| /kernel/bpf/ |
| A D | bpf_struct_ops.c | 181 u32 nargs, arg_no, info_cnt = 0; in prepare_arg_info() local 208 nargs = btf_type_vlen(func_proto); in prepare_arg_info() 209 if (nargs != btf_type_vlen(stub_func_proto)) { in prepare_arg_info() 215 if (!nargs) in prepare_arg_info() 221 info_buf = kcalloc(nargs, sizeof(*info_buf), GFP_KERNEL); in prepare_arg_info() 227 for (arg_no = 0; arg_no < nargs; arg_no++) { in prepare_arg_info()
|
| A D | btf.c | 7362 u32 i, nargs; in btf_distill_func_proto() local 7379 nargs = btf_type_vlen(func); in btf_distill_func_proto() 7380 if (nargs > MAX_BPF_FUNC_ARGS) { in btf_distill_func_proto() 7383 tname, nargs); in btf_distill_func_proto() 7396 for (i = 0; i < nargs; i++) { in btf_distill_func_proto() 7421 m->nr_args = nargs; in btf_distill_func_proto() 7680 u32 i, nargs, btf_id; in btf_prepare_func_args() local 7723 nargs = btf_type_vlen(t); in btf_prepare_func_args() 7724 if (nargs > MAX_BPF_FUNC_REG_ARGS) { in btf_prepare_func_args() 7746 for (i = 0; i < nargs; i++) { in btf_prepare_func_args() [all …]
|
| A D | verifier.c | 12357 int argno, int nargs) in get_kfunc_ptr_arg_type() argument 12429 if (argno + 1 < nargs && in get_kfunc_ptr_arg_type() 13012 u32 i, nargs; in check_kfunc_args() local 13016 nargs = btf_type_vlen(meta->func_proto); in check_kfunc_args() 13017 if (nargs > MAX_BPF_FUNC_REG_ARGS) { in check_kfunc_args() 13018 verbose(env, "Function %s has %d > %d args\n", func_name, nargs, in check_kfunc_args() 13026 for (i = 0; i < nargs; i++) { in check_kfunc_args() 13123 kf_arg_type = get_kfunc_ptr_arg_type(env, meta, t, ref_t, ref_tname, args, i, nargs); in check_kfunc_args() 13750 u32 i, nargs, ptr_type_id, release_ref_obj_id; in check_kfunc_call() local 14069 nargs = btf_type_vlen(meta.func_proto); in check_kfunc_call() [all …]
|
| /kernel/ |
| A D | auditsc.c | 1382 int nargs = context->socketcall.nargs; in show_special() local 1384 audit_log_format(ab, "nargs=%d", nargs); in show_special() 1385 for (i = 0; i < nargs; i++) in show_special() 2668 int __audit_socketcall(int nargs, unsigned long *args) in __audit_socketcall() argument 2672 if (nargs <= 0 || nargs > AUDITSC_ARGS || !args) in __audit_socketcall() 2675 context->socketcall.nargs = nargs; in __audit_socketcall() 2676 memcpy(context->socketcall.args, args, nargs * sizeof(unsigned long)); in __audit_socketcall()
|
| A D | audit.h | 157 int nargs; member
|
| /kernel/trace/ |
| A D | trace_eprobe.c | 198 int nargs) in alloc_event_probe() argument 211 ep = kzalloc(struct_size(ep, tp.args, nargs), GFP_KERNEL); in alloc_event_probe() 224 ret = trace_probe_init(&ep->tp, this_event, group, false, nargs); in alloc_event_probe()
|
| A D | trace_fprobe.c | 573 int nargs, bool is_return, in alloc_trace_fprobe() argument 579 tf = kzalloc(struct_size(tf, tp.args, nargs), GFP_KERNEL); in alloc_trace_fprobe() 594 ret = trace_probe_init(&tf->tp, event, group, false, nargs); in alloc_trace_fprobe()
|
| A D | trace_uprobe.c | 336 alloc_trace_uprobe(const char *group, const char *event, int nargs, bool is_ret) in alloc_trace_uprobe() argument 341 tu = kzalloc(struct_size(tu, tp.args, nargs), GFP_KERNEL); in alloc_trace_uprobe() 351 ret = trace_probe_init(&tu->tp, event, group, true, nargs); in alloc_trace_uprobe()
|
| A D | trace_probe.c | 2058 const char *group, bool alloc_filter, int nargs) in trace_probe_init() argument 2094 tp->nr_args = nargs; in trace_probe_init() 2096 if (nargs) in trace_probe_init() 2097 memset(tp->args, 0, sizeof(tp->args[0]) * nargs); in trace_probe_init()
|
| A D | trace_kprobe.c | 272 int nargs, bool is_return) in alloc_trace_kprobe() argument 277 tk = kzalloc(struct_size(tk, tp.args, nargs), GFP_KERNEL); in alloc_trace_kprobe() 303 ret = trace_probe_init(&tk->tp, event, group, false, nargs); in alloc_trace_kprobe()
|
| A D | trace_probe.h | 351 const char *group, bool alloc_filter, int nargs);
|