Searched refs:user_ip6 (Results 1 – 8 of 8) sorted by relevance
/Linux-v5.10/tools/testing/selftests/bpf/progs/ |
D | connect_force_port6.c | 48 orig->addr[0] = ctx->user_ip6[0]; in connect6() 49 orig->addr[1] = ctx->user_ip6[1]; in connect6() 50 orig->addr[2] = ctx->user_ip6[2]; in connect6() 51 orig->addr[3] = ctx->user_ip6[3]; in connect6() 54 ctx->user_ip6[0] = 0; in connect6() 55 ctx->user_ip6[1] = 0; in connect6() 56 ctx->user_ip6[2] = 0; in connect6() 57 ctx->user_ip6[3] = bpf_htonl(1); in connect6() 68 ctx->user_ip6[0] = bpf_htonl(0xfc000000); in getsockname6() 69 ctx->user_ip6[1] = 0; in getsockname6() [all …]
|
D | sendmsg6_prog.c | 44 if (ctx->user_ip6[0] == bpf_htonl(0xFACEB00C)) { in sendmsg_v6_prog() 45 ctx->user_ip6[0] = bpf_htonl(DST_REWRITE_IP6_0); in sendmsg_v6_prog() 46 ctx->user_ip6[1] = bpf_htonl(DST_REWRITE_IP6_1); in sendmsg_v6_prog() 47 ctx->user_ip6[2] = bpf_htonl(DST_REWRITE_IP6_2); in sendmsg_v6_prog() 48 ctx->user_ip6[3] = bpf_htonl(DST_REWRITE_IP6_3); in sendmsg_v6_prog()
|
D | connect6_prog.c | 71 ctx->user_ip6[0] = bpf_htonl(DST_REWRITE_IP6_0); in connect_v6_prog() 72 ctx->user_ip6[1] = bpf_htonl(DST_REWRITE_IP6_1); in connect_v6_prog() 73 ctx->user_ip6[2] = bpf_htonl(DST_REWRITE_IP6_2); in connect_v6_prog() 74 ctx->user_ip6[3] = bpf_htonl(DST_REWRITE_IP6_3); in connect_v6_prog()
|
/Linux-v5.10/tools/testing/selftests/bpf/verifier/ |
D | wide_access.c | 17 BPF_SOCK_ADDR_STORE(user_ip6, 0, ACCEPT, 19 BPF_SOCK_ADDR_STORE(user_ip6, 1, REJECT, 21 BPF_SOCK_ADDR_STORE(user_ip6, 2, ACCEPT, 23 BPF_SOCK_ADDR_STORE(user_ip6, 3, REJECT, 54 BPF_SOCK_ADDR_LOAD(user_ip6, 0, ACCEPT, 56 BPF_SOCK_ADDR_LOAD(user_ip6, 1, REJECT, 58 BPF_SOCK_ADDR_LOAD(user_ip6, 2, ACCEPT, 60 BPF_SOCK_ADDR_LOAD(user_ip6, 3, REJECT,
|
/Linux-v5.10/tools/testing/selftests/bpf/ |
D | test_sock_addr.c | 806 offsetof(struct bpf_sock_addr, user_ip6[1])), in bind6_prog_load() 811 offsetof(struct bpf_sock_addr, user_ip6[1])), in bind6_prog_load() 816 offsetof(struct bpf_sock_addr, user_ip6[3])), in bind6_prog_load() 824 offsetof(struct bpf_sock_addr, user_ip6[N])) in bind6_prog_load() 1043 STORE_IPV6(user_ip6, dst6_rw_addr.sin6_addr.s6_addr32), in sendmsg6_rw_dst_asm_prog_load() 1082 STORE_IPV6(user_ip6, src6_rw_addr.sin6_addr.s6_addr32), in recvmsg6_rw_asm_prog_load()
|
/Linux-v5.10/net/core/ |
D | filter.c | 7957 case bpf_ctx_range_till(struct bpf_sock_addr, user_ip6[0], user_ip6[3]): in sock_addr_is_valid_access() 7991 case bpf_ctx_range_till(struct bpf_sock_addr, user_ip6[0], user_ip6[3]): in sock_addr_is_valid_access() 8001 user_ip6)) in sock_addr_is_valid_access() 8014 user_ip6)) in sock_addr_is_valid_access() 8982 case bpf_ctx_range_till(struct bpf_sock_addr, user_ip6[0], user_ip6[3]): in sock_addr_convert_ctx_access() 8984 off -= offsetof(struct bpf_sock_addr, user_ip6[0]); in sock_addr_convert_ctx_access()
|
/Linux-v5.10/tools/include/uapi/linux/ |
D | bpf.h | 4467 __u32 user_ip6[4]; /* Allows 1,2,4,8-byte read and 4,8-byte write. member
|
/Linux-v5.10/include/uapi/linux/ |
D | bpf.h | 4467 __u32 user_ip6[4]; /* Allows 1,2,4,8-byte read and 4,8-byte write. member
|