Home
last modified time | relevance | path

Searched refs:tuplen (Results 1 – 2 of 2) sorted by relevance

/openbmc/linux/tools/testing/selftests/bpf/progs/
H A Dtest_cls_redirect_dynptr.c539 uint64_t tuplen, void *iph, struct tcphdr *tcp) in classify_tcp() argument
542 bpf_skc_lookup_tcp(skb, tuple, tuplen, BPF_F_CURRENT_NETNS, 0); in classify_tcp()
556 if (tuplen == sizeof(tuple->ipv6)) in classify_tcp()
570 static verdict_t classify_udp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, uint64_t tuplen) in classify_udp() argument
573 bpf_sk_lookup_udp(skb, tuple, tuplen, BPF_F_CURRENT_NETNS, 0); in classify_udp()
588 uint64_t tuplen, metrics_t *metrics) in classify_icmp() argument
592 return classify_tcp(skb, tuple, tuplen, NULL, NULL); in classify_icmp()
595 return classify_udp(skb, tuple, tuplen); in classify_icmp()
709 uint64_t tuplen; in process_tcp() local
723 tuplen = fill_tuple(&tuple, info->hdr, info->len, tcp.source, tcp.dest); in process_tcp()
[all …]
H A Dtest_cls_redirect.c648 struct bpf_sock_tuple *tuple, uint64_t tuplen, in classify_tcp() argument
652 bpf_skc_lookup_tcp(skb, tuple, tuplen, BPF_F_CURRENT_NETNS, 0); in classify_tcp()
665 if (tuplen == sizeof(tuple->ipv6)) { in classify_tcp()
681 struct bpf_sock_tuple *tuple, uint64_t tuplen) in classify_udp() argument
684 bpf_sk_lookup_udp(skb, tuple, tuplen, BPF_F_CURRENT_NETNS, 0); in classify_udp()
699 struct bpf_sock_tuple *tuple, uint64_t tuplen, in classify_icmp() argument
704 return classify_tcp(skb, tuple, tuplen, NULL, NULL); in classify_icmp()
707 return classify_udp(skb, tuple, tuplen); in classify_icmp()
831 uint64_t tuplen = in process_tcp() local
833 return classify_tcp(pkt->skb, &tuple, tuplen, iph, tcp); in process_tcp()
[all …]