• Home
  • Raw
  • Download

Lines Matching refs:size

163 bpf_probe_read_user_common(void *dst, u32 size, const void __user *unsafe_ptr)  in bpf_probe_read_user_common()  argument
167 ret = copy_from_user_nofault(dst, unsafe_ptr, size); in bpf_probe_read_user_common()
169 memset(dst, 0, size); in bpf_probe_read_user_common()
173 BPF_CALL_3(bpf_probe_read_user, void *, dst, u32, size, in BPF_CALL_3() argument
176 return bpf_probe_read_user_common(dst, size, unsafe_ptr); in BPF_CALL_3()
189 bpf_probe_read_user_str_common(void *dst, u32 size, in bpf_probe_read_user_str_common() argument
204 ret = strncpy_from_user_nofault(dst, unsafe_ptr, size); in bpf_probe_read_user_str_common()
206 memset(dst, 0, size); in bpf_probe_read_user_str_common()
210 BPF_CALL_3(bpf_probe_read_user_str, void *, dst, u32, size, in BPF_CALL_3() argument
213 return bpf_probe_read_user_str_common(dst, size, unsafe_ptr); in BPF_CALL_3()
226 bpf_probe_read_kernel_common(void *dst, u32 size, const void *unsafe_ptr) in bpf_probe_read_kernel_common() argument
230 ret = copy_from_kernel_nofault(dst, unsafe_ptr, size); in bpf_probe_read_kernel_common()
232 memset(dst, 0, size); in bpf_probe_read_kernel_common()
236 BPF_CALL_3(bpf_probe_read_kernel, void *, dst, u32, size, in BPF_CALL_3() argument
239 return bpf_probe_read_kernel_common(dst, size, unsafe_ptr); in BPF_CALL_3()
252 bpf_probe_read_kernel_str_common(void *dst, u32 size, const void *unsafe_ptr) in bpf_probe_read_kernel_str_common() argument
265 ret = strncpy_from_kernel_nofault(dst, unsafe_ptr, size); in bpf_probe_read_kernel_str_common()
267 memset(dst, 0, size); in bpf_probe_read_kernel_str_common()
271 BPF_CALL_3(bpf_probe_read_kernel_str, void *, dst, u32, size, in BPF_CALL_3() argument
274 return bpf_probe_read_kernel_str_common(dst, size, unsafe_ptr); in BPF_CALL_3()
287 BPF_CALL_3(bpf_probe_read_compat, void *, dst, u32, size, in BPF_CALL_3() argument
291 return bpf_probe_read_user_common(dst, size, in BPF_CALL_3()
294 return bpf_probe_read_kernel_common(dst, size, unsafe_ptr); in BPF_CALL_3()
306 BPF_CALL_3(bpf_probe_read_compat_str, void *, dst, u32, size, in BPF_CALL_3() argument
310 return bpf_probe_read_user_str_common(dst, size, in BPF_CALL_3()
313 return bpf_probe_read_kernel_str_common(dst, size, unsafe_ptr); in BPF_CALL_3()
327 u32, size) in BPF_CALL_3() argument
348 return copy_to_user_nofault(unsafe_ptr, src, size); in BPF_CALL_3()
594 struct bpf_perf_event_value *, buf, u32, size) in BPF_CALL_4() argument
598 if (unlikely(size != sizeof(struct bpf_perf_event_value))) in BPF_CALL_4()
606 memset(buf, 0, size); in BPF_CALL_4()
661 u64, flags, void *, data, u64, size) in BPF_CALL_5() argument
666 .size = size, in BPF_CALL_5()
723 .size = ctx_size, in bpf_event_output()
731 .size = meta_size, in bpf_event_output()
1151 BPF_CALL_3(bpf_get_branch_snapshot, void *, buf, u32, size, u64, flags) in BPF_CALL_3() argument
1157 u32 entry_cnt = size / br_entry_size; in BPF_CALL_3()
1560 static bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, in kprobe_prog_is_valid_access() argument
1568 if (off % size != 0) in kprobe_prog_is_valid_access()
1574 if (off + size > sizeof(struct pt_regs)) in kprobe_prog_is_valid_access()
1589 u64, flags, void *, data, u64, size) in BPF_CALL_5() argument
1598 return ____bpf_perf_event_output(regs, map, flags, data, size); in BPF_CALL_5()
1635 BPF_CALL_4(bpf_get_stack_tp, void *, tp_buff, void *, buf, u32, size, in BPF_CALL_4() argument
1641 (unsigned long) size, flags, 0); in BPF_CALL_4()
1671 static bool tp_prog_is_valid_access(int off, int size, enum bpf_access_type type, in tp_prog_is_valid_access() argument
1679 if (off % size != 0) in tp_prog_is_valid_access()
1695 struct bpf_perf_event_value *, buf, u32, size) in BPF_CALL_3() argument
1699 if (unlikely(size != sizeof(struct bpf_perf_event_value))) in BPF_CALL_3()
1707 memset(buf, 0, size); in BPF_CALL_3()
1721 void *, buf, u32, size, u64, flags) in BPF_CALL_4() argument
1739 if (!buf || (size % br_entry_size != 0)) in BPF_CALL_4()
1742 to_copy = min_t(u32, br_stack->nr * br_entry_size, size); in BPF_CALL_4()
1811 struct bpf_map *, map, u64, flags, void *, data, u64, size) in BPF_CALL_5() argument
1820 ret = ____bpf_perf_event_output(regs, map, flags, data, size); in BPF_CALL_5()
1868 void *, buf, u32, size, u64, flags) in BPF_CALL_4() argument
1878 (unsigned long) size, flags, 0); in BPF_CALL_4()
1974 static bool raw_tp_prog_is_valid_access(int off, int size, in raw_tp_prog_is_valid_access() argument
1979 return bpf_tracing_ctx_access(off, size, type); in raw_tp_prog_is_valid_access()
1982 static bool tracing_prog_is_valid_access(int off, int size, in tracing_prog_is_valid_access() argument
1987 return bpf_tracing_btf_ctx_access(off, size, type, prog, info); in tracing_prog_is_valid_access()
2017 static bool raw_tp_writable_prog_is_valid_access(int off, int size, in raw_tp_writable_prog_is_valid_access() argument
2023 if (size != sizeof(u64) || type != BPF_READ) in raw_tp_writable_prog_is_valid_access()
2027 return raw_tp_prog_is_valid_access(off, size, type, prog, info); in raw_tp_writable_prog_is_valid_access()
2038 static bool pe_prog_is_valid_access(int off, int size, enum bpf_access_type type, in pe_prog_is_valid_access() argument
2048 if (off % size != 0) { in pe_prog_is_valid_access()
2051 if (size != 8) in pe_prog_is_valid_access()
2053 if (off % size != 4) in pe_prog_is_valid_access()
2060 if (!bpf_ctx_narrow_access_ok(off, size, size_u64)) in pe_prog_is_valid_access()
2065 if (!bpf_ctx_narrow_access_ok(off, size, size_u64)) in pe_prog_is_valid_access()
2069 if (size != sizeof(long)) in pe_prog_is_valid_access()
2558 static void bpf_kprobe_multi_cookie_swap(void *a, void *b, int size, const void *priv) in bpf_kprobe_multi_cookie_swap() argument
2668 static void symbols_swap_r(void *a, void *b, int size, const void *priv) in symbols_swap_r() argument
2702 u32 flags, cnt, size; in bpf_kprobe_multi_link_attach() local
2728 size = cnt * sizeof(*addrs); in bpf_kprobe_multi_link_attach()
2740 if (copy_from_user(cookies, ucookies, size)) { in bpf_kprobe_multi_link_attach()
2747 if (copy_from_user(addrs, uaddrs, size)) { in bpf_kprobe_multi_link_attach()