/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv6/netfilter/ |
H A D | ip6_tables.c | 354 IP_NF_ASSERT(table->valid_hooks & (1 << hook)); 455 unsigned int valid_hooks, void *entry0) 465 if (!(valid_hooks & (1 << hook))) 739 unsigned int valid_hooks) 758 if (!(valid_hooks & (1 << h))) 826 repl->valid_hooks); 844 if (!(repl->valid_hooks & (1 << i))) 858 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0)) 1134 info.valid_hooks = t->valid_hooks; 454 mark_source_chains(const struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) argument 733 check_entry_size_and_hooks(struct ip6t_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument 1200 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument 1413 u32 valid_hooks; member in struct:compat_ip6t_replace 1660 translate_compat_table(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info **pinfo, void **pentry0, unsigned int total_size, unsigned int number, unsigned int *hook_entries, unsigned int *underflows) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/netfilter_ipv4/ |
H A D | ip_tables.h | 153 unsigned int valid_hooks; member in struct:ipt_getinfo 175 unsigned int valid_hooks; member in struct:ipt_replace
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/netfilter_ipv6/ |
H A D | ip6_tables.h | 210 unsigned int valid_hooks; member in struct:ip6t_getinfo 232 unsigned int valid_hooks; member in struct:ip6t_replace
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/netfilter/ |
H A D | iptable_mangle.c | 33 .valid_hooks = MANGLE_VALID_HOOKS,
|
H A D | nf_nat_rule.c | 36 .valid_hooks = NAT_VALID_HOOKS,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/bridge/netfilter/ |
H A D | ebtables.c | 420 unsigned int valid_hooks = repl->valid_hooks; local 438 if ((valid_hooks & (1 << i)) == 0) 476 (valid_hooks & (1 << i))) { 1008 if (t->check && (ret = t->check(newinfo, repl->valid_hooks))) 1179 if ((repl->valid_hooks & (1 << i)) == 0) 1191 if (table->check && table->check(newinfo, table->valid_hooks)) { 1500 tmp.valid_hooks = t->valid_hooks; 1504 tmp.valid_hooks 1533 compat_uint_t valid_hooks; member in struct:compat_ebt_replace [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/netfilter/ |
H A D | x_tables.h | 365 unsigned int valid_hooks; member in struct:xt_table
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.x/libiptc/ |
H A D | libiptc.c | 258 if ((h->info.valid_hooks & (1 << i)) 827 DEBUGP("valid_hooks=0x%08x, num_entries=%u, size=%u\n", 828 info.valid_hooks, info.num_entries, info.size); 2060 repl->valid_hooks = (*handle)->info.valid_hooks;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/libiptc/ |
H A D | libiptc.c | 281 if ((h->info.valid_hooks & (1 << i)) 1336 DEBUGP("valid_hooks=0x%08x, num_entries=%u, size=%u\n", 1337 info.valid_hooks, info.num_entries, info.size); 2574 repl->valid_hooks = handle->info.valid_hooks;
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/libiptc/ |
H A D | libiptc.c | 281 if ((h->info.valid_hooks & (1 << i)) 1335 DEBUGP("valid_hooks=0x%08x, num_entries=%u, size=%u\n", 1336 info.valid_hooks, info.num_entries, info.size); 2570 repl->valid_hooks = handle->info.valid_hooks;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netfilter/ |
H A D | x_tables.c | 1196 unsigned int hook_mask = table->valid_hooks; 1235 nf_unregister_hooks(ops, hweight32(table->valid_hooks));
|