/kernel/ |
D | kallsyms.c | 42 static unsigned int kallsyms_expand_symbol(unsigned int off, in kallsyms_expand_symbol() argument 50 data = &kallsyms_names[off]; in kallsyms_expand_symbol() 53 off++; in kallsyms_expand_symbol() 59 off++; in kallsyms_expand_symbol() 66 off += len; in kallsyms_expand_symbol() 95 return off; in kallsyms_expand_symbol() 102 static char kallsyms_get_symbol_type(unsigned int off) in kallsyms_get_symbol_type() argument 108 return kallsyms_token_table[kallsyms_token_index[kallsyms_names[off + 1]]]; in kallsyms_get_symbol_type() 216 unsigned int seq, off; in kallsyms_lookup_names() local 225 off = get_symbol_offset(seq); in kallsyms_lookup_names() [all …]
|
D | kheaders.c | 35 char *buf, loff_t off, size_t len) in ikheaders_read() argument 37 memcpy(buf, &kernel_headers_data[off], len); in ikheaders_read()
|
D | params.c | 474 int i, off, ret; in param_array_get() local 478 for (i = off = 0; i < (arr->num ? *arr->num : arr->max); i++) { in param_array_get() 481 buffer[off - 1] = ','; in param_array_get() 484 ret = arr->ops->get(buffer + off, &p); in param_array_get() 487 off += ret; in param_array_get() 489 buffer[off] = '\0'; in param_array_get() 490 return off; in param_array_get()
|
D | kcov.c | 480 unsigned long size, off; in kcov_mmap() local 493 for (off = 0; off < size; off += PAGE_SIZE) { in kcov_mmap() 494 page = vmalloc_to_page(kcov->area + off); in kcov_mmap() 495 res = vm_insert_page(vma, vma->vm_start + off, page); in kcov_mmap()
|
D | ksysfs.c | 198 char *buf, loff_t off, size_t count) in notes_read() argument 200 memcpy(buf, &__start_notes + off, count); in notes_read()
|
/kernel/bpf/ |
D | core.c | 310 dst[i].off == 0) { in bpf_prog_calc_tag() 370 s32 off = insn->off; in bpf_adj_delta_to_off() local 372 if (curr < pos && curr + off + 1 >= end_old) in bpf_adj_delta_to_off() 373 off += delta; in bpf_adj_delta_to_off() 374 else if (curr >= end_new && curr + off + 1 < end_new) in bpf_adj_delta_to_off() 375 off -= delta; in bpf_adj_delta_to_off() 376 if (off < off_min || off > off_max) in bpf_adj_delta_to_off() 379 insn->off = off; in bpf_adj_delta_to_off() 430 static void bpf_adj_linfo(struct bpf_prog *prog, u32 off, u32 delta) in bpf_adj_linfo() argument 442 if (off < linfo[i].insn_off) in bpf_adj_linfo() [all …]
|
D | verifier.c | 622 static int get_spi(s32 off) in get_spi() argument 624 return (-off - 1) / BPF_REG_SIZE; in get_spi() 716 spi = get_spi(reg->off); in mark_stack_slots_dynptr() 752 spi = get_spi(reg->off); in unmark_stack_slots_dynptr() 779 int spi = get_spi(reg->off); in is_dynptr_reg_valid_uninit() 798 int spi = get_spi(reg->off); in is_dynptr_reg_valid_init() 820 int spi = get_spi(reg->off); in is_dynptr_type_expected() 871 verbose(env, "%lld", reg->var_off.value + reg->off); in print_verifier_state() 890 verbose_a("off=%d", reg->off); in print_verifier_state() 965 verbose(env, "%lld", reg->var_off.value + reg->off); in print_verifier_state() [all …]
|
D | bpf_fuse.c | 32 static bool fuse_prog_is_valid_access(int off, int size, in fuse_prog_is_valid_access() argument 39 if (off < 0 || off > offsetofend(struct fuse_bpf_args, out_args)) in fuse_prog_is_valid_access() 44 if (off == offsetof(struct fuse_bpf_args, in_args[i].value)) { in fuse_prog_is_valid_access() 53 if (off == offsetof(struct fuse_bpf_args, out_args[i].value)) { in fuse_prog_is_valid_access()
|
D | disasm.c | 169 insn->off, insn->src_reg); in print_bpf_insn() 176 insn->dst_reg, insn->off, in print_bpf_insn() 189 insn->dst_reg, insn->off, insn->src_reg); in print_bpf_insn() 196 insn->dst_reg, insn->off, in print_bpf_insn() 204 insn->dst_reg, insn->off, insn->src_reg); in print_bpf_insn() 214 insn->off, insn->imm); in print_bpf_insn() 228 insn->src_reg, insn->off); in print_bpf_insn() 281 insn->code, insn->off); in print_bpf_insn() 291 insn->src_reg, insn->off); in print_bpf_insn() 298 insn->imm, insn->off); in print_bpf_insn()
|
D | btf.c | 278 u32 off; member 3217 u32 off; member 3222 u32 off, int sz, struct btf_field_info *info) in btf_find_struct() argument 3228 info->off = off; in btf_find_struct() 3233 u32 off, int sz, struct btf_field_info *info) in btf_find_kptr() argument 3262 info->off = off; in btf_find_kptr() 3275 u32 i, off; in btf_find_struct_field() local 3284 off = __btf_member_bit_offset(t, member); in btf_find_struct_field() 3285 if (off % 8) in btf_find_struct_field() 3288 off /= 8; in btf_find_struct_field() [all …]
|
D | arraymap.c | 175 u32 off) in array_map_direct_value_addr() argument 181 if (off >= map->value_size) in array_map_direct_value_addr() 189 u32 *off) in array_map_direct_value_meta() argument 200 *off = imm - base; in array_map_direct_value_meta() 268 int cpu, off = 0; in bpf_percpu_array_copy() local 282 copy_map_value_long(map, value + off, per_cpu_ptr(pptr, cpu)); in bpf_percpu_array_copy() 283 check_and_init_map_value(map, value + off); in bpf_percpu_array_copy() 284 off += size; in bpf_percpu_array_copy() 363 int cpu, off = 0; in bpf_percpu_array_update() local 388 copy_map_value_long(map, per_cpu_ptr(pptr, cpu), value + off); in bpf_percpu_array_update() [all …]
|
D | sysfs_btf.c | 18 char *buf, loff_t off, size_t len) in btf_vmlinux_read() argument 20 memcpy(buf, __start_BTF + off, len); in btf_vmlinux_read()
|
D | cgroup.c | 1622 static bool cgroup_dev_is_valid_access(int off, int size, in cgroup_dev_is_valid_access() argument 1632 if (off < 0 || off + size > sizeof(struct bpf_cgroup_dev_ctx)) in cgroup_dev_is_valid_access() 1635 if (off % size != 0) in cgroup_dev_is_valid_access() 1638 switch (off) { in cgroup_dev_is_valid_access() 1641 if (!bpf_ctx_narrow_access_ok(off, size, size_default)) in cgroup_dev_is_valid_access() 2180 static bool sysctl_is_valid_access(int off, int size, enum bpf_access_type type, in sysctl_is_valid_access() argument 2186 if (off < 0 || off + size > sizeof(struct bpf_sysctl) || off % size) in sysctl_is_valid_access() 2189 switch (off) { in sysctl_is_valid_access() 2194 return bpf_ctx_narrow_access_ok(off, size, size_default); in sysctl_is_valid_access() 2198 return bpf_ctx_narrow_access_ok(off, size, size_default); in sysctl_is_valid_access() [all …]
|
D | local_storage.c | 187 int cpu, off = 0; in bpf_percpu_cgroup_storage_copy() local 203 bpf_long_memcpy(value + off, in bpf_percpu_cgroup_storage_copy() 205 off += size; in bpf_percpu_cgroup_storage_copy() 216 int cpu, off = 0; in bpf_percpu_cgroup_storage_update() local 238 value + off, size); in bpf_percpu_cgroup_storage_update() 239 off += size; in bpf_percpu_cgroup_storage_update()
|
D | hashtab.c | 933 int off = 0, cpu; in pcpu_copy_value() local 937 value + off, size); in pcpu_copy_value() 938 off += size; in pcpu_copy_value() 1590 int off = 0, cpu; in __htab_map_lookup_and_delete_elem() local 1594 bpf_long_memcpy(value + off, in __htab_map_lookup_and_delete_elem() 1597 off += roundup_value_size; in __htab_map_lookup_and_delete_elem() 1786 int off = 0, cpu; in __htab_map_lookup_and_delete_batch() local 1791 bpf_long_memcpy(dst_val + off, in __htab_map_lookup_and_delete_batch() 1793 off += size; in __htab_map_lookup_and_delete_batch() 2047 int ret = 0, off = 0, cpu; in __bpf_hash_map_seq_show() local [all …]
|
D | syscall.c | 522 return bsearch(&offset, tab->off, tab->nr_off, sizeof(tab->off[0]), bpf_map_kptr_off_cmp); in bpf_map_kptr_off_contains() 533 if (tab->off[i].kptr.module) in bpf_map_free_kptr_off_tab() 534 module_put(tab->off[i].kptr.module); in bpf_map_free_kptr_off_tab() 535 btf_put(tab->off[i].kptr.btf); in bpf_map_free_kptr_off_tab() 548 size = offsetof(struct bpf_map_value_off, off[tab->nr_off]); in bpf_map_copy_kptr_off_tab() 554 btf_get(tab->off[i].kptr.btf); in bpf_map_copy_kptr_off_tab() 555 if (tab->off[i].kptr.module && !try_module_get(tab->off[i].kptr.module)) { in bpf_map_copy_kptr_off_tab() 557 if (tab->off[i].kptr.module) in bpf_map_copy_kptr_off_tab() 558 module_put(tab->off[i].kptr.module); in bpf_map_copy_kptr_off_tab() 559 btf_put(tab->off[i].kptr.btf); in bpf_map_copy_kptr_off_tab() [all …]
|
D | offload.c | 178 bpf_prog_offload_replace_insn(struct bpf_verifier_env *env, u32 off, in bpf_prog_offload_replace_insn() argument 190 ret = ops->replace_insn(env, off, insn); in bpf_prog_offload_replace_insn() 197 bpf_prog_offload_remove_insns(struct bpf_verifier_env *env, u32 off, u32 cnt) in bpf_prog_offload_remove_insns() argument 206 ret = offload->offdev->ops->remove_insns(env, off, cnt); in bpf_prog_offload_remove_insns()
|
/kernel/time/ |
D | namespace.c | 142 static struct timens_offset offset_from_ts(struct timespec64 off) in offset_from_ts() argument 146 ret.sec = off.tv_sec; in offset_from_ts() 147 ret.nsec = off.tv_nsec; in offset_from_ts() 381 struct proc_timens_offset *off = &offsets[i]; in proc_timens_set_offset() local 383 switch (off->clockid) { in proc_timens_set_offset() 397 if (off->val.tv_sec > KTIME_SEC_MAX || in proc_timens_set_offset() 398 off->val.tv_sec < -KTIME_SEC_MAX) in proc_timens_set_offset() 401 tp = timespec64_add(tp, off->val); in proc_timens_set_offset() 419 struct proc_timens_offset *off = &offsets[i]; in proc_timens_set_offset() local 422 switch (off->clockid) { in proc_timens_set_offset() [all …]
|
/kernel/gcov/ |
D | base.c | 63 size_t store_gcov_u32(void *buffer, size_t off, u32 v) in store_gcov_u32() argument 68 data = buffer + off; in store_gcov_u32() 87 size_t store_gcov_u64(void *buffer, size_t off, u64 v) in store_gcov_u64() argument 92 data = buffer + off; in store_gcov_u64()
|
D | gcov.h | 63 size_t store_gcov_u32(void *buffer, size_t off, u32 v); 64 size_t store_gcov_u64(void *buffer, size_t off, u64 v);
|
/kernel/power/ |
D | swap.c | 696 size_t off; in save_image_lzo() local 787 for (off = 0; off < LZO_UNC_SIZE; off += PAGE_SIZE) { in save_image_lzo() 795 memcpy(data[thr].unc + off, in save_image_lzo() 803 if (!off) in save_image_lzo() 806 data[thr].unc_len = off; in save_image_lzo() 849 for (off = 0; in save_image_lzo() 850 off < LZO_HEADER + data[thr].cmp_len; in save_image_lzo() 851 off += PAGE_SIZE) { in save_image_lzo() 852 memcpy(page, data[thr].cmp + off, PAGE_SIZE); in save_image_lzo() 1184 size_t off; in load_image_lzo() local [all …]
|
/kernel/dma/ |
D | ops_helpers.c | 42 unsigned long off = vma->vm_pgoff; in dma_common_mmap() local 51 if (off >= count || user_count > count - off) in dma_common_mmap()
|
D | coherent.c | 239 unsigned long off = vma->vm_pgoff; in __dma_mmap_from_coherent() local 245 if (off < count && user_count <= count - off) { in __dma_mmap_from_coherent() 246 unsigned long pfn = mem->pfn_base + start + off; in __dma_mmap_from_coherent()
|
/kernel/trace/ |
D | bpf_trace.c | 1560 static bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, in kprobe_prog_is_valid_access() argument 1564 if (off < 0 || off >= sizeof(struct pt_regs)) in kprobe_prog_is_valid_access() 1568 if (off % size != 0) in kprobe_prog_is_valid_access() 1574 if (off + size > sizeof(struct pt_regs)) in kprobe_prog_is_valid_access() 1671 static bool tp_prog_is_valid_access(int off, int size, enum bpf_access_type type, in tp_prog_is_valid_access() argument 1675 if (off < sizeof(void *) || off >= PERF_MAX_TRACE_SIZE) in tp_prog_is_valid_access() 1679 if (off % size != 0) in tp_prog_is_valid_access() 1974 static bool raw_tp_prog_is_valid_access(int off, int size, in raw_tp_prog_is_valid_access() argument 1979 return bpf_tracing_ctx_access(off, size, type); in raw_tp_prog_is_valid_access() 1982 static bool tracing_prog_is_valid_access(int off, int size, in tracing_prog_is_valid_access() argument [all …]
|
/kernel/cgroup/ |
D | cgroup-v1.c | 490 char *buf, size_t nbytes, loff_t off, in __cgroup1_procs_write() argument 536 char *buf, size_t nbytes, loff_t off) in cgroup1_procs_write() argument 538 return __cgroup1_procs_write(of, buf, nbytes, off, true); in cgroup1_procs_write() 542 char *buf, size_t nbytes, loff_t off) in cgroup1_tasks_write() argument 544 return __cgroup1_procs_write(of, buf, nbytes, off, false); in cgroup1_tasks_write() 548 char *buf, size_t nbytes, loff_t off) in cgroup_release_agent_write() argument
|