Searched refs:hook_state (Results 1 – 2 of 2) sorted by relevance
| /linux/net/netfilter/ |
| H A D | nf_conntrack_proto_tcp.c | 513 const struct nf_hook_state *hook_state) in tcp_in_window() argument 643 return nf_tcp_log_invalid(skb, ct, hook_state, sender, NFCT_TCP_IGNORE, in tcp_in_window() 647 return nf_tcp_log_invalid(skb, ct, hook_state, sender, NFCT_TCP_INVALID, in tcp_in_window() 653 return nf_tcp_log_invalid(skb, ct, hook_state, sender, NFCT_TCP_INVALID, in tcp_in_window() 661 return nf_tcp_log_invalid(skb, ct, hook_state, sender, NFCT_TCP_IGNORE, in tcp_in_window() 665 return nf_tcp_log_invalid(skb, ct, hook_state, sender, NFCT_TCP_IGNORE, in tcp_in_window() 726 const struct nf_hook_state *hook_state) in nf_tcp_handle_invalid() argument 767 nf_ct_l4proto_log_invalid(skb, ct, hook_state, in nf_tcp_handle_invalid()
|
| /linux/net/bpf/ |
| H A D | test_run.c | 1706 struct nf_hook_state *user_ctx, hook_state = { in bpf_prog_test_run_nf() local 1713 .state = &hook_state, in bpf_prog_test_run_nf() 1742 ret = verify_and_copy_hook_state(&hook_state, user_ctx, dev); in bpf_prog_test_run_nf() 1760 if (hook_state.hook != NF_INET_LOCAL_OUT) { in bpf_prog_test_run_nf() 1767 if (hook_state.pf == NFPROTO_IPV4) in bpf_prog_test_run_nf() 1773 if (hook_state.pf == NFPROTO_IPV6) in bpf_prog_test_run_nf() 1783 skb->protocol = nfproto_eth(hook_state.pf); in bpf_prog_test_run_nf()
|