• Home
  • Raw
  • Download

Lines Matching refs:size

141 BPF_CALL_3(bpf_probe_read, void *, dst, u32, size, const void *, unsafe_ptr)  in BPF_CALL_3()  argument
149 ret = probe_kernel_read(dst, unsafe_ptr, size); in BPF_CALL_3()
152 memset(dst, 0, size); in BPF_CALL_3()
167 u32, size) in BPF_CALL_3() argument
190 return probe_user_write(unsafe_ptr, src, size); in BPF_CALL_3()
393 struct bpf_perf_event_value *, buf, u32, size) in BPF_CALL_4() argument
397 if (unlikely(size != sizeof(struct bpf_perf_event_value))) in BPF_CALL_4()
405 memset(buf, 0, size); in BPF_CALL_4()
460 u64, flags, void *, data, u64, size) in BPF_CALL_5() argument
466 .size = size, in BPF_CALL_5()
519 .size = ctx_size, in bpf_event_output()
527 .size = meta_size, in bpf_event_output()
586 BPF_CALL_3(bpf_probe_read_str, void *, dst, u32, size, in BPF_CALL_3() argument
604 ret = strncpy_from_unsafe(dst, unsafe_ptr, size); in BPF_CALL_3()
607 memset(dst, 0, size); in BPF_CALL_3()
763 static bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, in kprobe_prog_is_valid_access() argument
771 if (off % size != 0) in kprobe_prog_is_valid_access()
777 if (off + size > sizeof(struct pt_regs)) in kprobe_prog_is_valid_access()
792 u64, flags, void *, data, u64, size) in BPF_CALL_5() argument
801 return ____bpf_perf_event_output(regs, map, flags, data, size); in BPF_CALL_5()
838 BPF_CALL_4(bpf_get_stack_tp, void *, tp_buff, void *, buf, u32, size, in BPF_CALL_4() argument
844 (unsigned long) size, flags, 0); in BPF_CALL_4()
872 static bool tp_prog_is_valid_access(int off, int size, enum bpf_access_type type, in tp_prog_is_valid_access() argument
880 if (off % size != 0) in tp_prog_is_valid_access()
896 struct bpf_perf_event_value *, buf, u32, size) in BPF_CALL_3() argument
900 if (unlikely(size != sizeof(struct bpf_perf_event_value))) in BPF_CALL_3()
908 memset(buf, 0, size); in BPF_CALL_3()
970 struct bpf_map *, map, u64, flags, void *, data, u64, size) in BPF_CALL_5() argument
979 ret = ____bpf_perf_event_output(regs, map, flags, data, size); in BPF_CALL_5()
1023 void *, buf, u32, size, u64, flags) in BPF_CALL_4() argument
1033 (unsigned long) size, flags, 0); in BPF_CALL_4()
1063 static bool raw_tp_prog_is_valid_access(int off, int size, in raw_tp_prog_is_valid_access() argument
1073 if (off % size != 0) in raw_tp_prog_is_valid_access()
1086 static bool raw_tp_writable_prog_is_valid_access(int off, int size, in raw_tp_writable_prog_is_valid_access() argument
1092 if (size != sizeof(u64) || type != BPF_READ) in raw_tp_writable_prog_is_valid_access()
1096 return raw_tp_prog_is_valid_access(off, size, type, prog, info); in raw_tp_writable_prog_is_valid_access()
1107 static bool pe_prog_is_valid_access(int off, int size, enum bpf_access_type type, in pe_prog_is_valid_access() argument
1117 if (off % size != 0) { in pe_prog_is_valid_access()
1120 if (size != 8) in pe_prog_is_valid_access()
1122 if (off % size != 4) in pe_prog_is_valid_access()
1129 if (!bpf_ctx_narrow_access_ok(off, size, size_u64)) in pe_prog_is_valid_access()
1134 if (!bpf_ctx_narrow_access_ok(off, size, size_u64)) in pe_prog_is_valid_access()
1138 if (size != sizeof(long)) in pe_prog_is_valid_access()