• Home
  • Raw
  • Download

Lines Matching refs:size

153 bpf_probe_read_user_common(void *dst, u32 size, const void __user *unsafe_ptr)  in bpf_probe_read_user_common()  argument
157 ret = copy_from_user_nofault(dst, unsafe_ptr, size); in bpf_probe_read_user_common()
159 memset(dst, 0, size); in bpf_probe_read_user_common()
163 BPF_CALL_3(bpf_probe_read_user, void *, dst, u32, size, in BPF_CALL_3() argument
166 return bpf_probe_read_user_common(dst, size, unsafe_ptr); in BPF_CALL_3()
179 bpf_probe_read_user_str_common(void *dst, u32 size, in bpf_probe_read_user_str_common() argument
194 ret = strncpy_from_user_nofault(dst, unsafe_ptr, size); in bpf_probe_read_user_str_common()
196 memset(dst, 0, size); in bpf_probe_read_user_str_common()
200 BPF_CALL_3(bpf_probe_read_user_str, void *, dst, u32, size, in BPF_CALL_3() argument
203 return bpf_probe_read_user_str_common(dst, size, unsafe_ptr); in BPF_CALL_3()
216 bpf_probe_read_kernel_common(void *dst, u32 size, const void *unsafe_ptr) in bpf_probe_read_kernel_common() argument
220 ret = copy_from_kernel_nofault(dst, unsafe_ptr, size); in bpf_probe_read_kernel_common()
222 memset(dst, 0, size); in bpf_probe_read_kernel_common()
226 BPF_CALL_3(bpf_probe_read_kernel, void *, dst, u32, size, in BPF_CALL_3() argument
229 return bpf_probe_read_kernel_common(dst, size, unsafe_ptr); in BPF_CALL_3()
242 bpf_probe_read_kernel_str_common(void *dst, u32 size, const void *unsafe_ptr) in bpf_probe_read_kernel_str_common() argument
255 ret = strncpy_from_kernel_nofault(dst, unsafe_ptr, size); in bpf_probe_read_kernel_str_common()
257 memset(dst, 0, size); in bpf_probe_read_kernel_str_common()
261 BPF_CALL_3(bpf_probe_read_kernel_str, void *, dst, u32, size, in BPF_CALL_3() argument
264 return bpf_probe_read_kernel_str_common(dst, size, unsafe_ptr); in BPF_CALL_3()
277 BPF_CALL_3(bpf_probe_read_compat, void *, dst, u32, size, in BPF_CALL_3() argument
281 return bpf_probe_read_user_common(dst, size, in BPF_CALL_3()
284 return bpf_probe_read_kernel_common(dst, size, unsafe_ptr); in BPF_CALL_3()
296 BPF_CALL_3(bpf_probe_read_compat_str, void *, dst, u32, size, in BPF_CALL_3() argument
300 return bpf_probe_read_user_str_common(dst, size, in BPF_CALL_3()
303 return bpf_probe_read_kernel_str_common(dst, size, unsafe_ptr); in BPF_CALL_3()
317 u32, size) in BPF_CALL_3() argument
340 return copy_to_user_nofault(unsafe_ptr, src, size); in BPF_CALL_3()
542 struct bpf_perf_event_value *, buf, u32, size) in BPF_CALL_4() argument
546 if (unlikely(size != sizeof(struct bpf_perf_event_value))) in BPF_CALL_4()
554 memset(buf, 0, size); in BPF_CALL_4()
609 u64, flags, void *, data, u64, size) in BPF_CALL_5() argument
615 .size = size, in BPF_CALL_5()
667 .size = ctx_size, in bpf_event_output()
675 .size = meta_size, in bpf_event_output()
1180 static bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, in kprobe_prog_is_valid_access() argument
1188 if (off % size != 0) in kprobe_prog_is_valid_access()
1194 if (off + size > sizeof(struct pt_regs)) in kprobe_prog_is_valid_access()
1209 u64, flags, void *, data, u64, size) in BPF_CALL_5() argument
1218 return ____bpf_perf_event_output(regs, map, flags, data, size); in BPF_CALL_5()
1255 BPF_CALL_4(bpf_get_stack_tp, void *, tp_buff, void *, buf, u32, size, in BPF_CALL_4() argument
1261 (unsigned long) size, flags, 0); in BPF_CALL_4()
1291 static bool tp_prog_is_valid_access(int off, int size, enum bpf_access_type type, in tp_prog_is_valid_access() argument
1299 if (off % size != 0) in tp_prog_is_valid_access()
1315 struct bpf_perf_event_value *, buf, u32, size) in BPF_CALL_3() argument
1319 if (unlikely(size != sizeof(struct bpf_perf_event_value))) in BPF_CALL_3()
1327 memset(buf, 0, size); in BPF_CALL_3()
1341 void *, buf, u32, size, u64, flags) in BPF_CALL_4() argument
1356 if (!buf || (size % br_entry_size != 0)) in BPF_CALL_4()
1359 to_copy = min_t(u32, br_stack->nr * br_entry_size, size); in BPF_CALL_4()
1428 struct bpf_map *, map, u64, flags, void *, data, u64, size) in BPF_CALL_5() argument
1437 ret = ____bpf_perf_event_output(regs, map, flags, data, size); in BPF_CALL_5()
1484 void *, buf, u32, size, u64, flags) in BPF_CALL_4() argument
1494 (unsigned long) size, flags, 0); in BPF_CALL_4()
1576 static bool raw_tp_prog_is_valid_access(int off, int size, in raw_tp_prog_is_valid_access() argument
1585 if (off % size != 0) in raw_tp_prog_is_valid_access()
1590 static bool tracing_prog_is_valid_access(int off, int size, in tracing_prog_is_valid_access() argument
1599 if (off % size != 0) in tracing_prog_is_valid_access()
1601 return btf_ctx_access(off, size, type, prog, info); in tracing_prog_is_valid_access()
1631 static bool raw_tp_writable_prog_is_valid_access(int off, int size, in raw_tp_writable_prog_is_valid_access() argument
1637 if (size != sizeof(u64) || type != BPF_READ) in raw_tp_writable_prog_is_valid_access()
1641 return raw_tp_prog_is_valid_access(off, size, type, prog, info); in raw_tp_writable_prog_is_valid_access()
1652 static bool pe_prog_is_valid_access(int off, int size, enum bpf_access_type type, in pe_prog_is_valid_access() argument
1662 if (off % size != 0) { in pe_prog_is_valid_access()
1665 if (size != 8) in pe_prog_is_valid_access()
1667 if (off % size != 4) in pe_prog_is_valid_access()
1674 if (!bpf_ctx_narrow_access_ok(off, size, size_u64)) in pe_prog_is_valid_access()
1679 if (!bpf_ctx_narrow_access_ok(off, size, size_u64)) in pe_prog_is_valid_access()
1683 if (size != sizeof(long)) in pe_prog_is_valid_access()