Searched refs:user_ip4 (Results 1 – 7 of 7) sorted by relevance
/Linux-v5.10/tools/testing/selftests/bpf/progs/ |
D | connect_force_port4.c | 49 orig->addr = ctx->user_ip4; in connect4() 52 ctx->user_ip4 = bpf_htonl(0x7f000001); in connect4() 63 ctx->user_ip4 = bpf_htonl(0x01020304); in getsockname4() 78 ctx->user_ip4 = orig->addr; in getpeername4()
|
D | sendmsg4_prog.c | 37 if ((ctx->user_ip4 >> 24) == (bpf_htonl(DST_IP4) >> 24) && in sendmsg_v4_prog() 39 ctx->user_ip4 = bpf_htonl(DST_REWRITE_IP4); in sendmsg_v4_prog()
|
D | connect4_prog.c | 195 ctx->user_ip4 = bpf_htonl(DST_REWRITE_IP4); in connect_v4_prog()
|
/Linux-v5.10/tools/testing/selftests/bpf/ |
D | test_sock_addr.c | 712 offsetof(struct bpf_sock_addr, user_ip4)), in bind4_prog_load() 717 offsetof(struct bpf_sock_addr, user_ip4) + 1), in bind4_prog_load() 722 offsetof(struct bpf_sock_addr, user_ip4) + 2), in bind4_prog_load() 727 offsetof(struct bpf_sock_addr, user_ip4) + 3), in bind4_prog_load() 732 offsetof(struct bpf_sock_addr, user_ip4)), in bind4_prog_load() 737 offsetof(struct bpf_sock_addr, user_ip4) + 2), in bind4_prog_load() 742 offsetof(struct bpf_sock_addr, user_ip4)), in bind4_prog_load() 765 offsetof(struct bpf_sock_addr, user_ip4)), in bind4_prog_load() 945 offsetof(struct bpf_sock_addr, user_ip4)), in sendmsg4_rw_asm_prog_load() 986 offsetof(struct bpf_sock_addr, user_ip4)), in recvmsg4_rw_asm_prog_load()
|
/Linux-v5.10/tools/include/uapi/linux/ |
D | bpf.h | 4464 __u32 user_ip4; /* Allows 1,2,4-byte read and 4-byte write. member
|
/Linux-v5.10/include/uapi/linux/ |
D | bpf.h | 4464 __u32 user_ip4; /* Allows 1,2,4-byte read and 4-byte write. member
|
/Linux-v5.10/net/core/ |
D | filter.c | 7944 case bpf_ctx_range(struct bpf_sock_addr, user_ip4): in sock_addr_is_valid_access() 7990 case bpf_ctx_range(struct bpf_sock_addr, user_ip4): in sock_addr_is_valid_access() 8976 case offsetof(struct bpf_sock_addr, user_ip4): in sock_addr_convert_ctx_access()
|