Searched refs:valid_hooks (Results 26 - 36 of 36) sorted by relevance

12

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv6/netfilter/
H A Dip6_tables.c354 IP_NF_ASSERT(table->valid_hooks & (1 << hook));
455 unsigned int valid_hooks, void *entry0)
465 if (!(valid_hooks & (1 << hook)))
739 unsigned int valid_hooks)
758 if (!(valid_hooks & (1 << h)))
826 repl->valid_hooks);
844 if (!(repl->valid_hooks & (1 << i)))
858 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0))
1134 info.valid_hooks = t->valid_hooks;
454 mark_source_chains(const struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) argument
733 check_entry_size_and_hooks(struct ip6t_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument
1200 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument
1413 u32 valid_hooks; member in struct:compat_ip6t_replace
1660 translate_compat_table(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info **pinfo, void **pentry0, unsigned int total_size, unsigned int number, unsigned int *hook_entries, unsigned int *underflows) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/netfilter_ipv4/
H A Dip_tables.h153 unsigned int valid_hooks; member in struct:ipt_getinfo
175 unsigned int valid_hooks; member in struct:ipt_replace
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/netfilter_ipv6/
H A Dip6_tables.h210 unsigned int valid_hooks; member in struct:ip6t_getinfo
232 unsigned int valid_hooks; member in struct:ip6t_replace
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/netfilter/
H A Diptable_mangle.c33 .valid_hooks = MANGLE_VALID_HOOKS,
H A Dnf_nat_rule.c36 .valid_hooks = NAT_VALID_HOOKS,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/bridge/netfilter/
H A Debtables.c420 unsigned int valid_hooks = repl->valid_hooks; local
438 if ((valid_hooks & (1 << i)) == 0)
476 (valid_hooks & (1 << i))) {
1008 if (t->check && (ret = t->check(newinfo, repl->valid_hooks)))
1179 if ((repl->valid_hooks & (1 << i)) == 0)
1191 if (table->check && table->check(newinfo, table->valid_hooks)) {
1500 tmp.valid_hooks = t->valid_hooks;
1504 tmp.valid_hooks
1533 compat_uint_t valid_hooks; member in struct:compat_ebt_replace
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/netfilter/
H A Dx_tables.h365 unsigned int valid_hooks; member in struct:xt_table
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.x/libiptc/
H A Dlibiptc.c258 if ((h->info.valid_hooks & (1 << i))
827 DEBUGP("valid_hooks=0x%08x, num_entries=%u, size=%u\n",
828 info.valid_hooks, info.num_entries, info.size);
2060 repl->valid_hooks = (*handle)->info.valid_hooks;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/libiptc/
H A Dlibiptc.c281 if ((h->info.valid_hooks & (1 << i))
1336 DEBUGP("valid_hooks=0x%08x, num_entries=%u, size=%u\n",
1337 info.valid_hooks, info.num_entries, info.size);
2574 repl->valid_hooks = handle->info.valid_hooks;
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/libiptc/
H A Dlibiptc.c281 if ((h->info.valid_hooks & (1 << i))
1335 DEBUGP("valid_hooks=0x%08x, num_entries=%u, size=%u\n",
1336 info.valid_hooks, info.num_entries, info.size);
2570 repl->valid_hooks = handle->info.valid_hooks;
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netfilter/
H A Dx_tables.c1196 unsigned int hook_mask = table->valid_hooks;
1235 nf_unregister_hooks(ops, hweight32(table->valid_hooks));

Completed in 179 milliseconds

12