Home
last modified time | relevance | path

Searched refs:user_ip4 (Results 1 – 7 of 7) sorted by relevance

/Linux-v5.10/tools/testing/selftests/bpf/progs/
Dconnect_force_port4.c49 orig->addr = ctx->user_ip4; in connect4()
52 ctx->user_ip4 = bpf_htonl(0x7f000001); in connect4()
63 ctx->user_ip4 = bpf_htonl(0x01020304); in getsockname4()
78 ctx->user_ip4 = orig->addr; in getpeername4()
Dsendmsg4_prog.c37 if ((ctx->user_ip4 >> 24) == (bpf_htonl(DST_IP4) >> 24) && in sendmsg_v4_prog()
39 ctx->user_ip4 = bpf_htonl(DST_REWRITE_IP4); in sendmsg_v4_prog()
Dconnect4_prog.c195 ctx->user_ip4 = bpf_htonl(DST_REWRITE_IP4); in connect_v4_prog()
/Linux-v5.10/tools/testing/selftests/bpf/
Dtest_sock_addr.c712 offsetof(struct bpf_sock_addr, user_ip4)), in bind4_prog_load()
717 offsetof(struct bpf_sock_addr, user_ip4) + 1), in bind4_prog_load()
722 offsetof(struct bpf_sock_addr, user_ip4) + 2), in bind4_prog_load()
727 offsetof(struct bpf_sock_addr, user_ip4) + 3), in bind4_prog_load()
732 offsetof(struct bpf_sock_addr, user_ip4)), in bind4_prog_load()
737 offsetof(struct bpf_sock_addr, user_ip4) + 2), in bind4_prog_load()
742 offsetof(struct bpf_sock_addr, user_ip4)), in bind4_prog_load()
765 offsetof(struct bpf_sock_addr, user_ip4)), in bind4_prog_load()
945 offsetof(struct bpf_sock_addr, user_ip4)), in sendmsg4_rw_asm_prog_load()
986 offsetof(struct bpf_sock_addr, user_ip4)), in recvmsg4_rw_asm_prog_load()
/Linux-v5.10/tools/include/uapi/linux/
Dbpf.h4464 __u32 user_ip4; /* Allows 1,2,4-byte read and 4-byte write. member
/Linux-v5.10/include/uapi/linux/
Dbpf.h4464 __u32 user_ip4; /* Allows 1,2,4-byte read and 4-byte write. member
/Linux-v5.10/net/core/
Dfilter.c7944 case bpf_ctx_range(struct bpf_sock_addr, user_ip4): in sock_addr_is_valid_access()
7990 case bpf_ctx_range(struct bpf_sock_addr, user_ip4): in sock_addr_is_valid_access()
8976 case offsetof(struct bpf_sock_addr, user_ip4): in sock_addr_convert_ctx_access()