/linux/tools/testing/selftests/bpf/progs/ |
H A D | bind6_prog.c | 110 __u32 user_ip6; in bind_v6_prog() local 124 if (ctx->user_ip6[0] != bpf_htonl(SERV6_IP_0) || in bind_v6_prog() 125 ctx->user_ip6[1] != bpf_htonl(SERV6_IP_1) || in bind_v6_prog() 126 ctx->user_ip6[2] != bpf_htonl(SERV6_IP_2) || in bind_v6_prog() 127 ctx->user_ip6[3] != bpf_htonl(SERV6_IP_3) || in bind_v6_prog() 133 user_ip6 = 0; in bind_v6_prog() 134 user_ip6 |= load_byte(ctx->user_ip6[i], 0, sizeof(user_ip6)); in bind_v6_prog() 135 user_ip6 |= load_byte(ctx->user_ip6[i], 1, sizeof(user_ip6)); in bind_v6_prog() 136 user_ip6 |= load_byte(ctx->user_ip6[i], 2, sizeof(user_ip6)); in bind_v6_prog() 137 user_ip6 |= load_byte(ctx->user_ip6[i], 3, sizeof(user_ip6)); in bind_v6_prog() [all …]
|
H A D | connect_force_port6.c | 49 orig->addr[0] = ctx->user_ip6[0]; in connect6() 50 orig->addr[1] = ctx->user_ip6[1]; in connect6() 51 orig->addr[2] = ctx->user_ip6[2]; in connect6() 52 orig->addr[3] = ctx->user_ip6[3]; in connect6() 55 ctx->user_ip6[0] = 0; in connect6() 56 ctx->user_ip6[1] = 0; in connect6() 57 ctx->user_ip6[2] = 0; in connect6() 58 ctx->user_ip6[3] = bpf_htonl(1); in connect6() 72 ctx->user_ip6[0] = bpf_htonl(0xfc000000); in getsockname6() 73 ctx->user_ip6[1] = 0; in getsockname6() [all …]
|
H A D | sendmsg6_prog.c | 52 if (ctx->user_ip6[0] == bpf_htonl(0xFACEB00C)) { in sendmsg_v6_prog() 53 ctx->user_ip6[0] = bpf_htonl(DST_REWRITE_IP6_0); in sendmsg_v6_prog() 54 ctx->user_ip6[1] = bpf_htonl(DST_REWRITE_IP6_1); in sendmsg_v6_prog() 55 ctx->user_ip6[2] = bpf_htonl(DST_REWRITE_IP6_2); in sendmsg_v6_prog() 56 ctx->user_ip6[3] = bpf_htonl(DST_REWRITE_IP6_3); in sendmsg_v6_prog() 77 ctx->user_ip6[0] = bpf_htonl(DST_REWRITE_IP6_V4_MAPPED_0); in sendmsg_v6_v4mapped_prog() 78 ctx->user_ip6[1] = bpf_htonl(DST_REWRITE_IP6_V4_MAPPED_1); in sendmsg_v6_v4mapped_prog() 79 ctx->user_ip6[2] = bpf_htonl(DST_REWRITE_IP6_V4_MAPPED_2); in sendmsg_v6_v4mapped_prog() 80 ctx->user_ip6[3] = bpf_htonl(DST_REWRITE_IP6_V4_MAPPED_3); in sendmsg_v6_v4mapped_prog() 97 ctx->user_ip6[0] = bpf_htonl(0); in sendmsg_v6_wildcard_prog() [all …]
|
H A D | getpeername6_prog.c | 22 ctx->user_ip6[0] = bpf_htonl(REWRITE_ADDRESS_IP6_0); in getpeername_v6_prog() 23 ctx->user_ip6[1] = bpf_htonl(REWRITE_ADDRESS_IP6_1); in getpeername_v6_prog() 24 ctx->user_ip6[2] = bpf_htonl(REWRITE_ADDRESS_IP6_2); in getpeername_v6_prog() 25 ctx->user_ip6[3] = bpf_htonl(REWRITE_ADDRESS_IP6_3); in getpeername_v6_prog()
|
H A D | getsockname6_prog.c | 22 ctx->user_ip6[0] = bpf_htonl(REWRITE_ADDRESS_IP6_0); in getsockname_v6_prog() 23 ctx->user_ip6[1] = bpf_htonl(REWRITE_ADDRESS_IP6_1); in getsockname_v6_prog() 24 ctx->user_ip6[2] = bpf_htonl(REWRITE_ADDRESS_IP6_2); in getsockname_v6_prog() 25 ctx->user_ip6[3] = bpf_htonl(REWRITE_ADDRESS_IP6_3); in getsockname_v6_prog()
|
H A D | recvmsg6_prog.c | 37 ctx->user_ip6[0] = bpf_htonl(SERV6_IP_0); in recvmsg6_prog() 38 ctx->user_ip6[1] = bpf_htonl(SERV6_IP_1); in recvmsg6_prog() 39 ctx->user_ip6[2] = bpf_htonl(SERV6_IP_2); in recvmsg6_prog() 40 ctx->user_ip6[3] = bpf_htonl(SERV6_IP_3); in recvmsg6_prog()
|
H A D | connect6_prog.c | 69 ctx->user_ip6[0] = bpf_htonl(DST_REWRITE_IP6_0); in connect_v6_prog() 70 ctx->user_ip6[1] = bpf_htonl(DST_REWRITE_IP6_1); in connect_v6_prog() 71 ctx->user_ip6[2] = bpf_htonl(DST_REWRITE_IP6_2); in connect_v6_prog() 72 ctx->user_ip6[3] = bpf_htonl(DST_REWRITE_IP6_3); in connect_v6_prog()
|
/linux/tools/testing/selftests/bpf/verifier/ |
H A D | wide_access.c | 18 BPF_SOCK_ADDR_STORE(user_ip6, 0, ACCEPT, 20 BPF_SOCK_ADDR_STORE(user_ip6, 1, REJECT, 23 BPF_SOCK_ADDR_STORE(user_ip6, 2, ACCEPT, 25 BPF_SOCK_ADDR_STORE(user_ip6, 3, REJECT, 60 BPF_SOCK_ADDR_LOAD(user_ip6, 0, ACCEPT, 62 BPF_SOCK_ADDR_LOAD(user_ip6, 1, REJECT, 65 BPF_SOCK_ADDR_LOAD(user_ip6, 2, ACCEPT, 67 BPF_SOCK_ADDR_LOAD(user_ip6, 3, REJECT,
|
/linux/net/core/ |
H A D | filter.c | 9135 case bpf_ctx_range_till(struct bpf_sock_addr, user_ip6[0], user_ip6[3]): in sock_addr_is_valid_access() 9169 case bpf_ctx_range_till(struct bpf_sock_addr, user_ip6[0], user_ip6[3]): in sock_addr_is_valid_access() 9179 user_ip6)) in sock_addr_is_valid_access() 9192 user_ip6)) in sock_addr_is_valid_access() 10264 case bpf_ctx_range_till(struct bpf_sock_addr, user_ip6[0], user_ip6[3]): in sock_addr_convert_ctx_access() 10266 off -= offsetof(struct bpf_sock_addr, user_ip6[0]); in sock_addr_convert_ctx_access()
|
/linux/include/uapi/linux/ |
H A D | bpf.h | 6762 __u32 user_ip6[4]; /* Allows 1,2,4,8-byte read and 4,8-byte write. member
|
/linux/tools/include/uapi/linux/ |
H A D | bpf.h | 6762 __u32 user_ip6[4]; /* Allows 1,2,4,8-byte read and 4,8-byte write. member
|