/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
H A D | bind6_prog.c | 108 __u32 user_ip6; in bind_v6_prog() local 122 if (ctx->user_ip6[0] != bpf_htonl(SERV6_IP_0) || in bind_v6_prog() 123 ctx->user_ip6[1] != bpf_htonl(SERV6_IP_1) || in bind_v6_prog() 124 ctx->user_ip6[2] != bpf_htonl(SERV6_IP_2) || in bind_v6_prog() 125 ctx->user_ip6[3] != bpf_htonl(SERV6_IP_3) || in bind_v6_prog() 131 user_ip6 = 0; in bind_v6_prog() 132 user_ip6 |= ((volatile __u8 *)&ctx->user_ip6[i])[0] << 0; in bind_v6_prog() 133 user_ip6 |= ((volatile __u8 *)&ctx->user_ip6[ in bind_v6_prog() [all...] |
H A D | connect_force_port6.c | 49 orig->addr[0] = ctx->user_ip6[0]; in connect6() 50 orig->addr[1] = ctx->user_ip6[1]; in connect6() 51 orig->addr[2] = ctx->user_ip6[2]; in connect6() 52 orig->addr[3] = ctx->user_ip6[3]; in connect6() 55 ctx->user_ip6[0] = 0; in connect6() 56 ctx->user_ip6[1] = 0; in connect6() 57 ctx->user_ip6[2] = 0; in connect6() 58 ctx->user_ip6[3] = bpf_htonl(1); in connect6() 72 ctx->user_ip6[0] = bpf_htonl(0xfc000000); in getsockname6() 73 ctx->user_ip6[ in getsockname6() [all...] |
H A D | sendmsg6_prog.c | 47 if (ctx->user_ip6[0] == bpf_htonl(0xFACEB00C)) { in sendmsg_v6_prog() 48 ctx->user_ip6[0] = bpf_htonl(DST_REWRITE_IP6_0); in sendmsg_v6_prog() 49 ctx->user_ip6[1] = bpf_htonl(DST_REWRITE_IP6_1); in sendmsg_v6_prog() 50 ctx->user_ip6[2] = bpf_htonl(DST_REWRITE_IP6_2); in sendmsg_v6_prog() 51 ctx->user_ip6[3] = bpf_htonl(DST_REWRITE_IP6_3); in sendmsg_v6_prog()
|
H A D | recvmsg6_prog.c | 37 ctx->user_ip6[0] = bpf_htonl(SERV6_IP_0); in recvmsg6_prog() 38 ctx->user_ip6[1] = bpf_htonl(SERV6_IP_1); in recvmsg6_prog() 39 ctx->user_ip6[2] = bpf_htonl(SERV6_IP_2); in recvmsg6_prog() 40 ctx->user_ip6[3] = bpf_htonl(SERV6_IP_3); in recvmsg6_prog()
|
H A D | connect6_prog.c | 69 ctx->user_ip6[0] = bpf_htonl(DST_REWRITE_IP6_0); in connect_v6_prog() 70 ctx->user_ip6[1] = bpf_htonl(DST_REWRITE_IP6_1); in connect_v6_prog() 71 ctx->user_ip6[2] = bpf_htonl(DST_REWRITE_IP6_2); in connect_v6_prog() 72 ctx->user_ip6[3] = bpf_htonl(DST_REWRITE_IP6_3); in connect_v6_prog()
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/ |
H A D | connect_force_port6.c | 48 orig->addr[0] = ctx->user_ip6[0]; in connect6() 49 orig->addr[1] = ctx->user_ip6[1]; in connect6() 50 orig->addr[2] = ctx->user_ip6[2]; in connect6() 51 orig->addr[3] = ctx->user_ip6[3]; in connect6() 54 ctx->user_ip6[0] = 0; in connect6() 55 ctx->user_ip6[1] = 0; in connect6() 56 ctx->user_ip6[2] = 0; in connect6() 57 ctx->user_ip6[3] = bpf_htonl(1); in connect6() 68 ctx->user_ip6[0] = bpf_htonl(0xfc000000); in getsockname6() 69 ctx->user_ip6[ in getsockname6() [all...] |
H A D | sendmsg6_prog.c | 44 if (ctx->user_ip6[0] == bpf_htonl(0xFACEB00C)) { in sendmsg_v6_prog() 45 ctx->user_ip6[0] = bpf_htonl(DST_REWRITE_IP6_0); in sendmsg_v6_prog() 46 ctx->user_ip6[1] = bpf_htonl(DST_REWRITE_IP6_1); in sendmsg_v6_prog() 47 ctx->user_ip6[2] = bpf_htonl(DST_REWRITE_IP6_2); in sendmsg_v6_prog() 48 ctx->user_ip6[3] = bpf_htonl(DST_REWRITE_IP6_3); in sendmsg_v6_prog()
|
H A D | connect6_prog.c | 71 ctx->user_ip6[0] = bpf_htonl(DST_REWRITE_IP6_0); in connect_v6_prog() 72 ctx->user_ip6[1] = bpf_htonl(DST_REWRITE_IP6_1); in connect_v6_prog() 73 ctx->user_ip6[2] = bpf_htonl(DST_REWRITE_IP6_2); in connect_v6_prog() 74 ctx->user_ip6[3] = bpf_htonl(DST_REWRITE_IP6_3); in connect_v6_prog()
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/verifier/ |
H A D | wide_access.c | 16 /* user_ip6[0] is u64 aligned */ 17 BPF_SOCK_ADDR_STORE(user_ip6, 0, ACCEPT, 19 BPF_SOCK_ADDR_STORE(user_ip6, 1, REJECT, 21 BPF_SOCK_ADDR_STORE(user_ip6, 2, ACCEPT, 23 BPF_SOCK_ADDR_STORE(user_ip6, 3, REJECT, 53 /* user_ip6[0] is u64 aligned */ 54 BPF_SOCK_ADDR_LOAD(user_ip6, 0, ACCEPT, 56 BPF_SOCK_ADDR_LOAD(user_ip6, 1, REJECT, 58 BPF_SOCK_ADDR_LOAD(user_ip6, 2, ACCEPT, 60 BPF_SOCK_ADDR_LOAD(user_ip6, [all...] |
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/verifier/ |
H A D | wide_access.c | 17 /* user_ip6[0] is u64 aligned */ 18 BPF_SOCK_ADDR_STORE(user_ip6, 0, ACCEPT, 20 BPF_SOCK_ADDR_STORE(user_ip6, 1, REJECT, 23 BPF_SOCK_ADDR_STORE(user_ip6, 2, ACCEPT, 25 BPF_SOCK_ADDR_STORE(user_ip6, 3, REJECT, 59 /* user_ip6[0] is u64 aligned */ 60 BPF_SOCK_ADDR_LOAD(user_ip6, 0, ACCEPT, 62 BPF_SOCK_ADDR_LOAD(user_ip6, 1, REJECT, 65 BPF_SOCK_ADDR_LOAD(user_ip6, 2, ACCEPT, 67 BPF_SOCK_ADDR_LOAD(user_ip6, [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/ |
H A D | test_sock_addr.c | 664 * narrow loads of different sizes from user_ip4 and user_ip6, and write to 806 offsetof(struct bpf_sock_addr, user_ip6[1])), in bind6_prog_load() 811 offsetof(struct bpf_sock_addr, user_ip6[1])), in bind6_prog_load() 816 offsetof(struct bpf_sock_addr, user_ip6[3])), in bind6_prog_load() 824 offsetof(struct bpf_sock_addr, user_ip6[N])) in bind6_prog_load() 826 /* user_ip6 = addr6_rw.sin6_addr */ in bind6_prog_load() 1043 STORE_IPV6(user_ip6, dst6_rw_addr.sin6_addr.s6_addr32), in sendmsg6_rw_dst_asm_prog_load() 1082 STORE_IPV6(user_ip6, src6_rw_addr.sin6_addr.s6_addr32), in recvmsg6_rw_asm_prog_load()
|
/kernel/linux/patches/linux-4.19/prebuilts/usr/include/linux/ |
H A D | bpf.h | 574 __u32 user_ip6[4]; member
|
/kernel/linux/linux-5.10/tools/include/uapi/linux/ |
H A D | bpf.h | 4495 __u32 user_ip6[4]; /* Allows 1,2,4,8-byte read and 4,8-byte write. member
|
/kernel/linux/linux-5.10/include/uapi/linux/ |
H A D | bpf.h | 4495 __u32 user_ip6[4]; /* Allows 1,2,4,8-byte read and 4,8-byte write. member
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/ |
H A D | test_sock_addr.c | 846 STORE_IPV6(user_ip6, dst6_rw_addr.sin6_addr.s6_addr32), in sendmsg6_rw_dst_asm_prog_load()
|
/kernel/linux/patches/linux-6.6/prebuilts/usr/include/linux/ |
H A D | bpf.h | 838 __u32 user_ip6[4]; member
|
/kernel/linux/patches/linux-5.10/prebuilts/usr/include/linux/ |
H A D | bpf.h | 838 __u32 user_ip6[4]; member
|
/kernel/linux/linux-5.10/net/core/ |
H A D | filter.c | 8102 case bpf_ctx_range_till(struct bpf_sock_addr, user_ip6[0], user_ip6[3]): in sock_addr_is_valid_access() 8136 case bpf_ctx_range_till(struct bpf_sock_addr, user_ip6[0], user_ip6[3]): in sock_addr_is_valid_access() 8146 user_ip6)) in sock_addr_is_valid_access() 8159 user_ip6)) in sock_addr_is_valid_access() 9127 case bpf_ctx_range_till(struct bpf_sock_addr, user_ip6[0], user_ip6[3]): in sock_addr_convert_ctx_access() 9129 off -= offsetof(struct bpf_sock_addr, user_ip6[0]); in sock_addr_convert_ctx_access()
|
/kernel/linux/linux-6.6/net/core/ |
H A D | filter.c | 9020 case bpf_ctx_range_till(struct bpf_sock_addr, user_ip6[0], user_ip6[3]): in sock_addr_is_valid_access() 9054 case bpf_ctx_range_till(struct bpf_sock_addr, user_ip6[0], user_ip6[3]): in sock_addr_is_valid_access() 9064 user_ip6)) in sock_addr_is_valid_access() 9077 user_ip6)) in sock_addr_is_valid_access() 10151 case bpf_ctx_range_till(struct bpf_sock_addr, user_ip6[0], user_ip6[3]): in sock_addr_convert_ctx_access() 10153 off -= offsetof(struct bpf_sock_addr, user_ip6[0]); in sock_addr_convert_ctx_access()
|
/kernel/linux/linux-6.6/include/uapi/linux/ |
H A D | bpf.h | 6578 __u32 user_ip6[4]; /* Allows 1,2,4,8-byte read and 4,8-byte write. member
|
/kernel/linux/linux-6.6/tools/include/uapi/linux/ |
H A D | bpf.h | 6578 __u32 user_ip6[4]; /* Allows 1,2,4,8-byte read and 4,8-byte write. member
|