Lines Matching refs:from

83  * 	Delete entry with *key* from *map*.
93 * For tracing programs, safely attempt to read *size* bytes from
121 * to file *\/sys/kernel/tracing/trace* from TraceFS, if
211 * Store *len* bytes from address *from* into the packet
227 static long (*bpf_skb_store_bytes)(struct __sk_buff *skb, __u32 offset, const void *from, __u32 len, __u64 flags) = (void *) 9;
235 * modified (*from*), the new value of this field (*to*), and the
239 * setting *from* and *size* to 0. For both methods, *offset*
256 static long (*bpf_l3_csum_replace)(struct __sk_buff *skb, __u32 offset, __u64 from, __u64 to, __u64 size) = (void *) 10;
264 * modified (*from*), the new value of this field (*to*), and the
268 * header field in *to*, by setting *from* and the four lowest
292 static long (*bpf_l4_csum_replace)(struct __sk_buff *skb, __u32 offset, __u64 from, __u64 to, __u64 flags) = (void *) 11;
407 * based on a user-provided identifier for all traffic coming from
409 * kernel documentation, available from the Linux sources in file
433 * the checksum. Note that if *vlan_proto* is different from
451 * Pop a VLAN header from the packet associated to *skb*.
488 * tunnel, and is supposed to filter out all messages coming from
509 * configuration can be extracted from this helper.
591 * The value of the perf event counter read from the map, or a
683 * space, and is much better suitable for streaming data from eBPF
703 * This helper was provided as an easy way to load data from a
704 * packet. It can be used to load *len* bytes from *offset* from
714 * at once from a packet into the eBPF stack.
730 * skip (from 0 to 255), masked with
770 * Compute a checksum difference, from the raw buffer pointed by
771 * *from*, of length *from_size* (that must be a multiple of 4),
774 * (this can be cascaded, the seed may come from a previous call
782 * checksum, it can be used when removing data from a packet.
796 static __s64 (*bpf_csum_diff)(__be32 *from, __u32 from_size, __be32 *to, __u32 to_size, __wsum seed) = (void *) 28;
811 * and retrieving arbitrary TLVs (Type-Length-Value headers) from
838 * supported are transition from IPv4 to IPv6, and from IPv6 to
944 * Attempt in a safe way to write *len* bytes from the buffer
994 * implicitly linearizes, unclones and drops offloads from the
1013 * from *skb* readable and writable. If a zero value is passed for
1035 * **bpf_skb_pull_data()** to effectively unclone the *skb* from
1141 * Copy a NUL terminated string from an unsafe kernel address
1381 * buffers, it remains possible to set from XDP the **mark** or
1606 * When called from within an eBPF program, the helper sets a
1609 * smaller than the current data being processed from a
1652 * For socket policies, pull in non-linear data from user space
1689 * connection from the desired IP address, which can be useful for
1754 * skip (from 0 to 255), masked with
1795 * it provides an easy way to load *len* bytes from *offset*
1796 * from the packet associated to *skb*, into the buffer pointed
1799 * base offset to start from. *start_header* can be one of:
1802 * Base offset to load data from is *skb*'s mac header.
1804 * Base offset to load data from is *skb*'s network header.
1827 * is set to metric from route (IPv4/IPv6 only), and ifindex
1828 * is set to the device index of the nexthop from the FIB lookup.
1842 * Perform lookup from an egress perspective (default is
1862 * packet is not forwarded or needs assist from full stack
1972 * Store *len* bytes from address *from* into the packet
1986 static long (*bpf_lwt_seg6_store_bytes)(struct __sk_buff *skb, __u32 offset, const void *from, __u32 len) = (void *) 74;
2151 * Select a **SO_REUSEPORT** socket from a
2219 * result is from *reuse*\ **->socks**\ [] using the hash of the
2260 * result is from *reuse*\ **->socks**\ [] using the hash of the
2269 * non-**NULL** pointer that was returned from
2294 * Pop an element from *map*.
2304 * Get an element from *map* without removing it.
2334 * Will remove *len* bytes from a *msg* starting at byte *start*.
2402 * * Syscall with command **BPF_MAP_UPDATE_ELEM**, or update from
2443 * This helper gets a **struct bpf_tcp_sock** pointer from a
2496 * result is from *reuse*\ **->socks**\ [] using the hash of the
2609 * Convert the initial part of the string from buffer *buf* of
2637 * Convert the initial part of the string from buffer *buf* of
2664 * Get a bpf-local-storage from a *sk*.
2666 * Logically, it could be thought of getting the value from
2668 * perspective, the usage is not much different from
2699 * Delete a bpf-local-storage from a *sk*.
2790 * Safely attempt to read *size* bytes from user space address
2801 * Safely attempt to read *size* bytes from kernel space address
2812 * Copy a NUL terminated string from an unsafe user address
2860 * Copy a NUL terminated string from an unsafe kernel address *unsafe_ptr*
2934 * Returns 0 on success, values for *pid* and *tgid* as seen from the current
3028 * This operation is only valid from TC ingress path.
3042 * a call from outside of TC ingress.
3081 * by returning 1 from bpf program.
3111 * returned from **bpf_sk_lookup_xxx**\ (),
3148 * Copy *size* bytes from *data* into a ring buffer *ringbuf*.
3332 * skip (from 0 to 255), masked with
3366 * If *flags* is 0, it will search the option from the
3400 * * **BPF_LOAD_HDR_OPT_TCP_SYN** to search from the
3431 * from buffer *from* with length *len* to the TCP header.
3433 * The buffer *from* should have the whole option that
3462 static long (*bpf_store_hdr_opt)(struct bpf_sock_ops *skops, const void *from, __u32 len, __u64 flags) = (void *) 143;
3493 * Get a bpf_local_storage from an *inode*.
3495 * Logically, it could be thought of as getting the value from
3497 * perspective, the usage is not much different from
3525 * Delete a bpf_local_storage from an *inode*.
3553 * Read *size* bytes from user space address *user_ptr* and store
3617 * This helper differs from **bpf_get_cgroup_classid**\ () in that
3618 * the cgroup v1 net_cls class is retrieved only from the *skb*'s
3630 * and fill in L2 addresses from neighboring subsystem. This helper
3680 * the kernel. Different from **bpf_per_cpu_ptr**\ (), it would
3694 * the netns switch takes place from ingress to ingress without
3711 * Get a bpf_local_storage from the *task*.
3713 * Logically, it could be thought of as getting the value from
3715 * perspective, the usage is not much different from
3743 * Delete a bpf_local_storage from a *task*.
3991 * The verifier will reject the program if *timer* is not from
4023 * Set timer expiration N nanoseconds from the current time. The
4037 * The map can contain timers that invoke callback_fn-s from different
4038 * programs. The same callback_fn can serve different timers from
4120 * Get branch trace from hardware engines like Intel LBR. The
4337 * This helper is provided as an easy way to load data from a
4338 * xdp buffer. It can be used to load *len* bytes from *offset* from
4350 * Store *len* bytes from buffer *buf* into the frame
4361 * Read *size* bytes from user space address *user_ptr* in *tsk*'s
4519 * Read *len* bytes from *src* into *dst*, starting from *offset*
4533 * Write *len* bytes from *src* into *dst*, starting from *offset*
4666 * A nonsettable system-wide clock derived from wall-clock time but
4681 * Drain samples from the specified user ring buffer, and invoke
4723 * Get a bpf_local_storage from the *cgroup*.
4725 * Logically, it could be thought of as getting the value from
4727 * perspective, the usage is not much different from
4757 * Delete a bpf_local_storage from a *cgroup*.