Searched refs:l4_nhoff (Results 1 - 3 of 3) sorted by relevance
/foundation/communication/netmanager_base/services/netmanagernative/bpf/include/netfirewall/ |
H A D | netfirewall_utils.h | 106 * @param l4_nhoff layer 4 network header offset
110 static __always_inline int load_tcp_flags(struct __sk_buff *skb, __u32 l4_nhoff, union tcp_flags *flags)
in load_tcp_flags() argument 112 return bpf_skb_load_bytes(skb, l4_nhoff + TCP_FLAGS_OFFSET, flags, TCP_FLAGS_SIZE);
in load_tcp_flags() 195 * @param l4_nhoff layer 4 network header offset
201 static __always_inline bool load_icmp_info(const struct __sk_buff *skb, __u32 l4_nhoff, __u8 protocol, __u8 *type,
in load_icmp_info() argument 208 bpf_skb_load_bytes(skb, l4_nhoff, &icmph, sizeof(struct icmphdr));
in load_icmp_info() 215 bpf_skb_load_bytes(skb, l4_nhoff, &icmph, sizeof(struct icmp6hdr));
in load_icmp_info() 232 * @param l4_nhoff layer 4 network header offset
238 static __always_inline bool load_l4_ports(const struct __sk_buff *skb, __u32 l4_nhoff, __u8 protocol, __be16 *sport,
in load_l4_ports() argument 245 bpf_skb_load_bytes(skb, l4_nhoff, in load_l4_ports() 271 load_l4_header_flags(const struct __sk_buff *skb, __u32 l4_nhoff, __u16 *rst) load_l4_header_flags() argument [all...] |
H A D | netfirewall_ct.h | 166 __u32 l4_nhoff = get_l4_nhoff(skb);
in ct_lookup_entry() local 167 if (load_tcp_flags(skb, l4_nhoff, &seen_flags) < 0) {
in ct_lookup_entry()
|
H A D | netfirewall_match.h | 93 __u32 l4_nhoff = get_l4_nhoff(skb);
in get_match_tuple() local 111 load_l4_ports(skb, l4_nhoff, protocol, &(tuple->sport), &(tuple->dport));
in get_match_tuple() 113 load_l4_header_flags(skb, l4_nhoff, &(tuple->rst));
in get_match_tuple()
|
Completed in 2 milliseconds