Searched refs:tuplen (Results 1 – 2 of 2) sorted by relevance
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_cls_redirect_dynptr.c | 539 uint64_t tuplen, void *iph, struct tcphdr *tcp) in classify_tcp() argument 542 bpf_skc_lookup_tcp(skb, tuple, tuplen, BPF_F_CURRENT_NETNS, 0); in classify_tcp() 556 if (tuplen == sizeof(tuple->ipv6)) in classify_tcp() 570 static verdict_t classify_udp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, uint64_t tuplen) in classify_udp() argument 573 bpf_sk_lookup_udp(skb, tuple, tuplen, BPF_F_CURRENT_NETNS, 0); in classify_udp() 588 uint64_t tuplen, metrics_t *metrics) in classify_icmp() argument 592 return classify_tcp(skb, tuple, tuplen, NULL, NULL); in classify_icmp() 595 return classify_udp(skb, tuple, tuplen); in classify_icmp() 709 uint64_t tuplen; in process_tcp() local 723 tuplen = fill_tuple(&tuple, info->hdr, info->len, tcp.source, tcp.dest); in process_tcp() [all …]
|
H A D | test_cls_redirect.c | 648 struct bpf_sock_tuple *tuple, uint64_t tuplen, in classify_tcp() argument 652 bpf_skc_lookup_tcp(skb, tuple, tuplen, BPF_F_CURRENT_NETNS, 0); in classify_tcp() 665 if (tuplen == sizeof(tuple->ipv6)) { in classify_tcp() 681 struct bpf_sock_tuple *tuple, uint64_t tuplen) in classify_udp() argument 684 bpf_sk_lookup_udp(skb, tuple, tuplen, BPF_F_CURRENT_NETNS, 0); in classify_udp() 699 struct bpf_sock_tuple *tuple, uint64_t tuplen, in classify_icmp() argument 704 return classify_tcp(skb, tuple, tuplen, NULL, NULL); in classify_icmp() 707 return classify_udp(skb, tuple, tuplen); in classify_icmp() 831 uint64_t tuplen = in process_tcp() local 833 return classify_tcp(pkt->skb, &tuple, tuplen, iph, tcp); in process_tcp() [all …]
|