Home
last modified time | relevance | path

Searched refs:l4_nhoff (Results 1 - 3 of 3) sorted by relevance

/foundation/communication/netmanager_base/services/netmanagernative/bpf/include/netfirewall/
H A Dnetfirewall_utils.h106 * @param l4_nhoff layer 4 network header offset
110 static __always_inline int load_tcp_flags(struct __sk_buff *skb, __u32 l4_nhoff, union tcp_flags *flags) in load_tcp_flags() argument
112 return bpf_skb_load_bytes(skb, l4_nhoff + TCP_FLAGS_OFFSET, flags, TCP_FLAGS_SIZE); in load_tcp_flags()
195 * @param l4_nhoff layer 4 network header offset
201 static __always_inline bool load_icmp_info(const struct __sk_buff *skb, __u32 l4_nhoff, __u8 protocol, __u8 *type, in load_icmp_info() argument
208 bpf_skb_load_bytes(skb, l4_nhoff, &icmph, sizeof(struct icmphdr)); in load_icmp_info()
215 bpf_skb_load_bytes(skb, l4_nhoff, &icmph, sizeof(struct icmp6hdr)); in load_icmp_info()
232 * @param l4_nhoff layer 4 network header offset
238 static __always_inline bool load_l4_ports(const struct __sk_buff *skb, __u32 l4_nhoff, __u8 protocol, __be16 *sport, in load_l4_ports() argument
245 bpf_skb_load_bytes(skb, l4_nhoff, in load_l4_ports()
271 load_l4_header_flags(const struct __sk_buff *skb, __u32 l4_nhoff, __u16 *rst) load_l4_header_flags() argument
[all...]
H A Dnetfirewall_ct.h166 __u32 l4_nhoff = get_l4_nhoff(skb); in ct_lookup_entry() local
167 if (load_tcp_flags(skb, l4_nhoff, &seen_flags) < 0) { in ct_lookup_entry()
H A Dnetfirewall_match.h93 __u32 l4_nhoff = get_l4_nhoff(skb); in get_match_tuple() local
111 load_l4_ports(skb, l4_nhoff, protocol, &(tuple->sport), &(tuple->dport)); in get_match_tuple()
113 load_l4_header_flags(skb, l4_nhoff, &(tuple->rst)); in get_match_tuple()

Completed in 2 milliseconds