Home
last modified time | relevance | path

Searched refs:bpf_sock_tuple (Results 1 – 13 of 13) sorted by relevance

/Linux-v5.10/tools/testing/selftests/bpf/progs/
Dtest_sk_lookup_kern.c22 static struct bpf_sock_tuple *get_tuple(void *data, __u64 nh_off, in get_tuple()
26 struct bpf_sock_tuple *result; in get_tuple()
38 result = (struct bpf_sock_tuple *)&iph->saddr; in get_tuple()
47 result = (struct bpf_sock_tuple *)&ip6h->saddr; in get_tuple()
62 struct bpf_sock_tuple *tuple; in bpf_sk_lookup_test0()
85 struct bpf_sock_tuple tuple = {}; in bpf_sk_lookup_test1()
97 struct bpf_sock_tuple tuple = {}; in bpf_sk_lookup_uaf()
112 struct bpf_sock_tuple tuple = {}; in bpf_sk_lookup_modptr()
127 struct bpf_sock_tuple tuple = {}; in bpf_sk_lookup_modptr_or_null()
141 struct bpf_sock_tuple tuple = {}; in bpf_sk_lookup_test2()
[all …]
Dtest_sk_assign.c43 static inline struct bpf_sock_tuple *
48 struct bpf_sock_tuple *result; in get_tuple()
69 result = (struct bpf_sock_tuple *)&iph->saddr; in get_tuple()
78 result = (struct bpf_sock_tuple *)&ip6h->saddr; in get_tuple()
80 return (struct bpf_sock_tuple *)data; in get_tuple()
91 handle_udp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) in handle_udp()
93 struct bpf_sock_tuple ln = {0}; in handle_udp()
123 handle_tcp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) in handle_tcp()
125 struct bpf_sock_tuple ln = {0}; in handle_tcp()
165 struct bpf_sock_tuple *tuple, ln = {0}; in bpf_sk_assign_test()
Dtest_cls_redirect.c90 offsetofend(struct bpf_sock_tuple, ipv4.dport) -
91 offsetof(struct bpf_sock_tuple, ipv4.sport) - 1,
95 offsetofend(struct bpf_sock_tuple, ipv6.dport) -
96 offsetof(struct bpf_sock_tuple, ipv6.sport) - 1,
611 static INLINING uint64_t fill_tuple(struct bpf_sock_tuple *tuple, void *iph, in fill_tuple()
641 struct bpf_sock_tuple *tuple, uint64_t tuplen, in classify_tcp()
674 struct bpf_sock_tuple *tuple, uint64_t tuplen) in classify_udp()
692 struct bpf_sock_tuple *tuple, uint64_t tuplen, in classify_icmp()
742 struct bpf_sock_tuple tuple; in process_icmpv4()
794 struct bpf_sock_tuple tuple; in process_icmpv6()
[all …]
Dcgroup_skb_sk_lookup_kern.c30 static inline void set_tuple(struct bpf_sock_tuple *tuple, in set_tuple()
45 struct bpf_sock_tuple tuple; in is_allowed_peer_cg()
Dtest_btf_skc_cls_ingress.c71 struct bpf_sock_tuple *tuple; in handle_ip6_tcp()
88 tuple = (struct bpf_sock_tuple *)&ip6h->saddr; in handle_ip6_tcp()
Dconnect6_prog.c32 struct bpf_sock_tuple tuple = {}; in connect_v6_prog()
Dtest_tcp_check_syncookie_kern.c48 struct bpf_sock_tuple tup; in check_syncookie()
Dconnect4_prog.c150 struct bpf_sock_tuple tuple = {}; in connect_v4_prog()
/Linux-v5.10/net/core/
Dfilter.c5880 static struct sock *sk_lookup(struct net *net, struct bpf_sock_tuple *tuple, in sk_lookup()
5931 __bpf_skc_lookup(struct sk_buff *skb, struct bpf_sock_tuple *tuple, u32 len, in __bpf_skc_lookup()
5972 __bpf_sk_lookup(struct sk_buff *skb, struct bpf_sock_tuple *tuple, u32 len, in __bpf_sk_lookup()
5991 bpf_skc_lookup(struct sk_buff *skb, struct bpf_sock_tuple *tuple, u32 len, in bpf_skc_lookup()
6010 bpf_sk_lookup(struct sk_buff *skb, struct bpf_sock_tuple *tuple, u32 len, in bpf_sk_lookup()
6028 struct bpf_sock_tuple *, tuple, u32, len, u64, netns_id, u64, flags) in BPF_CALL_5() argument
6047 struct bpf_sock_tuple *, tuple, u32, len, u64, netns_id, u64, flags) in BPF_CALL_5() argument
6066 struct bpf_sock_tuple *, tuple, u32, len, u64, netns_id, u64, flags) in BPF_CALL_5() argument
6099 struct bpf_sock_tuple *, tuple, u32, len, u32, netns_id, u64, flags) in BPF_CALL_5() argument
6122 struct bpf_sock_tuple *, tuple, u32, len, u32, netns_id, u64, flags) in BPF_CALL_5() argument
[all …]
/Linux-v5.10/tools/testing/selftests/bpf/verifier/
Dref_tracking.c642 BPF_MOV64_IMM(BPF_REG_3, sizeof(struct bpf_sock_tuple)),
/Linux-v5.10/tools/include/uapi/linux/
Dbpf.h4235 struct bpf_sock_tuple { struct
/Linux-v5.10/include/uapi/linux/
Dbpf.h4235 struct bpf_sock_tuple { struct
/Linux-v5.10/tools/testing/selftests/bpf/
Dtest_verifier.c312 BPF_MOV64_IMM(BPF_REG_3, sizeof(struct bpf_sock_tuple)), \