Home
last modified time | relevance | path

Searched refs:bpf_probe_read_kernel (Results 1 – 25 of 41) sorted by relevance

12

/linux-6.14.4/tools/testing/selftests/bpf/progs/
Dverifier_helper_access_var_len.c62 : __imm(bpf_probe_read_kernel) in bitwise_and_jmp_correct_bounds()
120 : __imm(bpf_probe_read_kernel) in bitwise_and_jmp_wrong_max()
152 : __imm(bpf_probe_read_kernel) in memory_stack_jmp_correct_bounds()
184 : __imm(bpf_probe_read_kernel) in stack_jmp_signed_correct_bounds()
208 : __imm(bpf_probe_read_kernel) in memory_stack_jmp_bounds_offset()
231 : __imm(bpf_probe_read_kernel) in memory_stack_jmp_wrong_max()
255 : __imm(bpf_probe_read_kernel) in stack_jmp_no_max_check()
312 : __imm(bpf_probe_read_kernel) in jmp_signed_no_min_check()
342 __imm(bpf_probe_read_kernel), in memory_map_jmp_correct_bounds()
375 __imm(bpf_probe_read_kernel), in memory_map_jmp_wrong_max()
[all …]
Dverifier_helper_value_access.c61 __imm(bpf_probe_read_kernel), in access_to_map_full_range()
87 __imm(bpf_probe_read_kernel), in access_to_map_partial_range()
173 __imm(bpf_probe_read_kernel), in map_out_of_bound_range()
199 __imm(bpf_probe_read_kernel), in access_to_map_negative_range()
225 __imm(bpf_probe_read_kernel), in via_const_imm_full_range()
253 __imm(bpf_probe_read_kernel), in via_const_imm_partial_range()
306 __imm(bpf_probe_read_kernel), in imm_out_of_bound_range()
334 __imm(bpf_probe_read_kernel), in const_imm_negative_range_adjustment_1()
361 __imm(bpf_probe_read_kernel), in const_imm_negative_range_adjustment_2()
389 __imm(bpf_probe_read_kernel), in via_const_reg_full_range()
[all …]
Dbpf_syscall_macro.c46 bpf_probe_read_kernel(&tmp, sizeof(tmp), &PT_REGS_PARM1_SYSCALL(real_regs)); in BPF_KPROBE()
48 bpf_probe_read_kernel(&arg2, sizeof(arg2), &PT_REGS_PARM2_SYSCALL(real_regs)); in BPF_KPROBE()
49 bpf_probe_read_kernel(&arg3, sizeof(arg3), &PT_REGS_PARM3_SYSCALL(real_regs)); in BPF_KPROBE()
50 bpf_probe_read_kernel(&arg4_cx, sizeof(arg4_cx), &PT_REGS_PARM4(real_regs)); in BPF_KPROBE()
51 bpf_probe_read_kernel(&arg4, sizeof(arg4), &PT_REGS_PARM4_SYSCALL(real_regs)); in BPF_KPROBE()
52 bpf_probe_read_kernel(&arg5, sizeof(arg5), &PT_REGS_PARM5_SYSCALL(real_regs)); in BPF_KPROBE()
Dverifier_const_or.c22 : __imm(bpf_probe_read_kernel) in constant_should_keep_constant_type()
40 : __imm(bpf_probe_read_kernel) in not_bypass_stack_boundary_checks_1()
59 : __imm(bpf_probe_read_kernel) in register_should_keep_constant_type()
78 : __imm(bpf_probe_read_kernel) in not_bypass_stack_boundary_checks_2()
Dloop6.c44 bpf_probe_read_kernel(&sg, sizeof(sg), sgp); in __sg_next()
50 bpf_probe_read_kernel(&sg, sizeof(sg), sgp); in __sg_next()
61 bpf_probe_read_kernel(&sgp, sizeof(sgp), sgs + i); in get_sgp()
83 bpf_probe_read_kernel(&len, sizeof(len), &sgp->length); in BPF_KPROBE()
93 bpf_probe_read_kernel(&len, sizeof(len), &sgp->length); in BPF_KPROBE()
Dtrace_dummy_st_ops.c14 bpf_probe_read_kernel(&state, sizeof(__u64), (void *)st_ops_ctx); in BPF_PROG()
16 bpf_probe_read_kernel(&val, sizeof(__u32), (void *)state); in BPF_PROG()
Dtest_task_pt_regs.c25 if (bpf_probe_read_kernel(current_regs, PT_REGS_SIZE, regs)) in handle_uprobe()
27 if (bpf_probe_read_kernel(ctx_regs, PT_REGS_SIZE, ctx)) in handle_uprobe()
Dbpf_iter_netlink.c41 bpf_probe_read_kernel(&group, sizeof(group), &nlk->groups[0]); in dump_netlink()
58 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in dump_netlink()
Dcgrp_kfunc_common.h35 status = bpf_probe_read_kernel(&id, sizeof(id), &cgrp->self.id); in cgrps_kfunc_map_value_lookup()
49 status = bpf_probe_read_kernel(&id, sizeof(id), &cgrp->self.id); in cgrps_kfunc_map_insert()
Dtask_kfunc_common.h35 status = bpf_probe_read_kernel(&pid, sizeof(pid), &p->pid); in tasks_kfunc_map_value_lookup()
49 status = bpf_probe_read_kernel(&pid, sizeof(pid), &p->pid); in tasks_kfunc_map_insert()
Dtest_module_attach.c118 bpf_probe_read_kernel(&buf, 8, ret); in BPF_PROG()
119 bpf_probe_read_kernel(&buf, 8, (char *)ret + 256); in BPF_PROG()
Dkfree_skb.c88 bpf_probe_read_kernel(&pkt_type, sizeof(pkt_type), _(&skb->__pkt_type_offset)); in BPF_PROG()
92 bpf_probe_read_kernel(&pkt_data, sizeof(pkt_data), data + 12); in BPF_PROG()
Dtest_skb_helpers.c25 bpf_probe_read_kernel(&tpid , sizeof(tpid), &task->tgid); in test_skb_helpers()
Dprofiler.inc.h157 if (bpf_probe_read_kernel(dst, len, src)) in probe_read_lim()
160 if (bpf_probe_read_kernel(dst, 1, src)) in probe_read_lim()
392 bpf_probe_read_kernel(&arr_struct->array[0], in trace_var_sys_kill()
407 bpf_probe_read_kernel(&arr_struct->array[i], in trace_var_sys_kill()
426 bpf_probe_read_kernel(&arr_struct->array[index], in trace_var_sys_kill()
434 bpf_probe_read_kernel(&arr_struct->array[index], in trace_var_sys_kill()
636 bpf_probe_read_kernel(kill_data, sizeof(*past_kill_data), in raw_tracepoint__sched_process_exit()
Dread_vsyscall.c28 read_ret[0] = bpf_probe_read_kernel(buf, sizeof(buf), user_ptr); in do_probe_read()
Dtask_kfunc_failure.c201 status = bpf_probe_read_kernel(&pid, sizeof(pid), &task->pid); in BPF_PROG()
299 bpf_probe_read_kernel(task->comm, 16, task->comm); in BPF_PROG()
Dtask_kfunc_success.c202 bpf_probe_read_kernel(&refcnt, sizeof(refcnt), &acquired->rcu_users); in BPF_PROG()
215 bpf_probe_read_kernel(&refcnt_after_drop, sizeof(refcnt_after_drop), &kptr->rcu_users); in BPF_PROG()
Dtest_skmsg_load_helpers.c39 bpf_probe_read_kernel(&tpid , sizeof(tpid), &task->tgid); in prog_msg_verdict_common()
Dbpf_iter_unix.c20 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
Dbpf_iter_udp4.c20 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
Dtest_verify_pkcs7_sig.c57 ret = bpf_probe_read_kernel(&value, sizeof(value), &attr->value); in BPF_PROG()
Dbpf_iter_udp6.c27 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
Dverifier_var_off.c291 : __imm(bpf_probe_read_kernel) in zero_sized_access_max_out_of_bound()
/linux-6.14.4/tools/lib/bpf/
Dbpf_core_read.h48 bpf_probe_read_kernel( \
58 bpf_probe_read_kernel( \
312 bpf_probe_read_kernel(dst, sz, (const void *)__builtin_preserve_access_index(src))
444 ___core_read(bpf_probe_read_kernel, bpf_probe_read_kernel, \
480 ___core_read(bpf_probe_read_kernel_str, bpf_probe_read_kernel, \
Dusdt.bpf.h153 err = bpf_probe_read_kernel(&val, sizeof(val), (void *)ctx + arg_spec->reg_off); in bpf_usdt_arg()
165 err = bpf_probe_read_kernel(&val, sizeof(val), (void *)ctx + arg_spec->reg_off); in bpf_usdt_arg()

12