Searched refs:src_ip4 (Results 1 – 7 of 7) sorted by relevance
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | sock_fields.c | 61 char src_ip4[24], dst_ip4[24]; in print_sk() local 64 inet_ntop(AF_INET, &sk->src_ip4, src_ip4, sizeof(src_ip4)); in print_sk() 75 sk->src_ip4, src_ip4, in print_sk()
|
/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_sock_fields.c | 73 dst->src_ip4 = src->src_ip4; in skcpy()
|
H A D | connect4_prog.c | 183 if (sk->src_ip4 != tuple.ipv4.daddr || in connect_v4_prog()
|
H A D | verifier_sock.c | 1028 : __imm_const(bpf_sock_src_ip4, offsetof(struct bpf_sock, src_ip4)) in post_bind6_read_src_ip4()
|
/linux/include/uapi/linux/ |
H A D | bpf.h | 6351 __u32 src_ip4; member
|
/linux/tools/include/uapi/linux/ |
H A D | bpf.h | 6351 __u32 src_ip4; member
|
/linux/net/core/ |
H A D | filter.c | 8778 case bpf_ctx_range(struct bpf_sock, src_ip4): in __sock_filter_check_attach_type() 8837 case bpf_ctx_range(struct bpf_sock, src_ip4): in bpf_sock_is_valid_access() 9992 case offsetof(struct bpf_sock, src_ip4): in bpf_sock_convert_ctx_access()
|