/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | verifier_raw_stack.c | 41 : __imm(bpf_skb_load_bytes) in skb_load_bytes_negative_len() 60 : __imm(bpf_skb_load_bytes), in load_bytes_negative_len_2() 80 : __imm(bpf_skb_load_bytes) in skb_load_bytes_zero_len() 99 : __imm(bpf_skb_load_bytes) in skb_load_bytes_no_init() 120 : __imm(bpf_skb_load_bytes) in stack_skb_load_bytes_init() 145 : __imm(bpf_skb_load_bytes), in bytes_spilled_regs_around_bounds() 169 : __imm(bpf_skb_load_bytes), in __flag() 252 : __imm(bpf_skb_load_bytes) in load_bytes_invalid_access_1() 271 : __imm(bpf_skb_load_bytes) in load_bytes_invalid_access_2() 290 : __imm(bpf_skb_load_bytes) in load_bytes_invalid_access_3() [all …]
|
H A D | test_tc_tunnel.c | 117 if (bpf_skb_load_bytes(skb, ETH_HLEN, &iph6_inner, in __encap_ipv4() 134 if (bpf_skb_load_bytes(skb, ETH_HLEN, &iph_inner, in __encap_ipv4() 145 if (bpf_skb_load_bytes(skb, ETH_HLEN + tcp_off, in __encap_ipv4() 215 if (bpf_skb_load_bytes(skb, 0, l2_hdr, ETH_HLEN)) in __encap_ipv4() 243 if (bpf_skb_load_bytes(skb, 0, ð, sizeof(eth)) < 0) in __encap_ipv4() 271 if (bpf_skb_load_bytes(skb, ETH_HLEN, &iph_inner, in __encap_ipv6() 345 if (bpf_skb_load_bytes(skb, 0, l2_hdr, ETH_HLEN)) in __encap_ipv6() 379 if (bpf_skb_load_bytes(skb, ETH_HLEN, &iph_inner, in encap_ipv6_ipip6() 613 if (bpf_skb_load_bytes(skb, off + len, &ip6_opt_hdr, in decap_internal() 670 if (bpf_skb_load_bytes(skb, ETH_HLEN, &iph_outer, in decap_ipv4() [all …]
|
H A D | decap_sanity.c | 42 if (bpf_skb_load_bytes(skb, ETH_HLEN, &ip6h, sizeof(ip6h))) in decap_sanity() 48 if (bpf_skb_load_bytes(skb, ETH_HLEN + sizeof(ip6h), &udph, sizeof(udph))) in decap_sanity()
|
H A D | cgroup_skb_sk_lookup_kern.c | 79 if (bpf_skb_load_bytes(skb, 0, &ip6h, sizeof(ip6h))) in ingress_lookup() 85 if (bpf_skb_load_bytes(skb, sizeof(ip6h), &tcph, sizeof(tcph))) in ingress_lookup()
|
H A D | test_lwt_seg6local.c | 144 err = bpf_skb_load_bytes(skb, cur_off, &tlv, sizeof(tlv)); in is_valid_tlv_boundary() 238 err = bpf_skb_load_bytes(skb, tlv_off, &tlv, sizeof(tlv)); in delete_tlv() 265 if (bpf_skb_load_bytes(skb, tlv_offset, &tlv, sizeof(struct sr6_tlv_t))) in has_egr_tlv() 271 if (bpf_skb_load_bytes(skb, tlv_offset + 4, &egr_addr, 16)) in has_egr_tlv()
|
H A D | skb_load_bytes.c | 16 test_result = bpf_skb_load_bytes(skb, load_offset, buf, 10); in skb_process()
|
H A D | test_select_reuseport_kern.c | 122 if (bpf_skb_load_bytes(reuse_md, th->doff << 2, &cmd_copy, in _select_by_skb_data() 138 if (bpf_skb_load_bytes(reuse_md, sizeof(struct udphdr), in _select_by_skb_data()
|
H A D | cgroup_tcp_skb.c | 31 if (bpf_skb_load_bytes(skb, 0, &ip6h, sizeof(ip6h))) in needed_tcp_pkt() 37 if (bpf_skb_load_bytes(skb, sizeof(ip6h), tcph, sizeof(*tcph))) in needed_tcp_pkt()
|
H A D | verifier_array_access.c | 425 __imm(bpf_skb_load_bytes), in a_read_only_array_2_2() 475 __imm(bpf_skb_load_bytes), in a_write_only_array_2_1()
|
H A D | fexit_bpf2bpf.c | 133 if (bpf_skb_load_bytes(skb, 14, &ip6, sizeof(ip6)) < 0) in new_get_skb_ifindex()
|
H A D | verifier_bounds_mix_sign_unsign.c | 237 __imm(bpf_skb_load_bytes) in signed_and_unsigned_variant_6()
|
H A D | test_seg6_loop.c | 147 err = bpf_skb_load_bytes(skb, cur_off, &tlv, sizeof(tlv)); in is_valid_tlv_boundary()
|
H A D | test_cls_redirect.c | 157 if (bpf_skb_load_bytes(buf->skb, buf_off(buf), dst, len)) { in buf_copy() 424 rc = bpf_skb_load_bytes( in forward_with_gre() 449 rc = bpf_skb_load_bytes( in forward_with_gre()
|
H A D | verifier_helper_packet_access.c | 301 : __imm(bpf_skb_load_bytes), in test12_cls_unsuitable_helper_2()
|
H A D | test_cls_redirect_dynptr.c | 319 rc = bpf_skb_load_bytes( in forward_with_gre() 344 rc = bpf_skb_load_bytes( in forward_with_gre()
|
H A D | bpf_flow.c | 109 if (bpf_skb_load_bytes(skb, thoff, buffer, hdr_size)) in bpf_flow_dissect_get_header()
|
/openbmc/linux/samples/bpf/ |
H A D | test_lwt_bpf.c | 90 ret = bpf_skb_load_bytes(skb, IP_PROTO_OFF, &proto, 1); in rewrite() 146 ret = bpf_skb_load_bytes(skb, IP_DST_OFF, &old_ip, 4); in do_test_rewrite()
|
H A D | hbm_kern.h | 116 bpf_skb_load_bytes(skb, 0, &iph, 12); in hbm_get_pkt_info()
|
/openbmc/linux/Documentation/bpf/ |
H A D | map_array.rst | 128 if (bpf_skb_load_bytes(skb, ETH_HLEN, &ip, sizeof(ip)) < 0)
|
/openbmc/linux/net/core/ |
H A D | filter.c | 1737 BPF_CALL_4(bpf_skb_load_bytes, const struct sk_buff *, skb, u32, offset, in BPF_CALL_4() argument 1758 .func = bpf_skb_load_bytes,
|