Home
last modified time | relevance | path

Searched refs:bpf_probe_read (Results 1 – 11 of 11) sorted by relevance

/Linux-v4.19/samples/bpf/
Dtest_overhead_kprobe_kern.c12 #define _(P) ({typeof(P) val = 0; bpf_probe_read(&val, sizeof(val), &P); val;})
27 bpf_probe_read(oldcomm, sizeof(oldcomm), &tsk->comm); in prog()
28 bpf_probe_read(newcomm, sizeof(newcomm), (void *)PT_REGS_PARM2(ctx)); in prog()
Dtracex1_kern.c13 #define _(P) ({typeof(P) val = 0; bpf_probe_read(&val, sizeof(val), &P); val;})
36 bpf_probe_read(devname, sizeof(devname), dev->name); in bpf_prog1()
Dtracex5_kern.c49 bpf_probe_read(&sd, sizeof(sd), (void *)PT_REGS_PARM2(ctx)); in PROG()
62 bpf_probe_read(&sd, sizeof(sd), (void *)PT_REGS_PARM2(ctx)); in PROG()
Dtest_map_in_map_kern.c119 ret = bpf_probe_read(dst6, sizeof(dst6), &in6->sin6_addr); in trace_sys_connect()
130 ret = bpf_probe_read(&port, sizeof(port), &in6->sin6_port); in trace_sys_connect()
Dtest_probe_write_user_kern.c39 if (bpf_probe_read(&orig_addr, sizeof(orig_addr), sockaddr_arg) != 0) in bpf_prog1()
Doffwaketime_kern.c14 #define _(P) ({typeof(P) val; bpf_probe_read(&val, sizeof(val), &P); val;})
Dmap_perf_test_kern.c182 ret = bpf_probe_read(test_params.dst6, sizeof(test_params.dst6), in stress_lru_hmap_alloc()
/Linux-v4.19/tools/testing/selftests/bpf/
Dbpf_helpers.h19 static int (*bpf_probe_read)(void *dst, int size, void *unsafe_ptr) = variable
330 bpf_probe_read(&(ip), sizeof(ip), (void *)PT_REGS_RET(ctx)); })
332 bpf_probe_read(&(ip), sizeof(ip), \
Dtest_tcp_estats.c41 #define _(P) ({typeof(P) val = 0; bpf_probe_read(&val, sizeof(val), &P); val;})
/Linux-v4.19/Documentation/bpf/
Dbpf_design_QA.rst160 of ABI. However when tracing programs are using bpf_probe_read() helper
190 Tracing bpf programs can *read* arbitrary memory with bpf_probe_read()
/Linux-v4.19/kernel/trace/
Dbpf_trace.c99 BPF_CALL_3(bpf_probe_read, void *, dst, u32, size, const void *, unsafe_ptr) in BPF_CALL_3() argument
111 .func = bpf_probe_read,