set.u.compat.dim, in set_target_v0() 219 ADT_OPT(del_opt, xt_family(par), info->del_set.u.compat.dim, in set_target_v0() 291 ADT_OPT(add_opt, xt_family(par), info->add_set.dim, in set_target_v1() 294 ADT_OPT(del_opt, xt_family(par), info->del_set.dim, in set_target_v1() 362 ADT_OPT(add_opt, xt_family(par), info->add_set.dim, in set_target_v2() 365 ADT_OPT(del_opt, xt_family(par), info->del_set.dim, in set_target_v2() [all …]
|
D | xt_pkttype.c | 30 else if (xt_family(par) == NFPROTO_IPV4 && in pkttype_mt() 33 else if (xt_family(par) == NFPROTO_IPV6) in pkttype_mt()
|
D | xt_conntrack.c | 199 if (conntrack_mt_origsrc(ct, info, xt_family(par)) ^ in conntrack_mt() 204 if (conntrack_mt_origdst(ct, info, xt_family(par)) ^ in conntrack_mt() 209 if (conntrack_mt_replsrc(ct, info, xt_family(par)) ^ in conntrack_mt() 214 if (conntrack_mt_repldst(ct, info, xt_family(par)) ^ in conntrack_mt()
|
D | xt_connlimit.c | 47 xt_family(par), net, &tuple)) { in connlimit_mt() 51 if (xt_family(par) == NFPROTO_IPV6) { in connlimit_mt()
|
D | xt_NFQUEUE.c | 44 xt_family(par), jhash_initval); in nfqueue_tg_v1() 99 xt_family(par), jhash_initval); in nfqueue_tg_v3()
|
D | xt_policy.c | 117 ret = match_policy_in(skb, info, xt_family(par)); in policy_mt() 119 ret = match_policy_out(skb, info, xt_family(par)); in policy_mt()
|
D | xt_osf.c | 30 return nf_osf_match(skb, xt_family(p), xt_hooknum(p), xt_in(p), in xt_osf_match_packet()
|
D | xt_NFLOG.c | 36 nf_log_packet(net, xt_family(par), xt_hooknum(par), skb, xt_in(par), in nflog_tg()
|
D | xt_dscp.c | 56 if (xt_family(par) == NFPROTO_IPV4) in tos_mt()
|
D | xt_LOG.c | 39 nf_log_packet(net, xt_family(par), xt_hooknum(par), skb, xt_in(par), in log_tg()
|
D | xt_AUDIT.c | 80 switch (xt_family(par)) { in audit_tg()
|
D | xt_cluster.c | 104 if (!xt_cluster_is_multicast_addr(skb, xt_family(par)) && in xt_cluster_mt()
|
D | xt_ipvs.c | 54 const u_int8_t family = xt_family(par); in ipvs_mt()
|
D | xt_recent.c | 251 if (xt_family(par) == NFPROTO_IPV4) { in recent_mt() 281 e = recent_entry_lookup(t, &addr_mask, xt_family(par), in recent_mt() 286 e = recent_entry_init(t, &addr_mask, xt_family(par), ttl); in recent_mt()
|
D | xt_addrtype.c | 143 if (xt_family(par) == NFPROTO_IPV6) in addrtype_mt_v1()
|
D | xt_TCPMSS.c | 171 if (xt_family(par) == NFPROTO_IPV4) in tcpmss_mangle_packet()
|
/linux-6.6.21/include/linux/netfilter/ |
D | x_tables.h | 74 static inline u_int8_t xt_family(const struct xt_action_param *par) in xt_family() function
|