Home
last modified time | relevance | path

Searched refs:hook_state (Results 1 – 3 of 3) sorted by relevance

/Linux-v6.6/net/netfilter/
Dnf_conntrack_proto_tcp.c511 const struct nf_hook_state *hook_state) in tcp_in_window() argument
641 return nf_tcp_log_invalid(skb, ct, hook_state, sender, NFCT_TCP_IGNORE, in tcp_in_window()
645 return nf_tcp_log_invalid(skb, ct, hook_state, sender, NFCT_TCP_INVALID, in tcp_in_window()
651 return nf_tcp_log_invalid(skb, ct, hook_state, sender, NFCT_TCP_INVALID, in tcp_in_window()
659 return nf_tcp_log_invalid(skb, ct, hook_state, sender, NFCT_TCP_IGNORE, in tcp_in_window()
663 return nf_tcp_log_invalid(skb, ct, hook_state, sender, NFCT_TCP_IGNORE, in tcp_in_window()
724 const struct nf_hook_state *hook_state) in nf_tcp_handle_invalid() argument
765 nf_ct_l4proto_log_invalid(skb, ct, hook_state, in nf_tcp_handle_invalid()
Dnf_conntrack_proto_dccp.c388 const struct nf_hook_state *hook_state) in dccp_new() argument
420 nf_ct_l4proto_log_invalid(skb, ct, hook_state, "%s", msg); in dccp_new()
/Linux-v6.6/net/bpf/
Dtest_run.c1573 struct nf_hook_state *user_ctx, hook_state = { in bpf_prog_test_run_nf() local
1580 .state = &hook_state, in bpf_prog_test_run_nf()
1609 ret = verify_and_copy_hook_state(&hook_state, user_ctx, dev); in bpf_prog_test_run_nf()
1627 if (hook_state.hook != NF_INET_LOCAL_OUT) { in bpf_prog_test_run_nf()
1634 if (hook_state.pf == NFPROTO_IPV4) in bpf_prog_test_run_nf()
1640 if (hook_state.pf == NFPROTO_IPV6) in bpf_prog_test_run_nf()
1650 skb->protocol = nfproto_eth(hook_state.pf); in bpf_prog_test_run_nf()