/linux-6.14.4/tools/testing/selftests/bpf/progs/ |
D | verifier_helper_access_var_len.c | 62 : __imm(bpf_probe_read_kernel) in bitwise_and_jmp_correct_bounds() 120 : __imm(bpf_probe_read_kernel) in bitwise_and_jmp_wrong_max() 152 : __imm(bpf_probe_read_kernel) in memory_stack_jmp_correct_bounds() 184 : __imm(bpf_probe_read_kernel) in stack_jmp_signed_correct_bounds() 208 : __imm(bpf_probe_read_kernel) in memory_stack_jmp_bounds_offset() 231 : __imm(bpf_probe_read_kernel) in memory_stack_jmp_wrong_max() 255 : __imm(bpf_probe_read_kernel) in stack_jmp_no_max_check() 312 : __imm(bpf_probe_read_kernel) in jmp_signed_no_min_check() 342 __imm(bpf_probe_read_kernel), in memory_map_jmp_correct_bounds() 375 __imm(bpf_probe_read_kernel), in memory_map_jmp_wrong_max() [all …]
|
D | verifier_helper_value_access.c | 61 __imm(bpf_probe_read_kernel), in access_to_map_full_range() 87 __imm(bpf_probe_read_kernel), in access_to_map_partial_range() 173 __imm(bpf_probe_read_kernel), in map_out_of_bound_range() 199 __imm(bpf_probe_read_kernel), in access_to_map_negative_range() 225 __imm(bpf_probe_read_kernel), in via_const_imm_full_range() 253 __imm(bpf_probe_read_kernel), in via_const_imm_partial_range() 306 __imm(bpf_probe_read_kernel), in imm_out_of_bound_range() 334 __imm(bpf_probe_read_kernel), in const_imm_negative_range_adjustment_1() 361 __imm(bpf_probe_read_kernel), in const_imm_negative_range_adjustment_2() 389 __imm(bpf_probe_read_kernel), in via_const_reg_full_range() [all …]
|
D | bpf_syscall_macro.c | 46 bpf_probe_read_kernel(&tmp, sizeof(tmp), &PT_REGS_PARM1_SYSCALL(real_regs)); in BPF_KPROBE() 48 bpf_probe_read_kernel(&arg2, sizeof(arg2), &PT_REGS_PARM2_SYSCALL(real_regs)); in BPF_KPROBE() 49 bpf_probe_read_kernel(&arg3, sizeof(arg3), &PT_REGS_PARM3_SYSCALL(real_regs)); in BPF_KPROBE() 50 bpf_probe_read_kernel(&arg4_cx, sizeof(arg4_cx), &PT_REGS_PARM4(real_regs)); in BPF_KPROBE() 51 bpf_probe_read_kernel(&arg4, sizeof(arg4), &PT_REGS_PARM4_SYSCALL(real_regs)); in BPF_KPROBE() 52 bpf_probe_read_kernel(&arg5, sizeof(arg5), &PT_REGS_PARM5_SYSCALL(real_regs)); in BPF_KPROBE()
|
D | verifier_const_or.c | 22 : __imm(bpf_probe_read_kernel) in constant_should_keep_constant_type() 40 : __imm(bpf_probe_read_kernel) in not_bypass_stack_boundary_checks_1() 59 : __imm(bpf_probe_read_kernel) in register_should_keep_constant_type() 78 : __imm(bpf_probe_read_kernel) in not_bypass_stack_boundary_checks_2()
|
D | loop6.c | 44 bpf_probe_read_kernel(&sg, sizeof(sg), sgp); in __sg_next() 50 bpf_probe_read_kernel(&sg, sizeof(sg), sgp); in __sg_next() 61 bpf_probe_read_kernel(&sgp, sizeof(sgp), sgs + i); in get_sgp() 83 bpf_probe_read_kernel(&len, sizeof(len), &sgp->length); in BPF_KPROBE() 93 bpf_probe_read_kernel(&len, sizeof(len), &sgp->length); in BPF_KPROBE()
|
D | trace_dummy_st_ops.c | 14 bpf_probe_read_kernel(&state, sizeof(__u64), (void *)st_ops_ctx); in BPF_PROG() 16 bpf_probe_read_kernel(&val, sizeof(__u32), (void *)state); in BPF_PROG()
|
D | test_task_pt_regs.c | 25 if (bpf_probe_read_kernel(current_regs, PT_REGS_SIZE, regs)) in handle_uprobe() 27 if (bpf_probe_read_kernel(ctx_regs, PT_REGS_SIZE, ctx)) in handle_uprobe()
|
D | bpf_iter_netlink.c | 41 bpf_probe_read_kernel(&group, sizeof(group), &nlk->groups[0]); in dump_netlink() 58 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in dump_netlink()
|
D | cgrp_kfunc_common.h | 35 status = bpf_probe_read_kernel(&id, sizeof(id), &cgrp->self.id); in cgrps_kfunc_map_value_lookup() 49 status = bpf_probe_read_kernel(&id, sizeof(id), &cgrp->self.id); in cgrps_kfunc_map_insert()
|
D | task_kfunc_common.h | 35 status = bpf_probe_read_kernel(&pid, sizeof(pid), &p->pid); in tasks_kfunc_map_value_lookup() 49 status = bpf_probe_read_kernel(&pid, sizeof(pid), &p->pid); in tasks_kfunc_map_insert()
|
D | test_module_attach.c | 118 bpf_probe_read_kernel(&buf, 8, ret); in BPF_PROG() 119 bpf_probe_read_kernel(&buf, 8, (char *)ret + 256); in BPF_PROG()
|
D | kfree_skb.c | 88 bpf_probe_read_kernel(&pkt_type, sizeof(pkt_type), _(&skb->__pkt_type_offset)); in BPF_PROG() 92 bpf_probe_read_kernel(&pkt_data, sizeof(pkt_data), data + 12); in BPF_PROG()
|
D | test_skb_helpers.c | 25 bpf_probe_read_kernel(&tpid , sizeof(tpid), &task->tgid); in test_skb_helpers()
|
D | profiler.inc.h | 157 if (bpf_probe_read_kernel(dst, len, src)) in probe_read_lim() 160 if (bpf_probe_read_kernel(dst, 1, src)) in probe_read_lim() 392 bpf_probe_read_kernel(&arr_struct->array[0], in trace_var_sys_kill() 407 bpf_probe_read_kernel(&arr_struct->array[i], in trace_var_sys_kill() 426 bpf_probe_read_kernel(&arr_struct->array[index], in trace_var_sys_kill() 434 bpf_probe_read_kernel(&arr_struct->array[index], in trace_var_sys_kill() 636 bpf_probe_read_kernel(kill_data, sizeof(*past_kill_data), in raw_tracepoint__sched_process_exit()
|
D | read_vsyscall.c | 28 read_ret[0] = bpf_probe_read_kernel(buf, sizeof(buf), user_ptr); in do_probe_read()
|
D | task_kfunc_failure.c | 201 status = bpf_probe_read_kernel(&pid, sizeof(pid), &task->pid); in BPF_PROG() 299 bpf_probe_read_kernel(task->comm, 16, task->comm); in BPF_PROG()
|
D | task_kfunc_success.c | 202 bpf_probe_read_kernel(&refcnt, sizeof(refcnt), &acquired->rcu_users); in BPF_PROG() 215 bpf_probe_read_kernel(&refcnt_after_drop, sizeof(refcnt_after_drop), &kptr->rcu_users); in BPF_PROG()
|
D | test_skmsg_load_helpers.c | 39 bpf_probe_read_kernel(&tpid , sizeof(tpid), &task->tgid); in prog_msg_verdict_common()
|
D | bpf_iter_unix.c | 20 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
|
D | bpf_iter_udp4.c | 20 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
|
D | test_verify_pkcs7_sig.c | 57 ret = bpf_probe_read_kernel(&value, sizeof(value), &attr->value); in BPF_PROG()
|
D | bpf_iter_udp6.c | 27 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
|
D | verifier_var_off.c | 291 : __imm(bpf_probe_read_kernel) in zero_sized_access_max_out_of_bound()
|
/linux-6.14.4/tools/lib/bpf/ |
D | bpf_core_read.h | 48 bpf_probe_read_kernel( \ 58 bpf_probe_read_kernel( \ 312 bpf_probe_read_kernel(dst, sz, (const void *)__builtin_preserve_access_index(src)) 444 ___core_read(bpf_probe_read_kernel, bpf_probe_read_kernel, \ 480 ___core_read(bpf_probe_read_kernel_str, bpf_probe_read_kernel, \
|
D | usdt.bpf.h | 153 err = bpf_probe_read_kernel(&val, sizeof(val), (void *)ctx + arg_spec->reg_off); in bpf_usdt_arg() 165 err = bpf_probe_read_kernel(&val, sizeof(val), (void *)ctx + arg_spec->reg_off); in bpf_usdt_arg()
|