/linux/tools/testing/selftests/bpf/progs/ |
A D | loop6.c | 43 bpf_probe_read_kernel(&sg, sizeof(sg), sgp); in __sg_next() 49 bpf_probe_read_kernel(&sg, sizeof(sg), sgp); in __sg_next() 60 bpf_probe_read_kernel(&sgp, sizeof(sgp), sgs + i); in get_sgp() 81 bpf_probe_read_kernel(&len, sizeof(len), &sgp->length); in BPF_KPROBE() 90 bpf_probe_read_kernel(&len, sizeof(len), &sgp->length); in BPF_KPROBE()
|
A D | test_task_pt_regs.c | 25 if (bpf_probe_read_kernel(current_regs, PT_REGS_SIZE, regs)) in handle_uprobe() 27 if (bpf_probe_read_kernel(ctx_regs, PT_REGS_SIZE, ctx)) in handle_uprobe()
|
A D | bpf_iter_netlink.c | 41 bpf_probe_read_kernel(&group, sizeof(group), &nlk->groups[0]); in dump_netlink() 58 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in dump_netlink()
|
A D | test_module_attach.c | 95 bpf_probe_read_kernel(&buf, 8, ret); in BPF_PROG() 96 bpf_probe_read_kernel(&buf, 8, (char *)ret + 256); in BPF_PROG()
|
A D | kfree_skb.c | 88 bpf_probe_read_kernel(&pkt_type, sizeof(pkt_type), _(&skb->__pkt_type_offset)); in BPF_PROG() 92 bpf_probe_read_kernel(&pkt_data, sizeof(pkt_data), data + 12); in BPF_PROG()
|
A D | test_skb_helpers.c | 25 bpf_probe_read_kernel(&tpid , sizeof(tpid), &task->tgid); in test_skb_helpers()
|
A D | test_probe_user.c | 40 bpf_probe_read_kernel(&ptr, sizeof(ptr), &PT_REGS_PARM2(real_regs)); in BPF_KPROBE()
|
A D | test_skmsg_load_helpers.c | 40 bpf_probe_read_kernel(&tpid , sizeof(tpid), &task->tgid); in prog_msg_verdict()
|
A D | bpf_iter_unix.c | 20 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
|
A D | bpf_iter_udp4.c | 20 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
|
A D | bpf_iter_udp6.c | 27 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
|
A D | fexit_bpf2bpf.c | 72 bpf_probe_read_kernel(&len, sizeof(len), in test_subprog2()
|
A D | test_varlen.c | 152 if (bpf_probe_read_kernel(&bla, sizeof(bla), 0)) in handler_exit()
|
A D | test_tcp_estats.c | 41 #define _(P) ({typeof(P) val = 0; bpf_probe_read_kernel(&val, sizeof(val), &P); val;})
|
A D | bpf_iter_tcp4.c | 59 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
|
A D | bpf_iter_tcp6.c | 59 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
|
/linux/samples/bpf/ |
A D | tracex1_kern.c | 17 bpf_probe_read_kernel(&val, sizeof(val), &(P)); \ 38 bpf_probe_read_kernel(&skb, sizeof(skb), (void *)PT_REGS_PARM1(ctx)); in bpf_prog1() 42 bpf_probe_read_kernel(devname, sizeof(devname), dev->name); in bpf_prog1()
|
A D | test_overhead_kprobe_kern.c | 16 bpf_probe_read_kernel(&val, sizeof(val), &(P)); \ 33 bpf_probe_read_kernel(oldcomm, sizeof(oldcomm), &tsk->comm); in prog() 34 bpf_probe_read_kernel(newcomm, sizeof(newcomm), in prog()
|
A D | tracex5_kern.c | 50 bpf_probe_read_kernel(&sd, sizeof(sd), (void *)PT_REGS_PARM2(ctx)); in PROG() 63 bpf_probe_read_kernel(&sd, sizeof(sd), (void *)PT_REGS_PARM2(ctx)); in PROG()
|
A D | offwaketime_kern.c | 18 bpf_probe_read_kernel(&val, sizeof(val), &(P)); \
|
/linux/tools/lib/bpf/ |
A D | bpf_core_read.h | 45 bpf_probe_read_kernel( \ 55 bpf_probe_read_kernel( \ 206 bpf_probe_read_kernel(dst, sz, (const void *)__builtin_preserve_access_index(src))
|
A D | bpf_tracing.h | 333 ({ bpf_probe_read_kernel(&(ip), sizeof(ip), (void *)PT_REGS_RET(ctx)); }) 335 ({ bpf_probe_read_kernel(&(ip), sizeof(ip), \
|
/linux/tools/bpf/bpftool/skeleton/ |
A D | pid_iter.bpf.c | 74 bpf_probe_read_kernel(&e.comm, sizeof(e.comm), in iter()
|
/linux/kernel/bpf/preload/iterators/ |
A D | iterators.bpf.c | 69 bpf_probe_read_kernel(&t, sizeof(t), types + btf_id); in get_name()
|
/linux/kernel/trace/ |
A D | bpf_trace.c | 226 BPF_CALL_3(bpf_probe_read_kernel, void *, dst, u32, size, in BPF_CALL_3() argument 233 .func = bpf_probe_read_kernel,
|