Lines Matching refs:programs
32 A: Because BPF programs are designed to run in the linux kernel
49 Q: can BPF programs access instruction pointer or return address?
53 Q: can BPF programs access stack pointer ?
69 BPF programs and programs call kernel helpers with zero overhead.
71 for JITed BPF programs that are indistinguishable from
135 workaround would be acceptable. Turned out that programs lose performance
158 A: YES. BPF instructions, arguments to BPF programs, set of helper
160 of ABI. However when tracing programs are using bpf_probe_read() helper
164 to prevent accidentally loading kprobe-based bpf programs written
165 for a different kernel. Networking programs don't do kern_version check.
179 A: NO. Classic BPF programs are converted into extend BPF instructions.
183 A: NO. BPF programs can only call a set of helper functions which
190 Tracing bpf programs can *read* arbitrary memory with bpf_probe_read()
191 and bpf_probe_read_str() helpers. Networking programs cannot read
199 Tracing BPF programs can overwrite the user memory
203 Tracing BPF programs are root only.
211 programs need to pass data to user space. Like bpf_perf_event_output()