Searched refs:valid_hooks (Results 1 - 25 of 36) sorted by relevance

12

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/bridge/netfilter/
H A Debtable_broute.c29 .valid_hooks = 1 << NF_BR_BROUTING,
37 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) argument
39 if (valid_hooks & ~(1 << NF_BR_BROUTING))
48 .valid_hooks = 1 << NF_BR_BROUTING,
H A Debtable_filter.c36 .valid_hooks = FILTER_VALID_HOOKS,
46 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) argument
48 if (valid_hooks & ~FILTER_VALID_HOOKS)
57 .valid_hooks = FILTER_VALID_HOOKS,
H A Debtable_nat.c36 .valid_hooks = NAT_VALID_HOOKS,
46 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) argument
48 if (valid_hooks & ~NAT_VALID_HOOKS)
57 .valid_hooks = NAT_VALID_HOOKS,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netfilter/
H A Dxt_repldata.h9 unsigned int hook_mask = info->valid_hooks; \
21 tbl->repl.valid_hooks = hook_mask; \
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/libiptc/
H A Dlibip4tc.c328 assert(h->info.valid_hooks
346 assert((h->info.valid_hooks
350 (h->info.valid_hooks
368 if (h->info.valid_hooks & (1 << NF_IP_LOCAL_IN)) {
379 assert((h->info.valid_hooks
382 (h->info.valid_hooks
394 if (h->info.valid_hooks & (1 << NF_IP_LOCAL_IN)) {
400 if (h->info.valid_hooks & (1 << NF_IP_FORWARD)) {
410 if (h->info.valid_hooks & (1 << NF_IP_POST_ROUTING)) {
417 assert(h->info.valid_hooks
[all...]
H A Dlibip6tc.c273 assert(h->info.valid_hooks
291 assert((h->info.valid_hooks
295 (h->info.valid_hooks
313 if (h->info.valid_hooks & (1 << NF_IP6_LOCAL_IN)) {
324 assert((h->info.valid_hooks
327 (h->info.valid_hooks
339 if (h->info.valid_hooks & (1 << NF_IP6_LOCAL_IN)) {
345 if (h->info.valid_hooks & (1 << NF_IP6_FORWARD)) {
355 if (h->info.valid_hooks & (1 << NF_IP6_POST_ROUTING)) {
362 assert(h->info.valid_hooks
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/include/linux/netfilter_ipv4/
H A Dip_tables.h147 unsigned int valid_hooks; member in struct:ipt_getinfo
169 unsigned int valid_hooks; member in struct:ipt_replace
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/include/linux/netfilter_ipv4/
H A Dip_tables.h147 unsigned int valid_hooks; member in struct:ipt_getinfo
169 unsigned int valid_hooks; member in struct:ipt_replace
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/libiptc/
H A Dlibip6tc.c273 assert(h->info.valid_hooks
291 assert((h->info.valid_hooks
295 (h->info.valid_hooks
313 if (h->info.valid_hooks & (1 << NF_IP6_LOCAL_IN)) {
324 assert((h->info.valid_hooks
327 (h->info.valid_hooks
339 if (h->info.valid_hooks & (1 << NF_IP6_LOCAL_IN)) {
345 if (h->info.valid_hooks & (1 << NF_IP6_FORWARD)) {
355 if (h->info.valid_hooks & (1 << NF_IP6_POST_ROUTING)) {
362 assert(h->info.valid_hooks
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.x/libiptc/
H A Dlibip6tc.c276 assert(h->info.valid_hooks
294 assert((h->info.valid_hooks
298 (h->info.valid_hooks
316 if (h->info.valid_hooks & (1 << NF_IP6_LOCAL_IN)) {
327 assert((h->info.valid_hooks
330 (h->info.valid_hooks
342 if (h->info.valid_hooks & (1 << NF_IP6_LOCAL_IN)) {
348 if (h->info.valid_hooks & (1 << NF_IP6_FORWARD)) {
358 if (h->info.valid_hooks & (1 << NF_IP6_POST_ROUTING)) {
365 assert(h->info.valid_hooks
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/netfilter_bridge/
H A Debtables.h44 unsigned int valid_hooks; member in struct:ebt_replace
60 unsigned int valid_hooks; member in struct:ebt_replace_kernel
277 unsigned int valid_hooks; member in struct:ebt_table
282 unsigned int valid_hooks);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/include/linux/netfilter_ipv4/
H A Dip_tables.h213 unsigned int valid_hooks; member in struct:ipt_getinfo
236 unsigned int valid_hooks; member in struct:ipt_replace
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/include/linux/netfilter_ipv6/
H A Dip6_tables.h204 unsigned int valid_hooks; member in struct:ip6t_getinfo
226 unsigned int valid_hooks; member in struct:ip6t_replace
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/netfilter_arp/
H A Darp_tables.h141 unsigned int valid_hooks; member in struct:arpt_getinfo
163 unsigned int valid_hooks; member in struct:arpt_replace
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/include/linux/netfilter_ipv6/
H A Dip6_tables.h204 unsigned int valid_hooks; member in struct:ip6t_getinfo
226 unsigned int valid_hooks; member in struct:ip6t_replace
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/netfilter/
H A Darptable_filter.c22 .valid_hooks = FILTER_VALID_HOOKS,
H A Diptable_filter.c29 .valid_hooks = FILTER_VALID_HOOKS,
H A Diptable_raw.c15 .valid_hooks = RAW_VALID_HOOKS,
H A Diptable_security.c33 .valid_hooks = SECURITY_VALID_HOOKS,
H A Darp_tables.c361 unsigned int valid_hooks, void *entry0)
373 if (!(valid_hooks & (1 << hook)))
558 unsigned int valid_hooks)
577 if (!(valid_hooks & (1 << h)))
640 repl->valid_hooks);
661 if (!(repl->valid_hooks & (1 << i)))
675 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0)) {
929 info.valid_hooks = t->valid_hooks;
995 unsigned int valid_hooks,
360 mark_source_chains(const struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) argument
552 check_entry_size_and_hooks(struct arpt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument
994 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument
1320 translate_compat_table(const char *name, unsigned int valid_hooks, struct xt_table_info **pinfo, void **pentry0, unsigned int total_size, unsigned int number, unsigned int *hook_entries, unsigned int *underflows) argument
1477 u32 valid_hooks; member in struct:compat_arpt_replace
[all...]
H A Dip_tables.c334 IP_NF_ASSERT(table->valid_hooks & (1 << hook));
459 unsigned int valid_hooks, void *entry0)
469 if (!(valid_hooks & (1 << hook)))
742 unsigned int valid_hooks)
761 if (!(valid_hooks & (1 << h)))
830 repl->valid_hooks);
848 if (!(repl->valid_hooks & (1 << i)))
862 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0))
1138 info.valid_hooks = t->valid_hooks;
458 mark_source_chains(const struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) argument
736 check_entry_size_and_hooks(struct ipt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument
1204 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument
1415 u32 valid_hooks; member in struct:compat_ipt_replace
1662 translate_compat_table(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info **pinfo, void **pentry0, unsigned int total_size, unsigned int number, unsigned int *hook_entries, unsigned int *underflows) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv6/netfilter/
H A Dip6table_filter.c27 .valid_hooks = FILTER_VALID_HOOKS,
H A Dip6table_raw.c14 .valid_hooks = RAW_VALID_HOOKS,
H A Dip6table_security.c32 .valid_hooks = SECURITY_VALID_HOOKS,
H A Dip6table_mangle.c27 .valid_hooks = MANGLE_VALID_HOOKS,

Completed in 142 milliseconds

12