/Linux-v5.10/samples/bpf/ |
D | test_overhead_kprobe_kern.c | 16 bpf_probe_read_kernel(&val, sizeof(val), &(P)); \ 33 bpf_probe_read_kernel(oldcomm, sizeof(oldcomm), &tsk->comm); in prog() 34 bpf_probe_read_kernel(newcomm, sizeof(newcomm), in prog()
|
D | tracex1_kern.c | 17 bpf_probe_read_kernel(&val, sizeof(val), &(P)); \ 42 bpf_probe_read_kernel(devname, sizeof(devname), dev->name); in bpf_prog1()
|
D | tracex5_kern.c | 50 bpf_probe_read_kernel(&sd, sizeof(sd), (void *)PT_REGS_PARM2(ctx)); in PROG() 63 bpf_probe_read_kernel(&sd, sizeof(sd), (void *)PT_REGS_PARM2(ctx)); in PROG()
|
D | offwaketime_kern.c | 18 bpf_probe_read_kernel(&val, sizeof(val), &(P)); \
|
/Linux-v5.10/tools/testing/selftests/bpf/progs/ |
D | bpf_iter_netlink.c | 42 bpf_probe_read_kernel(&group, sizeof(group), &nlk->groups[0]); in dump_netlink() 59 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in dump_netlink()
|
D | kfree_skb.c | 88 bpf_probe_read_kernel(&pkt_type, sizeof(pkt_type), _(&skb->__pkt_type_offset)); in BPF_PROG() 92 bpf_probe_read_kernel(&pkt_data, sizeof(pkt_data), data + 12); in BPF_PROG()
|
D | test_skb_helpers.c | 25 bpf_probe_read_kernel(&tpid , sizeof(tpid), &task->tgid); in test_skb_helpers()
|
D | test_skmsg_load_helpers.c | 40 bpf_probe_read_kernel(&tpid , sizeof(tpid), &task->tgid); in prog_msg_verdict()
|
D | bpf_iter_udp4.c | 21 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
|
D | bpf_iter_udp6.c | 28 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
|
D | test_varlen.c | 152 if (bpf_probe_read_kernel(&bla, sizeof(bla), 0)) in handler_exit()
|
D | fexit_bpf2bpf.c | 72 bpf_probe_read_kernel(&len, sizeof(len), in test_subprog2()
|
D | test_tcp_estats.c | 41 #define _(P) ({typeof(P) val = 0; bpf_probe_read_kernel(&val, sizeof(val), &P); val;})
|
D | bpf_iter_tcp4.c | 60 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
|
D | bpf_iter_tcp6.c | 60 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
|
/Linux-v5.10/tools/lib/bpf/ |
D | bpf_core_read.h | 45 bpf_probe_read_kernel( \ 55 bpf_probe_read_kernel( \ 198 bpf_probe_read_kernel(dst, sz, \
|
D | bpf_tracing.h | 292 ({ bpf_probe_read_kernel(&(ip), sizeof(ip), (void *)PT_REGS_RET(ctx)); }) 294 ({ bpf_probe_read_kernel(&(ip), sizeof(ip), \
|
/Linux-v5.10/tools/bpf/bpftool/skeleton/ |
D | pid_iter.bpf.c | 74 bpf_probe_read_kernel(&e.comm, sizeof(e.comm), in iter()
|
/Linux-v5.10/kernel/bpf/preload/iterators/ |
D | iterators.bpf.c | 70 bpf_probe_read_kernel(&t, sizeof(t), types + btf_id); in get_name()
|
/Linux-v5.10/kernel/trace/ |
D | bpf_trace.c | 231 BPF_CALL_3(bpf_probe_read_kernel, void *, dst, u32, size, in BPF_CALL_3() argument 238 .func = bpf_probe_read_kernel,
|
/Linux-v5.10/kernel/bpf/ |
D | core.c | 1358 u64 __weak bpf_probe_read_kernel(void *dst, u32 size, const void *unsafe_ptr) in bpf_probe_read_kernel() function 1621 bpf_probe_read_kernel(&DST, SIZE, (const void *)(long) (SRC + insn->off)); \ in ___bpf_prog_run()
|