Searched refs:bpf_probe_read (Results 1 – 11 of 11) sorted by relevance
/Linux-v4.19/samples/bpf/ |
D | test_overhead_kprobe_kern.c | 12 #define _(P) ({typeof(P) val = 0; bpf_probe_read(&val, sizeof(val), &P); val;}) 27 bpf_probe_read(oldcomm, sizeof(oldcomm), &tsk->comm); in prog() 28 bpf_probe_read(newcomm, sizeof(newcomm), (void *)PT_REGS_PARM2(ctx)); in prog()
|
D | tracex1_kern.c | 13 #define _(P) ({typeof(P) val = 0; bpf_probe_read(&val, sizeof(val), &P); val;}) 36 bpf_probe_read(devname, sizeof(devname), dev->name); in bpf_prog1()
|
D | tracex5_kern.c | 49 bpf_probe_read(&sd, sizeof(sd), (void *)PT_REGS_PARM2(ctx)); in PROG() 62 bpf_probe_read(&sd, sizeof(sd), (void *)PT_REGS_PARM2(ctx)); in PROG()
|
D | test_map_in_map_kern.c | 119 ret = bpf_probe_read(dst6, sizeof(dst6), &in6->sin6_addr); in trace_sys_connect() 130 ret = bpf_probe_read(&port, sizeof(port), &in6->sin6_port); in trace_sys_connect()
|
D | test_probe_write_user_kern.c | 39 if (bpf_probe_read(&orig_addr, sizeof(orig_addr), sockaddr_arg) != 0) in bpf_prog1()
|
D | offwaketime_kern.c | 14 #define _(P) ({typeof(P) val; bpf_probe_read(&val, sizeof(val), &P); val;})
|
D | map_perf_test_kern.c | 182 ret = bpf_probe_read(test_params.dst6, sizeof(test_params.dst6), in stress_lru_hmap_alloc()
|
/Linux-v4.19/tools/testing/selftests/bpf/ |
D | bpf_helpers.h | 19 static int (*bpf_probe_read)(void *dst, int size, void *unsafe_ptr) = variable 330 bpf_probe_read(&(ip), sizeof(ip), (void *)PT_REGS_RET(ctx)); }) 332 bpf_probe_read(&(ip), sizeof(ip), \
|
D | test_tcp_estats.c | 41 #define _(P) ({typeof(P) val = 0; bpf_probe_read(&val, sizeof(val), &P); val;})
|
/Linux-v4.19/Documentation/bpf/ |
D | bpf_design_QA.rst | 160 of ABI. However when tracing programs are using bpf_probe_read() helper 190 Tracing bpf programs can *read* arbitrary memory with bpf_probe_read()
|
/Linux-v4.19/kernel/trace/ |
D | bpf_trace.c | 99 BPF_CALL_3(bpf_probe_read, void *, dst, u32, size, const void *, unsafe_ptr) in BPF_CALL_3() argument 111 .func = bpf_probe_read,
|