| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/progs/ |
| H A D | connect_force_port6.c | 48 orig->addr[0] = ctx->user_ip6[0]; in connect6() 49 orig->addr[1] = ctx->user_ip6[1]; in connect6() 50 orig->addr[2] = ctx->user_ip6[2]; in connect6() 51 orig->addr[3] = ctx->user_ip6[3]; in connect6() 54 ctx->user_ip6[0] = 0; in connect6() 55 ctx->user_ip6[1] = 0; in connect6() 56 ctx->user_ip6[2] = 0; in connect6() 57 ctx->user_ip6[3] = bpf_htonl(1); in connect6() 68 ctx->user_ip6[0] = bpf_htonl(0xfc000000); in getsockname6() 69 ctx->user_ip6[1] = 0; in getsockname6() [all …]
|
| H A D | sendmsg6_prog.c | 44 if (ctx->user_ip6[0] == bpf_htonl(0xFACEB00C)) { in sendmsg_v6_prog() 45 ctx->user_ip6[0] = bpf_htonl(DST_REWRITE_IP6_0); in sendmsg_v6_prog() 46 ctx->user_ip6[1] = bpf_htonl(DST_REWRITE_IP6_1); in sendmsg_v6_prog() 47 ctx->user_ip6[2] = bpf_htonl(DST_REWRITE_IP6_2); in sendmsg_v6_prog() 48 ctx->user_ip6[3] = bpf_htonl(DST_REWRITE_IP6_3); in sendmsg_v6_prog()
|
| H A D | connect6_prog.c | 71 ctx->user_ip6[0] = bpf_htonl(DST_REWRITE_IP6_0); in connect_v6_prog() 72 ctx->user_ip6[1] = bpf_htonl(DST_REWRITE_IP6_1); in connect_v6_prog() 73 ctx->user_ip6[2] = bpf_htonl(DST_REWRITE_IP6_2); in connect_v6_prog() 74 ctx->user_ip6[3] = bpf_htonl(DST_REWRITE_IP6_3); in connect_v6_prog()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/verifier/ |
| H A D | wide_access.c | 17 BPF_SOCK_ADDR_STORE(user_ip6, 0, ACCEPT, 19 BPF_SOCK_ADDR_STORE(user_ip6, 1, REJECT, 21 BPF_SOCK_ADDR_STORE(user_ip6, 2, ACCEPT, 23 BPF_SOCK_ADDR_STORE(user_ip6, 3, REJECT, 54 BPF_SOCK_ADDR_LOAD(user_ip6, 0, ACCEPT, 56 BPF_SOCK_ADDR_LOAD(user_ip6, 1, REJECT, 58 BPF_SOCK_ADDR_LOAD(user_ip6, 2, ACCEPT, 60 BPF_SOCK_ADDR_LOAD(user_ip6, 3, REJECT,
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/ |
| H A D | test_sock_addr.c | 806 offsetof(struct bpf_sock_addr, user_ip6[1])), in bind6_prog_load() 811 offsetof(struct bpf_sock_addr, user_ip6[1])), in bind6_prog_load() 816 offsetof(struct bpf_sock_addr, user_ip6[3])), in bind6_prog_load() 824 offsetof(struct bpf_sock_addr, user_ip6[N])) in bind6_prog_load() 1043 STORE_IPV6(user_ip6, dst6_rw_addr.sin6_addr.s6_addr32), in sendmsg6_rw_dst_asm_prog_load() 1082 STORE_IPV6(user_ip6, src6_rw_addr.sin6_addr.s6_addr32), in recvmsg6_rw_asm_prog_load()
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/linux/ |
| H A D | bpf.h | 2686 __u32 user_ip6[4]; /* Allows 1,2,4-byte read an 4-byte write. member
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/linux/ |
| H A D | bpf.h | 2686 __u32 user_ip6[4]; /* Allows 1,2,4-byte read an 4-byte write. member
|
| /OK3568_Linux_fs/kernel/net/core/ |
| H A D | filter.c | 7983 case bpf_ctx_range_till(struct bpf_sock_addr, user_ip6[0], user_ip6[3]): in sock_addr_is_valid_access() 8017 case bpf_ctx_range_till(struct bpf_sock_addr, user_ip6[0], user_ip6[3]): in sock_addr_is_valid_access() 8027 user_ip6)) in sock_addr_is_valid_access() 8040 user_ip6)) in sock_addr_is_valid_access() 9008 case bpf_ctx_range_till(struct bpf_sock_addr, user_ip6[0], user_ip6[3]): in sock_addr_convert_ctx_access() 9010 off -= offsetof(struct bpf_sock_addr, user_ip6[0]); in sock_addr_convert_ctx_access()
|
| /OK3568_Linux_fs/kernel/tools/include/uapi/linux/ |
| H A D | bpf.h | 4468 __u32 user_ip6[4]; /* Allows 1,2,4,8-byte read and 4,8-byte write. member
|
| /OK3568_Linux_fs/kernel/include/uapi/linux/ |
| H A D | bpf.h | 4468 __u32 user_ip6[4]; /* Allows 1,2,4,8-byte read and 4,8-byte write. member
|