/linux-master/tools/testing/selftests/bpf/verifier/ |
H A D | ctx_sk_lookup.c | 40 /* 1-byte read from remote_ip4 field */ 42 offsetof(struct bpf_sk_lookup, remote_ip4)), 44 offsetof(struct bpf_sk_lookup, remote_ip4) + 1), 46 offsetof(struct bpf_sk_lookup, remote_ip4) + 2), 48 offsetof(struct bpf_sk_lookup, remote_ip4) + 3), 49 /* 2-byte read from remote_ip4 field */ 51 offsetof(struct bpf_sk_lookup, remote_ip4)), 53 offsetof(struct bpf_sk_lookup, remote_ip4) + 2), 54 /* 4-byte read from remote_ip4 field */ 56 offsetof(struct bpf_sk_lookup, remote_ip4)), [all...] |
H A D | ctx_skb.c | 118 "invalid access __sk_buff remote_ip4", 121 offsetof(struct __sk_buff, remote_ip4)), 188 "valid access __sk_buff remote_ip4", 191 offsetof(struct __sk_buff, remote_ip4)),
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | test_sk_lookup.c | 441 /* Expect SRC_IP4 in remote_ip4 */ 442 if (LSB(ctx->remote_ip4, 0) != ((SRC_IP4 >> 0) & 0xff) || 443 LSB(ctx->remote_ip4, 1) != ((SRC_IP4 >> 8) & 0xff) || 444 LSB(ctx->remote_ip4, 2) != ((SRC_IP4 >> 16) & 0xff) || 445 LSB(ctx->remote_ip4, 3) != ((SRC_IP4 >> 24) & 0xff)) 447 if (LSW(ctx->remote_ip4, 0) != ((SRC_IP4 >> 0) & 0xffff) || 448 LSW(ctx->remote_ip4, 1) != ((SRC_IP4 >> 16) & 0xffff)) 462 if (LSB(ctx->remote_ip4, 0) != 0 || LSB(ctx->remote_ip4, 1) != 0 || 463 LSB(ctx->remote_ip4, [all...] |
H A D | verifier_ctx_sk_msg.c | 22 __description("valid access remote_ip4 in SK_MSG") 30 : __imm_const(sk_msg_md_remote_ip4, offsetof(struct sk_msg_md, remote_ip4))
|
H A D | verifier_cgroup_skb.c | 126 __imm_const(__sk_buff_remote_ip4, offsetof(struct __sk_buff, remote_ip4)),
|
/linux-master/include/uapi/linux/ |
H A D | bpf.h | 6236 __u32 remote_ip4; /* Stored in network byte order */ member in struct:__sk_buff 6484 __u32 remote_ip4; /* Stored in network byte order */ member in struct:sk_msg_md 6765 __u32 remote_ip4; /* Stored in network byte order */ member in struct:bpf_sock_ops 7344 __u32 remote_ip4; /* Network byte order */ member in struct:bpf_sk_lookup
|
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 6236 __u32 remote_ip4; /* Stored in network byte order */ member in struct:__sk_buff 6484 __u32 remote_ip4; /* Stored in network byte order */ member in struct:sk_msg_md 6765 __u32 remote_ip4; /* Stored in network byte order */ member in struct:bpf_sock_ops 7344 __u32 remote_ip4; /* Network byte order */ member in struct:bpf_sk_lookup
|
/linux-master/net/core/ |
H A D | filter.c | 8531 case bpf_ctx_range_till(struct __sk_buff, remote_ip4, remote_ip4): 9273 case bpf_ctx_range(struct sk_msg_md, remote_ip4): 9682 case offsetof(struct __sk_buff, remote_ip4): 10427 case offsetof(struct bpf_sock_ops, remote_ip4): 10817 case offsetof(struct sk_msg_md, remote_ip4): 11476 case bpf_ctx_range(struct bpf_sk_lookup, remote_ip4): 11529 case offsetof(struct bpf_sk_lookup, remote_ip4):
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | sk_lookup.c | 271 remote = &ctx->remote_ip4;
|
/linux-master/net/bpf/ |
H A D | test_run.c | 1428 ctx.v4.saddr = (__force __be32)user_ctx->remote_ip4;
|