/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | trace_printk.c | 19 trace_printk_ret = bpf_trace_printk(fmt, sizeof(fmt),
|
H A D | test_xdp_devmap_helpers.c | 16 bpf_trace_printk(fmt, sizeof(fmt),
|
H A D | uninit_stack.c | 73 call %[bpf_trace_printk]; \ 82 : __imm(bpf_trace_printk),
|
H A D | dev_cgroup.c | 41 bpf_trace_printk(fmt, sizeof(fmt), ctx->major, ctx->minor);
|
H A D | test_xdp_with_devmap_helpers.c | 38 bpf_trace_printk(fmt, sizeof(fmt),
|
H A D | verifier_movsx.c | 219 call %[bpf_trace_printk]; \ 223 : __imm(bpf_trace_printk)
|
H A D | verifier_helper_value_access.c | 93 * be zero (i.e. bpf_trace_printk() declares the second argument to be 112 call %[bpf_trace_printk]; \ 116 __imm(bpf_trace_printk), 144 call %[bpf_trace_printk]; \ 148 __imm(bpf_trace_printk), 275 call %[bpf_trace_printk]; \ 279 __imm(bpf_trace_printk), 441 call %[bpf_trace_printk]; \ 445 __imm(bpf_trace_printk), 612 call %[bpf_trace_printk]; \ [all...] |
H A D | verifier_unpriv.c | 168 call %[bpf_trace_printk]; \ 172 : __imm(bpf_trace_printk)
|
/linux-master/tools/perf/util/bpf_skel/ |
H A D | bench_uprobe.bpf.c | 19 bpf_trace_printk(fmt, sizeof(fmt), ++nr_uprobes);
|
/linux-master/samples/bpf/ |
H A D | sock_flags.bpf.c | 15 bpf_trace_printk(fmt, sizeof(fmt), sk->family, sk->type, sk->protocol); 16 bpf_trace_printk(fmt2, sizeof(fmt2), uid, gid); 34 bpf_trace_printk(fmt, sizeof(fmt), sk->family, sk->type, sk->protocol);
|
H A D | test_cgrp2_tc.bpf.c | 44 bpf_trace_printk(dont_care_msg, sizeof(dont_care_msg), 48 bpf_trace_printk(pass_msg, sizeof(pass_msg)); 51 bpf_trace_printk(reject_msg, sizeof(reject_msg));
|
H A D | tracex5.bpf.c | 40 bpf_trace_printk(fmt, sizeof(fmt), sc_nr); 53 bpf_trace_printk(fmt, sizeof(fmt), 66 bpf_trace_printk(fmt, sizeof(fmt), 77 bpf_trace_printk(fmt, sizeof(fmt)); 87 bpf_trace_printk(fmt, sizeof(fmt));
|
H A D | trace_event_kern.c | 57 bpf_trace_printk(fmt, sizeof(fmt), cpu, ctx->sample_period, 64 bpf_trace_printk(time_fmt1, sizeof(time_fmt1), value_buf.enabled, value_buf.running); 66 bpf_trace_printk(time_fmt2, sizeof(time_fmt2), ret); 69 bpf_trace_printk(addr_fmt, sizeof(addr_fmt), ctx->addr);
|
H A D | tracex1.bpf.c | 39 /* using bpf_trace_printk() for DEBUG ONLY */ 40 bpf_trace_printk(fmt, sizeof(fmt), skb, len);
|
H A D | tc_l2_redirect_kern.c | 86 bpf_trace_printk(fmt4, sizeof(fmt4), *ifindex, 100 bpf_trace_printk(fmt6, sizeof(fmt6), *ifindex, 138 bpf_trace_printk(fmt4, sizeof(fmt4), _htonl(daddr), *ifindex); 176 bpf_trace_printk(fmt4, sizeof(fmt4), _htonl(iph->daddr), 188 bpf_trace_printk(fmt6, sizeof(fmt6),
|
H A D | parse_varlen.c | 44 bpf_trace_printk(fmt, sizeof(fmt));
|
H A D | test_lwt_bpf.c | 21 bpf_trace_printk(____fmt, sizeof(____fmt), \
|
H A D | map_perf_test.bpf.c | 243 bpf_trace_printk(fmt, sizeof(fmt), ret);
|
/linux-master/kernel/trace/ |
H A D | bpf_trace.h | 11 TRACE_EVENT(bpf_trace_printk,
|
H A D | bpf_trace.c | 375 BPF_CALL_5(bpf_trace_printk, char *, fmt, u32, fmt_size, u64, arg1, 400 .func = bpf_trace_printk, 410 * This program might be calling bpf_trace_printk, 411 * so enable the associated bpf_trace/bpf_trace_printk event. 413 * disabled bpf_trace_printk events. By loading a program 414 * calling bpf_trace_printk() however the user has expressed 417 if (trace_set_clr_event("bpf_trace", "bpf_trace_printk", 1)) 418 pr_warn_ratelimited("could not enable bpf_trace_printk events");
|
/linux-master/tools/lib/bpf/ |
H A D | bpf_helpers.h | 273 bpf_trace_printk(____fmt, sizeof(____fmt), \
|