/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | test_sk_lookup_kern.c | 21 static struct bpf_sock_tuple *get_tuple(void *data, __u64 nh_off, 25 struct bpf_sock_tuple *result; 37 result = (struct bpf_sock_tuple *)&iph->saddr; 46 result = (struct bpf_sock_tuple *)&ip6h->saddr; 61 struct bpf_sock_tuple *tuple; 84 struct bpf_sock_tuple tuple = {}; 96 struct bpf_sock_tuple tuple = {}; 111 struct bpf_sock_tuple tuple = {}; 125 struct bpf_sock_tuple tuple = {}; 138 struct bpf_sock_tuple tupl [all...] |
H A D | verifier_ref_tracking.c | 10 /* struct bpf_sock_tuple tuple = {} */ \ 121 __imm_const(sizeof_bpf_sock_tuple, sizeof(struct bpf_sock_tuple)) 136 __imm_const(sizeof_bpf_sock_tuple, sizeof(struct bpf_sock_tuple)) 154 __imm_const(sizeof_bpf_sock_tuple, sizeof(struct bpf_sock_tuple)) 174 __imm_const(sizeof_bpf_sock_tuple, sizeof(struct bpf_sock_tuple)) 189 __imm_const(sizeof_bpf_sock_tuple, sizeof(struct bpf_sock_tuple)) 204 __imm_const(sizeof_bpf_sock_tuple, sizeof(struct bpf_sock_tuple)) 221 __imm_const(sizeof_bpf_sock_tuple, sizeof(struct bpf_sock_tuple)) 360 __imm_const(sizeof_bpf_sock_tuple, sizeof(struct bpf_sock_tuple)) 379 __imm_const(sizeof_bpf_sock_tuple, sizeof(struct bpf_sock_tuple)) [all...] |
H A D | test_bpf_nf_fail.c | 16 struct nf_conn *bpf_skb_ct_alloc(struct __sk_buff *, struct bpf_sock_tuple *, u32, 18 struct nf_conn *bpf_skb_ct_lookup(struct __sk_buff *, struct bpf_sock_tuple *, u32, 31 struct bpf_sock_tuple tup = {}; 45 struct bpf_sock_tuple tup = {}; 62 struct bpf_sock_tuple tup = {}; 76 struct bpf_sock_tuple tup = {}; 90 struct bpf_sock_tuple tup = {}; 107 struct bpf_sock_tuple tup = {}; 124 struct bpf_sock_tuple tup = {}; 138 struct bpf_sock_tuple tu [all...] |
H A D | test_sk_assign.c | 54 static inline struct bpf_sock_tuple * 59 struct bpf_sock_tuple *result; 79 result = (struct bpf_sock_tuple *)&iph->saddr; 88 result = (struct bpf_sock_tuple *)&ip6h->saddr; 90 return (struct bpf_sock_tuple *)data; 102 handle_udp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) 133 handle_tcp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) 174 struct bpf_sock_tuple *tuple;
|
H A D | vrf_socket_lookup.c | 21 struct bpf_sock_tuple *tp; 36 tp = (struct bpf_sock_tuple *)&iph->saddr;
|
H A D | test_bpf_nf.c | 51 struct nf_conn *bpf_xdp_ct_alloc(struct xdp_md *, struct bpf_sock_tuple *, u32, 53 struct nf_conn *bpf_xdp_ct_lookup(struct xdp_md *, struct bpf_sock_tuple *, u32, 55 struct nf_conn *bpf_skb_ct_alloc(struct __sk_buff *, struct bpf_sock_tuple *, u32, 57 struct nf_conn *bpf_skb_ct_lookup(struct __sk_buff *, struct bpf_sock_tuple *, u32, 69 nf_ct_test(struct nf_conn *(*lookup_fn)(void *, struct bpf_sock_tuple *, u32, 71 struct nf_conn *(*alloc_fn)(void *, struct bpf_sock_tuple *, u32, 76 struct bpf_sock_tuple bpf_tuple;
|
H A D | cgroup_skb_sk_lookup_kern.c | 29 static inline void set_tuple(struct bpf_sock_tuple *tuple, 44 struct bpf_sock_tuple tuple;
|
H A D | verifier_unpriv.c | 10 /* struct bpf_sock_tuple tuple = {} */ \ 434 __imm_const(sizeof_bpf_sock_tuple, sizeof(struct bpf_sock_tuple)) 470 __imm_const(sizeof_bpf_sock_tuple, sizeof(struct bpf_sock_tuple)) 507 __imm_const(sizeof_bpf_sock_tuple, sizeof(struct bpf_sock_tuple)) 547 __imm_const(sizeof_bpf_sock_tuple, sizeof(struct bpf_sock_tuple))
|
H A D | test_btf_skc_cls_ingress.c | 71 struct bpf_sock_tuple *tuple; 88 tuple = (struct bpf_sock_tuple *)&ip6h->saddr;
|
H A D | test_cls_redirect.c | 94 offsetofend(struct bpf_sock_tuple, ipv4.dport) - 95 offsetof(struct bpf_sock_tuple, ipv4.sport) - 1, 96 "flow_ports_t must match sport and dport in struct bpf_sock_tuple"); 99 offsetofend(struct bpf_sock_tuple, ipv6.dport) - 100 offsetof(struct bpf_sock_tuple, ipv6.sport) - 1, 101 "flow_ports_t must match sport and dport in struct bpf_sock_tuple"); 611 /* Fill a bpf_sock_tuple to be used with the socket lookup functions. 621 static INLINING uint64_t fill_tuple(struct bpf_sock_tuple *tuple, void *iph, 651 struct bpf_sock_tuple *tuple, uint64_t tuplen, 684 struct bpf_sock_tuple *tupl [all...] |
H A D | test_cls_redirect_dynptr.c | 88 offsetofend(struct bpf_sock_tuple, ipv4.dport) - 89 offsetof(struct bpf_sock_tuple, ipv4.sport) - 1, 90 "flow_ports_t must match sport and dport in struct bpf_sock_tuple"); 93 offsetofend(struct bpf_sock_tuple, ipv6.dport) - 94 offsetof(struct bpf_sock_tuple, ipv6.sport) - 1, 95 "flow_ports_t must match sport and dport in struct bpf_sock_tuple"); 501 /* Fill a bpf_sock_tuple to be used with the socket lookup functions. 511 static uint64_t fill_tuple(struct bpf_sock_tuple *tuple, void *iph, 540 static verdict_t classify_tcp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, 572 static verdict_t classify_udp(struct __sk_buff *skb, struct bpf_sock_tuple *tupl [all...] |
H A D | connect6_prog.c | 30 struct bpf_sock_tuple tuple = {};
|
H A D | test_tcp_check_syncookie_kern.c | 48 struct bpf_sock_tuple tup;
|
H A D | connect4_prog.c | 149 struct bpf_sock_tuple tuple = {};
|
H A D | xdp_synproxy_kern.c | 99 struct bpf_sock_tuple *bpf_tuple, 105 struct bpf_sock_tuple *bpf_tuple, 436 struct bpf_sock_tuple tup = {};
|
H A D | test_tcp_custom_syncookie.c | 513 struct bpf_sock_tuple tuple;
|
/linux-master/net/netfilter/ |
H A D | nf_conntrack_bpf.c | 61 static int bpf_nf_ct_tuple_parse(struct bpf_sock_tuple *bpf_tuple, 102 __bpf_nf_ct_alloc_entry(struct net *net, struct bpf_sock_tuple *bpf_tuple, 149 struct bpf_sock_tuple *bpf_tuple, 251 bpf_xdp_ct_alloc(struct xdp_md *xdp_ctx, struct bpf_sock_tuple *bpf_tuple, 285 bpf_xdp_ct_lookup(struct xdp_md *xdp_ctx, struct bpf_sock_tuple *bpf_tuple, 318 bpf_skb_ct_alloc(struct __sk_buff *skb_ctx, struct bpf_sock_tuple *bpf_tuple, 353 bpf_skb_ct_lookup(struct __sk_buff *skb_ctx, struct bpf_sock_tuple *bpf_tuple,
|
/linux-master/net/core/ |
H A D | filter.c | 6603 static struct sock *sk_lookup(struct net *net, struct bpf_sock_tuple *tuple, 6653 __bpf_skc_lookup(struct sk_buff *skb, struct bpf_sock_tuple *tuple, u32 len, 6694 __bpf_sk_lookup(struct sk_buff *skb, struct bpf_sock_tuple *tuple, u32 len, 6725 bpf_skc_lookup(struct sk_buff *skb, struct bpf_sock_tuple *tuple, u32 len, 6744 bpf_sk_lookup(struct sk_buff *skb, struct bpf_sock_tuple *tuple, u32 len, 6773 struct bpf_sock_tuple *, tuple, u32, len, u64, netns_id, u64, flags) 6792 struct bpf_sock_tuple *, tuple, u32, len, u64, netns_id, u64, flags) 6811 struct bpf_sock_tuple *, tuple, u32, len, u64, netns_id, u64, flags) 6830 struct bpf_sock_tuple *, tuple, u32, len, u64, netns_id, u64, flags) 6854 struct bpf_sock_tuple *, tupl [all...] |
/linux-master/include/uapi/linux/ |
H A D | bpf.h | 3665 * struct bpf_sock *bpf_sk_lookup_tcp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags) 3702 * struct bpf_sock *bpf_sk_lookup_udp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags) 3900 * struct bpf_sock *bpf_skc_lookup_tcp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags) 6382 struct bpf_sock_tuple { struct
|
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 3665 * struct bpf_sock *bpf_sk_lookup_tcp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags) 3702 * struct bpf_sock *bpf_sk_lookup_udp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags) 3900 * struct bpf_sock *bpf_skc_lookup_tcp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags) 6382 struct bpf_sock_tuple { struct
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_verifier.c | 467 /* struct bpf_sock_tuple tuple = {} */ \ 478 BPF_MOV64_IMM(BPF_REG_3, sizeof(struct bpf_sock_tuple)), \
|