Searched refs:src_ip4 (Results 1 – 8 of 8) sorted by relevance
/linux/tools/testing/selftests/bpf/prog_tests/ ! |
H A D | sock_fields.c | 61 char src_ip4[24], dst_ip4[24]; in print_sk() local 64 inet_ntop(AF_INET, &sk->src_ip4, src_ip4, sizeof(src_ip4)); in print_sk() 75 sk->src_ip4, src_ip4, in print_sk()
|
H A D | sock_post_bind.c | 136 offsetof(struct bpf_sock, src_ip4)), 166 offsetof(struct bpf_sock, src_ip4)), 197 offsetof(struct bpf_sock, src_ip4)),
|
/linux/tools/testing/selftests/bpf/progs/ ! |
H A D | test_sock_fields.c | 73 dst->src_ip4 = src->src_ip4; in skcpy()
|
H A D | connect4_prog.c | 183 if (sk->src_ip4 != tuple.ipv4.daddr || in connect_v4_prog()
|
H A D | verifier_sock.c | 1028 : __imm_const(bpf_sock_src_ip4, offsetof(struct bpf_sock, src_ip4)) in post_bind6_read_src_ip4()
|
/linux/tools/include/uapi/linux/ ! |
H A D | bpf.h | 6400 __u32 src_ip4; member
|
/linux/include/uapi/linux/ ! |
H A D | bpf.h | 6400 __u32 src_ip4; member
|
/linux/net/core/ ! |
H A D | filter.c | 8854 case bpf_ctx_range(struct bpf_sock, src_ip4): in __sock_filter_check_attach_type() 8913 case bpf_ctx_range(struct bpf_sock, src_ip4): in bpf_sock_is_valid_access() 10071 case offsetof(struct bpf_sock, src_ip4): in bpf_sock_convert_ctx_access()
|