/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
H A D | bind4_prog.c | 102 __u32 user_ip4; in bind_v4_prog() local 115 if (ctx->user_ip4 != bpf_htonl(SERV4_IP) || in bind_v4_prog() 120 user_ip4 = 0; in bind_v4_prog() 121 user_ip4 |= ((volatile __u8 *)&ctx->user_ip4)[0] << 0; in bind_v4_prog() 122 user_ip4 |= ((volatile __u8 *)&ctx->user_ip4)[1] << 8; in bind_v4_prog() 123 user_ip4 |= ((volatile __u8 *)&ctx->user_ip4)[2] << 16; in bind_v4_prog() 124 user_ip4 | in bind_v4_prog() [all...] |
H A D | connect_force_port4.c | 50 orig->addr = ctx->user_ip4; in connect4() 53 ctx->user_ip4 = bpf_htonl(0x7f000001); in connect4() 67 ctx->user_ip4 = bpf_htonl(0x01020304); in getsockname4() 85 ctx->user_ip4 = orig->addr; in getpeername4()
|
H A D | sendmsg4_prog.c | 40 if ((ctx->user_ip4 >> 24) == (bpf_htonl(DST_IP4) >> 24) && in sendmsg_v4_prog() 42 ctx->user_ip4 = bpf_htonl(DST_REWRITE_IP4); in sendmsg_v4_prog()
|
H A D | recvmsg4_prog.c | 34 ctx->user_ip4 = bpf_htonl(SERV4_IP); in recvmsg4_prog()
|
H A D | connect4_prog.c | 194 ctx->user_ip4 = bpf_htonl(DST_REWRITE_IP4); in connect_v4_prog()
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/ |
H A D | connect_force_port4.c | 49 orig->addr = ctx->user_ip4; in connect4() 52 ctx->user_ip4 = bpf_htonl(0x7f000001); in connect4() 63 ctx->user_ip4 = bpf_htonl(0x01020304); in getsockname4() 78 ctx->user_ip4 = orig->addr; in getpeername4()
|
H A D | sendmsg4_prog.c | 37 if ((ctx->user_ip4 >> 24) == (bpf_htonl(DST_IP4) >> 24) && in sendmsg_v4_prog() 39 ctx->user_ip4 = bpf_htonl(DST_REWRITE_IP4); in sendmsg_v4_prog()
|
H A D | connect4_prog.c | 195 ctx->user_ip4 = bpf_htonl(DST_REWRITE_IP4); in connect_v4_prog()
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/ |
H A D | test_sock_addr.c | 664 * narrow loads of different sizes from user_ip4 and user_ip6, and write to 712 offsetof(struct bpf_sock_addr, user_ip4)), in bind4_prog_load() 717 offsetof(struct bpf_sock_addr, user_ip4) + 1), in bind4_prog_load() 722 offsetof(struct bpf_sock_addr, user_ip4) + 2), in bind4_prog_load() 727 offsetof(struct bpf_sock_addr, user_ip4) + 3), in bind4_prog_load() 732 offsetof(struct bpf_sock_addr, user_ip4)), in bind4_prog_load() 737 offsetof(struct bpf_sock_addr, user_ip4) + 2), in bind4_prog_load() 742 offsetof(struct bpf_sock_addr, user_ip4)), in bind4_prog_load() 762 /* user_ip4 = addr4_rw.sin_addr */ in bind4_prog_load() 765 offsetof(struct bpf_sock_addr, user_ip4)), in bind4_prog_load() [all...] |
/kernel/linux/patches/linux-4.19/prebuilts/usr/include/linux/ |
H A D | bpf.h | 573 __u32 user_ip4; member
|
/kernel/linux/linux-5.10/tools/include/uapi/linux/ |
H A D | bpf.h | 4492 __u32 user_ip4; /* Allows 1,2,4-byte read and 4-byte write. member
|
/kernel/linux/linux-5.10/include/uapi/linux/ |
H A D | bpf.h | 4492 __u32 user_ip4; /* Allows 1,2,4-byte read and 4-byte write. member
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/ |
H A D | test_sock_addr.c | 781 /* user_ip4 = dst4_rw_addr.sin_addr */ in sendmsg4_rw_asm_prog_load() 784 offsetof(struct bpf_sock_addr, user_ip4)), in sendmsg4_rw_asm_prog_load()
|
/kernel/linux/patches/linux-6.6/prebuilts/usr/include/linux/ |
H A D | bpf.h | 837 __u32 user_ip4; member
|
/kernel/linux/patches/linux-5.10/prebuilts/usr/include/linux/ |
H A D | bpf.h | 837 __u32 user_ip4; member
|
/kernel/linux/linux-6.6/include/uapi/linux/ |
H A D | bpf.h | 6575 __u32 user_ip4; /* Allows 1,2,4-byte read and 4-byte write. member
|
/kernel/linux/linux-6.6/tools/include/uapi/linux/ |
H A D | bpf.h | 6575 __u32 user_ip4; /* Allows 1,2,4-byte read and 4-byte write. member
|
/kernel/linux/linux-5.10/net/core/ |
H A D | filter.c | 8089 case bpf_ctx_range(struct bpf_sock_addr, user_ip4): in sock_addr_is_valid_access() 8135 case bpf_ctx_range(struct bpf_sock_addr, user_ip4): in sock_addr_is_valid_access() 9121 case offsetof(struct bpf_sock_addr, user_ip4): in sock_addr_convert_ctx_access()
|
/kernel/linux/linux-6.6/net/core/ |
H A D | filter.c | 9007 case bpf_ctx_range(struct bpf_sock_addr, user_ip4): in sock_addr_is_valid_access() 9053 case bpf_ctx_range(struct bpf_sock_addr, user_ip4): in sock_addr_is_valid_access() 10145 case offsetof(struct bpf_sock_addr, user_ip4): in sock_addr_convert_ctx_access()
|