Lines Matching refs:cookie
13 * cookie: 877, uid: 0x3e8, Pakcet Count: 20, Bytes Count: 11058
14 * cookie: 132, uid: 0x0, Pakcet Count: 2, Bytes Count: 286
15 * cookie: 812, uid: 0x3e8, Pakcet Count: 3, Bytes Count: 1726
16 * cookie: 802, uid: 0x3e8, Pakcet Count: 2, Bytes Count: 104
17 * cookie: 877, uid: 0x3e8, Pakcet Count: 20, Bytes Count: 11058
18 * cookie: 831, uid: 0x3e8, Pakcet Count: 2, Bytes Count: 104
19 * cookie: 0, uid: 0x0, Pakcet Count: 6, Bytes Count: 712
20 * cookie: 880, uid: 0xfffe, Pakcet Count: 1, Bytes Count: 70
24 * directly from the ebpf map based on the socket cookie.
105 * pc9. if r0 != 0x0, go to pc+14, since we have the cookie
210 printf("cookie: %u, uid: 0x%x, Packet Count: %lu,"
225 uint64_t cookie;
227 socklen_t cookie_len = sizeof(cookie);
242 res = getsockopt(s_send, SOL_SOCKET, SO_COOKIE, &cookie, &cookie_len);
244 printf("get cookie failed: %s\n", strerror(errno));
245 res = bpf_map_lookup_elem(map_fd, &cookie, &dataEntry);
264 res = bpf_map_lookup_elem(map_fd, &cookie, &dataEntry);
266 error(1, errno, "lookup sk stat failed, cookie: %lu\n",
267 cookie);
268 printf("cookie: %lu, uid: 0x%x, Packet Count: %lu,"
269 " Bytes Count: %lu\n\n", cookie, dataEntry.uid,
281 " -s getsockopt cookie test\n");