/openbmc/linux/Documentation/bpf/ |
H A D | graph_ds_impl.rst | 6 structures (linked_list, rbtree), with particular focus on the verifier's 9 Although no specific verifier code is referred to in this document, the document 10 assumes that the reader has general knowledge of BPF verifier internals, BPF 37 "node"s, the verifier code and this document refer to common functionality 75 variables are placed in a single-value arraymap. The verifier considers this 109 What should the verifier do with ``n`` after ownership is passed off? If the 133 Both the read from and write to ``n->data`` would be rejected. The verifier 153 The verifier considers such a reference a *non-owning reference*. The ref 168 * If not released before program ends, verifier considers program invalid 184 From verifier's perspective non-owning references can only exist [all …]
|
H A D | verifier.rst | 3 eBPF verifier 18 If verifier sees an insn that does R2=R1, then R2 has now type 70 the verifier will reject the program. 104 Seccomp solves this by two stage verifier: classic BPF verifier is followed 105 by seccomp verifier. In case of eBPF one configurable verifier is shared for 108 See details of eBPF verifier in kernel/bpf/verifier.c 390 verifier state creation; 394 verifier state itself; 397 is read by a some child state of this verifier state; 535 verifier state becomes a valid entry in a set of cached verifier states. [all …]
|
H A D | kfuncs.rst | 59 by the verifier to make the usage of kernel functions safer and more useful. 74 Here, the verifier will treat first argument as a PTR_TO_MEM, and second 83 the verifier must check the scalar argument to be a known constant, which does 97 values don't match during verifier state pruning checks. 117 annotation, the verifier will reject the program if the dynptr passed in is 186 referenced kptr (by invoking bpf_kptr_xchg). If not, the verifier fails the 232 that to the verifier: 347 The verifier will always enforce that the BTF type of a pointer passed to a 349 definition. The verifier, does, however, allow types that are equivalent 478 programs calling the kfunc will be rejected by the verifier. [all …]
|
H A D | bpf_design_QA.rst | 90 Q: What are the verifier limits? 94 program can have. The verifier has various internal limits. 100 calls, a limit to the number of the verifier states per instruction, 104 to be rejected. The verifier used to recognize only pointer + constant 108 The verifier is steadily getting 'smarter'. The limits are 110 be accepted by the verifier is to try to load it. 178 compiling a program. Furthermore, the verifier can now mark the 186 enable zext insertion in the verifier). 189 support for zext. In that case, if verifier zext insertion is enabled, 225 space, but the verifier computes the actual amount of stack used [all …]
|
H A D | index.rst | 15 verifier
|
H A D | clang-notes.rst | 27 instruction, which is not supported by the Linux kernel verifier.
|
H A D | ringbuf.rst | 49 infrastructure that has to be built for observability and verifier support. It 98 submit records of the length that's not known to verifier beforehand. It also 107 be reserved, such that verifier can verify that BPF program can't access memory 118 Each reserved record is tracked by verifier through existing 175 header. This significantly simplifies verifier, as well as improving API
|
H A D | prog_lsm.rst | 90 the BPF verifier to update the offsets for the access at runtime using the 91 Documentation/bpf/btf.rst information. Since the BPF verifier is aware of the
|
H A D | bpf_devel_QA.rst | 250 Q: I made a BPF verifier change, do I need to add test cases for 253 A: If the patch has changes to the behavior of the verifier, then yes, 262 affect prior use-cases. Thus, treat those test cases as: verifier 454 To run the verifier tests:: 458 The verifier tests print out all the current checks being 508 existing ones are adapted to verifier changes e.g. due to verifier 576 generation back end or about LLVM generated code that the verifier 685 into these structures is verified by the BPF verifier and may result
|
H A D | linux-notes.rst | 20 by the verifier. Any programs with this instruction will fail to load
|
/openbmc/linux/fs/nfs/ |
H A D | nfstrace.h | 327 const __be32 *verifier, 340 __array(char, verifier, NFS4_VERIFIER_SIZE) 355 memcpy(__entry->verifier, verifier, 358 memset(__entry->verifier, 0, 380 const __be32 *verifier, \ 1363 memcpy(__entry->verifier, 1364 &verf->verifier, 1381 show_nfs4_verifier(__entry->verifier) 1502 memcpy(__entry->verifier, 1503 &verf->verifier, [all …]
|
H A D | nfs3xdr.c | 275 static __be32 *xdr_encode_cookieverf3(__be32 *p, const __be32 *verifier) in xdr_encode_cookieverf3() argument 277 memcpy(p, verifier, NFS3_COOKIEVERFSIZE); in xdr_encode_cookieverf3() 281 static int decode_cookieverf3(struct xdr_stream *xdr, __be32 *verifier) in decode_cookieverf3() argument 288 memcpy(verifier, p, NFS3_COOKIEVERFSIZE); in decode_cookieverf3() 297 static void encode_createverf3(struct xdr_stream *xdr, const __be32 *verifier) in encode_createverf3() argument 302 memcpy(p, verifier, NFS3_CREATEVERFSIZE); in encode_createverf3() 305 static int decode_writeverf3(struct xdr_stream *xdr, struct nfs_write_verifier *verifier) in decode_writeverf3() argument 312 memcpy(verifier->data, p, NFS3_WRITEVERFSIZE); in decode_writeverf3() 1029 encode_createverf3(xdr, args->verifier); in encode_createhow3() 1703 if (decode_writeverf3(xdr, &result->verf->verifier)) in decode_write3resok() [all …]
|
H A D | nfs42proc.c | 243 memcpy(&res->write_res.verifier, ©->verf, sizeof(copy->verf)); in handle_async_copy() 269 if (nfs_write_verifier_cmp(&res->write_res.verifier.verifier, in process_copy_commit() 270 &cres.verf->verifier)) { in process_copy_commit() 383 nfs_write_verifier_cmp(&res->write_res.verifier.verifier, in _nfs42_proc_copy() 384 &res->commit_res.verf->verifier)) { in _nfs42_proc_copy() 397 res->write_res.verifier.committed != NFS_FILE_SYNC) { in _nfs42_proc_copy()
|
/openbmc/linux/tools/testing/selftests/bpf/ |
H A D | veristat.cfg | 2 # BPF verifier's performance on
|
H A D | README.rst | 107 // the instructions below will not be seen in the verifier log 112 The verifier will reject such code with above error. 115 verifier to understand such speculative pointer arithmetic. 176 The verifier output looks like 204 This cause later verifier failure. The bug has been `fixed`__ in
|
H A D | Makefile | 632 verifier/tests.h: verifier/*.c 633 $(shell ( cd verifier/; \ 638 ) > verifier/tests.h) 639 $(OUTPUT)/test_verifier: test_verifier.c verifier/tests.h $(BPFOBJ) | $(OUTPUT) 710 prog_tests/tests.h map_tests/tests.h verifier/tests.h \
|
/openbmc/u-boot/net/ |
H A D | nfs.c | 445 rpc_pkt.u.reply.verifier || in rpc_lookup_reply() 475 rpc_pkt.u.reply.verifier || in nfs_mount_reply() 501 rpc_pkt.u.reply.verifier || in nfs_umountall_reply() 525 rpc_pkt.u.reply.verifier || in nfs_lookup_reply() 624 rpc_pkt.u.reply.verifier || in nfs_readlink_reply() 671 rpc_pkt.u.reply.verifier || in nfs_read_reply()
|
H A D | nfs.h | 74 uint32_t verifier; member
|
/openbmc/phosphor-ipmi-flash/bmc/firmware-handler/test/ |
H A D | firmware_json_unittest.cpp | 490 auto verifier = reinterpret_cast<SystemdWithStatusFile*>( in TEST() local 492 EXPECT_THAT(verifier->getMode(), "replace"); in TEST() 533 auto verifier = reinterpret_cast<SystemdWithStatusFile*>( in TEST() local 535 EXPECT_THAT(verifier->getMode(), "replace-nope"); in TEST() 577 auto verifier = reinterpret_cast<SystemdWithStatusFile*>( in TEST() local 579 EXPECT_THAT(verifier->getMode(), "replace-nope"); in TEST()
|
/openbmc/linux/include/linux/ |
H A D | nfs_xdr.h | 468 nfs4_verifier verifier; /* EXCLUSIVE */ member 637 struct nfs_write_verifier verifier; member 923 __be32 verifier[2]; member 1140 nfs4_verifier verifier; member 1150 nfs4_verifier verifier; member 1325 nfs4_verifier verifier; member 1472 struct nfs_writeverf verifier; member
|
/openbmc/linux/tools/bpf/bpftool/Documentation/ |
H A D | common_options.rst | 24 logs from libbpf as well as from the verifier, when attempting to
|
/openbmc/linux/drivers/net/ethernet/netronome/nfp/ |
H A D | Makefile | 71 bpf/verifier.o \
|
/openbmc/linux/kernel/bpf/ |
H A D | Makefile | 9 obj-$(CONFIG_BPF_SYSCALL) += syscall.o verifier.o inode.o helpers.o tnum.o log.o
|
/openbmc/linux/Documentation/filesystems/nfs/ |
H A D | client-identifier.rst | 56 - boot verifier: A 64-bit incarnation verifier that enables a 98 client presents a different boot verifier, so it appears to the
|
/openbmc/linux/fs/nfsd/ |
H A D | trace.h | 759 __array(unsigned char, verifier, NFS4_VERIFIER_SIZE) 767 memcpy(__entry->verifier, nn->writeverf, 772 __print_hex_str(__entry->verifier, NFS4_VERIFIER_SIZE) 845 __array(unsigned char, verifier, NFS4_VERIFIER_SIZE) 854 memcpy(__entry->verifier, (void *)&clp->cl_verifier, 860 __print_hex_str(__entry->verifier, NFS4_VERIFIER_SIZE),
|